BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (579)
use (402)
system (261)
model (241)
analysi (207)

Stem method$ (all stems)

3321 papers:

QoSAQoSA-2015-DurisicST #architecture #identification #set #standard
Identifying Optimal Sets of Standardized Architectural Features: A Method and its Automotive Application (DD, MS, MT), pp. 103–112.
CASECASE-2015-BjorkenstamCL
Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning (SB, JSC, BL), pp. 769–774.
CASECASE-2015-DasCQMTMK #automation #monitoring #precise
Devices, systems, and methods for automated monitoring enabling precision agriculture (JD, GC, CQ, AM, PT, YM, VK), pp. 462–469.
CASECASE-2015-HayakawaI #fault #linear #reduction
GPS error range reduction method based on linear kinematic model (TH, MI), pp. 1515–1520.
CASECASE-2015-HolmOFUHAK #evolution #industrial #integration #performance #process
Engineering method for the integration of modules into fast evolving production systems in the process industry (TH, MO, AF, LU, UH, TA, SK), pp. 1042–1047.
CASECASE-2015-KaoLJ #mobile
Application of potential field method and optimal path planning to mobile robot control (CCK, CML, JGJ), pp. 1552–1554.
CASECASE-2015-Lee #locality #mobile #reliability
A reliable range-free indoor localization method for mobile robots (YCL), pp. 720–727.
CASECASE-2015-LiuY #modelling #predict #self
A self-organizing method for predictive modeling with highly-redundant variables (GL, HY), pp. 1084–1089.
CASECASE-2015-LiX #energy #learning #multi
A multi-grid reinforcement learning method for energy conservation and comfort of HVAC in buildings (BL, LX), pp. 444–449.
CASECASE-2015-LuTZ #assessment #design #estimation #industrial #modelling
Model-based temperature estimation methods in design of industrial manipulator and their assessment (QL, GT, JZ), pp. 1242–1248.
CASECASE-2015-WangZ #modelling #predict #simulation
A prediction method for interior temperature of grain storage via dynamics models: A simulation study (DW, XZ), pp. 1477–1483.
CASECASE-2015-YanLP #fault
A fault diagnosis method for HVAC Air Handling Units considering fault propagation (YY, PBL, KRP), pp. 961–966.
DACDAC-2015-DunbarQ
A practical circuit fingerprinting method utilizing observability don’t care conditions (CD, GQ), p. 6.
DACDAC-2015-HelalBH #parallel #simulation #using
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-SeshiaSS #formal method
Formal methods for semi-autonomous driving (SAS, DS, SSS), p. 5.
DACDAC-2015-WangLYSOC #grid #novel #power management #reduction
Novel power grid reduction method based on L1 regularization (YW, ML, XY, ZS, MO, CC), p. 6.
DACDAC-2015-WangLZYW #architecture #configuration management #control flow
Acceleration of control flows on reconfigurable architecture with a composite method (JW, LL, JZ, SY, SW), p. 6.
DATEDATE-2015-AfacanBPDB #hybrid #monte carlo
A hybrid Quasi Monte Carlo method for yield aware analog circuit sizing tool (EA, GB, AEP, GD, IFB), pp. 1225–1228.
DATEDATE-2015-AwanoHS #named #performance #probability
ECRIPSE: an efficient method for calculating RTN-induced failure probability of an SRAM cell (HA, MH, TS), pp. 549–554.
DATEDATE-2015-FrancqF #detection #hardware
Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATEDATE-2015-KadryKMNSPPJS #case study #comparative #generative #simulation #testing
Comparative study of test generation methods for simulation accelerators (WK, DK, AM, AN, VS, JSP, SBP, WJ, JCS), pp. 321–324.
DATEDATE-2015-LiaperdosAT #detection #estimation #fault #probability #testing
A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
DATEDATE-2015-LiFBLON #design
Thermal aware design method for VCSEL-based on-chip optical interconnect (HL, AF, SLB, XL, IO, GN), pp. 1120–1125.
DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-OyaSYT #classification #identification
A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
DATEDATE-2015-RustP #approximate #design #multi
Design method for multiplier-less two-variable numeric function approximation (JR, SP), pp. 948–953.
DATEDATE-2015-SuHL #encoding #named #recognition #scalability
SubHunter: a high-performance and scalable sub-circuit recognition method with Prüfer-encoding (HYS, CHH, YLL), pp. 1583–1586.
DRRDRR-2015-FuLLQT #diagrams #learning #multi #retrieval
A diagram retrieval method with multi-label learning (SF, XL, LL, JQ, ZT).
HTHT-2015-BerettaMCM #interactive #twitter
An Interactive Method for Inferring Demographic Attributes in Twitter (VB, DM, TC, EM), pp. 113–122.
HTHT-2015-Jain #automation #social
Automated Methods for Identity Resolution across Heterogeneous Social Platforms (PJ), pp. 307–310.
SIGMODSIGMOD-2015-ArulrajPD #database #memory management
Let’s Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems (JA, AP, SD), pp. 707–722.
VLDBVLDB-2015-KatsarouNT #performance #query #scalability
Performance and Scalability of Indexed Subgraph Query Processing Methods (FK, NN, PT), pp. 1566–1577.
VLDBVLDB-2015-NaidanBN #performance #permutation
Permutation Search Methods are Efficient, Yet Faster Search is Possible (BN, LB, EN), pp. 1618–1629.
ITiCSEITiCSE-2015-ChaudhariD #formal method
Introducing Formal Methods via Program Derivation (DLC, OPD), pp. 266–271.
TACASTACAS-2015-ZengSLH #precise #predict
A Method for Improving the Precision and Coverage of Atomicity Violation Predictions (RZ, ZS, SL, XH), pp. 116–130.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-AsaduzzamanRMS #api #parametricity #recommendation
Exploring API method parameter recommendations (MA, CKR, SM, KAS), pp. 271–280.
ICSMEICSME-2015-AsaduzzamanRS #api #named #parametricity #recommendation
PARC: Recommending API methods parameters (MA, CKR, KAS), pp. 330–332.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification #using
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-WuMKGI #consistency #detection #nondeterminism #open source #scalability
A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
SANERSANER-2015-HashimotoMI #fine-grained #scalability #source code
A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
SCAMSCAM-2015-GhafariGR #automation #identification #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
SCAMSCAM-2015-SteidlD #how #java #question
How do Java methods grow? (DS, FD), pp. 151–160.
SASSAS-2015-RapoportLT #analysis #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
STOCSTOC-2015-AmbainisFG #matrix #multi #performance
Fast Matrix Multiplication: Limitations of the Coppersmith-Winograd Method (AA, YF, FLG), pp. 585–593.
STOCSTOC-2015-BarakKS #composition #learning #taxonomy
Dictionary Learning and Tensor Decomposition via the Sum-of-Squares Method (BB, JAK, DS), pp. 143–151.
STOCSTOC-2015-FearnleyS #complexity
The Complexity of the Simplex Method (JF, RS), pp. 201–208.
CIAACIAA-2015-Hulden #automaton #finite #regular expression
From Two-Way to One-Way Finite Automata — Three Regular Expression-Based Methods (MH), pp. 176–187.
ICALPICALP-v1-2015-BhattacharyaHI #algorithm #design
Design of Dynamic Algorithms via Primal-Dual Method (SB, MH, GFI), pp. 206–218.
CHICHI-2015-Clarke #design
The Work of Mad Men that Makes the Methods of Math Men Work: Practically Occasioned Segment Design (MFC), pp. 3275–3284.
CHICHI-2015-JokinenSPS #validation
Quick Affective Judgments: Validation of a Method for Primed Product Comparisons (JPPJ, JMS, PMHP, PS), pp. 2221–2230.
CHICHI-2015-JonesCDTPDH #delphi #information management #using
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-OLearyEKVRP #approach #comprehension #design #health #trade-off
Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
HCIDHM-EH-2015-NakamuraYTLK
The Digital Reminiscence Method: Effect on Dementia in Japanese Day Care Centers (MN, TY, KT, ML, NK), pp. 482–489.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-YamamotoABKGO
Caregiver’s Eye Gaze and Field of View Presumption Method During Bathing Care in Elderly Facility (AY, TA, HCBJ, NK, AG, TO), pp. 524–532.
HCIDHM-HM-2015-EndoKSOTGH #case study
Study on Method of Observing Maki-e Crafts Work in Urushi Craftspeople (AE, NK, YS, IO, YT, AG, HH), pp. 35–45.
HCIDHM-HM-2015-KikuchiSTGH #information management
An Investigation on Conversion from Tacit Knowledge to Explicit Knowledge in Hand Lay-Up Fabrication Method (TK, ES, YT, AG, HH), pp. 114–123.
HCIDHM-HM-2015-KikuchiSZTGH #quantifier
Effects of Quantified Instructional Tool on Spray-up Fabrication Method (TK, ES, YZ, YT, AG, HH), pp. 104–113.
HCIDHM-HM-2015-MigakiOTMKIH #experience
The Relationship Between Mechanical Properties and the Method Technique of GFRP Plate by Hand Lay-up Method: Effect of the Workers Experience (MM, KO, RT, YM, EK, DI, HH), pp. 143–153.
HCIDHM-HM-2015-WangHM #case study
A Study on Characteristic of Calligraphy Characters Part 1 Analytical Method with Computer Technology (ZW, IH, ZM), pp. 419–428.
HCIDUXU-DD-2015-ChasanidouGL #design #tool support
Design Thinking Methods and Tools for Innovation (DC, AAG, EL), pp. 12–23.
HCIDUXU-DD-2015-FilippiBS #design #interactive
Investigating Synergies Between Interaction Design Methods (SF, DB, PAS), pp. 179–190.
HCIDUXU-DD-2015-RenziF #delphi #human-computer
Delphi Method to Explore Future Scenario Possibilities on Technology and HCI (ABR, SFdF), pp. 644–653.
HCIDUXU-IXD-2015-YangWP #empirical #research
New Research Methods for Media and Cognition Experiment Course (YY, SW, LP), pp. 327–334.
HCIHCI-DE-2015-JensenRB #collaboration #design #interactive
An Interaction Design Method to Support the Expression of User Intentions in Collaborative Systems (CJJ, JCdR, RB), pp. 214–226.
HCIHCI-IT-2015-BakaevA #complexity #human-computer #optimisation #user interface
Defining and Optimizing User Interfaces Information Complexity for AI Methods Application in HCI (MB, TA), pp. 397–405.
HCIHCI-IT-2015-GuXCZ #using
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HuhJIKKP #case study #comparison #interactive
Preliminary Study to Determine a “User-Friendly” Bending Method: Comparison Between Bending and Touch Interaction (BH, HJ, SI, HSK, GK, JP), pp. 175–183.
HCIHCI-IT-2015-MurataMT #comparison
Optimal Scroll Method for Eye-Gaze Input System — Comparison of R-E and R-S Compatibility (AM, MM, YT), pp. 86–93.
HCIHCI-UC-2015-Obwegeser #development #matter #why
Entrepreneurial IS Development: Why Techniques Matter and Methods Don’t (NO), pp. 218–225.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-Iwata #difference #learning
Method to Generate an Operation Learning Support System by Shortcut Key Differences in Similar Software (HI), pp. 332–340.
HCIHIMI-IKC-2015-KosakaN #behaviour #education
Education Method for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 225–232.
HCIHIMI-IKC-2015-RobertsACC #communication #complexity
A Method for Calculating Air Traffic Controller Communication Complexity (ZR, BA, JC, DC), pp. 25–32.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking #using
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-UeokaI #development
Development of the Horror Emotion Amplification System by Means of Biofeedback Method (RU, KI), pp. 657–665.
HCIHIMI-IKD-2015-0002S #approach #visualisation
An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
HCIHIMI-IKD-2015-ArgyleLG #evaluation #predict
Evaluation of Data Display Methods in a Flash Flood Prediction Tool (EMA, CL, JJG), pp. 15–22.
HCIHIMI-IKD-2015-HallettASRDJV #case study #comparative #design #usability #web
The Usability of Magnification Methods: A Comparative Study Between Screen Magnifiers and Responsive Web Design (ECH, BA, JS, ZR, WD, TJ, KPLV), pp. 181–189.
HCIHIMI-IKD-2015-IchiharaHIK #behaviour #metric
Presentation Method of Walking Sensation Based on Walking Behavior Measurement with Inertial Sensors and Pressure Sensors (KI, KH, YI, MK), pp. 374–385.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
ICEISICEIS-v1-2015-BousdekisMAM
Supporting the Selection of Prognostic-based Decision Support Methods in Manufacturing (AB, BM, DA, GM), pp. 487–494.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-VaroneA #multi #using
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v1-2015-Xylogiannopoulos #detection #roadmap
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-PepinAAB #legacy
A Method for Business-IT Alignment of Legacy Systems (JP, PA, CA, EB), pp. 229–237.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ECIRECIR-2015-ValcarcePB #case study #modelling #recommendation
A Study of Smoothing Methods for Relevance-Based Language Modelling of Recommender Systems (DV, JP, AB), pp. 346–351.
ECIRECIR-2015-VieiraSCM #self #web
A Self-training CRF Method for Recognizing Product Model Mentions in Web Forums (HSV, ASdS, MC, ESdM), pp. 257–264.
ICMLICML-2015-AybatWI #distributed #optimisation
An Asynchronous Distributed Proximal Gradient Method for Composite Convex Optimization (NSA, ZW, GI), pp. 2454–2462.
ICMLICML-2015-BoutsidisKG #clustering
Spectral Clustering via the Power Method — Provably (CB, PK, AG), pp. 40–48.
ICMLICML-2015-ChazalFLMRW #persistent
Subsampling Methods for Persistent Homology (FC, BF, FL, BM, AR, LAW), pp. 2143–2151.
ICMLICML-2015-EneN #coordination #random
Random Coordinate Descent Methods for Minimizing Decomposable Submodular Functions (AE, HLN), pp. 787–795.
ICMLICML-2015-GarberH #performance #set
Faster Rates for the Frank-Wolfe Method over Strongly-Convex Sets (DG, EH), pp. 541–549.
ICMLICML-2015-GhoshdastidarD #clustering
A Provable Generalized Tensor Spectral Method for Uniform Hypergraph Partitioning (DG, AD), pp. 400–409.
ICMLICML-2015-GongY #analysis #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-LimKPJ #performance #scalability #set
Double Nyström Method: An Efficient and Accurate Nyström Scheme for Large-Scale Data Sets (WL, MK, HP, KJ), pp. 1367–1375.
ICMLICML-2015-NaessethLS #monte carlo
Nested Sequential Monte Carlo Methods (CAN, FL, TBS), pp. 1292–1301.
ICMLICML-2015-TheisH #probability #streaming
A trust-region method for stochastic variational inference with applications to streaming data (LT, MDH), pp. 2503–2511.
ICMLICML-2015-ZhangL #coordination #empirical #probability
Stochastic Primal-Dual Coordinate Method for Regularized Empirical Risk Minimization (YZ, XL), pp. 353–361.
ICMLICML-2015-ZhaoYZL #adaptation #multi #probability
Adaptive Stochastic Alternating Direction Method of Multipliers (PZ, JY, TZ, PL), pp. 69–77.
ICMLICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-GleichM #algorithm #graph #learning #using
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-Gomez-Rodriguez #machine learning #modelling #network #probability #problem #research #social
Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods (MGR, LS), pp. 2315–2316.
KDDKDD-2015-KadkhodaieCSB #multi
Accelerated Alternating Direction Method of Multipliers (MK, KC, MS, AB), pp. 497–506.
KDDKDD-2015-NikolaevDGUGS #composition #evaluation #online
Extreme States Distribution Decomposition Method for Search Engine Online Evaluation (KN, AD, EG, AU, GG, PS), pp. 845–854.
MLDMMLDM-2015-Prado #classification #named
MOGACAR: A Method for Filtering Interesting Classification Association Rules (DBP), pp. 172–183.
MLDMMLDM-2015-TanGZ #incremental #kernel #named
IKLTSA: An Incremental Kernel LTSA Method (CT, JG, SZ), pp. 70–83.
SEKESEKE-2015-AlencarARRB #rule-based
A Rule-based Method for Discovering Trajectory Profiles (LAdA, LOA, CR, AR, VB), pp. 244–249.
SEKESEKE-2015-CavalcanteRC #experience #named #user interface
MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
SEKESEKE-2015-CostaSRSAP #collaboration #nearest neighbour
A Collaborative Method to Reduce the Running Time and Accelerate the k-Nearest Neighbors Search (AAMC, RRdS, FBAR, GS, HOdA, AP), pp. 105–109.
SEKESEKE-2015-SchreiberMRM #comprehension #named #object-oriented #source code
TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension (DS, ALAM, SSR, AM), pp. 278–283.
SEKESEKE-2015-VacariP #agile #bibliography #perspective
Adopting Agile Methods in the Public Sector: A Systematic Literature Review (IV, RP), pp. 709–714.
SEKESEKE-2015-WangKN #feature model #re-engineering
Stability of Three Forms of Feature Selection Methods on Software Engineering Data (HW, TMK, AN), pp. 385–390.
SEKESEKE-2015-XuZHX
A Balanced Method for Budgeted Influence Maximization (XX, YZ, QH, CX), pp. 250–255.
SIGIRSIGIR-2015-GwizdkaoMW #information retrieval #research
NeuroIR 2015: Neuro-Physiological Methods in IR Research (JG, JMJ, JM, MW), pp. 1151–1153.
SIGIRSIGIR-2015-LiCLPK #named #ranking #recommendation
Rank-GeoFM: A Ranking based Geographical Factorization Method for Point of Interest Recommendation (XL, GC, XL, TANP, SK), pp. 433–442.
MoDELSMoDELS-2015-FarwickSBH #architecture #automation #documentation #enterprise
A situational method for semi-automated enterprise architecture documentation (SoSyM abstract) (MF, CMS, RB, IH), p. 448.
REFSQREFSQ-2015-VriezekolkEW #assessment #risk management #validation
Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
SACSAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-BarbieriTPG #named #representation #video #visual notation
Shot-HR: a video shot representation method based on visual features (TTSB, THT, MPPJ, RG), pp. 1257–1262.
SACSAC-2015-BezuBRVVF #component #detection #multi #similarity #web
Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SACSAC-2015-KhelladiBBLG #consistency #framework #process #verification
A framework to formally verify conformance of a software process to a software method (DEK, RB, SB, YL, MPG), pp. 1518–1525.
SACSAC-2015-MatuszykVSJG #incremental #matrix #recommendation
Forgetting methods for incremental matrix factorization in recommender systems (PM, JV, MS, AMJ, JG), pp. 947–953.
SACSAC-2015-MergelSS #mining #string #visual notation
A method to support search string building in systematic literature reviews through visual text mining (GDM, MSS, TSdS), pp. 1594–1601.
SACSAC-2015-OmatuYI #classification #learning #smell
Smell classification of wines by the learning vector quantization method (SO, MY, YI), pp. 195–200.
ESEC-FSEESEC-FSE-2015-AllamanisBBS
Suggesting accurate method and class names (MA, ETB, CB, CAS), pp. 38–49.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-MorenoBPOM #how #question
How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSEICSE-v1-2015-YiYLZW #analysis #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-GuerroujBR #documentation
Leveraging Informal Documentation to Summarize Classes and Methods in Context (LG, DB, PCR), pp. 639–642.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-MenziesMP #data analysis
The Art and Science of Analyzing Software Data; Quantitative Methods (TM, LLM, FP), pp. 959–960.
SPLCSPLC-2015-ValovGC #comparison #empirical #performance #predict #variability
Empirical comparison of regression methods for variability-aware performance prediction (PV, JG, KC), pp. 186–190.
PPoPPPPoPP-2015-SeoKK #graph #named #scalability #streaming
GStream: a graph streaming processing method for large-scale graphs on GPUs (HS, JK, MSK), pp. 253–254.
CADECADE-2015-BalbianiB #composition #logic #parallel
Tableaux Methods for Propositional Dynamic Logics with Separating Parallel Composition (PB, JB), pp. 539–554.
CADECADE-2015-ChocronFR #revisited
A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited (PC, PF, CR), pp. 419–433.
ICLPICLP-2015-Harrison #formal method #programming #set
Formal Methods for Answer Set Programming (AH).
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
CBSECBSE-2014-Dustdar
Principles and methods for elastic computing (SD), pp. 1–2.
CBSECBSE-2014-KurodaYKKM #memory management
A memory isolation method for OSGi-based home gateways (YK, IY, SK, YK, OM), pp. 117–122.
ECSAECSA-2014-RekhaM #architecture
Suitability of Software Architecture Decision Making Methods for Group Decisions (VSR, HM), pp. 17–32.
QoSAQoSA-2014-OlssonTWE #architecture #consistency #evaluation #game studies
Evaluation of a static architectural conformance checking method in a line of computer games (TO, DT, AW, ME), pp. 113–118.
WICSAWICSA-2014-SeeleSB #architecture #functional #modelling #web
The Functional Architecture Modeling Method Applied on Web Browsers (WS, SS, SB), pp. 171–174.
CASECASE-2014-ChiuC #bound #detection #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASECASE-2014-ChowJCN #novel
A novel vision guided knot-tying method for autonomous robotic surgery (DLC, RCJ, MCC, WSN), pp. 504–508.
CASECASE-2014-LeePP #locality #using
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LiuLS #monitoring
A wavelet-based characteristic vector construction method for machining condition monitoring (CL, YL, WS), pp. 304–308.
CASECASE-2014-LiuXL #approximate #capacity
A queuing approximation method for capacity planning of emergency department with time-varying demand (QL, XX, RL), pp. 558–563.
CASECASE-2014-ParkLH #generative #performance #using
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-ShiWS #approximate #matrix
Approximation method to rank-one binary matrix factorization (ZS, LW, LS), pp. 800–805.
CASECASE-2014-XuJGX #energy #scalability
A new method to solve large-scale building energy management for energy saving (ZX, QSJ, XG, XX), pp. 940–945.
CASECASE-2014-YanZJCC #3d #metric
Hall-sensor-based orientation measurement method in three-dimensional space for electromagnetic actuators (LY, BZ, ZJ, CYC, IMC), pp. 182–187.
CASECASE-2014-ZhaoUH #divide and conquer #flexibility #synthesis
A divide-and-conquer method for the synthesis of non-blocking supervisors for flexible manufacturing systems (MZ, MU, YH), pp. 455–460.
DACDAC-2014-LiuF
A Time-Unrolling Method to Compute Sensitivity of Dynamic Systems (FL, PF), p. 6.
DACDAC-2014-LuCCSHTC #named #using
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-RaoGHC #artificial reality #design
Design Methods for Augmented Reality In-Vehicle Infotainment Systems (QR, CG, MH, SC), p. 6.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-ZhangYYX #approximate #framework #named
ApproxIt: An Approximate Computing Framework for Iterative Methods (QZ, FY, RY, QX), p. 6.
DATEDATE-2014-BahrebarS #approach #network
Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis #using
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-NoursPB #architecture #evaluation #manycore #performance
A dynamic computation method for fast and accurate performance evaluation of multi-core architectures (SLN, AP, NWB), pp. 1–6.
DocEngDocEng-2014-DavisonMM #named #privacy #semantics #similarity
P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
DRRDRR-2014-LiPLD #analysis #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
HTHT-2014-Abdel-HafezXJ #generative #rating
A rating aggregation method for generating product reputations (AAH, YX, AJ), pp. 291–293.
SIGMODSIGMOD-2014-ZengGMZ #approximate #estimation #fault #performance #query
The analytical bootstrap: a new method for fast error estimation in approximate query processing (KZ, SG, BM, CZ), pp. 277–288.
VLDBVLDB-2014-XuCC #clustering #graph #named
LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
ITiCSEITiCSE-2014-Jasute #education #geometry #interactive #learning #visualisation
An interactive visualization method of constructionist teaching and learning of geometry (EJ), p. 349.
ITiCSEITiCSE-2014-MI #bound #query
A method to prove query lower bounds (JM, SI), pp. 81–86.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
ICPCICPC-2014-GuptaS #program analysis #quality
A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
ICPCICPC-2014-GuptaSVU #assessment #industrial #named #quality #scalability
SCQAM: a scalable structured code quality assessment method for industrial software (SG, HKS, RDV, UU), pp. 244–252.
ICPCICPC-2014-MatsumuraIKI #execution #java #performance #visualisation
Repeatedly-executed-method viewer for efficient visualization of execution paths and states in Java (TM, TI, YK, KI), pp. 253–257.
ICPCICPC-2014-McBurneyM #automation #documentation #generative #source code #summary
Automatic documentation generation via source code summarization of method context (PWM, CM), pp. 279–290.
ICPCICPC-2014-SilvaTV #automation #recommendation #refactoring
Recommending automated extract method refactorings (DS, RT, MTV), pp. 146–156.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICSMEICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
SCAMSCAM-2014-LozanoNJ #why
Explaining Why Methods Change Together (AL, CN, VJ), pp. 185–194.
SCAMSCAM-2014-YoshidaH #c #semiparsing #source code #syntax
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
AFLAFL-2014-Crespi-ReghizziP #commutative #composition
Commutative Languages and their Composition by Consensual Methods (SCR, PSP), pp. 216–230.
FMFM-2014-BjornerH #formal method #question
40 Years of Formal Methods — Some Obstacles and Some Possibilities? (DB, KH), pp. 42–61.
FMFM-2014-FreitasW #formal method #proving
Proof Patterns for Formal Methods (LF, IW), pp. 279–295.
IFMIFM-2014-TofanSR #composition #multi #proving
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset (BT, GS, WR), pp. 357–372.
ICFPICFP-2014-Fisher #formal method #using
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
CHICHI-2014-DixonLF #implementation #runtime
Pixel-based methods for widget state and style in a runtime implementation of sliding widgets (MED, GL, JAF), pp. 2231–2240.
CHICHI-2014-YueLCSBGSZ #experience #research
Photographing information needs: the role of photos in experience sampling method-style research (ZY, EL, CJC, JS, KB, ZG, NS, G(Z), pp. 1545–1554.
CSCWCSCW-2014-SaveryGGB #consistency #experience #game studies #maintenance #performance
The effects of consistency maintenance methods on player experience and performance in networked games (CS, TCNG, CG, MB), pp. 1344–1355.
CSCWCSCW-2014-ShiltonKF #how #social
How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
HCIDHM-2014-KikuchiTTGH #information management
Biomechanics Investigation of Skillful Technician in Spray-up Fabrication Method — Converting Tacit Knowledge to Explicit Knowledge in the Fiber Reinforced Plastics Molding (TK, YT, YT, AG, HH), pp. 24–34.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-YamamotoKGOAYB
Caregiver’s Gaze and Field of View Presumption Method During Bath Care in the Elderly Facility (AY, NK, AG, TO, TA, SY, HBJ), pp. 78–87.
HCIDHM-2014-YangZYHZL #design
Based on Upper Extremity Comfort ROM of Ergonomic Methods for Household Products Design (FY, QXZ, AY, HH, XZ, ZQL), pp. 167–173.
HCIDUXU-DI-2014-GencerBZV #detection #machine learning #mobile
Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
HCIDUXU-DI-2014-MonatBL #visual notation
Taking Decisions with Systems Oriented to the General Public — Applying Visual Information Based on Viennese Method (ASM, MB, RCL), pp. 463–471.
HCIDUXU-DI-2014-PalomakiHVH #bibliography #mobile #perspective #process
Methods to Study Everyday Activities in a Mobile Work Context — A Literature Overview (EP, KH, MV, MH), pp. 301–312.
HCIDUXU-DI-2014-RugenhagenH #design #development #game studies #research
Game Design Techniques in User Research Methods — A New Way to Reach the High Score in Development Teams (ER, TH), pp. 754–762.
HCIDUXU-DP-2014-Gatsou #generative
From Inexperienced Users to Co-creators: An Exploration of a Generative Method (CG), pp. 244–252.
HCIDUXU-DP-2014-Schall14a
New Methods for Measuring Emotional Engagement (AS), pp. 347–357.
HCIDUXU-TMT-2014-GoodeLSGB #approach #research
A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability #using
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-JerzakR #evaluation #game studies #heuristic
Serious Games and Heuristic Evaluation — The Cross-Comparison of Existing Heuristic Evaluation Methods for Games (NJ, FR), pp. 453–464.
HCIDUXU-TMT-2014-SakamotoM #elicitation #interactive #mobile #named #perspective #requirements
M4REMAIP: Method for Requirements Elicitation Based on Mobile Applications under an Interaction Perspective (SGS, LCdM), pp. 74–85.
HCIDUXU-TMT-2014-SchmidtKGSGW #education
Bridging the Gap — Methods and Teaching of F-A-S-T — Framing-Art-Science- Technology (DS, GK, SG, CS, RG, MW), pp. 589–600.
HCIDUXU-TMT-2014-SchmuntzschF #design #how #smarttech
How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
HCIDUXU-TMT-2014-SilvaMLO #quality #usability #user interface
Evaluating Quality and Usability of the User Interface: A Practical Study on Comparing Methods with and without Users (CMS, VM, RL, MLLRO), pp. 318–328.
HCIHCI-AIMT-2014-KashimaMY #programming
Proposal of a Method to Measure Difficulty Level of Programming Code with Eye-Tracking (TK, SM, SY), pp. 264–272.
HCIHCI-AIMT-2014-NakaI #communication #effectiveness #generative #gesture
Proposal of the Effective Method of Generating Characteristic Gestures in Nonverbal Communication (TN, TI), pp. 102–112.
HCIHCI-AIMT-2014-YanikTMMBGW #gesture #learning
A Method for Lifelong Gesture Learning Based on Growing Neural Gas (PMY, AT, JM, JM, JOB, KEG, IDW), pp. 191–202.
HCIHCI-AS-2014-TeracineM #assessment #usability #web
Proposals for an Assessment Method of Accessibility and Usability in Web Software (ECT, FCM), pp. 80–89.
HCIHCI-TMT-2014-LiXTW #research #visual notation
Color Saliency Research on Visual Perceptual Layering Method (JL, CX, WT, XW), pp. 86–97.
HCIHCI-TMT-2014-MatsumotoKKA #adaptation #automation #learning #student #word
Evaluating an Automatic Adaptive Delivery Method of English Words Learning Contents for University Students in Science and Technology (SM, TK, TK, MA), pp. 510–520.
HCIHCI-TMT-2014-MauesB
Reflections on the Cross-Platform Semiotic Inspection Method (RdAM, SDJB), pp. 533–544.
HCIHCI-TMT-2014-MayasHRK #testing #usability
Evaluating Methods and Equipment for Usability Field Tests in Public Transport (CM, SH, CR, HK), pp. 545–553.
HCIHCI-TMT-2014-MotylF #comparison #design #generative #idea
Comparison of Creativity Enhancement and Idea Generation Methods in Engineering Design Training (BM, SF), pp. 242–250.
HCIHCI-TMT-2014-YajimaTS #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT, RS), pp. 457–465.
HCIHIMI-AS-2014-AlkhateebHH #comprehension #using
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-JangKJS #analysis #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-DE-2014-FukuzumiYTYYK
A New Computational Method for Single-Trial-EEG-Based BCI — Proposal of the Number of Electrodes (SF, HY, KT, TY, TY, KK), pp. 148–156.
HCIHIMI-DE-2014-LinKT #analysis #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition #using
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-UedaA14a #twitter
Suggestion of Operation Method of the Interest Shift Model of the Twitter User (YU, YA), pp. 664–677.
AdaEuropeAdaEurope-2014-IliasovLR #approach #formal method
Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
CAiSECAiSE-2014-VlaanderenDB #incremental
Finding Optimal Plans for Incremental Method Engineering (KV, FD, SB), pp. 640–655.
ICEISICEIS-v1-2014-ChinoGRTT #named #scalability
TrieMotif — A New and Efficient Method to Mine Frequent K-Motifs from Large Time Series (DYTC, RRdVG, LASR, CTJ, AJMT), pp. 60–69.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net #using
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-PfisterHN #agile #concurrent #design #diagrams #framework #metamodelling #modelling #synthesis #towards #visual notation
A Framework for Concurrent Design of Metamodels and Diagrams — Towards an Agile Method for the Synthesis of Domain Specific Graphical Modeling Languages (FP, MH, CN), pp. 298–306.
ICEISICEIS-v2-2014-VieiraJF #analysis #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
CIKMCIKM-2014-LiangZHGB #identification #named #novel #sentiment #word
CONR: A Novel Method for Sentiment Word Identification (JL, XZ, YH, LG, SB), pp. 1943–1946.
CIKMCIKM-2014-PaikO #fixpoint #query
A Fixed-Point Method for Weighting Terms in Verbose Informational Queries (JHP, DWO), pp. 131–140.
CIKMCIKM-2014-SongG #difference #named #privacy #query
Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
ECIRECIR-2014-NainiA #feature model #learning #rank
Exploiting Result Diversification Methods for Feature Selection in Learning to Rank (KDN, ISA), pp. 455–461.
ICMLICML-c1-2014-AzadiS #multi #probability #towards
Towards an optimal stochastic alternating direction method of multipliers (SA, SS), pp. 620–628.
ICMLICML-c1-2014-LinX #adaptation #continuation #optimisation
An Adaptive Accelerated Proximal Gradient Method and its Homotopy Continuation for Sparse Optimization (QL, LX), pp. 73–81.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance #using
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c1-2014-Suzuki #coordination #multi #probability
Stochastic Dual Coordinate Ascent with Alternating Direction Method of Multipliers (TS), pp. 736–744.
ICMLICML-c1-2014-YogatamaS #multi #word
Making the Most of Bag of Words: Sentence Regularization with Alternating Direction Method of Multipliers (DY, NAS), pp. 656–664.
ICMLICML-c1-2014-ZhongK #multi #performance #probability
Fast Stochastic Alternating Direction Method of Multipliers (WZ, JTYK), pp. 46–54.
ICMLICML-c2-2014-BalleHP #comparison #empirical #learning #probability
Methods of Moments for Learning Stochastic Languages: Unified Presentation and Empirical Comparison (BB, WLH, JP), pp. 1386–1394.
ICMLICML-c2-2014-Bou-AmmarERT #learning #multi #online #policy
Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
ICMLICML-c2-2014-CarlssonMRS #clustering #network #symmetry
Hierarchical Quasi-Clustering Methods for Asymmetric Networks (GEC, FM, AR, SS), pp. 352–360.
ICMLICML-c2-2014-CortesKM #predict
Ensemble Methods for Structured Prediction (CC, VK, MM), pp. 1134–1142.
ICMLICML-c2-2014-DefazioDC #big data #incremental #named #performance #problem
Finito: A faster, permutable incremental gradient method for big data problems (AD, JD, TSC), pp. 1125–1133.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-Sohl-DicksteinPG #optimisation #performance #probability #scalability
Fast large-scale optimization by unifying stochastic gradient and quasi-Newton methods (JSD, BP, SG), pp. 604–612.
ICMLICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICPRICPR-2014-AghdamPS #adaptation #probability #segmentation
Adaptive Probabilistic Thresholding Method for Accurate Breast Region Segmentation in Mammograms (HHA, DP, AS), pp. 3357–3362.
ICPRICPR-2014-CadoniLG #case study #comparative #multimodal #recognition
Iconic Methods for Multimodal Face Recognition: A Comparative Study (MC, AL, EG), pp. 4612–4617.
ICPRICPR-2014-ChironGM #behaviour #parametricity #using
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-DahlCB #image #multi #segmentation #using
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DuanHZCZ #image #segmentation #using
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification #using
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-FernandezT #analysis #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-FuKGYZ #ranking
Binary Code Reranking Method Based on Bit Importance (HF, XK, YG, XY, LZ), pp. 2679–2684.
ICPRICPR-2014-GongWLT #consistency #video
Temporal Consistency Based Method for Blind Video Deblurring (WG, WW, WL, ST), pp. 861–864.
ICPRICPR-2014-HedjamCK #detection #documentation #energy #image #multi #self
Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
ICPRICPR-2014-HuangZLW #distance #feature model
A Method of Discriminative Information Preservation and In-Dimension Distance Minimization Method for Feature Selection (SH, JZ, XL, LW), pp. 1615–1620.
ICPRICPR-2014-IshaqEW #evaluation #performance
An Evaluation of the Faster STORM Method for Super-resolution Microscopy (OI, JE, CW), pp. 4435–4440.
ICPRICPR-2014-KhanVP #multi #visual notation
A Generalized Search Method for Multiple Competing Hypotheses in Visual Tracking (MHK, MFV, TPP), pp. 2245–2250.
ICPRICPR-2014-KondoriYOLL #3d
A Direct Method for 3D Hand Pose Recovery (FAK, SY, AO, LL, HL), pp. 345–350.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition #using
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LiewY #detection #feature model #novel #performance #robust
Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
ICPRICPR-2014-MontagnerjH #machine learning
A Machine Learning Based Method for Staff Removal (IdSM, RHJ, NSTH), pp. 3162–3167.
ICPRICPR-2014-NguyenTHM #classification #novel
A Novel Sphere-Based Maximum Margin Classification Method (PN, DT, XH, WM), pp. 620–624.
ICPRICPR-2014-RozzaMP #graph #kernel #learning #novel
A Novel Graph-Based Fisher Kernel Method for Semi-supervised Learning (AR, MM, AP), pp. 3786–3791.
ICPRICPR-2014-SuiTX #predict
An Unsupervised Band Selection Method Based on Overall Accuracy Prediction (CS, YT, YX), pp. 3756–3761.
ICPRICPR-2014-WangZZ #segmentation
An Improved BET Method for Brain Segmentation (LW, ZZ, RZ), pp. 3221–3226.
ICPRICPR-2014-Yasuda #effectiveness
Effective Mean-Field Inference Method for Nonnegative Boltzmann Machines (MY), pp. 3600–3605.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhaoTHTY #comparison #performance #segmentation
A Performance Comparison between Circular and Spline-Based Methods for Iris Segmentation (YZ, CT, XH, AOT, RY), pp. 351–356.
ICPRICPR-2014-ZhuY #image #optimisation #quality
A Bit Allocation Optimization Method for ROI Based Image Compression with Stable Image Quality (YZ, JY), pp. 849–854.
KDDKDD-2014-BenderskyPHJL #retrieval #scalability #video
Up next: retrieval methods for large scale related video suggestion (MB, LGP, JJH, VJ, DL), pp. 1769–1778.
KDDKDD-2014-RamanJ
Methods for ordinal peer grading (KR, TJ), pp. 1037–1046.
KDDKDD-2014-Ting #approximate
Streamed approximate counting of distinct elements: beating optimal batch methods (DT), pp. 442–451.
KDDKDD-2014-WangZQZ #using
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-ZhaiXW #multi #optimisation
A multi-class boosting method with direct optimization (SZ, TX, SW), pp. 273–282.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #using #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-PlansangketG #evaluation #performance #query #retrieval #state of the art
Performance Evaluation of State-of-the-Art Ranked Retrieval Methods and Their Combinations for Query Suggestion (SP, JQG), pp. 141–148.
KDIRKDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-SatoNS #classification #kernel #using
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KDIRKDIR-2014-SenkoDPRK #modelling
A Method for Evaluating Validity of Piecewise-linear Models (OVS, DSD, EAP, LYR, AVK), pp. 437–443.
KMISKMIS-2014-HisakaneOSK #multi
A Tutoring Rule Selection Method for Case-based e-Learning by Multi-class Support Vector Machine (DH, MO, MS, NK), pp. 119–125.
KMISKMIS-2014-HisakaneS #learning #visualisation
A Visualization System of Discussion Structure in Case Method Learning (DH, MS), pp. 126–132.
KMISKMIS-2014-ToureMM #architecture #design #information management #towards
Re-Designing Knowledge Management Systems — Towards User-Centred Design Methods Integrating Information Architecture (CET, CM, JCM), pp. 298–305.
KRKR-2014-BoothAR
Interval Methods for Judgment Aggregation in Argumentation (RB, EA, IR).
MLDMMLDM-2014-AnandWA #information management #scalability
A Method of Crowd-Sourced Information Extraction From Large Data Files (IMA, AW, PA), pp. 431–436.
MLDMMLDM-2014-SenkoD #multi
Multiple Regression Method Based on Unexpandable and Irreducible Convex Combinations (OVS, AD), pp. 43–57.
MLDMMLDM-2014-SharmaT #mining #social #social media
A Generalized Relationship Mining Method for Social Media Text Data (TS, DT), pp. 376–392.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #using #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-LeeKB #twitter
Method for Measuring Twitter Content Influence (EL, JDK, DKB), pp. 659–664.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SIGIRSIGIR-2014-QianL0H
Co-training on authorship attribution with very fewlabeled examples: methods vs. views (TQ, BL, MZ, GH), pp. 903–906.
SIGIRSIGIR-2014-RoitmanHK #using
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
LOPSTRLOPSTR-2014-Balaniuk #induction #synthesis
Drill and Join: A Method for Exact Inductive Program Synthesis (RB), pp. 219–237.
LOPSTRLOPSTR-2014-TahatE #hybrid #protocol #self #synthesis #verification
A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
QAPLQAPL-2014-KempfLM #design #formal method #manycore
Formal and Informal Methods for Multi-Core Design Space Exploration (JFK, OL, OM), pp. 78–92.
RERE-2014-KnaussH #assessment #named
EAM: Ecosystemability assessment method (EK, IH), pp. 319–320.
RERE-2014-PutnamC #approach #game studies #multi #requirements
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
RERE-2014-WohlrabGKB #experience #industrial #performance #requirements
Experience of pragmatically combining RE methods for performance requirements in industry (RW, TdG, AK, SB), pp. 344–353.
SACSAC-2014-AlnajemZ #evaluation #mobile
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
SACSAC-2014-AnjosTCON #3d #evaluation #interactive #statistics
Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments (AMdA, RT, AC, SdO, FLSN), pp. 223–228.
SACSAC-2014-BaeCPJKC #clustering #effectiveness #memory management
An effective data clustering method based on expected update time in flash memory environment (DHB, JWC, SMP, BSJ, SWK, SjC), pp. 1492–1497.
SACSAC-2014-BaeLKWP #network #privacy #social
Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SACSAC-2014-BarddalGE #classification #concept #named #network #social
SFNClassifier: a scale-free social network method to handle concept drift (JPB, HMG, FE), pp. 786–791.
SACSAC-2014-CorralGSS #android #energy #implementation
Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-MoraCGZJEBAH #named
MUSES: a corporate user-centric system which applies computational intelligence methods (AMM, PdlC, JJMG, SZ, MJ, AIEA, MB, HA, ZH), pp. 1719–1723.
SACSAC-2014-SakamotoKTT #visualisation
Method for visualizing undone operations based on changes on desktop screen (AS, TK, TT, MT), pp. 193–195.
SACSAC-2014-TinK #clustering #distributed #performance
Method for fast clustering of data distributed on a sphere surface (TT, SRK), pp. 1735–1736.
SACSAC-2014-WangWPSC #collaboration #network #process
A collaborative processes synchronization method with regards to system crashes and network failures (LW, AW, LFP, MvS, CC), pp. 1393–1398.
FSEFSE-2014-GoffiGMPT #search-based #sequence #synthesis
Search-based synthesis of equivalent method sequences (AG, AG, AM, MP, PT), pp. 366–376.
FSEFSE-2014-HigoK #case study #functional #how #java #source code
How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
FSEFSE-2014-KrkaBM #automation #invariant #mining #specification
Automatic mining of specifications from invocation traces and method invariants (IK, YB, NM), pp. 178–189.
SPLCSPLC-2014-DillonRD #approach #product line
A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
RTARTA-TLCA-2014-Schmidt-Schauss #analysis #concurrent #programming language #semantics
Concurrent Programming Languages and Methods for Semantic Analyses (Extended Abstract of Invited Talk) (MSS), pp. 21–30.
VMCAIVMCAI-2014-BloemKS #safety #satisfiability #specification #synthesis
SAT-Based Synthesis Methods for Safety Specs (RB, RK, MS), pp. 1–20.
ASEASE-2013-Fard #behaviour #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-ThungWLL #api #automation #feature model #recommendation
Automatic recommendation of API methods from feature requests (FT, SW, DL, JLL), pp. 290–300.
CASECASE-2013-BentahaBD #composition #probability
A decomposition method for stochastic partial disassembly line balancing with profit maximization (MLB, OB, AD), pp. 404–409.
CASECASE-2013-ChowN
Improved knot-tying methods for autonomous robot surgery (DLC, WSN), pp. 461–465.
CASECASE-2013-DevesseRFW #realtime
A real-time optimal control method for swing-free tower crane motions (WD, MR, LF, JW), pp. 336–341.
CASECASE-2013-FerreiraL #generative #multi #tool support #using
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-LiuCXG #distributed #energy #optimisation
A decentralized optimization method for energy saving of HVAC systems (ZL, XC, XX, XG), pp. 225–230.
CASECASE-2013-Nieves-RiveraXJMZ #automation #development
Development of a position sensitive device and control method for automated robot calibration (ENR, NX, YJ, CM, GZ), pp. 1127–1132.
CASECASE-2013-QianY #named #navigation #performance #visual notation
NCC-RANSAC: A fast plane extraction method for navigating a smart cane for the visually impaired (XQ, CY), pp. 261–267.
DACDAC-2013-BombieriLFC #c++ #synthesis
A method to abstract RTL IP blocks into C++ code and enable high-level synthesis (NB, HYL, FF, LPC), p. 9.
DACDAC-2013-Fang #simulation
A new time-stepping method for circuit simulation (GPF), p. 10.
DACDAC-2013-KimOCHH #distributed #embedded #estimation #novel
A novel analytical method for worst case response time estimation of distributed embedded systems (JK, HO, JC, HH, SH), p. 10.
DACDAC-2013-LiuC #on the #synthesis
On learning-based methods for design-space exploration with high-level synthesis (HYL, LPC), p. 7.
DACDAC-2013-MillerVG #modelling #physics #statistics #using
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DATEDATE-2013-ElfadelMA #formal method #industrial #manycore
Closed-loop control for power and thermal management in multi-core processors: formal methods and industrial practice (IME, RM, DA), pp. 1879–1881.
DATEDATE-2013-KodakaTSYKTXSUTMM #manycore #power management #predict
A near-future prediction method for low power consumption on a many-core processor (TK, AT, SS, AY, TK, TT, HX, TS, HU, JT, TM, NM), pp. 1058–1059.
DATEDATE-2013-PigorschS #locality
Lemma localization: a practical method for downsizing SMT-interpolants (FP, CS), pp. 1405–1410.
DATEDATE-2013-WachterEAM #fault tolerance
Topology-agnostic fault-tolerant NoC routing method (EW, AE, AMA, FM), pp. 1595–1600.
DATEDATE-2013-YanLH #adaptation #fault #self
A dynamic self-adaptive correction method for error resilient application (LY, HL, ZH), pp. 943–946.
DATEDATE-2013-YingHH #3d #performance
Fast and optimized task allocation method for low vertical link density 3-dimensional networks-on-chip based many core systems (HY, TH, KH), pp. 1777–1782.
DocEngDocEng-2013-Esposito #documentation #machine learning
Symbolic machine learning methods for historical document processing (FE), pp. 1–2.
DocEngDocEng-2013-SrivastavaSM #graph #interactive #topic
A graph-based topic extraction method enabling simple interactive customization (AS, AJS, EEM), pp. 71–80.
DRRDRR-2013-YangP #documentation #segmentation
Local projection-based character segmentation method for historical Chinese documents (LY, LP).
ICDARICDAR-2013-AhmedSLD #segmentation #using
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-BuiVM #documentation #invariant #navigation
Invariants Extraction Method Applied in an Omni-language Old Document Navigating System (QAB, MV, RM), pp. 1325–1329.
ICDARICDAR-2013-ChattopadhyayRG #automation #robust
Automatic Selection of Binarization Method for Robust OCR (TC, VRR, UG), pp. 1170–1174.
ICDARICDAR-2013-Furukawa #composition #using
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GacebLD #adaptation #documentation #image
Adaptative Smart-Binarization Method: For Images of Business Documents (DG, FL, JD), pp. 118–122.
ICDARICDAR-2013-ItaniHI #using
Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDARICDAR-2013-LinGTBAS #detection #recognition
A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
ICDARICDAR-2013-LiPXW #analysis #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-MiyoshiNS #image #using
Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDARICDAR-2013-NguyenZN #online #recognition
A Semi-incremental Recognition Method for On-Line Handwritten Japanese Text (CTN, BZ, MN), pp. 84–88.
ICDARICDAR-2013-PuriST #learning #network
Bayesian Network Structure Learning and Inference Methods for Handwriting (MP, SNS, YT), pp. 1320–1324.
ICDARICDAR-2013-Ramirez-OrtegonMRC #documentation #metric
An Objective Method to Evaluate Stroke-Width Measures for Binarized Documents (MARO, VM, RR, EC), pp. 175–179.
ICDARICDAR-2013-SekiAYNSN #documentation #image
Color Drop-Out Binarization Method for Document Images with Color Shift (MS, EA, TY, HN, HS, TN), pp. 123–127.
ICDARICDAR-2013-SharmaSPBT #multi #segmentation #video #word
A New Method for Character Segmentation from Multi-oriented Video Words (NS, PS, UP, MB, CLT), pp. 413–417.
ICDARICDAR-2013-ShivakumaraBGT #detection #video
Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
ICDARICDAR-2013-SuDPL #comprehension #documentation #novel #word
Cross-Language Sensitive Words Distribution Map: A Novel Recognition-Based Document Understanding Method for Uighur and Tibetan (BS, XD, LP, CL), pp. 255–259.
ICDARICDAR-2013-SurintaSW #comparison
A Comparison of Feature and Pixel-Based Methods for Recognizing Handwritten Bangla Digits (OS, LS, MW), pp. 165–169.
SIGMODSIGMOD-2013-GaoLOWC #crowdsourcing #online
An online cost sensitive decision-making method in crowdsourcing systems (JG, XL, BCO, HW, GC), pp. 217–228.
SIGMODSIGMOD-2013-SametSA #database #game studies
Indexing methods for moving object databases: games and other applications (HS, JS, MA), pp. 169–180.
VLDBVLDB-2013-HuaiMLO0 #clustering #comprehension
Understanding Insights into the Basic Structure and Essential Issues of Table Placement Methods in Clusters (YH, SM, RL, OO, XZ), pp. 1750–1761.
VLDBVLDB-2013-QardajiYL #comprehension
Understanding Hierarchical Methods for Differentially Private Histograms (WHQ, WY, NL), pp. 1954–1965.
ICPCICPC-2013-MondalRS #co-evolution #empirical #identification
Insight into a method co-change pattern to identify highly coupled methods: An empirical study (MM, CKR, KAS), pp. 103–112.
WCREWCRE-2013-SalesTMV #dependence #recommendation #refactoring #set #using
Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
ICALPICALP-v2-2013-EtessamiSY #context-free grammar #probability #regular expression
Stochastic Context-Free Grammars, Regular Languages, and Newton’s Method (KE, AS, MY), pp. 199–211.
LATALATA-2013-LuttenbergerS #commutative #convergence
Convergence of Newton’s Method over Commutative Semirings (ML, MS), pp. 407–418.
CHICHI-2013-BauerK #design #named
DesignLibs: a scenario-based design method for ideation (JSB, JAK), pp. 1955–1958.
CHICHI-2013-Grosse-PuppendahlBKK #interface #proximity #recognition #ubiquitous
Swiss-cheese extended: an object recognition method for ubiquitous interfaces based on capacitive proximity sensing (TAGP, AB, FK, AK), pp. 1401–1410.
CHICHI-2013-JokelaL #collaboration #comparative #evaluation #interactive #mobile
A comparative evaluation of touch-based methods to bind mobile devices for collaborative interactions (TJ, AL), pp. 3355–3364.
CHICHI-2013-JungBLK #design
Make it move: a movement design method of simple standing products based on systematic mapping of torso movements & product messages (JJ, SHB, JHL, MSK), pp. 1279–1288.
CHICHI-2013-MankoffRF #research #using
Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHICHI-2013-VoelkerWB #evaluation
An evaluation of state switching methods for indirect touch systems (SV, CW, JOB), pp. 745–754.
CSCWCSCW-2013-HailpernDHSLK #communication #framework #named #research
ACES: a cross-discipline platform and method for communication and language research (JMH, MD, AH, SS, RL, KK), pp. 515–526.
HCIDHM-HB-2013-GuoCWDL #design #e-commerce #interface
An Interface Design Method for E-commerce Sites’ Homepage Considering Users’ Emotions (FG, YC, MW, YD, LWL), pp. 30–39.
HCIDHM-HB-2013-KeyvaniLBO #database #metric #using
Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, ), pp. 343–352.
HCIDHM-SET-2013-LauterbachS #evaluation #implementation #interactive
Implementing Scenarios as an Evaluation Method of the Patient-Physician Interaction in Decision Aids (CVL, JDS), pp. 232–239.
HCIDUXU-CXC-2013-AsanoY #analysis #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-Chang #evaluation #segmentation #usability
Usability Evaluation of Two Chinese Segmentation Methods in Subtitles to Scaffold Chinese Novice (CKC), pp. 28–37.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management #using
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIDUXU-NTE-2013-FukumotoI #algorithm #interactive #mobile #optimisation #search-based
A Proposal for Optimization Method of Vibration Pattern of Mobile Device with Interactive Genetic Algorithm (MF, TI), pp. 264–269.
HCIDUXU-NTE-2013-ParkK #performance #representation
Efficient Information Representation Method for Driver-Centered AR-HUD System (HP, KhK), pp. 393–400.
HCIDUXU-PMT-2013-FischerSN #design #set #towards #usability #validation
Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design (HF, BS, KN), pp. 252–261.
HCIDUXU-PMT-2013-HamaKKIN #design #experience #framework #novel #social #user interface
Novel Method of Evaluating GUI Design from the Viewpoint of Worker Experience — Central Control Systems for Social Infrastructure (DH, MK, MK, KI, MN), pp. 283–293.
HCIDUXU-PMT-2013-SuL #design #interactive
Designing for Resonance by Evocative Objects: An Experiential Interaction Design Method (CSS, RHL), pp. 610–619.
HCIDUXU-PMT-2013-Yantac #design #education #experience #interactive #user interface
A Method for Teaching Affordance for User Experience Design in Interactive Media Design Education (AEY), pp. 630–638.
HCIDUXU-WM-2013-OkazawaY #design #modelling
A Proposal of Design Method of Obtaining the Construction Items of Mental Models in Product Design (NO, TY), pp. 408–413.
HCIHCI-AMTE-2013-ChamberlainC #named
Engagingdesign — Methods for Collective Creativity (PC, CC), pp. 22–31.
HCIHCI-AMTE-2013-HirataY #design pattern #logic #user interface #using
A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCIHCI-AMTE-2013-UedaGTHYY #design #experience
Structured Scenario-Based Design Method for Experience Vision (YU, KG, KT, SH, KY, KY), pp. 500–509.
HCIHCI-AMTE-2013-YanagidaUGTHY #experience
Method Format for Experience Vision (KY, YU, KG, KT, SH, KY), pp. 531–539.
HCIHCI-AMTE-2013-YasuIK #collaboration #design #enterprise #experience #user interface
Collaborative User Experience Design Methods for Enterprise System (HY, NI, IK), pp. 146–155.
HCIHCI-III-2013-ItoON #biology #interactive
A Method for Promoting Interaction Awareness by Biological Rhythm in Elementary School Children (KI, KO, SN), pp. 421–430.
HCIHCI-III-2013-RebenitschO #speech
Facial Electromyogram Activation as Silent Speech Method (LR, CBO), pp. 464–473.
HCIHCI-III-2013-WangLDHY #detection #set
A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
HCIHCI-III-2013-ZhaolaoZWFT #image #semantics
Semantic Annotation Method of Clothing Image (LZ, MZ, XW, YF, XT), pp. 289–298.
HCIHCI-IMT-2013-EbisawaF #detection #using #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHCI-IMT-2013-KurosawaST
Keyboard Clawing: Input Method by Clawing Key Tops (TK, BS, JT), pp. 272–280.
HCIHCI-IMT-2013-MaWHZ #gesture #interactive
A Method for Single Hand Fist Gesture Input to Enhance Human Computer Interaction (TM, WGW, CYH, XZ), pp. 291–300.
HCIHCI-IMT-2013-MurataHMH #case study #interface #using
Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCIHCI-IMT-2013-MurataHO #estimation #interface
Proposal of Estimation Method of Stable Fixation Points for Eye-gaze Input Interface (AM, TH, KO), pp. 330–339.
HCIHCI-IMT-2013-SakamotoTT #music #using
A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCIHCI-IMT-2013-ShibuyaKM #web
A Web Browsing Method on Handheld Touch Screen Devices for Preventing from Tapping Unintended Links (YS, HK, KM), pp. 491–496.
HCIHCI-IMT-2013-WongKCPW #documentation #multi
Audio-Visual Documentation Method for Digital Storytelling for a Multimedia Art Project (CYW, CWK, KC, MAMP, MLW), pp. 750–758.
HCIHCI-UC-2013-FurukawaN #navigation
A Pedestrian Navigation Method for User’s Safe and Easy Wayfinding (HF, YN), pp. 156–165.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-LinCTH
An Application of the Ballistic Movement Method for Evaluating Computer Mice (RFL, CWC, YCT, CYH), pp. 199–208.
HCIHCI-UC-2013-OkiTS #named #using
AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCIHIMI-D-2013-IsogaiN #modelling #motivation #music #recommendation
Modeling of Music Recommendation Methods to Promote the User’s Singing Motivation — For Next-Generation Japanese Karaoke Systems (SI, MN), pp. 439–448.
HCIHIMI-D-2013-MoriTK #adaptation
Correction Method Based on KI-VPA Model for Changes in Vibratory Perception Caused by Adaptation (YM, TT, SK), pp. 107–116.
HCIHIMI-D-2013-OkuboN #composition #generative
Proposal of Avatar Generating Method by Composition of the Portraits Made by Friends (MO, SN), pp. 515–523.
HCIHIMI-HSM-2013-MoreiraB #automation #interface
A Semiotic Based Method for Evaluating Automated Cockpit Interfaces (WM, RB), pp. 530–539.
HCIHIMI-LCCB-2013-GuoZSP #axiom #usability
Value Added by the Axiomatic Usability Method for Evaluating Consumer Electronics (YG, YZ, GS, RWP), pp. 457–466.
HCIHIMI-LCCB-2013-KimitaKWTS #evaluation #nondeterminism
Service Evaluation Method for Managing Uncertainty (KK, YK, KW, TT, YS), pp. 569–578.
HCIHIMI-LCCB-2013-KuritaKWS #analysis
A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HCIHIMI-LCCB-2013-OmoriTU #3d #experience
A Method of Viewing 3D Horror Contents for Amplifying Horror Experience (NO, MT, RU), pp. 228–237.
HCIHIMI-LCCB-2013-TomiokaSI #deployment #ontology #quality
A Method for Developing Quality Function Deployment Ontology (KT, FS, SI), pp. 632–638.
HCIHIMI-LCCB-2013-YajimaHY #analysis #communication #design
Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
HILTHILT-2013-Wing #formal method #industrial #perspective
Formal methods: an industrial perspective (JMW), pp. 85–86.
CAiSECAiSE-2013-DelmasP #formal method #policy #specification
Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
ICEISICEIS-J-2013-AmmarTM #development #modelling #usability
Dealing with Usability in Model-Driven Development Method (LBA, AT, AM), pp. 405–420.
ICEISICEIS-v1-2013-AndradeRYS #data-driven #database #novel #similarity
A Novel Method for Similarity Search over Meteorological Time Series Data based on the Coulomb’s Law (CGdA, MXR, CAY, MTPS), pp. 209–216.
ICEISICEIS-v1-2013-Frank #enterprise #modelling #multi #self
Multi-Perspective Enterprise Modelling as a Foundation of Method Engineering and Self-Referential Enterprise Systems (UF), p. IX.
ICEISICEIS-v1-2013-HayashiK #optimisation #performance
Data Location Optimization Method to Improve Tiered Storage Performance (SH, NK), pp. 112–119.
ICEISICEIS-v1-2013-SimrinAD #heuristic #problem #using
A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEISICEIS-v2-2013-DjuanaXLJC #ontology #problem #recommendation
An Ontology-based Method for Sparsity Problem in Tag Recommendation (ED, YX, YL, AJ, CC), pp. 467–474.
ICEISICEIS-v2-2013-SiepermannSL
Electronic Exercises for the Metra Potential Method (MS, CS, RL), pp. 435–442.
ICEISICEIS-v3-2013-MiloszBL #empirical #evaluation #usability
Memorability Experiment Vs. Expert Method in Websites Usability Evaluation (MM, MB, ML), pp. 151–157.
ICEISICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #using #web
Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKMCIKM-2013-MengK #network
Discovering influential authors in heterogeneous academic networks by a co-ranking method (QM, PJK), pp. 1029–1036.
CIKMCIKM-2013-XuXWW #automation #feedback #image #ranking
A heterogenous automatic feedback semi-supervised method for image reranking (XCX, XSX, YW, XW), pp. 999–1008.
ECIRECIR-2013-ChenC #analysis #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-MirkinS #clustering
Least Square Consensus Clustering: Criteria, Methods, Experiments (BGM, AS), pp. 764–767.
ECIRECIR-2013-NeshatiAHB #classification #network #social
A Joint Classification Method to Integrate Scientific and Social Networks (MN, EA, DH, HB), pp. 122–133.
ECIRECIR-2013-ZhukovskiiGS #ranking
URL Redirection Accounting for Improving Link-Based Ranking Methods (MZ, GG, PS), pp. 656–667.
ICMLICML-c1-2013-ChevaleyreKZ #classification #linear
Rounding Methods for Discrete Linear Classification (YC, FK, JDZ), pp. 651–659.
ICMLICML-c1-2013-OuyangHTG #multi #probability
Stochastic Alternating Direction Method of Multipliers (HO, NH, LT, AGG), pp. 80–88.
ICMLICML-c1-2013-Suzuki #multi #online
Dual Averaging and Proximal Gradient Descent for Online Alternating Direction Multiplier Method (TS), pp. 392–400.
ICMLICML-c3-2013-GittensM #machine learning #scalability
Revisiting the Nystrom method for improved large-scale machine learning (AG, MWM), pp. 567–575.
ICMLICML-c3-2013-GoschinWL
The Cross-Entropy Method Optimizes for Quantiles (SG, AW, MLL), pp. 1193–1201.
ICMLICML-c3-2013-TakacBRS
Mini-Batch Primal and Dual Methods for SVMs (MT, ASB, PR, NS), pp. 1022–1030.
ICMLICML-c3-2013-TamarCM #difference
Temporal Difference Methods for the Variance of the Reward To Go (AT, DDC, SM), pp. 495–503.
KDDKDD-2013-BakshyE #evaluation #nondeterminism #online
Uncertainty in online experiments with dependent data: an evaluation of bootstrap methods (EB, DE), pp. 1303–1311.
KDDKDD-2013-EmersonWN #data mining #mining #profiling
A data mining driven risk profiling method for road asset management (DE, JW, RN), pp. 1267–1275.
KDDKDD-2013-GaneshapillaiG #data-driven
A data-driven method for in-game decision making in MLB: when to pull a starting pitcher (GG, JVG), pp. 973–979.
KDDKDD-2013-MorenoNK #graph #learning #modelling
Learning mixed kronecker product graph models with simulated method of moments (SM, JN, SK), pp. 1052–1060.
KDDKDD-2013-NarasimhanA #bound #named #optimisation
SVMpAUCtight: a new support vector method for optimizing partial AUC based on a tight convex upper bound (HN, SA), pp. 167–175.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-CunhaFM #clustering #documentation #integration
Clustering and Classifying Text Documents — A Revisit to Tagging Integration Methods (EC, ÁF, ÓM), pp. 160–168.
KEODKEOD-2013-KarolyA #implementation
The Implementation of a ReALIS-based Method of Static Intensional Interpretation (MK, GA), pp. 393–398.
MLDMMLDM-2013-OthmanB #induction #reduction
Preceding Rule Induction with Instance Reduction Methods (OO, CHB), pp. 209–218.
RecSysRecSys-2013-AdamopoulosT #collaboration #predict #recommendation #using
Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSysRecSys-2013-BabasCT #personalisation #recommendation #what
You are what you consume: a bayesian method for personalized recommendations (KB, GC, ET), pp. 221–228.
RecSysRecSys-2013-MouraoRKM #hybrid #recommendation
Exploiting non-content preference attributes through hybrid recommendation method (FM, LCdR, JAK, WMJ), pp. 177–184.
SEKESEKE-2013-ChaoY #analysis #order #reachability #scalability
A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
SEKESEKE-2013-DuHCLH #incremental #named #personalisation #recommendation
ABEY: an Incremental Personalized Method Based on Attribute Entropy for Recommender Systems (S) (XD, TH, ZC, JL, CH), pp. 318–321.
SEKESEKE-2013-HeDWCL #collaboration #topic
Comparing Collaborative Filtering Methods Based on User-Topic Ratings (TH, XD, WW, ZC, JL), pp. 312–317.
SEKESEKE-2013-KayaF #identification
Identifying Extract Method Opportunities Based on Variable References (S) (MK, JWF), pp. 153–158.
SEKESEKE-2013-TriasCSM #migration #web
An ADM-based Method for migrating CMS-based Web applications (FT, VdC, MLS, EM), pp. 256–261.
SIGIRSIGIR-2013-CuiMLWR #automation #image #nearest neighbour
Ranking-oriented nearest-neighbor based method for automatic image annotation (CC, JM, TL, XW, ZR), pp. 957–960.
SIGIRSIGIR-2013-LuWTZHZ #rank #ranking #scalability
A low rank structural large margin method for cross-modal ranking (XL, FW, ST, ZZ, XH, YZ), pp. 433–442.
SIGIRSIGIR-2013-ZhuC #adaptation
An adaptive evidence weighting method for medical record search (DZ, BC), pp. 1025–1028.
AMTAMT-2013-TisoRL #model-to-text #testing
A Method for Testing Model to Text Transformations (AT, GR, ML), pp. 22–31.
RERE-2013-GolnamRWK #case study #integration #scalability
The integration of an RE method and AHP: A pilot study in a large Swiss bank (AG, GR, AW, SK), pp. 308–313.
RERE-2013-GuillermDS #safety
A safety requirement engineering method and tool (RG, HD, NS), pp. 328–329.
RERE-2013-ZarghamiVESW #identification #risk management
Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
SACSAC-2013-AlitavoliJE #java #novel #source code
A novel watermarking method for Java programs (MA, MJ, AE), pp. 1013–1018.
SACSAC-2013-BrinkeMBBA #composition #design #energy
A design method for modular energy-aware software (StB, SM, CB, LB, MA), pp. 1180–1182.
SACSAC-2013-BuarqueCA #modelling #requirements
The role of NFRs when transforming i* requirements models into OO-method models (AB, JC, FMRA), pp. 1305–1306.
SACSAC-2013-FanYZ #architecture #framework #modelling #scalability
A generic framework for deriving architecture modeling methods for large-scale software-intensive systems (ZF, TY, LZ), pp. 1750–1757.
SACSAC-2013-KawakamiIYT #communication #data type
A delivery method considering communication loads for sensor data stream with different collection cycles (TK, YI, TY, YT), pp. 611–618.
SACSAC-2013-KinderenP #approach #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SACSAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-MendesW #navigation #realtime #using
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SACSAC-2013-SouzaRB #clustering #data access #metric #performance
Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
ESEC-FSEESEC-FSE-2013-ZervoudakisREF #model checking #verification
Cascading verification: an integrated method for domain-specific model checking (FZ, DSR, SGE, AF), pp. 400–410.
ICSEICSE-2013-CotroneoPR #testing
A learning-based method for combining testing techniques (DC, RP, SR), pp. 142–151.
ICSEICSE-2013-FitzgeraldSOO #agile #case study #industrial #scalability
Scaling agile methods to regulated environments: an industry case study (BF, KJS, RO, DO), pp. 863–872.
ICSEICSE-2013-SamarthyamSSG #assessment #design #industrial #named #quality
MIDAS: a design quality assessment method for industrial software (GS, GS, TS, SG), pp. 911–920.
SLESLE-2013-LammelMV #tool support #wiki
Method and Tool Support for Classifying Software Languages with Wikipedia (RL, DM, AV), pp. 249–259.
SPLCSPLC-2013-ClementsKSW #strict
A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
PPoPPPPoPP-2013-Chen #algorithm #detection #fault #fault tolerance #named #online
Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
CADECADE-2013-GoreT #logic
An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description (RG, JT), pp. 275–281.
CADECADE-2013-HahnleSB #reuse #verification
Reuse in Software Verification by Abstract Method Calls (RH, IS, RB), pp. 300–314.
CAVCAV-2013-StewartEY #automaton #bound #model checking #polynomial #probability
Upper Bounds for Newton’s Method on Monotone Polynomial Systems, and P-Time Model Checking of Probabilistic One-Counter Automata (AS, KE, MY), pp. 495–510.
ICSTICST-2013-FarooqQA #effectiveness #empirical #performance #testing
A Controlled Experiment to Evaluate Effectiveness and Efficiency of Three Software Testing Methods (SUF, SMKQ, NA), pp. 493–494.
ICSTICST-2013-IchidaSO #testing
A Method of Making Single Function Tests for Constituting Scenario Tests (NI, TS, HO), pp. 479–480.
ICSTICST-2013-ShuSPC #fault #locality #named
MFL: Method-Level Fault Localization with Causal Inference (GS, BS, AP, FC), pp. 124–133.
ISSTAISSTA-2013-Buda #database #generative #testing #using
Generation of test databases using sampling methods (TSB), pp. 366–369.
WICSA-ECSAWICSA-ECSA-2012-BassN #architecture #comprehension #evaluation
Understanding the Context of Architecture Evaluation Methods (LB, RLN), pp. 277–281.
WICSA-ECSAWICSA-ECSA-2012-KoziolekDGVW #architecture #lightweight #named
MORPHOSIS: A Lightweight Method Facilitating Sustainable Software Architectures (HK, DD, TG, PV, RJW), pp. 253–257.
WICSA-ECSAWICSA-ECSA-2012-LytraSZ #architecture #framework #integration #multi
Architectural Decision Making for Service-Based Platform Integration: A Qualitative Multi-Method Study (IL, SS, UZ), pp. 111–120.
ASEASE-2012-MorenoM #automation #identification #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
CASECASE-2012-BaekKAYK #case study
Study on iterative method of electro-hydraulic actuator in force control (SGB, HK, KTA, HGY, JCK), pp. 178–183.
CASECASE-2012-KimPLPC #estimation #framework #parametricity
A parameter estimation method for the bilateral teleoperation framework for an O2 lance manipulator (HK, BP, JL, YJP, WKC), pp. 564–568.
CASECASE-2012-KosakiS #architecture #internet
Control of pneumatic artificial muscles with the just-in-time method based on a client-server architecture via the internet (TK, MS), pp. 980–985.
CASECASE-2012-LiZH #realtime
A practical method for motor imagery based real-time prosthesis control (YNL, XDZ, ZXH), pp. 1052–1056.
CASECASE-2012-WeiZW #detection #recognition #research
Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
CASECASE-2012-ZhuSZZ #assessment #kernel #multi
A novelty degradation assessment method for equipment based on multi-kernel SVDD (YZ, YS, XZ, YZ), pp. 753–756.
DACDAC-2012-SunGR #design #nondeterminism #robust
A new uncertainty budgeting based method for robust analog/mixed-signal design (JS, PG, JMWR), pp. 529–535.
DACDAC-2012-SuYZ #named #order #performance #reduction
AMOR: an efficient aggregating based model order reduction method for many-terminal interconnect circuits (YS, FY, XZ), pp. 295–300.
DACDAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DATEDATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-LiuMG #estimation #performance #problem
A fast analog circuit yield estimation method for medium and high dimensional problems (BL, JM, GGEG), pp. 751–756.
DATEDATE-2012-LiuTWY #simulation
A GPU-accelerated envelope-following method for switching power converter simulation (XL, SXDT, HW, HY), pp. 1349–1354.
DATEDATE-2012-MitraBD #formal method #mining #ranking
Formal methods for ranking counterexamples through assumption mining (SM, AB, PD), pp. 911–916.
DATEDATE-2012-ZhangPM #3d #analysis #grid #power management
Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DRRDRR-2012-DaherGEBV #categorisation #recognition
Unsupervised categorization method of graphemes on handwritten manuscripts: application to style recognition (HD, DG, VE, SB, NV).
DRRDRR-2012-Obafemi-AjayiAX #classification #documentation
Ensemble methods with simple features for document zone classification (TOA, GA, BX).
DRRDRR-2012-WalkerLR #dataset #documentation #image
A synthetic document image dataset for developing and evaluating historical document processing methods (DDW, WBL, EKR).
CSEETCSEET-2012-Kajko-Mattsson #design #education #re-engineering #source code
A Method for Designing Software Engineering Educational Programs (MKM), pp. 139–143.
ITiCSEITiCSE-2012-MI #algorithm
A method to construct counterexamples for greedy algorithms (JM, SI), pp. 238–243.
ITiCSEITiCSE-2012-SalzerHY #testing
The scientific method and software testing integrated into the same lesson (HTS, BH, CY), p. 385.
CSMRCSMR-2012-HeinemannBHH #api #recommendation
Identifier-Based Context-Dependent API Method Recommendation (LH, VB, MH, BH), pp. 31–40.
CSMRCSMR-2012-HottaHK #dependence #graph #identification #refactoring
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph (KH, YH, SK), pp. 53–62.
CSMRCSMR-2012-KimKKB #analysis #database
Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
ICPCICPC-2012-HottaHIK #named #refactoring
CRat: A refactoring support tool for Form Template Method (KH, YH, HI, SK), pp. 250–252.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code #using
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICSMEICSM-2012-BiegelBHD #developer #how #order
The Order of Things: How developers sort fields and methods (BB, FB, WH, SD), pp. 88–97.
SASSAS-2012-ThakurR
A Generalization of Stålmarck’s Method (AVT, TWR), pp. 334–351.
STOCSTOC-2012-OrecchiaSV #algorithm #approximate #exponential
Approximating the exponential, the lanczos method and an Õ(m)-time spectral algorithm for balanced separator (LO, SS, NKV), pp. 1141–1160.
DLTDLT-2012-GiambrunoMNS #bidirectional #finite
A Generalization of Girod’s Bidirectional Decoding Method to Codes with a Finite Deciphering Delay (LG, SM, JN, CS), pp. 471–476.
ICALPICALP-v1-2012-AchlioptasM #bound #random #satisfiability
Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method (DA, RMM), pp. 1–12.
ICALPICALP-v1-2012-BringmannP #performance
Efficient Sampling Methods for Discrete Distributions (KB, KP), pp. 133–144.
ICALPICALP-v1-2012-ShiW #optimisation
Epsilon-Net Method for Optimizations over Separable States (YS, XW), pp. 798–809.
ICALPICALP-v2-2012-BroadbentCHS #automaton
A Saturation Method for Collapsible Pushdown Systems (CHB, AC, MH, OS), pp. 165–176.
FMFM-2012-Degani #formal method
Formal Methods in the Wild: Trains, Planes, & Automobile (AD), p. 6.
FMFM-2012-OsaiweranFGR #case study #component #design #experience #formal method #using
Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FMFM-2012-YangKK #formal method #lightweight #using
Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
GRAPHITEGRAPHITE-2012-Cormie-Bowins #comparison #gpu #implementation #reachability
A Comparison of Sequential and GPU Implementations of Iterative Methods to Compute Reachability Probabilities (ECB), pp. 20–34.
CHICHI-2012-BabaianLO #collaboration
Evaluating the collaborative critique method (TB, WTL, MKO), pp. 2137–2164.
CHICHI-2012-GhomiFHCB #using
Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHICHI-2012-KapteinR #analysis #statistics
Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHICHI-2012-ZhangYELBI #lightweight
See me, see you: a lightweight method for discriminating user touches on tabletop displays (HZ, XDY, BE, HNL, PB, PI), pp. 2327–2336.
CSCWCSCW-2012-PhilipUASGLR #component #reuse
Software reuse through methodical component reuse and amethodical snippet remixing (KP, MU, MA, SES, REGV, CVL, SR), pp. 1361–1370.
ICEISICEIS-J-2012-KaragiannisS #approach #design #hybrid #modelling
An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
ICEISICEIS-J-2012-NikovskiEYST12a #automation #composition
Matcher Composition Methods for Automatic Schema Matching (DN, AE, XY, MS, ST), pp. 108–123.
ICEISICEIS-J-2012-PolasikGWKPT12a #empirical #mobile #performance
Time Efficiency of Point-of-Sale Payment Methods: Empirical Results for Cash, Cards and Mobile Payments (MP, JG, GW, JK, KP, NT), pp. 306–320.
ICEISICEIS-v1-2012-CarvalhoBSR #clustering
Labeling Methods for Association Rule Clustering (VOdC, DSB, FFdS, SOR), pp. 105–111.
ICEISICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy #using
A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
ICEISICEIS-v3-2012-TsudaASO #automation #classification
A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
CIKMCIKM-2012-BaeK #classification #effectiveness #recommendation
An effective category classification method based on a language model for question category recommendation on a cQA service (KB, YK), pp. 2255–2258.
CIKMCIKM-2012-ChenPZ #semantics
A co-training based method for chinese patent semantic annotation (XC, ZP, CZ), pp. 2379–2382.
CIKMCIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKMCIKM-2012-LiuSJL #web
An unsupervised method for author extraction from web pages containing user-generated content (JL, XS, JJ, CYL), pp. 2387–2390.
CIKMCIKM-2012-MaFL #database #relational
A positional access method for relational databases (DM, JF, GL), pp. 2164–2168.
CIKMCIKM-2012-OhY #framework #named
iSampling: framework for developing sampling methods considering user’s interest (JO, HY), pp. 1667–1671.
CIKMCIKM-2012-RenLZZ #collaboration #performance
The efficient imputation method for neighborhood-based collaborative filtering (YR, GL, JZ, WZ), pp. 684–693.
CIKMCIKM-2012-XuKZ #generative #timeline #word
A picture paints a thousand words: a method of generating image-text timelines (SX, LK, YZ), pp. 2511–2514.
ICMLICML-2012-BalasubramanianL #multi #predict
The Landmark Selection Method for Multiple Output Prediction (KB, GL), p. 41.
ICMLICML-2012-DefazioC #collaboration #performance #visual notation
A Graphical Model Formulation of Collaborative Filtering Neighbourhood Methods with Fast Maximum Entropy Training (AD, TSC), p. 75.
ICMLICML-2012-DhillonRFU #modelling #using #word
Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICMLICML-2012-HannahD #design #geometry #programming
Ensemble Methods for Convex Regression with Applications to Geometric Programming Based Circuit Design (LH, DBD), p. 24.
ICMLICML-2012-HennigK
Quasi-Newton Methods: A New Direction (PH, MK), p. 134.
ICMLICML-2012-RavanbakhshYG #approximate #modelling #visual notation
A Generalized Loop Correction Method for Approximate Inference in Graphical Models (S(R, CNY, RG), p. 84.
ICMLICML-2012-WangB #online
Online Alternating Direction Method (HW, AB), p. 221.
ICMLICML-2012-XiaoZ #problem
A Proximal-Gradient Homotopy Method for the L1-Regularized Least-Squares Problem (LX, TZ), p. 160.
ICPRICPR-2012-AntoniukFH #learning #markov #network
Learning Markov Networks by Analytic Center Cutting Plane Method (KA, VF, VH), pp. 2250–2253.
ICPRICPR-2012-FausserS #clustering #dataset #kernel #scalability
Clustering large datasets with kernel methods (SF, FS), pp. 501–504.
ICPRICPR-2012-FrouzeshPH #modelling #optimisation
A combined method for finding best starting points for optimisation in bernoulli mixture models (FF, SP, YH), pp. 1128–1131.
ICPRICPR-2012-FuLBF
Spectral correspondence method for fingerprint minutia matching (XF, CL, JB, JF), pp. 1743–1746.
ICPRICPR-2012-GaoTLW #graph #re-engineering
A graph-based method of newspaper article reconstruction (LG, ZT, XL, YW), pp. 1566–1569.
ICPRICPR-2012-GautamSV #performance
An efficient, bolus-stage based method for motion correction in perfusion weighted MRI (RG, JS, RV), pp. 145–148.
ICPRICPR-2012-GonzalezBTB #image #recognition
A character recognition method in natural scene images (ÁG, LMB, JJYT, SB), pp. 621–624.
ICPRICPR-2012-KangLH #adaptation #image
Fusing soft-decision-adaptive and bicubic methods for image interpolation (XK, SL, JH), pp. 1043–1046.
ICPRICPR-2012-KovalenkoS #on the
On methods for incorporating evidences into posterior scoring of hypotheses (DK, SNS), pp. 577–580.
ICPRICPR-2012-LiuSZ #feature model #graph
Sparsity Score: A new filter feature selection method based on graph (ML, DS, DZ), pp. 959–962.
ICPRICPR-2012-LiuXL #performance #recognition
An efficient method for occluded face recognition (WL, XX, KML), pp. 2993–2996.
ICPRICPR-2012-MinagawaKTH #automation #detection
A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
ICPRICPR-2012-MoriyamaAS #analysis #using
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-ShaoWCHW #array #automation #image
An improved automatic gridding method for cDNA microarray images (GS, TW, ZC, YH, YW), pp. 1615–1618.
ICPRICPR-2012-ShivakumaraHZTP #video
A new Iterative-Midpoint-Method for video character gap filling (PS, DBH, DZ, CLT, UP), pp. 673–676.
ICPRICPR-2012-SunH #component
A component-tree based method for user-intention guided text extraction (LS, QH), pp. 633–636.
ICPRICPR-2012-TajimaIA #3d #correlation #using
A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPRICPR-2012-WangUL
Part-based method on handwritten texts (SW, SU, ML), pp. 339–342.
ICPRICPR-2012-YangLP #effectiveness
A simple and effective extrinsic calibration method of a camera and a single line scanning lidar (HY, XL, IP), pp. 1439–1442.
ICPRICPR-2012-ZangY0JZT #information management
A score-level fusion method with prior knowledge for fingerprint matching (YZ, XY, KC, XJ, NZ, JT), pp. 2379–2382.
ICPRICPR-2012-ZhangLC #analysis #detection #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
ICPRICPR-2012-ZhangLMA #detection #independence #statistics
A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
ICPRICPR-2012-ZhangW #image #segmentation
An image fusion method based on region segmentation and Cauchy convolution (YQZ, XJW), pp. 392–395.
ICPRICPR-2012-ZhangWL #documentation #keyword #online
A confidence-based method for keyword spotting in online Chinese handwritten documents (HZ, DHW, CLL), pp. 525–528.
ICPRICPR-2012-ZhaoL #3d #detection
Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
ICPRICPR-2012-ZhaoYXJ #learning
A near-optimal non-myopic active learning method (YZ, GY, XX, QJ), pp. 1715–1718.
ICPRICPR-2012-Zhu0N #normalisation #recognition
Discriminative normalization method for handwritten Chinese character recognition (YZ, JS, SN), pp. 274–277.
KDDKDD-2012-BellalaMALB #power management
Following the electrons: methods for power management in commercial buildings (GB, MM, MFA, GL, CB), pp. 994–1002.
KDDKDD-2012-CosciaRGP #community #named
DEMON: a local-first discovery method for overlapping communities (MC, GR, FG, DP), pp. 615–623.
KDDKDD-2012-GleichS #community
Vertex neighborhoods, low conductance cuts, and good seeds for local community methods (DFG, CS), pp. 597–605.
KDIRKDIR-2012-MiaoLWZ #infinity #modelling #process #semantics #topic #wiki
Infinite Topic Modelling for Trend Tracking — Hierarchical Dirichlet Process Approaches with Wikipedia Semantic based Method (YM, CL, HW, LZ), pp. 35–44.
KEODKEOD-2012-FernandezVML #fuzzy #named #ontology
FuzzyAlign — A Fuzzy Method for Ontology Alignment (SF, JRV, IMM, MALC), pp. 98–107.
KEODKEOD-2012-HenriquesS #framework #ontology
An Ontology-based Framework for Syndromic Surveillance Method Selection (GH, DAS), pp. 396–400.
KMISKMIS-2012-HamadaAS #generative #learning #using
A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMISKMIS-2012-KataokaTKH #information management #network
An Information Sharing Method for Skilled Management Operations based on Bayesian Network Inference (TK, KT, MK, MH), pp. 257–260.
KMISKMIS-2012-OtsukiAS #using
An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KMISKMIS-2012-PanTG #analysis #component
A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
KMISKMIS-2012-RezendeLBJMRB #framework #information management #modelling
Modelling and Knowledge Management in the Field of Road Infrastructure Operation and Regulation — Study on the Methods Application in an Organizational Unit (LR, MAL, CRNB, JdLPCJ, LAM, SAR, CAMB), pp. 265–268.
MLDMMLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation #using
EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDMMLDM-2012-JoenssenB
Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
MLDMMLDM-2012-StaroszczykOM #analysis #comparative #feature model #recognition
Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
RecSysRecSys-2012-NingK #linear #recommendation
Sparse linear methods with side information for top-n recommendations (XN, GK), pp. 155–162.
RecSysRecSys-2012-SchelterBM #pipes and filters #scalability #similarity
Scalable similarity-based neighborhood methods with MapReduce (SS, CB, VM), pp. 163–170.
SEKESEKE-2012-ChenCZS #analysis #approach #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-GaoKN #feature model #metric
Stability of Filter-Based Feature Selection Methods for Imbalanced Software Measurement Data (KG, TMK, AN), pp. 74–79.
SEKESEKE-2012-HuangL
A Goal-Driven Method for Selecting Issues Used in Agent Negotiation (YCH, AL), pp. 759–762.
SEKESEKE-2012-HuiLCDM #e-commerce #empirical #recommendation
An Empirical Study on Recommendation Methods for Vertical B2C E-commerce (CH, JL, ZC, XD, WM), pp. 139–142.
SEKESEKE-2012-LiLCZJZ #adaptation #continuation #self #verification
A HybridUML and QdL Based Verification Method for CPS Self-Adaptability (JL, BL, QC, MZ, SJ, XZ), pp. 239–242.
SEKESEKE-2012-RiveroC #usability #using #web
Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKESEKE-2012-SubburajUS #safety #specification
Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
SEKESEKE-2012-TanizakiAK #variability
A Variability Management Method for Software Configuration Files (HT, TA, TK), pp. 672–677.
SIGIRSIGIR-2012-BerardiES #automation #classification #ranking
A utility-theoretic ranking method for semi-automated text classification (GB, AE, FS), pp. 961–970.
SIGIRSIGIR-2012-CareniniM #mining
Methods for mining and summarizing text conversations (GC, GM), pp. 1178–1179.
SIGIRSIGIR-2012-MetzlerK #information retrieval
Experimental methods for information retrieval (DM, OK), pp. 1185–1186.
SIGIRSIGIR-2012-WeiLZMRZ #novel #web
Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
ECMFAECMFA-2012-QureshiCT #constraints #specification
A Timed Automata-Based Method to Analyze EAST-ADL Timing Constraint Specifications (TNQ, DJC, MT), pp. 303–318.
TOOLSTOOLS-EUROPE-J-2011-SchwarzLN12 #fine-grained #named
Seuss: Decoupling responsibilities from static methods for fine-grained configurability (NS, ML, ON), pp. 1–23.
OOPSLAOOPSLA-2012-CousotCLB #abstract interpretation #contract #framework #refactoring
An abstract interpretation framework for refactoring with application to extract methods with contracts (PC, RC, FL, MB), pp. 213–232.
OOPSLAOOPSLA-2012-HuangMDE
Reim & ReImInfer: checking and inference of reference immutability and method purity (WH, AM, WD, MDE), pp. 879–896.
TOOLSTOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #privacy #social
Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
TOOLSTOOLS-EUROPE-2012-OlszakBJV #detection #quantifier
Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
TOOLSTOOLS-EUROPE-2012-VranyKG #performance #smalltalk
Efficient Method Lookup Customization for Smalltalk (JV, JK, CG), pp. 124–139.
QAPLQAPL-2012-GazeauMP #analysis #float #robust #source code
A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
REFSQREFSQ-2012-BeckersFKS #identification
A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
REFSQREFSQ-2012-TekaCS #bibliography
A Systematic Literature Review on Service Description Methods (AYT, NCF, BS), pp. 239–255.
SACSAC-2012-ChenNX #collaboration #recommendation
A common neighbour based two-way collaborative recommendation method (LC, RN, YX), pp. 214–215.
SACSAC-2012-GrooteOW #case study #experience #formal method
Experience report on developing the Front-end client unit under the control of formal methods (JFG, AO, JHW), pp. 1183–1190.
SACSAC-2012-IkemotoDO #pseudo #reliability
Estimating software reliability via pseudo maximum likelihood method (SI, TD, HO), pp. 1171–1176.
SACSAC-2012-LiuHHYS #multi #performance
An application of circumscribed circle filter in the Multi-Stencils Fast Marching method (HL, CCH, HH, MY, ES), pp. 33–38.
SACSAC-2012-MaruhashiTT #identification
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-OtaMSA #dependence #flexibility #functional #named
C-Mapping: a flexible XML-RDB mapping method based on functional and inclusion dependencies (SO, AM, NS, TA), pp. 834–839.
SACSAC-2012-RajeDFRR #data access #implementation #ontology #using
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-TeymooriKY #fault tolerance #network #realtime
A real-time data aggregation method for fault-tolerant wireless sensor networks (PT, MK, NY), pp. 605–612.
SACSAC-2012-YuHJSLH #novel #programming #segmentation
A novel segmentation method for convex lesions based on dynamic programming with local intra-class variance (MY, QH, RJ, ES, HL, CCH), pp. 39–44.
FSEFSE-2012-HuangM #java #named
ReImInfer: method purity inference for Java (WH, AM), p. 38.
ICSEICSE-2012-DangWZZN #clustering #named #similarity #stack
ReBucket: A method for clustering duplicate crash reports based on call stack similarity (YD, RW, HZ, DZ, PN), pp. 1084–1093.
ICSEICSE-2012-PanditaXZXOP #api #natural language #specification
Inferring method specifications from natural language API descriptions (RP, XX, HZ, TX, SO, AMP), pp. 815–825.
ICSEICSE-2012-SingerS #re-engineering #social #using
Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
PLEASEPLEASE-2012-ShimbaraWKKO #testing
Feature-analysis-based selection method for system configuration for system testing (DS, HW, SK, MK, HO), pp. 61–64.
SPLCSPLC-2012-Heymans #formal method
Formal methods for the masses (PH), p. 4.
CCCC-2012-HouVQJFV
A New Method for Program Inversion (CH, GV, DJQ, DJ, RF, RWV), pp. 81–100.
CGOCGO-2012-AnsaloniBHC #multi #program analysis
Deferred methods: accelerating dynamic program analysis on multicores (DA, WB, AH, LYC), pp. 242–251.
CAVCAV-2012-ChuJ #reduction #safety #symmetry #verification
A Complete Method for Symmetry Reduction in Safety Verification (DHC, JJ), pp. 616–633.
CAVCAV-2012-ThakurR #symbolic computation
A Method for Symbolic Computation of Abstract Operations (AVT, TWR), pp. 174–192.
ICSTICST-2012-EndoS #comparison #finite #generative #state machine #testing
Experimental Comparison of Test Case Generation Methods for Finite State Machines (ATE, AdSS), pp. 549–558.
ICSTICST-2012-GrooteOW #formal method #using
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICSTICST-2012-Kapfhammer #database #testing #towards
Towards a Method for Reducing the Test Suites of Database Applications (GMK), pp. 964–965.
ICSTICST-2012-KuhnHLKL #combinator #sequence #testing
Combinatorial Methods for Event Sequence Testing (DRK, JMH, JL, RK, YL), pp. 601–609.
ICTSSICTSS-2012-ChenV #protocol #testing
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
ICSTSAT-2012-DemirovicG #composition #performance #satisfiability
An Efficient Method for Solving UNSAT 3-SAT and Similar Instances via Static Decomposition — (Poster Presentation) (ED, HG), pp. 489–490.
CBSECBSE-2011-DistefanoFGM #analysis #composition #multi #reliability #workflow
A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
CBSECBSE-2011-InoueH #analysis #component #data flow
A method for data-flow analysis of business components (TI, SH), pp. 51–60.
ECSAECSA-2011-MullerKG #architecture
A Question-Based Method for Deriving Software Architectures (MM, BK, MG), pp. 35–42.
ECSAECSA-2011-Naab #architecture #design #flexibility #information management
Enhancing Architecture Design Methods for Improved Flexibility in Long-Living Information Systems (MN), pp. 194–198.
WICSAWICSA-2011-PetrovBN #analysis #architecture #design #enterprise #multi
The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
WICSAWICSA-2011-RosS #architecture
A Method for Evidence-Based Architecture Discovery (JPR, RSS), pp. 342–345.
ASEASE-2011-HillPV #code search #natural language #source code
Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
CASECASE-2011-AranovskiyBB #identification #metric
The method of identification for the “motor-dual-section device” system through output signal measurements (SA, AAB, VB), pp. 346–350.
CASECASE-2011-CaoPW #scheduling
A drum-buffer-rope based scheduling method for semiconductor manufacturing system (ZC, YP, YW), pp. 120–125.
CASECASE-2011-LeonardoKKDS #monitoring #simulation
Simulation of a hydraulic pump application for monitoring and diagnosis methods (DL, SK, AKH, AD, RS), pp. 341–345.
CASECASE-2011-LiTL #process
A GERT-based analytical method for remanufacturing process routing (CL, YT, CL), pp. 462–467.
CASECASE-2011-PurwinsNBHKLPW #predict
Regression methods for prediction of PECVD Silicon Nitride layer thickness (HP, AN, BB, UH, AK, BL, GP, KW), pp. 387–392.
CASECASE-2011-WuS #bound #multi #problem
A lower and upper bound guided nested partitions method for solving capacitated multi-level production planning problems (TW, LS), pp. 78–83.
CASECASE-2011-ZanasiC #design #visual notation
Direct method for digital lead-lag design: analytical and graphical solutions (RZ, SC), pp. 804–809.
DACDAC-2011-HochmanBW #empirical #reduction
A stabilized discrete empirical interpolation method for model reduction of electrical, thermal, and microelectromechanical systems (AH, BNB, JKW), pp. 540–545.
DACDAC-2011-HsiaoD #bound #parallel #scalability
A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
DACDAC-2011-MillerBHDCB #analysis #testing #validation
A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
DACDAC-2011-ZhaoF #3d #gpu #parallel #performance
Fast multipole method on GPU: tackling 3-D capacitance extraction on massively parallel SIMD platforms (XZ, ZF), pp. 558–563.
DATEDATE-2011-AadithyaDVR #modelling #named #random #simulation
SAMURAI: An accurate method for modelling and simulating non-stationary Random Telegraph Noise in SRAMs (KVA, AD, SV, JSR), pp. 1113–1118.
DATEDATE-2011-BonannoBS #analysis #energy #modelling #monitoring #optimisation #tool support
Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
DATEDATE-2011-ErbP #analysis #performance
A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KeezerG #synthesis
Two methods for 24 Gbps test signal synthesis (DCK, CEG), pp. 579–582.
DATEDATE-2011-LiuS #continuation #optimisation #performance
An efficient mask optimization method based on homotopy continuation technique (FL, XS), pp. 1053–1058.
DATEDATE-2011-PanHHL #effectiveness
A cost-effective substantial-impact-filter based method to tolerate voltage emergencies (SP, YH, XH, XL), pp. 311–315.
DATEDATE-2011-RekikADMN #development #evaluation
An electrical test method for MEMS convective accelerometers: Development and evaluation (AAR, FA, ND, FM, PN), pp. 806–811.
DATEDATE-2011-ShinG #fault
A new circuit simplification method for error tolerant applications (DS, SKG), pp. 1566–1571.
DATEDATE-2011-Sifakis #component #design #tool support
Methods and tools for component-based system design (JS), p. 1022.
DATEDATE-2011-SommerKHSS #automation #design #generative #network
A new method for automated generation of compensation networks — The EDA Designer Finger (RS, DK, EH, ES, CS), pp. 1666–1672.
DATEDATE-2011-VasicekS #optimisation
A global postsynthesis optimization method for combinational circuits (ZV, LS), pp. 1525–1528.
DATEDATE-2011-YehHWL #framework #simulation
Speeding Up MPSoC virtual platform simulation by Ultra Synchronization Checking Method (YFY, CYH, CAW, HCL), pp. 353–358.
DATEDATE-2011-YuH #fault #logic
Trigonometric method to handle realistic error probabilities in logic circuits (CCY, JPH), pp. 64–69.
DocEngDocEng-2011-CardosoJLRC #independence #performance
An efficient language-independent method to extract content from news webpages (ETC, IVJ, ESL, RR, PC), pp. 121–128.
DRRDRR-2011-Dejean
Unsupervised method to generate page templates (HD), pp. 1–10.
DRRDRR-2011-FujiiTTH #keyword #retrieval #robust
Robust keyword retrieval method for OCRed text (YF, HT, HT, YH), pp. 1–10.
DRRDRR-2011-LemaitreCC #segmentation
A perceptive method for handwritten text segmentation (AL, JC, BC), pp. 1–10.
DRRDRR-2011-Rodriguez-PineiroAPM #documentation #image
A new method for perspective correction of document images (JRP, PCA, FPG, AMG), pp. 1–10.
DRRDRR-2011-SmithDL #documentation
A mask-based enhancement method for historical documents (EHBS, JD, LLS), pp. 1–10.
DRRDRR-2011-SuPD #recognition
SemiBoost-based Arabic character recognition method (BS, LP, XD), pp. 1–10.
ICDARICDAR-2011-AlmazanFV #feature model #recognition
A Non-rigid Feature Extraction Method for Shape Recognition (JA, AF, EV), pp. 987–991.
ICDARICDAR-2011-ClausnerPA11a #analysis #documentation #evaluation #layout #performance
Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
ICDARICDAR-2011-FangGBQTT #detection #documentation #multi #visual notation
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
ICDARICDAR-2011-GaoDL #documentation #multi #segmentation
A Multi-scale Text Line Segmentation Method in Freestyle Handwritten Documents (YG, XD, CL), pp. 643–647.
ICDARICDAR-2011-GaoWJ #2d #optimisation #recognition
A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition (XG, WW, LJ), pp. 232–236.
ICDARICDAR-2011-KurbielKE #analysis #component #independence #novel #preprocessor
A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
ICDARICDAR-2011-LiangWS #image #segmentation
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther (YL, YW, ES), pp. 247–251.
ICDARICDAR-2011-LiuLZL #detection #image #novel
A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
ICDARICDAR-2011-LiuZLL #clustering #image #locality
A Chinese Character Localization Method Based on Intergrating Structure and CC-Clustering for Advertising Images (JL, SZ, HL, WL), pp. 1044–1048.
ICDARICDAR-2011-LuangvilayZN #online
An On-line Handwritten Text Search Method Based on Directional Feature Matching (PL, BZ, MN), pp. 683–686.
ICDARICDAR-2011-ManoharVCPN #clustering #graph #segmentation
Graph Clustering-Based Ensemble Method for Handwritten Text Line Segmentation (VM, SNPV, HC, RP, PN), pp. 574–578.
ICDARICDAR-2011-NavonKO
Enhanced Active Contour Method for Locating Text (YN, VK, BO), pp. 222–226.
ICDARICDAR-2011-PhamDB #detection
A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
ICDARICDAR-2011-PhanSST #segmentation #video
A Gradient Vector Flow-Based Method for Video Character Segmentation (TQP, PS, BS, CLT), pp. 1024–1028.
ICDARICDAR-2011-RajendranSSLT #recognition #video #word
A New Fourier-Moments Based Video Word and Character Extraction Method for Recognition (DR, PS, BS, SL, CLT), pp. 1165–1169.
ICDARICDAR-2011-RenLC #automation #recognition #retrieval #segmentation
A New Method on the Segmentation and Recognition of Chinese Characters for Automatic Chinese Seal Imprint Retrieval (CR, DL, YC), pp. 972–976.
ICDARICDAR-2011-RusinolATL #documentation #word
Browsing Heterogeneous Document Collections by a Segmentation-Free Word Spotting Method (MR, DA, RT, JL), pp. 63–67.
ICDARICDAR-2011-ShaoWXZZ11a #learning #multi
Multiple Instance Learning Based Method for Similar Handwritten Chinese Characters Discrimination (YS, CW, BX, RZ, YZ), pp. 1002–1006.
ICDARICDAR-2011-ShivakumaraBSTP #recognition #segmentation #video
A New Gradient Based Character Segmentation Method for Video Text Recognition (PS, SB, BS, CLT, UP), pp. 126–130.
ICDARICDAR-2011-SilvaL #automation #documentation #recognition
An Automatic Method for Enhancing Character Recognition in Degraded Historical Documents (GPeS, RDL), pp. 553–557.
ICDARICDAR-2011-SongUL11a #case study #comparative #recognition
Comparative Study of Part-Based Handwritten Character Recognition Methods (WS, SU, ML), pp. 814–818.
ICDARICDAR-2011-TanakaTH #documentation #optimisation #robust
Robust Cell Extraction Method for Form Documents Based on Intersection Searching and Global Optimization (HT, HT, YH), pp. 354–358.
ICDARICDAR-2011-TerasawaSK #image #performance
A Fast Appearance-Based Full-Text Search Method for Historical Newspaper Images (KT, TS, TK), pp. 1379–1383.
ICDARICDAR-2011-WangHL #embedded #novel #segmentation
A Novel Method for Embedded Text Segmentation Based on Stroke and Color (XW, LH, CL), pp. 151–155.
ICDARICDAR-2011-WeiGB #word
A Method for Removing Inflectional Suffixes in Word Spotting of Mongolian Kanjur (HW, GG, YB), pp. 88–92.
ICDARICDAR-2011-XuDPL #grid #independence #recognition
An Improved Method Based on Weighted Grid Micro-structure Feature for Text-Independent Writer Recognition (LX, XD, LP, XL), pp. 638–642.
ICDARICDAR-2011-ZhangL #keyword #online
A Lattice-Based Method for Keyword Spotting in Online Chinese Handwriting (HZ, CLL), pp. 1064–1068.
ICDARICDAR-2011-ZhangLYDW #random #recognition #using
An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDARICDAR-2011-ZhaoLL #detection #independence #robust
A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
ICDARICDAR-2011-ZhuN11a #classification #online #recognition #scalability
A Coarse Classifier Construction Method from a Large Number of Basic Recognizers for On-line Recognition of Handwritten Japanese Characters (BZ, MN), pp. 1090–1094.
ICDARICDAR-2011-ZhuN11b #online #recognition #using
Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
SIGMODSIGMOD-2011-LiTP #named #sequence
WHAM: a high-throughput sequence alignment method (YL, AT, JMP), pp. 445–456.
VLDBVLDB-2012-LiDWF11 #named #similarity
PASS-JOIN: A Partition-based Method for Similarity Joins (GL, DD, JW, JF), pp. 253–264.
CSEETCSEET-2011-AndrianoMBR #assessment
A quantitative assessment method for simulation-based e-learnings (NA, MGM, CB, DR), pp. 159–168.
CSEETCSEET-2011-ChenZL #education #testing
Teaching software testing methods based on diversity principles (ZC, JZ, BL), pp. 391–395.
CSEETCSEET-2011-ChookittikulMK #agile #education
Agile methods in Thai higher education and beyond (WC, PEM, JLK), p. 557.
CSEETCSEET-2011-John #assessment #re-engineering #usability
A quantitative usability assessment method for inclusion in software engineering courses (BEJ), pp. 537–539.
CSEETCSEET-2011-LuLL #analysis #using
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-MacekK #development #student
The practical method of motivating students to iterative software development (OM, MK), pp. 512–516.
ITiCSEITiCSE-2011-VihavainenPLK #scalability
Extreme apprenticeship method: key practices and upward scalability (AV, MP, ML, JK), pp. 273–277.
ESOPESOP-2011-JimM #parsing
A New Method for Dependent Parsing (TJ, YM), pp. 378–397.
ICPCICPC-2011-SridharaPV #generative #parametricity #summary
Generating Parameter Comments and Integrating with Method Summaries (GS, LLP, KVS), pp. 71–80.
ICSMEICSM-2011-Demeyer #research
Research methods in computer science (SD), p. 600.
ICSMEICSM-2011-Dragan #object-oriented
Emergent laws of method and class stereotypes in object oriented software (ND), pp. 550–555.
ICSMEICSM-2011-GethersOPL #information retrieval #on the #orthogonal #traceability
On integrating orthogonal information retrieval methods to improve traceability recovery (MG, RO, DP, ADL), pp. 133–142.
ICSMEICSM-2011-GrooteOW #development #formal method #industrial
Analyzing the effects of formal methods on the development of industrial control software (JFG, AO, JHW), pp. 467–472.
ICSMEICSM-2011-HouP #api #code completion #evaluation #sorting
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
ICSMEICSM-2011-KhadkaRSJH #legacy #migration
A method engineering based legacy to SOA migration method (RK, GR, AS, SJ, JH), pp. 163–172.
ICSMEICSM-2011-KuhnK #combinator #detection #fault #testing
Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
WCREWCRE-2011-WangPV #automation #readability #segmentation
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
ICALPICALP-v1-2011-Zhang #bound #communication #complexity #on the #power of #quantum
On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity (SZ), pp. 49–60.
FMFM-2011-BowenR #case study #community #formal method
From a Community of Practice to a Body of Knowledge: A Case Study of the Formal Methods Community (JPB, SR), pp. 308–322.
SEFMSEFM-2011-EggersRNF #analysis #hybrid #satisfiability
Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
SEFMSEFM-2011-Hermanns #energy #formal method
Formal Methods in Energy Informatics (HH), pp. 1–2.
SEFMSEFM-2011-Metayer #formal method
Formal Methods as a Link between Software Code and Legal Rules (DLM), pp. 3–18.
CHICHI-2011-BrownRS #challenge
Into the wild: challenges and opportunities for field trial methods (BB, SR, SS), pp. 1657–1666.
CHICHI-2011-DixonLF #interface #reverse engineering
Content and hierarchy in pixel-based methods for reverse engineering interface structure (MD, DL, JF), pp. 969–978.
CHICHI-2011-EllingLJ #eye tracking #using
Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHICHI-2011-GerkenJZMR #api #concept #usability
The concept maps method as a tool to evaluate the usability of APIs (JG, HCJ, MZ, MM, HR), pp. 3373–3382.
CHICHI-2011-QuinnCRD #cost analysis #multi #on the
On the costs of multiple trajectory pointing methods (PQ, AC, KJR, JD), pp. 859–862.
CHICHI-2011-WacharamanothamHMKSB
Evaluating swabbing: a touchscreen input method for elderly users with tremor (CW, JH, AM, MK, CMS, JOB), pp. 623–626.
HCIDHM-2011-FangF #automation
An Automatic Method for Computerized Head and Facial Anthropometry (JJF, SYF), pp. 12–21.
HCIDHM-2011-GraggYB #modelling #re-engineering #simulation
Posture Reconstruction Method for Mapping Joint Angles of Motion Capture Experiments to Simulation Models (JG, J(Y, RB), pp. 69–78.
HCIDUXU-v1-2011-AnderssonBORT #industrial
To Develop Viable Human Factors Engineering Methods for Improved Industrial Use (JA, LOB, ALO, MJR, ST), pp. 355–362.
HCIDUXU-v1-2011-DinetVB #community #design #difference #towards
Towards Future Methods to Take into Account Cross-Cultural Differences in Design: An Example with the “Expert Community Staff” (ECS) (JD, RV, EB), pp. 53–61.
HCIDUXU-v1-2011-FunadaIFS #effectiveness
Studies on Imaging Methods to Realize Effective BCI through ERPs (MFF, YI, TF, MS), pp. 228–236.
HCIDUXU-v1-2011-Hsu #case study #design #interface
A Study of Interface Design Method on Crossing Media-Dimension (HPH), pp. 247–255.
HCIDUXU-v2-2011-BohmSW11a #adaptation #constraints #usability
Customized Usability Engineering for a Solar Control Unit: Adapting Traditional Methods to Domain and Project Constraints (PB, TS, CW), pp. 109–117.
HCIDUXU-v2-2011-MatsumotoINI #biology
An Air Conditioning Control Method Based on Biological Fluctuation (HM, YI, YN, HI), pp. 608–615.
HCIDUXU-v2-2011-TengC #concept #design
The Application of the Concept of Affordance to a Creative Design Method (CKT, MCC), pp. 215–224.
HCIHCD-2011-ChouC #interactive #physics
Investigating Users’ Interaction with Physical Products Applying Qualitative and Quantitative Methods (CJC, CC), pp. 3–12.
HCIHCD-2011-GoreHHBM #approach #modelling #performance
A Methodical Approach for Developing Valid Human Performance Models of Flight Deck Operations (BFG, BLH, NH, DLB, EM), pp. 379–388.
HCIHCD-2011-HoriKK #testing #usability
Investigation of Indirect Oral Operation Method for Think Aloud Usability Testing (MH, YK, TK), pp. 38–46.
HCIHCD-2011-KondoK #design
Consideration of HCD Methods for Service Innovation Design (AK, NK), pp. 74–80.
HCIHCD-2011-Yamaoka #design #evaluation
A Proposal of Service Design Evaluation Method (TY), pp. 153–159.
HCIHCD-2011-Yamazaki #idea
Idea Creation Method for HCD (KY), pp. 160–165.
HCIHCD-2011-YanagidaUGTHY #design
Vision-Proposal Design Method (KY, YU, KG, KT, SH, KY), pp. 166–174.
HCIHCI-DDA-2011-ChiangT #design #education #interactive
Interaction Design Teaching Method Design (CWC, KT), pp. 45–53.
HCIHCI-DDA-2011-HeL #graph #image #modelling #segmentation
An Image Segmentation Method for Chinese Paintings by Combining Deformable Models with Graph Cuts (NH, KL), pp. 571–579.
HCIHCI-DDA-2011-MiyazakiNI #detection #image
A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
HCIHCI-ITE-2011-KimiokaST #multi #using
Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCIHCI-ITE-2011-KimRH #detection #multi #recognition
A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
HCIHCI-ITE-2011-OkamotoYW #using #visual notation
A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCIHCI-MIIE-2011-AoyagiOIS #behaviour #communication
Proposal of a Method for Promotion of Continuous Pro-Environmental Behavior with Easy Communication (SA, TO, HI, HS), pp. 465–473.
HCIHCI-MIIE-2011-ShibuyaNM #diagrams #documentation #float #mobile #performance
An Efficient Document Browsing Method with Floating Diagram Window on Mobile Device (YS, KN, KM), pp. 101–106.
HCIHCI-UA-2011-IshidaNKOT #word
Therapeutic Category Improvement Method Based on the Words Appearing in Effect-Efficacy Description (HI, KN, MK, MO, FT), pp. 174–181.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity #using
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHCI-UA-2011-KanekoN #evaluation #simulation
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation (RK, YN), pp. 346–353.
HCIHCI-UA-2011-YajimaT #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT), pp. 113–120.
HCIHIMI-v1-2011-GuoPS #axiom #concept #evaluation #usability
A Conceptual Model of the Axiomatic Usability Evaluation Method (YG, RWP, GS), pp. 93–102.
HCIHIMI-v1-2011-MikiHY #visualisation
Methods for Service Sciences from Visualization Points (HM, NH, SY), pp. 231–238.
HCIHIMI-v2-2011-HosonoIMSNTY
Service Science Method to Create Pictograms Referring to Sign Languages (NH, HI, HM, MS, YN, YT, SY), pp. 123–130.
HCIHIMI-v2-2011-NguyenBRHVSB #how #multi
How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
EDOCEDOC-2011-FakhfakhVP #multi #quality
Multi-criteria Decision Making Method for Quality of Service Aggregation (NF, HV, FP), pp. 203–212.
ICEISICEIS-v1-2011-AbramoviciJ #industrial #monitoring
A New Method for Monitoring Industrial Product-service Systems based on BSC and AHP (MA, FJ), pp. 190–196.
ICEISICEIS-v1-2011-GongG #evaluation #internet #performance #research
Research on the Evaluation Index System and Method for Intelligent Performance of Smart Space based on Internet of Things Technology (XG, TG), pp. 301–307.
ICEISICEIS-v1-2011-Li #image #lifecycle #locality #novel
A Novel Method for Dynamic Image Localization of Tourism Destination based on Butler Life Cycle Theory (CL), pp. 473–476.
ICEISICEIS-v1-2011-LiX
A Method of Adjusting the Number of Replica Dynamically in HDFS (BL, KX), pp. 529–533.
ICEISICEIS-v1-2011-LuoS #network #novel
A Novel Service Routing Method in a Service-oriented Network (XL, JS), pp. 560–563.
ICEISICEIS-v1-2011-XiaoXYZ #case study
Study on Developing Warehouse Receipt Hypothecation Financing Method in China (XX, SX, CY, ZZ), pp. 295–300.
ICEISICEIS-v1-2011-ZhuXP
A Differentiated Service based Content Distribution Method in CDN (BZ, KX, RP), pp. 576–579.
ICEISICEIS-v2-2011-JiananDF #summary
Summary of LASSO and Relative Methods (XJ, SD, XF), pp. 131–134.
ICEISICEIS-v3-2011-DuLD #comparison #modelling
Comparison Between the Business Modelling Methods Provided by MEASUR and RUP (HD, TL, DD), pp. 432–438.
ICEISICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
ICEISICEIS-v3-2011-LazarteVCTI #design #integration #modelling #process
An MDA-based Method for Designing Integration Process Models in B2B Collaborations (IML, PDV, OC, LHT, CI), pp. 55–65.
ICEISICEIS-v3-2011-Li11c #identification #performance
An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
ICEISICEIS-v3-2011-ZhouL #analysis #metric
A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
ICEISICEIS-v4-2011-MartinsP #implementation #visual notation
A Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users (LCGM, BEP), pp. 287–290.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-HofmannWR #probability
A probabilistic method for inferring preferences from clicks (KH, SW, MdR), pp. 249–258.
CIKMCIKM-2011-JameelLYC #ranking
An unsupervised ranking method based on a technical difficulty terrain (SJ, WL, CmAY, SC), pp. 1989–1992.
CIKMCIKM-2011-LiaoLCW #named #performance
KLEAP: an efficient cleaning method to remove cross-reads in RFID streams (GL, JL, LC, CW), pp. 2209–2212.
CIKMCIKM-2011-MagdyJ #performance #using
An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKMCIKM-2011-ParkSBY #distance #nearest neighbour #query
k-Nearest neighbor query processing method based on distance relation pattern (YP, DS, KB, JY), pp. 2413–2416.
CIKMCIKM-2011-PimentelCS #clustering #data-driven #database #kernel #metric
A partitioning method for symbolic interval data based on kernelized metric (BAP, AFBFdC, RMCRdS), pp. 2189–2192.
CIKMCIKM-2011-XuSPZ #kernel #named #performance
TAKES: a fast method to select features in the kernel space (YX, FS, WP, JZ), pp. 683–692.
CIKMCIKM-2011-YanWN #adaptation #performance
Efficient methods for finding influential locations with adaptive grids (DY, RCWW, WN), pp. 1475–1484.
ECIRECIR-2011-BelloginWC #collaboration #ranking #retrieval
Text Retrieval Methods for Item Ranking in Collaborative Filtering (AB, JW, PC), pp. 301–306.
ECIRECIR-2011-KeikhaGC #feedback #named
TEMPER: A Temporal Relevance Feedback Method (MK, SG, FC), pp. 436–447.
ECIRECIR-2011-LiSD #ambiguity #wiki #word
A Generalized Method for Word Sense Disambiguation Based on Wikipedia (CL, AS, AD), pp. 653–664.
ECIRECIR-2011-NeumayerMN #categorisation #feature model
Combination of Feature Selection Methods for Text Categorisation (RN, RM, KN), pp. 763–766.
ICMLICML-2011-GermainLLMS #approach #kernel
A PAC-Bayes Sample-compression Approach to Kernel Methods (PG, AL, FL, MM, SS), pp. 297–304.
ICMLICML-2011-JimenezS #performance
Fast Newton-type Methods for Total Variation Regularization (ÁBJ, SS), pp. 313–320.
ICMLICML-2011-LeeW #identification #learning #online #probability
Manifold Identification of Dual Averaging Methods for Regularized Stochastic Online Learning (SL, SJW), pp. 1121–1128.
ICMLICML-2011-LeNCLPN #learning #on the #optimisation
On optimization methods for deep learning (QVL, JN, AC, AL, BP, AYN), pp. 265–272.
KDDKDD-2011-HsiehD #coordination #matrix #performance
Fast coordinate descent methods with variable selection for non-negative matrix factorization (CJH, ISD), pp. 1064–1072.
KDIRKDIR-2011-ArmengolP #case study #classification #information management #lazy evaluation #learning
Combining Two Lazy Learning Methods for Classification and Knowledge Discovery — A Case Study for Malignant Melanoma Diagnosis (EA, SP), pp. 200–207.
KDIRKDIR-2011-MohammadzadehGSN #documentation #web
Extracting the Main Content of Web Documents based on a Naive Smoothing Method (HM, TG, FS, GN), pp. 470–475.
KDIRKDIR-2011-OlegA #analysis #approach #clustering
Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
KDIRKDIR-2011-ShishiboriLK #metric
An Improved Method to Select Candidates on Metric Index VP-tree (MS, SSL, KK), pp. 314–319.
KDIRKDIR-2011-VanetikG #mining #named
HashMax: A New Method for Mining Maximal Frequent Itemsets (NV, EG), pp. 140–145.
KEODKEOD-2011-AarnioSK #industrial #lightweight #semantics
A Lightweight Element Matching Method for Industrial Terminology Harmonization — Exploiting Minimal Semantics based on Naming Conventions (PA, SS, KK), pp. 390–395.
KEODKEOD-2011-FrikhDO #hybrid #ontology #web
A Hybrid Method for Domain Ontology Construction from the Web (BF, ASD, BO), pp. 285–292.
KEODKEOD-2011-OkumuraH #concept #using
A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KMISKMIS-2011-RamosSB #process
A Method for Discovering the Relevance of External Context Variables to Business Processes (ECR, FMS, FAB), pp. 399–408.
KMISKMIS-2011-SaharkhizS #multi #network #privacy #social
A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
MLDMMLDM-2011-JoutsijokiJ #classification #image
Comparing the One-vs-One and One-vs-All Methods in Benthic Macroinvertebrate Image Classification (HJ, MJ), pp. 399–413.
RecSysRecSys-2011-KnijnenburgRW #how #interactive #recommendation
Each to his own: how different users call for different interaction methods in recommender systems (BPK, NJMR, MCW), pp. 141–148.
RecSysRecSys-2011-TakacsPT #collaboration #feedback
Applications of the conjugate gradient method for implicit feedback collaborative filtering (GT, IP, DT), pp. 297–300.
SEKESEKE-2011-LiJ #classification #ontology
An Ontology based Method for Building Understandable Hierarchical Classification Structure for Software Assets Browsing (GL, ZJ), pp. 521–526.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SIGIRSIGIR-2011-AlonsoL #crowdsourcing #information retrieval
Crowdsourcing for information retrieval: principles, methods, and applications (OA, ML), pp. 1299–1300.
SIGIRSIGIR-2011-EfronG #estimation #ranking
Estimation methods for ranking recent information (ME, GG), pp. 495–504.
SIGIRSIGIR-2011-FernandesMSRA #web
A site oriented method for segmenting web pages (DFdO, ESdM, ASdS, BARN, EBA), pp. 215–224.
SIGIRSIGIR-2011-HanSZ #graph #web
Collective entity linking in web text: a graph-based method (XH, LS, JZ), pp. 765–774.
SIGIRSIGIR-2011-HeHS
A weighted curve fitting method for result merging in federated search (CH, DH, LS), pp. 1177–1178.
SIGIRSIGIR-2011-KanhabuaN11a #comparison #ranking
A comparison of time-aware ranking methods (NK, KN), pp. 1257–1258.
SIGIRSIGIR-2011-MartinHRF #music #retrieval #towards
Towards an indexing method to speed-up music retrieval (BM, PH, MR, PF), pp. 1167–1168.
SIGIRSIGIR-2011-TangLWWL #ambiguity #graph #network #social
A bipartite graph based social network splicing method for person name disambiguation (JT, QL, TW, JW, WL), pp. 1233–1234.
OOPSLAOOPSLA-2011-ThummalapentaXTHS #sequence #testing
Synthesizing method sequences for high-coverage testing (ST, TX, NT, JdH, ZS), pp. 189–206.
GPCEGPCE-2011-SlattenKH #automation #case study #distributed #generative #industrial #reliability #specification #towards #validation #verification
Towards automatic generation of formal specifications to validate and verify reliable distributed systems: a method exemplified by an industrial case study (VS, FAK, PH), pp. 147–156.
RERE-2011-FranqueiraTYWN #security
Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
RERE-2011-UbayashiKHT #analysis #bound #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
SACSAC-2011-AlencarRB #composition #evaluation #human-computer #hybrid
Composition of HCI evaluation methods for hybrid virtual environments (MFCA, ABR, SDJB), pp. 1237–1244.
SACSAC-2011-DumasDBB #partial order #verification
Application of partial-order methods for the verification of closed-loop SDL systems (XD, PD, FB, EB), pp. 1666–1673.
SACSAC-2011-EcharteACVL #classification #folksonomy
A method for the classification of folksonomy resources (FE, JJA, AC, JEV, AL), pp. 1675–1680.
SACSAC-2011-ElahiY #analysis #heuristic #metric #requirements #trade-off
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
SACSAC-2011-LinCL #data-driven #navigation
Service-oriented dynamic data driven application systems to potential field method vehicle navigation (SYL, KMC, CCL), pp. 462–467.
SACSAC-2011-RosaGO #problem #quality #satisfiability
Optimal stopping methods for finding high quality solutions to satisfiability problems with preferences (EDR, EG, BO), pp. 901–906.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-YatakaTTT #smarttech
A context-aware audio presentation method in wearable computing (SY, KT, TT, MT), pp. 405–412.
GTTSEGTTSE-2011-MikhaielTNSX #difference #modelling #uml
Differencing UML Models: A Domain-Specific vs. a Domain-Agnostic Method (RM, NT, NN, ES, ZX), pp. 159–196.
ICSEICSE-2011-OBrienGG #framework #metric
A method for selecting SOA pilot projects including a pilot metrics framework (LO, JG, JG), pp. 653–662.
ICSEICSE-2011-OlivetoGBPL #identification #smell
Identifying method friendships to remove the feature envy bad smell (RO, MG, GB, DP, ADL), pp. 820–823.
ICSEICSE-2011-Sethanandha #open source #process #tool support
Improving open source software patch contribution process: methods and tools (BDS), pp. 1134–1135.
ICSEICSE-2011-SridharaPV #automation #detection
Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
SPLCSPLC-2011-ChastekDMM #product line
Engineering a Production Method for a Software Product Line (GJC, PD, JDM, DM), pp. 277–286.
CGOCGO-2011-InoueHWN #compilation #java #jit
A trace-based Java JIT compiler retrofitted from a method-based compiler (HI, HH, PW, TN), pp. 246–256.
CGOCGO-2011-SanchezASPS #compilation #using
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
HPDCHPDC-2011-Chen
Algorithm-based recovery for iterative methods without checkpointing (ZC), pp. 73–84.
CADECADE-2011-KlinovP #hybrid #probability #satisfiability
A Hybrid Method for Probabilistic Satisfiability (PK, BP), pp. 354–368.
ICLPICLP-J-2011-DrescherT #logic programming #named #prolog
ALPprolog — A new logic programming method for dynamic domains (CD, MT), pp. 451–468.
ICSTICST-2011-EldhHP #analysis #design #testing
Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
ISSTAISSTA-2011-PradelG #detection #order
Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
ASEASE-2010-GermanMI #automation #identification #source code
A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
ASEASE-2010-SridharaHMPV #automation #generative #java #summary #towards
Towards automatically generating summary comments for Java methods (GS, EH, DM, LLP, KVS), pp. 43–52.
CASECASE-2010-PaullGLM #adaptation #using
An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
DACDAC-2010-El-MoselhyD #probability
Stochastic dominant singular vectors method for variation-aware extraction (TAEM, LD), pp. 667–672.
DACDAC-2010-FonsecaDBGPVB #analysis #reliability #simulation #statistics
A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
DACDAC-2010-KinsmanN #algorithm #design #hardware #robust
Robust design methods for hardware accelerators for iterative algorithms in scientific computing (ABK, NN), pp. 254–257.
DATEDATE-2010-ForoutanTHJ #performance
An analytical method for evaluating Network-on-Chip performance (SF, YT, RH, AJ), pp. 1629–1632.
DATEDATE-2010-GaoH #geometry #optimisation #programming #using
A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATEDATE-2010-JavaidJHP #agile #estimation #pipes and filters #runtime
Rapid runtime estimation methods for pipelined MPSoCs (HJ, AJ, MSH, SP), pp. 363–368.
DATEDATE-2010-KerstanO #design #realtime
Design of a real-time optimized emulation method (TK, MO), pp. 646–649.
DATEDATE-2010-LiuFG #optimisation #performance
An accurate and efficient yield optimization method for analog circuits based on computing budget allocation and memetic search technique (BL, FVF, GGEG), pp. 1106–1111.
DATEDATE-2010-OnoTKSNF #evaluation #execution #modelling #performance
A modeling method by eliminating execution traces for performance evaluation (KO, MT, RK, YS, TN, NF), pp. 1337–1340.
DATEDATE-2010-SeiculescuMBM
A method to remove deadlocks in Networks-on-Chips with Wormhole flow control (CS, SM, LB, GDM), pp. 1625–1628.
DATEDATE-2010-SuCG #multi
A general method to make multi-clock system deterministic (MS, YC, XG), pp. 1480–1485.
DATEDATE-2010-VasicekSB #design #implementation
A method for design of impulse bursts noise filters optimized for FPGA implementations (ZV, LS, MB), pp. 1731–1736.
DATEDATE-2010-WieckowskiSBCIPA #analysis #black box
A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
DocEngDocEng-2010-CahierMZ #documentation #hybrid #modelling #semantics #web
Document and item-based modeling: a hybrid method for a socio-semantic web (JPC, XM, LZ), pp. 243–246.
DRRDRR-2010-KatsuyamaMHOK #classification
A new pre-classification method based on associative matching method (YK, AM, YH, SO, NK), pp. 1–10.
DRRDRR-2010-SunPD #documentation #segmentation
Touching character segmentation method for Chinese historical documents (XS, LP, XD), pp. 1–10.
DRRDRR-2010-ZhangZLT #learning #recognition
A stacked sequential learning method for investigator name recognition from web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
VLDBVLDB-2010-CormodeLLS
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
CSEETCSEET-2010-Cowling #education #formal method
Stages in Teaching Formal Methods (AJC), pp. 17–24.
ITiCSEITiCSE-2010-Ezel #assessment #education #how #student
Assessment methods and how teachers and students view them in a computer science course at Uppsala University (MCE), p. 309.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition #using
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
FASEFASE-2010-HashimotoM #evolution
A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
CSMRCSMR-2010-NagyPGB #dependence #towards
Towards a Safe Method for Computing Dependencies in Database-Intensive Systems (CN, JP, TG, ÁB), pp. 166–175.
CSMRCSMR-2010-SanchezNCP #case study #java #refactoring
Refactoring Generics in JAVA: A Case Study on Extract Method (RMS, CLN, YC, FJP), pp. 212–221.
ICPCICPC-2010-OlivetoGPL #automation #equivalence #information retrieval #on the #traceability
On the Equivalence of Information Retrieval Methods for Automated Traceability Link Recovery (RO, MG, DP, ADL), pp. 68–71.
ICSMEICSM-2010-MirzaAghaeiPP #automation #evolution #testing
Automatically repairing test cases for evolving method declarations (MM, FP, MP), pp. 1–5.
ICSMEICSM-2010-QusefOL #testing #traceability
Recovering traceability links between unit tests and classes under test: An improved method (AQ, RO, ADL), pp. 1–10.
SASSAS-2010-KatoenMMM #automation #generative #invariant #probability #source code
Linear-Invariant Generation for Probabilistic Programs: — Automated Support for Proof-Based Methods (JPK, AM, LM, CCM), pp. 390–406.
SASSAS-2010-MatringeMR #algebra #generative #hybrid #invariant #linear
Generating Invariants for Non-linear Hybrid Systems by Linear Algebraic Methods (NM, AVM, RR), pp. 373–389.
STOCSTOC-2010-BayatiGT #approach #combinator #graph #random #scalability
Combinatorial approach to the interpolation method and scaling limits in sparse random graphs (MB, DG, PT), pp. 105–114.
STOCSTOC-2010-Kannan #matrix
Spectral methods for matrices and tensors (RK), pp. 1–12.
IFMIFM-2010-Dimovski #composition #equivalence #nondeterminism #source code #termination
A Compositional Method for Deciding Equivalence and Termination of Nondeterministic Programs (AD), pp. 121–135.
SEFMSEFM-2010-Powell #analysis #behaviour #modelling #scalability
Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
SEFMSEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing #using
A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
CHICHI-2010-FarooqWZ #api #programming #usability
API usability peer reviews: a method for evaluating the usability of application programming interfaces (UF, LW, DZ), pp. 2327–2336.
CHICHI-2010-IlinkinK #case study #evaluation #mobile
Evaluation of text entry methods for Korean mobile phones, a user study (II, SK), pp. 2023–2026.
CHICHI-2010-SchwarzHHM #mobile #multi
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices (JS, CH, SEH, JM), pp. 1657–1660.
CHICHI-2010-SongKLS #comparative #evaluation #scalability #visualisation
A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs (HS, BHK, BL, JS), pp. 223–232.
CSCWCSCW-2010-FarooqZ #api #programming #usability
API peer reviews: a method for evaluating usability of application programming interfaces (UF, DZ), pp. 207–210.
CAiSECAiSE-2010-EsfahaniYC #approach #evaluation
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach (HCE, ESKY, JC), pp. 424–438.
ICEISICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance #using
Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEISICEIS-AIDSS-2010-MasvoulaKM #bibliography #learning
A Review of Learning Methods Enhanced in Strategies of Negotiating Agents (MM, PK, DM), pp. 212–219.
ICEISICEIS-AIDSS-2010-WatanabeRTT #classification #statistics
Statistical Associative Classification of Mammograms — The SACMiner Method (CYVW, MXR, CTJ, AJMT), pp. 121–128.
ICEISICEIS-ISAS-2010-Looso
A Generic Method for Best Practice Reference Model Application (SL), pp. 149–158.
ICEISICEIS-ISAS-2010-SeemuellerVHB #approach #development #process
Situational Method Engineering Applied for the Enactment of Development Processes — An Agent based Approach (HS, HV, BH, BB), pp. 399–405.
ICEISICEIS-ISAS-2010-TaveiraAS #approach #incremental
A Method for Portfolio Management and Prioritization — An Incremental Funding Method Approach (GT, AJA, EAS), pp. 23–33.
ICEISICEIS-J-2010-ClariziaGN10a #adaptation #automation #lightweight #ontology #optimisation
An Adaptive Optimisation Method for Automatic Lightweight Ontology Extraction (FC, LG, PN), pp. 357–371.
ICEISICEIS-J-2010-WatanabeRTT10a #classification #image #named #statistics
SACMiner: A New Classification Method Based on Statistical Association Rules to Mine Medical Images (CYVW, MXR, CTJ, AJMT), pp. 249–263.
ICEISICEIS-SAIC-2010-MatCS #approach #collaboration #network
Selecting Partners for Collaborative Networks — Mixed Methods Approach (NACM, YC, HS), pp. 122–128.
CIKMCIKM-2010-BamisFS #component
A method for discovering components of human rituals from streams of sensor data (AB, JF, AS), pp. 779–788.
CIKMCIKM-2010-FujinoUN #classification #learning #robust
A robust semi-supervised classification method for transfer learning (AF, NU, MN), pp. 379–388.
ECIRECIR-2010-Martinez-RomoA #information retrieval #web
Analyzing Information Retrieval Methods to Recover Broken Web Links (JMR, LA), pp. 26–37.
ECIRECIR-2010-SaldarriagaMV #information retrieval #online #ranking
Ranking Fusion Methods Applied to On-Line Handwriting Information Retrieval (SPS, EM, CVG), pp. 253–264.
ICMLICML-2010-ChengDH #ranking
Label Ranking Methods based on the Plackett-Luce Model (WC, KD, EH), pp. 215–222.
ICMLICML-2010-JenattonMOB #learning #taxonomy
Proximal Methods for Sparse Hierarchical Dictionary Learning (RJ, JM, GO, FRB), pp. 487–494.
ICMLICML-2010-RouxF #performance
A fast natural Newton method (NLR, AWF), pp. 623–630.
ICMLICML-2010-Yu #convergence #difference
Convergence of Least Squares Temporal Difference Methods Under General Conditions (HY), pp. 1207–1214.
ICPRICPR-2010-AnthimopoulosVG #detection #evaluation #image
A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
ICPRICPR-2010-ArslanSATY #comparison #data access #image #multi #retrieval
Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
ICPRICPR-2010-Artigas-FuentesGB #approximate #mining #similarity
A High-Dimensional Access Method for Approximated Similarity Search in Text Mining (FJAF, RGG, JMBC), pp. 3155–3158.
ICPRICPR-2010-AungSN #3d #precise
Traj Align: A Method for Precise Matching of 3-D Trajectories (ZA, KS, WSN), pp. 3818–3821.
ICPRICPR-2010-BanimahdE #distance #image #segmentation #set #using
Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPRICPR-2010-BrezovanBGSS #adaptation #detection #image #performance #visual notation
An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
ICPRICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation #using
A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPRICPR-2010-FausserS #approximate #learning
Learning a Strategy with Neural Approximated Temporal-Difference Methods in English Draughts (SF, FS), pp. 2925–2928.
ICPRICPR-2010-FujitaHSTS #detection #image #using
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GangehKD #categorisation #random
Random Subspace Method in Text Categorization (MJG, MSK, RPWD), pp. 2049–2052.
ICPRICPR-2010-GhiasiS #identification #independence #performance
An Efficient Method for Offline Text Independent Writer Identification (GG, RS), pp. 1245–1248.
ICPRICPR-2010-HarandiAABL #random #recognition
Directed Random Subspace Method for Face Recognition (MTH, MNA, BNA, AB, BCL), pp. 2688–2691.
ICPRICPR-2010-IwahoriIWKFK #performance
Extending Fast Marching Method under Point Light Source Illumination and Perspective Projection (YI, KI, RJW, HK, SF, KK), pp. 1650–1653.
ICPRICPR-2010-KayaCC #design #using
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPRICPR-2010-KeuperSPHPBR #3d #parametricity #robust #self
3D Deformable Surfaces with Locally Self-Adjusting Parameters — A Robust Method to Determine Cell Nucleus Shapes (MK, TS, JP, PH, KP, HB, OR), pp. 2254–2257.
ICPRICPR-2010-KohGC #locality #robust #using
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPRICPR-2010-LiuCLL #automation #locality #parametricity #using
A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPRICPR-2010-LiuZYL #hybrid #image #performance
A Fast Image Inpainting Method Based on Hybrid Similarity-Distance (JL, SZ, WY, HL), pp. 4432–4435.
ICPRICPR-2010-MezghaniPMLG #network #order
A Computer-Aided Method for Scoliosis Fusion Level Selection by a Topologicaly Ordered Self Organizing Kohonen Network (NM, PP, AM, HL, JAdG), pp. 4012–4015.
ICPRICPR-2010-MochizukiKISI #energy
An Iterative Method for Superresolution of Optical Flow Derived by Energy Minimisation (YM, YK, AI, TS, TI), pp. 2270–2273.
ICPRICPR-2010-MonzoAAM #case study #comparative #locality #recognition #using
A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPRICPR-2010-OrtegaGJV #configuration management #self #video
A Combined Self-Configuring Method for Object Tracking in Colour Video (JARO, GAG, ÁRJ, VLAV), pp. 2081–2084.
ICPRICPR-2010-Parker #classification #empirical #feature model
An Empirical Study of Feature Extraction Methods for Audio Classification (CP), pp. 4593–4596.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-Ramirez-OrtegonR #documentation #evaluation
Unsupervised Evaluation Methods Based on Local Gray-Intensity Variances for Binarization of Historical Documents (MARO, RR), pp. 2029–2032.
ICPRICPR-2010-RenHHLC #detection
A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
ICPRICPR-2010-SakarK #analysis #canonical #correlation #feature model #hybrid
A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
ICPRICPR-2010-SattiGCP #adaptation #human-computer #interface
A Covariate Shift Minimisation Method to Alleviate Non-stationarity Effects for an Adaptive Brain-Computer Interface (ARS, CG, DC, GP), pp. 105–108.
ICPRICPR-2010-SemenovichS #higher-order #performance
Tensor Power Method for Efficient MAP Inference in Higher-order MRFs (DS, AS), pp. 734–737.
ICPRICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition #using
Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPRICPR-2010-SethiC #analysis #motivation #probability #process #video
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
ICPRICPR-2010-SodaI #composition #dataset #integration #learning
Decomposition Methods and Learning Approaches for Imbalanced Dataset: An Experimental Integration (PS, GI), pp. 3117–3120.
ICPRICPR-2010-SomolGP #algorithm #feature model #problem #set
The Problem of Fragile Feature Subset Preference in Feature Selection Methods and a Proposal of Algorithmic Workaround (PS, JG, PP), pp. 4396–4399.
ICPRICPR-2010-SukF
Refined Morphological Methods of Moment Computation (TS, JF), pp. 966–970.
ICPRICPR-2010-Temerinac-OttKB #evaluation
Evaluation of a New Point Clouds Registration Method Based on Group Averaging Features (MTO, MK, HB), pp. 2452–2455.
ICPRICPR-2010-Thurau #classification #scalability
Nearest Archetype Hull Methods for Large-Scale Data Classification (CT), pp. 4040–4043.
ICPRICPR-2010-WangC #3d #estimation
3D Human Pose Estimation by an Annealed Two-Stage Inference Method (YKW, KYC), pp. 535–538.
ICPRICPR-2010-WeiXZ
Calibration Method for Line Structured Light Vision Sensor Based on Vanish Points and Lines (ZW, MX, GZ), pp. 794–797.
ICPRICPR-2010-WshahGCL #novel #recognition #reduction
A Novel Lexicon Reduction Method for Arabic Handwriting Recognition (SW, VG, YC, HL), pp. 2865–2868.
ICPRICPR-2010-YamashitaW #correlation #matrix
Subspace Methods with Globally/Locally Weighted Correlation Matrix (YY, TW), pp. 4259–4262.
ICPRICPR-2010-YangSZ #analysis #multi #recognition #using
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-ZhangGA #analysis #linear
An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
ICPRICPR-2010-ZhangH #clustering
A Hierarchical Clustering Method for Color Quantization (JZ, JH), pp. 786–789.
ICPRICPR-2010-ZhangW10a #modelling #random #validation
LLN-based Model-Driven Validation of Data Points for Random Sample Consensus Methods (LZ, DW), pp. 3436–3439.
ICPRICPR-2010-ZouH #3d #performance #using
Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
KDDKDD-2010-LichtenwalterLC #predict
New perspectives and methods in link prediction (RL, JTL, NVC), pp. 243–252.
KDIRKDIR-2010-Bernard #formal method #modelling #reuse
Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
KDIRKDIR-2010-DoucetA #evaluation #statistics
Statistical Methods for the Evaluation of Indexing Phrases (AD, HAM), pp. 141–149.
KDIRKDIR-2010-GuderSC #kernel #modelling #quality
Integrated Instance-based and Kernel Methods for Power Quality Knowledge Modeling (MG, ÖS, ), pp. 352–357.
KDIRKDIR-2010-Molokov #combinator #identification
Application of Combinatorial Methods to Protein Identification in Peptide Mass Fingerprinting (LM), pp. 307–313.
KDIRKDIR-2010-ViswanathBK #classification #nearest neighbour #performance #set
A Method to Generate a Reduced Training Set for Faster and Better Nearest Neighbor Classification (PV, VSB, TNK), pp. 232–236.
KDIRKDIR-2010-WangSFR #concept
A Meta-learning Method for Concept Drift (RW, LS, MÓF, ER), pp. 257–262.
KEODKEOD-2010-MatsumotoMM #development #information management #modelling
A Model-driven Systems Development Method for Management Information Systems (KM, TM, NM), pp. 10–16.
KEODKEOD-2010-MazakSL #approximate #heuristic #ontology
align++ — A Heuristic-based Method for Approximating the Mismatch-at-Risk in Schema-based Ontology Alignment (AM, BS, ML), pp. 17–26.
KEODKEOD-2010-MurdockBA #ontology
Two Methods for Evaluating Dynamic Ontologies (JM, CB, CA), pp. 110–122.
KEODKEOD-2010-NirenburgMBC #elicitation #hybrid
Hybrid Methods of Knowledge Elicitation within a Unified Representational Knowledge Scheme (SN, MM, SB, RC), pp. 177–182.
KMISKMIS-2010-BrockV #analysis #data flow #semantics #using
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-DienstAHF #knowledge base #visual notation
Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
KMISKMIS-2010-EtoMKM #evaluation #process
Externalization Method and Its Evaluation of Know-how Information for Care Planning Processes by Awareness of Novices (KE, MM, YK, TM), pp. 201–206.
KMISKMIS-2010-SultanowWL #communication
Solve Insufficient Communications — A Measurement-method for Satisfied Communication in Business Organizations (ES, EW, RL), pp. 367–371.
SEKESEKE-2010-ChangK #architecture #modelling #process
A Model-based Business Process Diagnosis Method in Service Oriented Architecture (SHC, SDK), pp. 458–461.
SEKESEKE-2010-MadieshW #process #top-down
A Top-Down Method for Secure SOA-based B2B Processes (MM, GW), pp. 698–703.
SIGIRSIGIR-2010-JiangPL #challenge #information retrieval #mining #web
Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
SIGIRSIGIR-2010-KardanGB #automation
A method to automatically construct a user knowledge model in a forum environment (AK, MG, BB), pp. 717–718.
SIGIRSIGIR-2010-Keikha #retrieval
Investigation on smoothing and aggregation methods in blog retrieval (MK), p. 923.
ECMFAECMFA-2010-OnoTKSNF #abstraction #embedded #execution #modelling #performance
A Model-Based Method for Evaluating Embedded System Performance by Abstraction of Execution Traces (KO, MT, RK, YS, TN, NF), pp. 233–244.
ECOOPECOOP-2010-MonperrusBM #detection #object-oriented
Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
GPCEGPCE-J-2007-PirkelbauerSS10 #c++ #design #evaluation #multi
Design and evaluation of C++ open multi-methods (PP, YS, BS), pp. 638–667.
GPCEGPCE-2010-GrechRF #generative #named #similarity
JEqualityGen: generating equality and hashing methods (NG, JR, BF), pp. 177–186.
RERE-2010-YoungA #identification #policy #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
REFSQREFSQ-2010-VillelaDJ #evaluation #evolution #product line
Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line (KV, JD, IJ), pp. 113–127.
SACSAC-2010-AddicksA #architecture #enterprise
A method for application evaluations in context of enterprise architecture (JSA, HJA), pp. 131–136.
SACSAC-2010-AraujoOS #hybrid #quantum
Hybrid evolutionary quantum inspired method to adjust time phase distortions in financial time series (RdAA, ALIdO, SCBS), pp. 1153–1154.
SACSAC-2010-AraujoSCA #process #validation
A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
SACSAC-2010-BaeCK
Flash-aware record management method (DHB, JWC, SWK), pp. 554–555.
SACSAC-2010-BattistelliMMSS #documentation
Avoiding to dispense with accuracy: a method to make different DTDs documents comparable (MB, SM, LAM, PS, SS), pp. 862–866.
SACSAC-2010-CaetanoST #composition #principle #process
A method for business process decomposition based on the separation of concerns principle (AC, ARS, JMT), pp. 79–85.
SACSAC-2010-HilaireGGK #approach #documentation
An approach based upon OWL-S for method fragments documentation and selection (VH, NG, SG, AK), pp. 938–939.
SACSAC-2010-LanLSH #algorithm #classification #image #using
An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SACSAC-2010-LoTLC #named #performance
Swap-before-hibernate: a time efficient method to suspend an OS to a flash drive (SWL, WsT, JgL, GsC), pp. 201–205.
SACSAC-2010-PeixotoPR #education #game studies #simulation
Semiotic inspection method in the context of educational simulation games (DCCP, ROP, RFR), pp. 1207–1212.
SACSAC-2010-RiosBKO #documentation #evaluation #set #word
Evaluation of different feature sets in an OCR free method for word spotting in printed documents (IR, AdSBJ, ALK, LSO), pp. 52–56.
SACSAC-2010-RyuLYS #clustering #file system
Flash-aware cluster allocation method based on filename extension for FAT file system (SR, CL, SY, SS), pp. 502–509.
SACSAC-2010-SerugendoFR #architecture #development #named #self
MetaSelf: an architecture and a development method for dependable self-* systems (GDMS, JSF, AR), pp. 457–461.
ICSEICSE-2010-Chan #approach #formal method #taxonomy #web #web service
Formal methods for web services: a taxonomic approach (KSMC), pp. 357–360.
ICSEICSE-2010-SharpdD #re-engineering #research #using
Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSEICSE-2010-SridharanN #data analysis #re-engineering
Bayesian methods for data analysis in software engineering (MS, ASN), pp. 477–478.
ICSEICSE-2010-WangZ #case study #development #multi #policy
Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
LDTALDTA-2009-SingerBLPY10 #java
Fundamental Nano-Patterns to Characterize and Classify Java Methods (JS, GB, ML, AP, PY), pp. 191–204.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics #using
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SPLCSPLC-2010-YoshimuraAF #constraints #feature model #identification #mining
A Method to Identify Feature Constraints Based on Feature Selections Mining (KY, YA, TF), pp. 425–429.
ICLPICLP-2010-OetschPT10 #source code
Methods and Methodologies for Developing Answer-Set Programs — Project Description (JO, JP, HT), pp. 154–161.
ICSTICST-2010-Laurent #concept #formal method #process #testing #using #validation #verification
Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICSTICST-2010-SilvaJA #cost analysis #execution #machine learning #symmetry #testing
Machine Learning Methods and Asymmetric Cost Function to Estimate Execution Effort of Software Testing (DGeS, MJ, BTdA), pp. 275–284.
ICSTSAT-2010-PankratovB #on the #problem #satisfiability
On the Relative Merits of Simple Local Search Methods for the MAX-SAT Problem (DP, AB), pp. 223–236.
ICSTSAT-2010-TompkinsH #satisfiability
Dynamic Scoring Functions with Variable Expressions: New SLS Methods for Solving SAT (DADT, HHH), pp. 278–292.
WICSA-ECSAWICSA-ECSA-2009-BielG #architecture #towards #usability
Towards a Method for Analyzing Architectural Support Levels of Usability (BB, VG), pp. 273–276.
WICSA-ECSAWICSA-ECSA-2009-HoylandA #development
RQ-Tech method for user-involved software development (CAH, KMA), pp. 257–260.
WICSA-ECSAWICSA-ECSA-2009-XuZSL #architecture #distributed
An architecting method for distributed process-intensive systems (XX, LZ, MS, YL), pp. 277–280.
ASEASE-2009-PradelG #automation #generative #scalability #specification
Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
ASEASE-2009-VakilianDBOAJ #summary
Inferring Method Effect Summaries for Nested Heap Regions (MV, DD, RLBJ, JO, VSA, REJ), pp. 421–432.
CASECASE-2009-ChengP #predict
A fusion prognostics method for remaining useful life prediction of electronic products (SC, MGP), pp. 102–107.
CASECASE-2009-FiorentiniSRS #standard #towards
Towards a method for harmonizing information standards (XF, RS, SR, RDS), pp. 466–471.
CASECASE-2009-WuS #heuristic #multi #problem
A new heuristic method for capacitated multi-level lot sizing problem with backlogging (TW, LS), pp. 483–488.
DACDAC-2009-IsshikiLKIS #multi #simulation
Trace-driven workload simulation method for Multiprocessor System-On-Chips (TI, DL, HK, TI, KS), pp. 232–237.
DACDAC-2009-TamPB #automation #validation
Automated failure population creation for validating integrated circuit diagnosis methods (WCT, OP, RD(B), pp. 708–713.
DACDAC-2009-UzelacM #realtime
A real-time program trace compressor utilizing double move-to-front method (VU, AM), pp. 738–743.
DATEDATE-2009-HsiehLH #reduction
A physical-location-aware X-filling method for IR-drop reduction in at-speed scan test (WWH, ISL, TH), pp. 1234–1237.
DATEDATE-2009-KorhonenK #identification
A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
DATEDATE-2009-LadharMB #fault #performance
Efficient and accurate method for intra-gate defect diagnoses in nanometer technology and volume data (AL, MM, LB), pp. 988–993.
DATEDATE-2009-RemersaroRRP #generative #scalability #testing
A scalable method for the generation of small test sets (SR, JR, SMR, IP), pp. 1136–1141.
DATEDATE-2009-TzengH #named
QC-Fill: An X-Fill method for quick-and-cool scan test (CWT, SYH), pp. 1142–1147.
DRRDRR-2009-KhurshidSFV #comparison #documentation
Comparison of Niblack inspired binarization methods for ancient documents (KK, IS, CF, NV), pp. 1–10.
DRRDRR-2009-LiD #difference #independence #using #verification
Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRRDRR-2009-ZhangZLT #learning
A semi-supervised learning method to classify grant-support zone in web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
HTHT-2009-ParisCW #evaluation #information management
A cost-benefit evaluation method for web-based information systems (CP, NC, RW), pp. 353–354.
ICDARICDAR-2009-ChiangK #automation
A Method for Automatically Extracting Road Layers from Raster Maps (YYC, CAK), pp. 838–842.
ICDARICDAR-2009-CoustatyOPV #composition
Drop Caps Decomposition for Indexing a New Letter Extraction Method (MC, JMO, RP, NV), pp. 476–480.
ICDARICDAR-2009-DingJG #approach #online #recognition #word
A New Method for Rotation Free Method for Online Unconstrained Handwritten Chinese Word Recognition: A Holistic Approach (KD, LJ, XG), pp. 1131–1135.
ICDARICDAR-2009-HamamuraAI #probability #recognition #word
An A Posteriori Probability Calculation Method for Analytic Word Recognition Applicable to Address Recognition (TH, TA, BI), pp. 391–395.
ICDARICDAR-2009-ImuraT #documentation #image #string
Compression and String Matching Method for Printed Document Images (HI, YT), pp. 291–295.
ICDARICDAR-2009-MuramatsuYM #authentication #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-PhanST #detection #video
A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
ICDARICDAR-2009-Pletschacher #adaptation #self
A Self-Adaptive Method for Extraction of Document-Specific Alphabets (SP), pp. 656–660.
ICDARICDAR-2009-ShahabiR #documentation #identification
A New Method for Writer Identification of Handwritten Farsi Documents (FS, MR), pp. 426–430.
ICDARICDAR-2009-SundaramR #online #recognition #using
An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDARICDAR-2009-XiaJ
A Kai Style Calligraphic Beautification Method for Handwriting Chinese Character (WX, LJ), pp. 798–802.
ICDARICDAR-2009-YinL #segmentation
A Variational Bayes Method for Handwritten Text Line Segmentation (FY, CLL), pp. 436–440.
SIGMODSIGMOD-2009-GhotingM #parallel #performance
Serial and parallel methods for i/o efficient suffix tree construction (AG, KM), pp. 827–840.
VLDBVLDB-2009-KimH #clustering #network
A Particle-and-Density Based Evolutionary Clustering Method for Dynamic Networks (MSK, JH), pp. 622–633.
VLDBVLDB-2009-KimuraHRMZ #correlation #dependence #functional
Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
VLDBVLDB-2009-WongOYFL #nearest neighbour #performance
Efficient Method for Maximizing Bichromatic Reverse Nearest Neighbor (RCWW, MTÖ, PSY, AWCF, LL), pp. 1126–1137.
CSEETCSEET-2009-SkevoulisCHVT #health #industrial
Engineering a Software Supported Health Risk Appraisal Method: A Joint Effort between Academia and Health Care Industry (SS, JC, KH, JV, ST), pp. 113–116.
ITiCSEITiCSE-2009-MoraPJC #assessment #collaboration #learning #student
Learning method based on collaborative assessment performed by the students: an application to computer science (HMM, MTSP, RCJ, JMGC), p. 372.
FASEFASE-2009-LeinoM #consistency #proving
Proving Consistency of Pure Methods and Model Fields (KRML, RM), pp. 231–245.
CSMRCSMR-2009-FrankeJLUHEK #assessment #metric #network #using
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMRCSMR-2009-Sneed #development
Stevens Lecture on Software Development Methods at CSMR 2009 (HMS), pp. 5–6.
CSMRCSMR-2009-TsantalisC #identification #refactoring
Identification of Extract Method Refactoring Opportunities (NT, AC), pp. 119–128.
ICPCICPC-2009-ShternT #algorithm #clustering
Methods for selecting and improving software clustering algorithms (MS, VT), pp. 248–252.
ICSMEICSM-2009-DraganCM #using
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSMEICSM-2009-WangWYZY #evolution #kernel #linux #network #novel
Linux kernels as complex networks: A novel method to study evolution (LW, ZW, CY, LZ, QY), pp. 41–50.
WCREWCRE-1999-AnquetilL99b #clustering #years after
Ten Years Later, Experiments with Clustering as a Software Remodularization Method (NA, TCL), p. 7.
WCREWCRE-1999-SerebrenikRRB99a #diagrams #enterprise #java #reverse engineering #sequence chart
Reverse Engineering Sequence Diagrams for Enterprise JavaBeans with Business Method Interceptors (AS, SAR, EER, MvdB), pp. 269–273.
STOCSTOC-2009-KannanN #linear #programming #random
Random walks on polytopes and an affine interior point method for linear programming (RK, HN), pp. 561–570.
CIAACIAA-2009-LiuYLT #automaton
A Table Compression Method for Extended Aho-Corasick Automaton (YL, YY, PL, JT), pp. 84–93.
ICALPICALP-v2-2009-FotakisKS #design #network #performance
Efficient Methods for Selfish Network Design (DF, ACK, PGS), pp. 459–471.
FMFM-2009-BicarreguiFLW #bibliography #formal method #industrial #perspective
Industrial Practice in Formal Methods: A Review (JB, JSF, PGL, JCPW), pp. 810–813.
FMFM-2009-BonzanniFFK #biology #formal method #question #what
What Can Formal Methods Bring to Systems Biology? (NB, KAF, WF, EK), pp. 16–22.
FMFM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement #using
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FMFM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight #using
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
FMFM-2009-TschantzW #formal method #privacy
Formal Methods for Privacy (MCT, JMW), pp. 1–15.
CHICHI-2009-BlytheC
Critical methods and user generated content: the iPhone on YouTube (MB, PAC), pp. 1467–1476.
CHICHI-2009-BruunGHS #comparison #testing #usability
Let your users do the testing: a comparison of three remote asynchronous usability testing methods (AB, PG, LH, JS), pp. 1619–1628.
CHICHI-2009-JakobsenH #source code #using #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHICHI-2009-PooleCMGE
Computer help at home: methods and motivations for informal technical support (ESP, MC, TM, REG, WKE), pp. 739–748.
CHICHI-2009-ZimmermanRHTM #communication #effectiveness
User-created forms as an effective method of human-agent communication (JZ, KR, IH, AT, KM), pp. 1869–1878.
HCIDHM-2009-AndreoniMCZRCP #assessment #gesture
Method for Movement and Gesture Assessment (MMGA) in Ergonomics (GA, MM, OC, MZ, MR, FC, EP), pp. 591–598.
HCIDHM-2009-NiedermaierDEK #process #usability
The New BMW iDrive — Applied Processes and Methods to Assure High Usability (BN, SD, LE, AK), pp. 443–452.
HCIDHM-2009-Pauzie
Method to Evaluate Driver’s Workload in Real Road Context (AP), pp. 453–462.
HCIDHM-2009-WuLN #3d #assessment
A 3D Method for Fit Assessment of a Sizing System (JW, ZL, JN), pp. 737–743.
HCIHCD-2009-Cinar #case study #eye tracking #usability #web
Eye Tracking Method to Compare the Usability of University Web Sites: A Case Study (MOÇ), pp. 671–678.
HCIHCD-2009-KimY #consistency #design #interactive #multi
A Method for Consistent Design of User Interaction with Multifunction Devices (DSK, WCY), pp. 202–211.
HCIHCD-2009-LinO #analysis #information management
The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
HCIHCD-2009-MisawaF #case study #experience #generative #idea #user interface #using
A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCIHCD-2009-NakanoR #analysis #corpus #multimodal #usability
Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
HCIHCD-2009-Nishiguchi #people #user interface
Support Method for Improving the Ability of People with Cerebral Palsy to Efficiently Point a Mouse at Objects on a GUI Screen (HN), pp. 531–537.
HCIHCD-2009-RuggeRS #development #human-computer #process #smarttech #towards
Changes of HCI Methods towards the Development Process of Wearable Computing Solutions (IR, CR, BSR), pp. 302–311.
HCIHCD-2009-RunonenM #concept #development #research #tool support
Shaping the Future with Users — Futures Research Methods as Tools for User-Centered Concept Development (MR, PM), pp. 904–911.
HCIHCD-2009-Seland #design #game studies #mobile #using
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCIHCD-2009-WadaY #analysis
The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
HCIHCD-2009-YanagidaUGTHY #design
Structured Scenario-Based Design Method (KY, YU, KG, KT, SH, KY), pp. 374–380.
HCIHCI-AUII-2009-Dai #design #research
Nine Assistant Guiding Methods in Subway Design — A Research of Shanghai Subway Users (LD), pp. 125–132.
HCIHCI-AUII-2009-HongE #multi
Point and Control: The Intuitive Method to Control Multi-device with Single Remote Control (SSH, JIE), pp. 416–422.
HCIHCI-AUII-2009-IbenWK #feedback #smarttech #visual notation
The Impact of Different Visual Feedback Presentation Methods in a Wearable Computing Scenario (HI, HW, EMK), pp. 752–759.
HCIHCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi #using
Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCIHCI-NIMT-2009-NisimuraMKI #development #interactive #speech
Development of Speech Input Method for Interactive VoiceWeb Systems (RN, JM, HK, TI), pp. 710–719.
HCIHCI-NT-2009-AbeOO #automation #image #using
Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCIHCI-NT-2009-AsahiIF #evaluation #usability
A Usability Evaluation Method Applying AHP and Treemap Techniques (TA, TI, SF), pp. 195–203.
HCIHCI-NT-2009-FukuzumiIO #development #evaluation #usability
Development of Quantitative Usability Evaluation Method (SF, TI, HO), pp. 252–258.
HCIHCI-NT-2009-KimuraUOM #evaluation #metric #towards #usability
Toward Constructing an Electroencephalogram Measurement Method for Usability Evaluation (MK, HU, MO, KiM), pp. 95–104.
HCIHCI-NT-2009-ShastriPW #monitoring
A Method to Monitor Operator Overloading (DS, IP, AW), pp. 169–175.
HCIHCI-NT-2009-WatanabeSMY #design #interface
Time-Oriented Interface Design: Picking the Right Time and Method for Information Presentation (KW, KS, SM, MY), pp. 752–759.
HCIHCI-NT-2009-Yang #design #development #evaluation #interface
Website Designer as an Evaluator: A Formative Evaluation Method for Website Interface Development (CYY), pp. 372–381.
HCIHIMI-DIE-2009-IshiiS #perspective #representation
Representation Method for Engineering Perspective (GI, MS), pp. 69–76.
HCIHIMI-DIE-2009-KawashimoSDAT
A Skill Transfer Method for Manual Machine Tool Operation Utilizing Cutting Sound (TK, NS, DD, MA, TT), pp. 77–86.
HCIHIMI-DIE-2009-MatsumotoSS #case study #effectiveness #visual notation
A Study on Effective Methods of Visual Inspection for Reused-Parts by Inspectors (TM, HS, KS), pp. 131–139.
HCIHIMI-DIE-2009-SrinivasSPK #classification #feature model #performance #using
Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HCIHIMI-DIE-2009-TaguchiKT
A Method for Evaluating the Relationship among Four Perspectives of the Balanced Scorecard (YT, TK, TT), pp. 163–170.
HCIHIMI-DIE-2009-YamaguchiNKN #evaluation
Evaluation for Adjustment Method of Vehicle’s Location by Recognizing Crosswalks (YY, TN, HK, SN), pp. 648–656.
HCIHIMI-DIE-2009-YatsuzukaTT #case study #motivation
A Study on a Method of Support for Improving the Motivation of Employees (DY, YT, TT), pp. 197–204.
HCIHIMI-II-2009-NabetaKOT
A Proposal of a Method to Extract Active Ingredient Names from Package Inserts (KN, MK, MO, FT), pp. 576–585.
HCIHIMI-II-2009-NakamuraS #learning
Construction of Systematic Learning Support System of Business Theory and Method (YN, KS), pp. 669–678.
HCIHIMI-II-2009-NozawaK #analysis #comparison #realtime #reduction
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
HCIHIMI-II-2009-OotsukiIOT #evaluation #similarity
Examination of Evaluation Method for Appearance Similarity of PTP Sheets (YO, AI, MO, FT), pp. 586–593.
HCIHIMI-II-2009-SawaragiIHN #approach #identification #using
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIHIMI-II-2009-ShibuyaNMKT #3d #distance #empirical #evaluation #mobile
Empirical Evaluation of Throwing Method to Move Object for Long Distance in 3D Information Space on Mobile Device (YS, KN, KM, IK, YT), pp. 468–475.
HCIHIMI-II-2009-TakaoIS #keyword #web
A Coauthoring Method of Keyword Dictionaries for Knowledge Combination on Corporate Discussion Web Sites (ST, TI, AS), pp. 84–93.
HCIIDGD-2009-TranL #interface #question #research
Attention to Effects of Different Cross-Cultural Levels in User Research Method’s Interface: Discipline or Nationality — Which Has Stronger Force? (TTT, KPL), pp. 127–134.
HCIOCSC-2009-SongNKE #recommendation #using #word
A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
CAiSECAiSE-2009-EspanaGP #analysis #communication #information management #requirements
Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
CAiSECAiSE-2009-Franch #metric #modelling
A Method for the Definition of Metrics over i* Models (XF), pp. 201–215.
ICEISICEIS-AIDSS-2009-RoperoGLC #fuzzy #information management #logic #novel #web
Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction (JR, AG, CL, AC), pp. 130–137.
ICEISICEIS-DISI-2009-RomeuAC #integration #metric #using
Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEISICEIS-ISAS-2009-BifflFHM #analysis #automation #evaluation #open source #process #tool support
Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
ICEISICEIS-ISAS-2009-GruhnK #analysis #mobile #modelling #process
Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
ICEISICEIS-ISAS-2009-KillispergerPSS #generative #process #validation
Method Manual based Process Generation and Validation (PK, GP, MS, TS), pp. 256–261.
ICEISICEIS-ISAS-2009-NascimentoITR #legacy #process #using
A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEISICEIS-J-2009-CallegariB #fuzzy #logic #multi #using
A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEISICEIS-SAIC-2009-ClariziaCSN #probability #semantics #web
Semantic Indexing of Web Pages Via Probabilistic Methods — In Search of Semantics Project (FC, FC, MDS, PN), pp. 134–140.
CIKMCIKM-2009-ChenWL #kernel #learning #novel #rank
Learning to rank with a novel kernel perceptron method (XwC, HW, XL), pp. 505–512.
CIKMCIKM-2009-HeZL #comparison #evaluation #retrieval
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs (JH, CZ, XL), pp. 2029–2032.
CIKMCIKM-2009-KhaitanDGS #data-driven
Data-driven compound splitting method for english compounds in domain names (SK, AD, SG, AS), pp. 207–214.
CIKMCIKM-2009-LaberSJACRTV #performance
A fast and simple method for extracting relevant content from news webpages (ESL, CPdS, IVJ, ECFdA, ETC, RPR, LCT, CDV), pp. 1685–1688.
CIKMCIKM-2009-LiuZ #classification #sentiment #using
Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKMCIKM-2009-LvZ09a #case study #comparative #feedback #modelling #pseudo #query
A comparative study of methods for estimating query language models with pseudo feedback (YL, CZ), pp. 1895–1898.
CIKMCIKM-2009-YuOH #performance #ranking
Efficient feature weighting methods for ranking (HY, JO, WSH), pp. 1157–1166.
ECIRECIR-2009-HauffAH #evaluation #performance #predict #query
The Combination and Evaluation of Query Performance Prediction Methods (CH, LA, DH), pp. 301–312.
ICMLICML-2009-JiY
An accelerated gradient method for trace norm minimization (SJ, JY), pp. 457–464.
ICMLICML-2009-Shalev-ShwartzT #probability
Stochastic methods for l1 regularized loss minimization (SSS, AT), pp. 929–936.
ICMLICML-2009-SuttonMPBSSW #approximate #learning #linear #performance
Fast gradient-descent methods for temporal-difference learning with linear function approximation (RSS, HRM, DP, SB, DS, CS, EW), pp. 993–1000.
ICMLICML-2009-WallachMSM #evaluation #modelling #topic
Evaluation methods for topic models (HMW, IM, RS, DMM), pp. 1105–1112.
ICMLICML-2009-YangJY #learning #online
Online learning by ellipsoid method (LY, RJ, JY), pp. 1153–1160.
KDDKDD-2009-AshrafiN
Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
KDDKDD-2009-BifetHPKG #data type #evolution
New ensemble methods for evolving data streams (AB, GH, BP, RK, RG), pp. 139–148.
KDDKDD-2009-LozanoALR #modelling #visual notation
Grouped graphical Granger modeling methods for temporal causal modeling (ACL, NA, YL, SR), pp. 577–586.
KDDKDD-2009-Mannila #data mining #mining
Randomization methods in data mining (HM), pp. 5–6.
KDDKDD-2009-XueW #classification #quantifier
Quantification and semi-supervised classification methods for handling changes in class distribution (JCX, GMW), pp. 897–906.
KDDKDD-2009-YaoMM #documentation #model inference #performance #streaming #topic
Efficient methods for topic model inference on streaming document collections (LY, DMM, AM), pp. 937–946.
KDIRKDIR-2009-CallejaFGA #learning #set
A Learning Method for Imbalanced Data Sets (JdlC, OF, JG, RMAP), pp. 307–310.
KDIRKDIR-2009-Fang #development #gender
Development and Application of a Roach Gene Regulation Profile based Gender Discrimination Method (YF), pp. 263–269.
KDIRKDIR-2009-KimRM #retrieval #semantics #using
A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KEODKEOD-2009-ChimientiDNM #evaluation #ontology
Evaluation of Ontology Building Methodologies — A Method based on Balanced Scorecards (MC, MD, ADN, MM), pp. 141–146.
KEODKEOD-2009-StanevOW #design #formal method #modelling #validation
Formal Method for Validation of Product Design through Knowledge Modelling (SS, JO, WW), pp. 166–170.
KEODKEOD-2009-TsalapatiSK #approximate #ontology #problem #reuse
A Method for Approximation to Ontology Reuse Problem (ET, GBS, GK), pp. 416–419.
KEODKEOD-2009-ZambachM #implementation #logic #ontology
Applying Terminological Methods and Description Logic for Creating and Implementing an Ontology on Inhibition (SZ, BNM), pp. 452–455.
MLDMMLDM-2009-ChanguelLB #automation #html #learning
A General Learning Method for Automatic Title Extraction from HTML Pages (SC, NL, BBM), pp. 704–718.
MLDMMLDM-2009-KobayashiS #classification #distributed #linear #representation #using
A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDMMLDM-2009-TronciGR
Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method (RT, GG, FR), pp. 163–177.
MLDMMLDM-2009-XiongBS #detection
A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
RecSysRecSys-2009-KnijnenburgW #adaptation #comprehension #elicitation #recommendation #user satisfaction
Understanding the effect of adaptive preference elicitation methods on user satisfaction of a recommender system (BPK, MCW), pp. 381–384.
RecSysRecSys-2009-SchclarTRMA #collaboration #performance
Ensemble methods for improving the performance of neighborhood-based collaborative filtering (AS, AT, LR, AM, LA), pp. 261–264.
SEKESEKE-2009-AhsanFW #debugging #estimation #machine learning #using
Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKESEKE-2009-JiCXZ #analysis #clustering #novel
A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
SEKESEKE-2009-KongLLYW #feedback #refinement #traceability
A Requirement Traceability Refinement Method Based on Relevance Feedback (LK, JL, YL, YY, QW), pp. 37–42.
SEKESEKE-2009-PengSZ #architecture #evolution #product line
An Architecture-based Evolution Management Method for Software Product Line (XP, LS, WZ), pp. 135–140.
SEKESEKE-2009-XieWXWY #named #scheduling
PP-HAS: A Task Priority Based Preemptive Human Resource Scheduling Method (LX, QW, JX, YW, YY), pp. 655–660.
SEKESEKE-2009-ZepedaCRCCC #modelling
A Model Driven Method for Data Warehouse (LZ, EC, JR, JC, NCF, MC), pp. 676–681.
SEKESEKE-2009-ZhaoWX #optimisation #web #web service
User Perceived Response-time Optimization Method for Composite Web Services (JZ, YW, BX), pp. 356–363.
SIGIRSIGIR-2009-AmbaiY #clustering #image #multi #ranking #set #visual notation
Multiclass VisualRank: image ranking method in clustered subsets based on visual features (MA, YY), pp. 732–733.
SIGIRSIGIR-2009-CormackCB #learning #rank
Reciprocal rank fusion outperforms condorcet and individual rank learning methods (GVC, CLAC, SB), pp. 758–759.
SIGIRSIGIR-2009-KazaiMC #quality #towards
Towards methods for the collective gathering and quality control of relevance assessments (GK, NMF, JC), pp. 452–459.
SIGIRSIGIR-2009-MeijMZ #evaluation #query
An evaluation of entity and frequency based query completion methods (EM, PM, HZ), pp. 678–679.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
ECOOPECOOP-2009-HostO #debugging
Debugging Method Names (EWH, BMØ), pp. 294–317.
RERE-2009-DecreusSP #challenge #modelling #process
Practical Challenges for Methods Transforming i* Goal Models into Business Process Models (KD, MS, GP), pp. 15–23.
REFSQREFSQ-2009-KhurumGAF #empirical #requirements
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
REFSQREFSQ-2009-SeyffGMG #case study #experience #requirements
Scenarios in the Wild: Experiences with a Contextual Requirements Discovery Method (NS, FG, NAMM, PG), pp. 147–161.
SACSAC-2009-BangerthJ #adaptation #finite #problem
Adaptive finite element methods for nonlinear inverse problems (WB, AJ), pp. 1002–1006.
SACSAC-2009-BeckerR #evaluation #modelling #off the shelf #requirements
Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentation (CB, AR), pp. 401–402.
SACSAC-2009-ChaovalitG #clustering #data type
A method for clustering transient data streams (PC, AG), pp. 1518–1519.
SACSAC-2009-ChoppyR #state machine #uml
A method for developing UML state machines (CC, GR), pp. 382–388.
SACSAC-2009-FloraTB #forensics #identification #image #using
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-KiyoharaMMNK #embedded #performance
Method for fast compression of program codes for remote updates in embedded systems (RK, SM, MM, MN, SK), pp. 1683–1684.
SACSAC-2009-LandZEL #enterprise #integration #ontology #performance #towards
Towards a fast enterprise ontology based method for post merger integration (MOL, HZ, PE, QL), pp. 245–252.
SACSAC-2009-LievensH #encapsulation #multi #symmetry
Symmetric encapsulated multi-methods to abstract over application structure (DL, WH), pp. 1873–1880.
SACSAC-2009-SuzukiOSKTK #generative #quality #requirements
A systematic method for generating quality requirements spectrum (SS, AO, TS, HK, MT, KK), pp. 399–400.
SACSAC-2009-TanakaKTN #navigation #predict #using
A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SACSAC-2009-TokoroTT #smarttech #using
A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SACSAC-2009-XuMX #game studies
A method to construct knowledge table-base in k-in-a-row games (CX, ZMM, XX), pp. 929–933.
LDTALDTA-2008-Basten09 #ambiguity #context-free grammar #detection #usability
The Usability of Ambiguity Detection Methods for Context-Free Grammars (BB), pp. 35–46.
CADECADE-2009-McLaughlinP #performance #proving #theorem proving
Efficient Intuitionistic Theorem Proving with the Polarized Inverse Method (SM, FP), pp. 230–244.
CAVCAV-2009-CernyA #analysis #automation #java
Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
ICLPICLP-2009-Raiser #constraints #graph transformation #research #summary #using
Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (Research Summary) (FR), pp. 540–541.
RTARTA-2009-MoserS #complexity #dependence
The Derivational Complexity Induced by the Dependency Pair Method (GM, AS), pp. 255–269.
TAPTAP-2009-Chetali #certification #formal method #security #smarttech #testing
Security Testing and Formal Methods for High Levels Certification of Smart Cards (BC), pp. 1–5.
TAPTAP-2009-Gladisch #contract #invariant #question
Could We Have Chosen a Better Loop Invariant or Method Contract? (CG), pp. 74–89.
CBSECBSE-2008-AlbaniOB #component #identification #towards
Towards a Systematic Method for Identifying Business Components (AA, SO, DB), pp. 262–277.
ECSAECSA-2008-AngelovTG #architecture #case study #evaluation #experience #towards
Towards a Method for the Evaluation of Reference Architectures: Experiences from a Case (SA, JJMT, PWPJG), pp. 225–240.
WICSAWICSA-2008-StollWN #architecture
Guiding Architectural Decisions with the Influencing Factors Method (PS, AW, CN), pp. 179–188.
WICSAWICSA-2008-ZimmermannZGL #architecture #design #modelling #pattern matching #reuse
Combining Pattern Languages and Reusable Architectural Decision Models into a Comprehensive and Comprehensible Design Method (OZ, UZ, TG, FL), pp. 157–166.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
CASECASE-2008-0001LYS #optimisation
An improved lagrangian relaxation method for discrete optimization applications (WW, PBL, JHY, GAS), pp. 359–364.
CASECASE-2008-JungL #clustering #performance #scheduling #tool support
Efficient scheduling method based on an assignment model for robotized cluster tools (CJ, TEL), pp. 79–84.
CASECASE-2008-KangXWW #assembly #scheduling
A swarm-dynamic scheduling method for semiconductor assembly production line (QK, HX, LW, QW), pp. 91–96.
CASECASE-2008-KuanCJ #modelling
Method for proposing sort screen thresholds based on modeling etest/sort-class in semiconductor manufacturing (WKY, LCC, WJL), pp. 236–241.
CASECASE-2008-SunZL
An enhanced nested partitions method (JS, QZ, PBL), pp. 377–382.
CASECASE-2008-SunZL08a #framework #optimisation
A unified optimization framework for population-based methods (JS, QZ, PBL), pp. 383–387.
DACDAC-2008-YeZP #analysis #equation #linear #multi
Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
DATEDATE-2008-BinkleyGGR #design
From Transistor to PLL — Analogue Design and EDA Methods (DB, HEG, GGEG, JSR).
DATEDATE-2008-CongX #network
Simultaneous FU and Register Binding Based on Network Flow Method (JC, JX), pp. 1057–1062.
DATEDATE-2008-CornetMM #development #modelling #performance #transaction
A Method for the Efficient Development of Timed and Untimed Transaction-Level Models of Systems-on-Chip (JC, FM, LMC), pp. 9–14.
DATEDATE-2008-ErnstJSBC #analysis #formal method #optimisation #performance
Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
DATEDATE-2008-FrankWESN #analysis #architecture #design #evaluation #standard #tool support
Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
DATEDATE-2008-GouraryRUZMG #analysis #injection
Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
DATEDATE-2008-HalakY #optimisation
Bandwidth-Centric Optimisation for Area-Constrained Links with Crosstalk Avoidance Methods (BH, AY), pp. 438–443.
DATEDATE-2008-LiTM #analysis #grid #named #network #power management
ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
DATEDATE-2008-LiXHL #named #reduction #testing
iFill: An Impact-Oriented X-Filling Method for Shift- and Capture-Power Reduction in At-Speed Scan-Based Testing (JL, QX, YH, XL), pp. 1184–1189.
DATEDATE-2008-NessL #design #fault tolerance #statistics
Guiding Circuit Level Fault-Tolerance Design with Statistical Methods (DCN, DJL), pp. 348–353.
DATEDATE-2008-StratigopoulosTM #estimation #parametricity
A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation (HGDS, JT, SM), pp. 68–73.
DATEDATE-2008-ZhangYWYJX #correlation #performance #process #statistics
An Efficient Method for Chip-Level Statistical Capacitance Extraction Considering Process Variations with Spatial Correlation (WZ, WY, ZW, ZY, RJ, JX), pp. 580–585.
DocEngDocEng-2008-Nguyen #algorithm #documentation #image #using
A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DRRDRR-2008-BaiNS #composition #using
Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRRDRR-2008-LemaitreCC #documentation #recognition
A generic method for structure recognition of handwritten mail documents (AL, JC, BC), p. 68150.
SIGMODSIGMOD-2008-HeS #data access #database #graph #named #query
Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
SIGMODSIGMOD-2008-LiOFWZ #effectiveness #keyword #named
EASE: an effective 3-in-1 keyword search method for unstructured, semi-structured and structured data (GL, BCO, JF, JW, LZ), pp. 903–914.
SIGMODSIGMOD-2008-ShaullSX #named
Skippy: a new snapshot indexing method for time travel in the storage manager (RS, LS, HX), pp. 637–648.
SIGMODSIGMOD-2008-VuOPT #database #graph #keyword
A graph method for keyword-based selection of the top-K databases (QHV, BCO, DP, AKHT), pp. 915–926.
VLDBVLDB-2008-WangLLG #documentation #query #xml
Hash-base subgraph query processing method for graph-structured XML documents (HW, JL, JL, HG), pp. 478–489.
ITiCSEITiCSE-2008-ApplinH #library #multi #research
Computing research methods multi-perspective digital library: a call for participation (AGA, HJH), p. 337.
ITiCSEITiCSE-2008-GunawardenaBO #comprehension
A method for analyzing reading comprehension in computer science courses (AG, JB, AO), p. 348.
ESOPESOP-2008-LeinoM #verification
Verification of Equivalent-Results Methods (KRML, PM), pp. 307–321.
FoSSaCSFoSSaCS-2008-BraunCP #composition #information management
Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
CSMRCSMR-2008-Oliveto #information retrieval #traceability
Traceability Management meets Information Retrieval Methods “Strengths and Limitations” (RO), pp. 302–305.
ICSMEICSM-2008-XiaoWLYZX #constraints #development #maintenance #process #scheduling
A constraint-driven human resource scheduling method in software development and maintenance process (JX, QW, ML, YY, FZ, LX), pp. 17–26.
MSRMSR-2008-ChangM #detection #evaluation #source code
Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
PASTEPASTE-2008-JashkiZB #impact analysis #performance #towards
Towards a more efficient static software change impact analysis method (MAJ, RZ, EB), pp. 84–90.
STOCSTOC-2008-Sherstov #bound #communication #matrix #quantum
The pattern matrix method for lower bounds on quantum communication (AAS), pp. 85–94.
DLTDLT-J-2007-Freivalds08 #automaton #finite #probability
Non-Constructive Methods for Finite Probabilistic Automata (RF), pp. 565–580.
ICALPICALP-A-2008-EsparzaGKS #approximate #equation
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations (JE, TG, SK, HS), pp. 698–710.
ICALPICALP-B-2008-EsparzaKL
Newton’s Method for ω-Continuous Semirings (JE, SK, ML), pp. 14–26.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-Katz #aspect-oriented #formal method
Aspects and Formal Methods (SK), pp. 1–11.
FMFM-2008-KiniryZ #formal method
Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
FMFM-2008-LintelmanRLS #formal method #security
Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
FMFM-2008-RudichDM #specification
Checking Well-Formedness of Pure-Method Specifications (AR, ÁD, PM), pp. 68–83.
FMFM-2008-VerhulstJM #case study #development #formal method #industrial
An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS (EV, GGdJ, VM), pp. 411–418.
FMFM-2008-WijbransBRG #case study #development #experience #formal method #re-engineering
Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System (KW, FB, RR, WG), pp. 419–424.
SEFMSEFM-2008-BartheKPS #hybrid #proving #verification
Preservation of Proof Pbligations for Hybrid Verification Methods (GB, CK, DP, JSF), pp. 127–136.
SEFMSEFM-2008-BonifacioMS #generative #modelling #testing
A Generalized Model-Based Test Generation Method (ALB, AVM, AdSS), pp. 139–148.
SEFMSEFM-2008-PetrenkoP #challenge #formal method
Formal Methods and Innovation Economy: Facing New Challenges (AKP, OLP), pp. 367–371.
SFMSFM-2008-Gillespie #biology #simulation
Simulation Methods in Systems Biology (DTG), pp. 125–167.
GT-VCGT-VC-2007-Bruggink08 #graph transformation #proving #termination #towards
Towards a Systematic Method for Proving Termination of Graph Transformation Systems (HJSB), pp. 23–38.
CHICHI-2008-EverettGBWDST #performance
Electronic voting machines versus traditional methods: improved preference, similar performance (SPE, KKG, MDB, DSW, KD, DS, TT), pp. 883–892.
CHICHI-2008-KramerR #behaviour #modelling #word
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
CHICHI-2008-ShiIGS #named
PressureFish: a method to improve control of discrete pressure-based input (KS, PI, SG, SS), pp. 1295–1298.
CAiSECAiSE-2008-NiknafsR #analysis
Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
EDOCEDOC-2008-CarbonJMN #collaboration #development
A Method for Collaborative Development of Systems of Systems in the Office Domain (RC, GJ, DM, MN), pp. 339–345.
EDOCEDOC-2008-EngelsA #architecture #concept #enterprise #evolution
Service-Oriented Enterprise Architectures: Evolution of Concepts and Methods (GE, MA).
EDOCEDOC-2008-SchropferS
Introducing a Method to Derive an Enterprise-Specific SOA Operating Model (CS, MS), pp. 235–244.
EDOCEDOC-2008-SimoninADTJN #architecture #development #enterprise #named
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (JS, FA, JPD, YLT, JMJ, BN), pp. 279–285.
ICEISICEIS-AIDSS-2008-BiscarriMLGBM #data mining #mining #variability
A Data Mining Method Based on the Variability of the Customer Consumption — A Special Application on Electric Utility Companies (FB, IM, CL, JIG, JB, RM), pp. 370–374.
ICEISICEIS-AIDSS-2008-KompaoreMT #information retrieval #query
Combining Indexing Methods and Query Sizes in Information Retrieval in French (DK, JM, LT), pp. 149–154.
ICEISICEIS-AIDSS-2008-PanahiT #clustering #hybrid #performance #problem
An Efficient Hybrid Method for Clustering Problems (HP, RTM), pp. 288–294.
ICEISICEIS-AIDSS-2008-RokachMS #elicitation #recommendation
Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System (LR, AM, AS), pp. 268–275.
ICEISICEIS-DISI-2008-MendezPM #testing
Improving Software Test Strategy with a Method to Specify Test Cases (MSTC) (EMM, MAP, LEM), pp. 159–164.
ICEISICEIS-DISI-2008-SilveiraPM #enterprise #information management #integration #towards
Towards a Method for Enterprise Information Systems Integration (RS, JP, EM), pp. 349–354.
ICEISICEIS-HCI-2008-LeivaCGA #development #maintenance #using #workflow
A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEISICEIS-ISAS1-2008-VlaanderenVP #web
Improvement of a Web Engineering Method Applying Situational Method Engineering (KV, FV, OP), pp. 147–154.
ICEISICEIS-ISAS2-2008-EngelsHHJLRVW #architecture
A Method for Engineering a True Service-Oriented Architecture (GE, AH, BH, OJ, ML, JPR, MV, JW), pp. 272–281.
ICEISICEIS-ISAS2-2008-GoekenA #framework
IT Governance Frameworks as Methods (MG, SA), pp. 331–338.
ICEISICEIS-ISAS2-2008-SantosBBR #analysis #architecture #modelling #semantics
A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
ICEISICEIS-ISAS2-2008-SchultK #adaptation #automation #concept #data mining #enterprise #mining #self
Self-Adaptive Customizing with Data Mining Methods — A Concept for the Automatic Customizing of an ERP System with Data Mining Methods (RS, GK), pp. 70–75.
CIKMCIKM-2008-BarskySTU #using
A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKMCIKM-2008-HeW #feedback #information retrieval
Translation enhancement: a new relevance feedback method for cross-language information retrieval (DH, DW), pp. 729–738.
CIKMCIKM-2008-HsuC #predict #social
A method to predict social annotations (MHH, HHC), pp. 1375–1376.
CIKMCIKM-2008-ItoNHN #analysis #wiki
Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
CIKMCIKM-2008-LeeL #clustering #data type #multi #online
A coarse-grain grid-based subspace clustering method for online multi-dimensional data streams (JWL, WSL), pp. 1521–1522.
CIKMCIKM-2008-Moschitti #categorisation #kernel #relational #semantics #syntax
Kernel methods, syntax and semantics for relational text categorization (AM), pp. 253–262.
CIKMCIKM-2008-RazenteBTFT #approach #data access #metric #novel #optimisation #process #query #similarity
A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
CIKMCIKM-2008-ZubizarretaFCACGLV #multi #web
A georeferencing multistage method for locating geographic context in web search (ÁZ, PdlF, JMC, MA, JCA, GGB, CL, JV), pp. 1485–1486.
ECIRECIR-2008-FishbeinE #classification #encoding
Integrating Structure and Meaning: A New Method for Encoding Structure for Text Classification (JMF, CE), pp. 514–521.
ECIRECIR-2008-FishbeinE08a #classification #modelling #semantics
Methods for Augmenting Semantic Models with Structural Information for Text Classification (JMF, CE), pp. 575–579.
ECIRECIR-2008-LoponenPJK #implementation #novel
A Novel Implementation of the FITE-TRT Translation Method (AL, AP, KJ, HK), pp. 138–149.
ECIRECIR-2008-NaderiR #evaluation #graph #similarity
Graph-Based Profile Similarity Calculation Method and Evaluation (HN, BR), pp. 637–641.
ECIRECIR-2008-VanB #hybrid #library #personalisation
Hybrid Method for Personalized Search in Digital Libraries (TTV, MB), pp. 647–651.
ECIRECIR-2008-WuKT #information retrieval
Book Search Experiments: Investigating IR Methods for the Indexing and Retrieval of Books (HW, GK, MT), pp. 234–245.
ICMLICML-2008-CevikalpTP #classification
Nearest hyperdisk methods for high-dimensional classification (HC, BT, RP), pp. 120–127.
ICMLICML-2008-CunninghamSS #estimation #performance #process
Fast Gaussian process methods for point process intensity estimation (JPC, KVS, MS), pp. 192–199.
ICMLICML-2008-HsiehCLKS #coordination #linear #scalability
A dual coordinate descent method for large-scale linear SVM (CJH, KWC, CJL, SSK, SS), pp. 408–415.
ICPRICPR-2008-AliFG #estimation #parametricity
Analytical method for MGRF Potts model parameter estimation (AMA, AAF, GLG), pp. 1–4.
ICPRICPR-2008-BorsN #estimation #kernel #modelling #probability
Kernel bandwidth estimation in methods based on probability density function modelling (AGB, NN), pp. 1–4.
ICPRICPR-2008-BridsonA #analysis #approach #evaluation #geometry #layout #performance
A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
ICPRICPR-2008-ChandraS #using
A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPRICPR-2008-ChenCC #performance
A performance controllable octree construction method (ZC, HLC, WCC), pp. 1–4.
ICPRICPR-2008-Cleuziou #clustering
An extended version of the k-means method for overlapping clustering (GC), pp. 1–4.
ICPRICPR-2008-Correa-MorrisRPE #incremental
Incremental nested partition method (JCM, JRS, APP, DLEI), pp. 1–4.
ICPRICPR-2008-HuangLZ #detection
A method of small object detection and tracking based on particle filters (YH, JL, CZ), pp. 1–4.
ICPRICPR-2008-HulkkonenH #detection #monitoring
A minimum description length principle based method for signal change detection in machine condition monitoring (JJH, JVH), pp. 1–4.
ICPRICPR-2008-IshidaTIM #recognition
A Hilbert warping method for camera-based finger-writing recognition (HI, TT, II, HM), pp. 1–5.
ICPRICPR-2008-IwahoriNWFK #performance #self
Shape from self-calibration and Fast Marching Method (YI, TN, RJW, SF, HK), pp. 1–4.
ICPRICPR-2008-JiangDX #design
An affinity propagation based method for vector quantization codebook design (WJ, FD, QLX), pp. 1–4.
ICPRICPR-2008-KangBK #3d #modelling #multi
Multi-resolution 3D morphable models and its matching method (BNK, HB, DK), pp. 1–4.
ICPRICPR-2008-KawabataHS #agile #kernel
A rapid anomalous region extraction method by iterative projection onto kernel eigenspace (SK, SH, KS), pp. 1–4.
ICPRICPR-2008-KobayashiO #strict
Cone-restricted subspace methods (TK, NO), pp. 1–4.
ICPRICPR-2008-LeKM #clustering #graph
Coring method for clustering a graph (TVL, CAK, IBM), pp. 1–4.
ICPRICPR-2008-LiL #incremental #segmentation
An incremental method for accurate iris segmentation (PL, XL), pp. 1–4.
ICPRICPR-2008-LongJ #novel #online #recognition #word
A novel orientation free method for online unconstrained cursive handwritten chinese word recognition (TL, LJ), pp. 1–4.
ICPRICPR-2008-Lu #performance
Markerless human motion capture: An application of simulated annealing and Fast Marching Method (YL), pp. 1–4.
ICPRICPR-2008-LuJZ #detection #effectiveness #segmentation
An effective method for detection and segmentation of the body of human in the view of a single stationary camera (HL, CJ, RZ), pp. 1–4.
ICPRICPR-2008-OkadaH #incremental #network #recognition #self
Motion recognition based on Dynamic-Time Warping method with Self-Organizing Incremental Neural Network (SO, OH), pp. 1–4.
ICPRICPR-2008-PorroHTNDB #evaluation #performance
Performance evaluation of relevance vector machines as a nonlinear regression method in real-world chemical spectroscopic data (DP, NHG, ITB, ON, AD, RJB), pp. 1–4.
ICPRICPR-2008-SaitohMK #analysis #performance
Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
ICPRICPR-2008-Sakai #approach #classification #incremental #monte carlo
Monte Carlo subspace method: An incremental approach to high-dimensional data classification (TS), pp. 1–4.
ICPRICPR-2008-SatoOKI #image #realtime
Real-time image-based rendering system for virtual city based on image compression technique and eigen texture method (RS, SO, HK, KI), pp. 1–4.
ICPRICPR-2008-ThomasRCB #analysis #comparative
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
ICPRICPR-2008-TsuchiyaF #feature model #using
A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPRICPR-2008-VazquezRC #image #recognition
A new image division for LBP method to improve face recognition under varying lighting conditions (HMV, EBGR, YCM), pp. 1–4.
ICPRICPR-2008-Wang #algorithm #string
A new method to obtain the shift-table in Boyer-Moore’s string matching algorithm (YW), pp. 1–4.
ICPRICPR-2008-YamaguchiH #detection #image
Improved percolation-based method for crack detection in concrete surface images (TY, SH), pp. 1–4.
ICPRICPR-2008-YangB08a #feature model #recognition #sketching
Feature extraction method based on cascade noise elimination for sketch recognition (JY, HB), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-ZhangK #automation #detection
Automatic road sign detection method based on Color Barycenters Hexagon model (QZ, SiK), pp. 1–4.
ICPRICPR-2008-ZhangYLCG
A covariance-based method for dynamic background subtraction (SZ, HY, SL, XC, WG), pp. 1–4.
KDDKDD-2008-CuiDSAJ #learning
Learning methods for lung tumor markerless gating in image-guided radiotherapy (YC, JGD, GCS, BMA, SBJ), pp. 902–910.
KDDKDD-2008-KeerthiSCHL #linear #multi #scalability
A sequential dual method for large scale multi-class linear svms (SSK, SS, KWC, CJH, CJL), pp. 408–416.
KRKR-2008-Cortes-CalabuigDAB #approximate #database #fixpoint #performance #query
Accuracy and Efficiency of Fixpoint Methods for Approximate Query Answering in Locally Complete Databases (ACC, MD, OA, MB), pp. 81–91.
RecSysRecSys-2008-MaidelSST #evaluation #personalisation
Evaluation of an ontology-content based filtering method for a personalized newspaper (VM, PS, BS, MTM), pp. 91–98.
RecSysRecSys-2008-YildirimK #collaboration #problem #random
A random walk method for alleviating the sparsity problem in collaborative filtering (HY, MSK), pp. 131–138.
SEKESEKE-2008-CuiSXM #architecture #design #reuse
A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
SEKESEKE-2008-HeWTG #process #reuse
A Systematic Method for Process Tailoring Based on Knowledge Reuse (XyH, YsW, YxT, JgG), pp. 38–41.
SEKESEKE-2008-QuNXZ #testing
A Dynamic Adjusting Method for Test Case Prioritization (BQ, CN, BX, XZ), pp. 484–487.
SEKESEKE-2008-XieXLW #scheduling
A Project Scheduling Method Based on Human Resource Availability (LX, JX, DL, QW), pp. 161–166.
SEKESEKE-2008-XiPLH #component #repository
A Goal-oriented Mixed-granularity Component Selection Method for Huge Component Repositories (XX, JP, JL, SH), pp. 573–576.
SIGIRSIGIR-2008-ChenC #named #novel #summary #topic
TSCAN: a novel method for topic summarization and content anatomy (CCC, MCC), pp. 579–586.
SIGIRSIGIR-2008-Diaz #retrieval
A method for transferring retrieval scores between collections with non-overlapping vocabularies (FDD), pp. 805–806.
SIGIRSIGIR-2008-LeeCA #clustering #feedback #pseudo
A cluster-based resampling method for pseudo-relevance feedback (KSL, WBC, JA), pp. 235–242.
SIGIRSIGIR-2008-LiT #documentation #image #word
A word shape coding method for camera-based document images (LL, CLT), pp. 771–772.
SIGIRSIGIR-2008-WangFZ #case study #feedback
A study of methods for negative relevance feedback (XW, HF, CZ), pp. 219–226.
SIGIRSIGIR-2008-YilmazKA #performance
A simple and efficient sampling method for estimating AP and NDCG (EY, EK, JAA), pp. 603–610.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
PPDPPPDP-2008-DeckerM #consistency #nondeterminism
Classifying integrity checking methods with regard to inconsistency tolerance (HD, DM), pp. 195–204.
PADLPADL-2008-KellerCCSB #generative #monte carlo
Specialising Simulator Generators for High-Performance Monte-Carlo Methods (GK, HCM, MMTC, DS, CBK), pp. 116–132.
RERE-2008-MakinoO #difference #generative
A Method of Scenario Generation with Differential Scenario (MM, AO), pp. 337–338.
RERE-2008-Szoke #automation #scheduling #using
A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQREFSQ-2008-AlenljungP #named #requirements #tool support
DESCRY: A Method for Evaluating Decision-Supporting Capabilities of Requirements Engineering Tools (BA, AP), pp. 52–57.
REFSQREFSQ-2008-BrinkkemperWSV #approach #process #requirements
Process Improvement in Requirements Management: A Method Engineering Approach (SB, IvdW, MS, JV), pp. 6–22.
REFSQREFSQ-2008-FrickerG #framework #requirements
Negotiation Constellations — Method Selection Framework for Requirements Negotiation (SF, PG), pp. 37–51.
SACSAC-2008-AndresAN #experience #formal method #information management #using
Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SACSAC-2008-AndronickN #embedded #protocol
Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
SACSAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SACSAC-2008-CimadamoreV #java #prolog #type inference
Integrating Java and Prolog through generic methods and type inference (MC, MV), pp. 198–205.
SACSAC-2008-DornS #3d #approximate #named #predict
CReF: a central-residue-fragment-based method for predicting approximate 3-D polypeptides structures (MD, ONdS), pp. 1261–1267.
SACSAC-2008-KuangZ #algorithm #detection #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-NaderiRP #collaboration #graph #information retrieval #similarity
A graph-based profile similarity calculation method for collaborative information retrieval (HN, BR, JMP), pp. 1127–1131.
SACSAC-2008-RazenteBTT #feedback #image #query #retrieval #similarity
Aggregate similarity queries in relevance feedback methods for content-based image retrieval (HLR, MCNB, AJMT, CTJ), pp. 869–874.
SACSAC-2008-Santos-NetoRP #evaluation #information management #modelling #testing
An evaluation of a model-based testing method for information systems (PdAdSN, RFR, CIPdSeP), pp. 770–776.
SACSAC-2008-SchmitzAA #implementation #nondeterminism #order
A method for defining the implementation order of software projects under uncertainty (EAS, AJA, CMdA), pp. 844–845.
SACSAC-2008-TakanoC #documentation #feature model #feedback
A light-weight feedback method for reconstructing a document vector space on a feature extraction model (KT, XC), pp. 1169–1170.
SACSAC-2008-YuB #detection #effectiveness #multi #performance
A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
SACSAC-2008-ZhouZCZ #concept #ontology #semantics
A method for semantics-based conceptual expansion of ontology (LZ, DZ, XC, CZ), pp. 1583–1587.
FSEFSE-2008-StylosM #api
The implications of method placement on API learnability (JS, BAM), pp. 105–112.
ICSEICSE-2008-McCafferyPR #agile #assessment #hybrid #named #safety
Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
ICSEICSE-2008-Murphy-HillB #refactoring #tool support
Breaking the barriers to successful refactoring: observations and tools for extract method (ERMH, APB), pp. 421–430.
ICSEICSE-2008-WangCW #automation #distributed
Four enhancements to automated distributed system experimentation methods (YW, AC, ALW), pp. 491–500.
SPLCSPLC-2008-Krueger08b #product line
Pragmatic Methods for Commercial Software Product Line Engineering Practice (CWK), p. 376.
CCCC-2008-KhedkerK #analysis #data flow #interprocedural #performance #precise #string
Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety #using
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
ICSTICST-2008-BousquetS #inheritance
Relation between Depth of Inheritance Tree and Number of Methods to Test (LdB, MRS), pp. 161–170.
ICSTICST-2008-KimC #object-oriented #sequence #source code #testing
A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs (MK, YC), pp. 537–540.
ICSTICST-2008-RahaJ #automation #testing #xml
Automation Method for Testing XML/DB/XML Layers (DR, MJ), pp. 458–464.
ICSTICST-2008-WongWQZ #effectiveness #fault #locality #statistics
A Crosstab-based Statistical Method for Effective Fault Localization (WEW, TW, YQ, LZ), pp. 42–51.
IJCARIJCAR-2008-HirokawaM #analysis #automation #complexity #dependence
Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
IJCARIJCAR-2008-SchmidtT #first-order #logic
A General Tableau Method for Deciding Description Logics, Modal Logics and Related First-Order Fragments (RAS, DT), pp. 194–209.
RTARTA-2008-Schmidt-SchaussM #call-by #finite #nondeterminism #simulation #λ-calculus
A Finite Simulation Method in a Non-deterministic Call-by-Need λ-Calculus with Letrec, Constructors, and Case (MSS, EM), pp. 321–335.
WICSAWICSA-2007-FalessiCK #architecture #design #question
Do Architecture Design Methods Meet Architects’ Needs? (DF, GC, PK), p. 5.
WICSAWICSA-2007-MurthyRH #refactoring
Refactoring Methods (PVRM, TR, SH), p. 37.
WICSAWICSA-2007-SangwanH #analysis #architecture #design #object-oriented
Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
ASEASE-2007-Easterbrook #empirical #re-engineering #research
Empirical research methods for software engineering (SME), p. 574.
ASEASE-2007-WapplerS #testing
Improving evolutionary class testing in the presence of non-public methods (SW, IS), pp. 381–384.
CASECASE-2007-ChengYT #evaluation #testing
A Quantitative Knife-edge Testing Method for Local Deformation Evaluation in Optical Aspheric Fabrication (HC, YY, HT), pp. 818–822.
CASECASE-2007-HablaDMPE
A Short-Term Forecast Method for Demand Quantities in Semiconductor Manufacturing (CH, RD, LM, TP, HE), pp. 94–99.
CASECASE-2007-NishiHI #problem #scheduling
A Successive Lagrangian Relaxation Method for Solving Flowshop Scheduling Problems with Total Weighted Tardiness (TN, YH, MI), pp. 875–880.
CASECASE-2007-NishiHIG #composition #generative #multi #scheduling
A Decomposition Method with Cut Generation for Simultaneous Production Scheduling and Routing for multiple AGVs (TN, YH, MI, IEG), pp. 658–663.
CASECASE-2007-ZhuangXZD #multi #optimisation #set
Von Mises Stress and Level Set Method based Structural Topology Optimization with Multi-phase Materials (CZ, ZX, XZ, HD), pp. 945–949.
DACDAC-2007-IwataYF
A DFT Method for Time Expansion Model at Register Transfer Level (HI, TY, HF), pp. 682–687.
DACDAC-2007-RastogiCK #on the
On Estimating Impact of Loading Effect on Leakage Current in Sub-65nm Scaled CMOS Circuits Based on Newton-Raphson Method (AR, WC, SK), pp. 712–715.
DACDAC-2007-TaylorP #combinator #design #logic #optimisation #physics
Exact Combinatorial Optimization Methods for Physical Design of Regular Logic Bricks (BT, LTP), pp. 344–349.
DACDAC-2007-VytyazLLMMM #parametricity
Parameter Finding Methods for Oscillators with a Specified Oscillation Frequency (IV, DCL, SL, AM, UKM, KM), pp. 424–429.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DATEDATE-2007-0004XJ #analysis #novel #statistics
A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
DATEDATE-2007-BjerregaardSS #architecture #scalability
A scalable, timing-safe, network-on-chip architecture with an integrated clock distribution method (TB, MBS, JS), pp. 648–653.
DATEDATE-2007-HongSCY #adaptation
A two-tone test method for continuous-time adaptive equalizers (DH, SS, KTC, CPY), pp. 1283–1288.
DATEDATE-2007-KeezerMD #multi
Method for reducing jitter in multi-gigahertz ATE (DCK, DM, PD), pp. 701–706.
DATEDATE-2007-LisselGG #design #industrial #perspective #verification
Introducing new verification methods into a company’s design flow: an industrial user’s point of view (RL, JG), pp. 689–694.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-SingheeR #monte carlo #novel #performance #simulation #statistics
Statistical blockade: a novel method for very fast Monte Carlo simulation of rare circuit events, and its application (AS, RAR), pp. 1379–1384.
DATEDATE-2007-VerbauwhedeS #design #security #trust
Design methods for security and trust (IV, PS), pp. 672–677.
DATEDATE-2007-XuC #array
A cross-referencing-based droplet manipulation method for high-throughput and pin-constrained digital microfluidic arrays (TX, KC), pp. 552–557.
DATEDATE-2007-ZhuZCXZ #grid #probability #process
A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology (HZ, XZ, WC, JX, DZ), pp. 1514–1519.
DATEDATE-2007-ZjajoAG #interactive #monitoring #parametricity #process
Interactive presentation: BIST method for die-level process parameter variation monitoring in analog/mixed-signal integrated circuits (AZ, MJBA, JPdG), pp. 1301–1306.
DocEngDocEng-2007-KimYHKK #documentation #modelling #scalability #xml
A document object modeling method to retrieve data from a very large XML document (SMK, SIY, EH, TGK, IKK), pp. 59–68.
DRRDRR-2007-AndraNLZBBHST #effectiveness
Frequency coding: an effective method for combining dichotomizers (SA, GN, CLL, IZ, EB, AB, LH, KMS, MT).
ICDARICDAR-2007-AbedM #comparison #feature model #preprocessor #recognition
Comparison of Different Preprocessing and Feature Extraction Methods for Offline Recognition of Handwritten ArabicWords (HEA, VM), pp. 974–978.
ICDARICDAR-2007-AntonacopoulosB #analysis #framework #layout #performance
Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
ICDARICDAR-2007-BaudrierR #image #visualisation
A Method for Image Local-Difference Visualization (EB, AR), pp. 949–953.
ICDARICDAR-2007-ChenLJ #learning #pseudo #recognition
Learning Handwritten Digit Recognition by the Max-Min Posterior Pseudo-Probabilities Method (XC, XL, YJ), pp. 342–346.
ICDARICDAR-2007-NejadR #identification #verification
A New Method for Writer Identification and Verification Based on Farsi/Arabic Handwritten Texts (FN, MR), pp. 829–833.
ICDARICDAR-2007-PapavassiliouSKC #parametricity #verification
A Parametric Spectral-Based Method for Verification of Text in Videos (VP, TS, VK, GC), pp. 879–883.
ICDARICDAR-2007-RabasseGF #synthesis
A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
ICDARICDAR-2007-Renaudin #collaboration
A General Method of Segmentation-Recognition Collaboration Applied to Pairs of Touching and Overlapping Symbols (CR), pp. 659–663.
ICDARICDAR-2007-TabboneZ #documentation #visual notation
An Indexing Method for Graphical Documents (ST, DZ), pp. 789–793.
ICDARICDAR-2007-WuLFLX #2d #image #modelling
A Model Based Book Dewarping Method to Handle 2D Images Captured by a Digital Camera (MW, RL, BF, WL, ZX), pp. 158–162.
SIGMODSIGMOD-2007-MorseP #performance #similarity
An efficient and accurate method for evaluating time series similarity (MDM, JMP), pp. 569–580.
VLDBVLDB-2007-ChenCB #estimation #performance
A Simple and Efficient Estimation Method for Stream Expression Cardinalities (AC, JC, TB), pp. 171–182.
VLDBVLDB-2007-WuJ #set
A Bayesian Method for Guessing the Extreme Values in a Data Set (MW, CJ), pp. 471–482.
CSEETCSEET-2007-FrezzaT #behaviour #developer #testing
Testing as a Mental Discipline: Practical Methods for Affecting Developer Behavior (STF, MHT), pp. 355–356.
ITiCSEITiCSE-2007-CaronnaSMIHT #predict #using
Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
FASEFASE-2007-DarvasL #implementation #reasoning
Practical Reasoning About Invocations and Implementations of Pure Methods (ÁD, KRML), pp. 336–351.
TACASTACAS-2007-HarelS #flexibility #source code
Planned and Traversable Play-Out: A Flexible Method for Executing Scenario-Based Programs, (DH, IS), pp. 485–499.
WCREWCRE-J-2005-ChristlKS07 #automation #clustering
Automated clustering to support the reflexion method (AC, RK, MADS), pp. 255–274.
SCAMSCAM-2007-JuilleratH #implementation #refactoring #towards
Toward an Implementation of the “Form Template Method” Refactoring (NJ, BH), pp. 81–90.
WCREWCRE-2007-FrenzelKBA #product line
Extending the Reflexion Method for Consolidating Software Variants into Product Lines (PF, RK, APJB, KA), pp. 160–169.
STOCSTOC-2007-DunaganH
Iteratively constructing preconditioners via the conjugate gradient method (JD, NJAH), pp. 207–216.
STOCSTOC-2007-KieferLE #convergence #equation #on the #polynomial
On the convergence of Newton’s method for monotone systems of polynomial equations (SK, ML, JE), pp. 217–226.
CIAACIAA-2007-Yli-JyraK #compilation #parallel
A New Method for Compiling Parallel Replacement Rules (AYJ, KK), pp. 320–321.
DLTDLT-2007-EsparzaKL
An Extension of Newton’s Method to ω-Continuous Semirings (JE, SK, ML), pp. 157–168.
DLTDLT-2007-Freivalds #automaton #finite #probability
Non-constructive Methods for Finite Probabilistic Automata (RF), pp. 169–180.
ICALPICALP-2007-BlomerN
Sampling Methods for Shortest Vectors, Closest Vectors and Successive Minima (JB, SN), pp. 65–77.
SEFMSEFM-2007-AichernigPWW #consistency #formal method #industrial #protocol #testing
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
SEFMSEFM-2007-Cousot #abstract interpretation #formal method
The Rôle of Abstract Interpretation in Formal Methods (PC), pp. 135–140.
CHICHI-2007-AndreasenNSS #empirical #testing #usability #what
What happened to remote usability testing?: an empirical study of three methods (MSA, HVN, SOS, JS), pp. 1405–1414.
CHICHI-2007-ZimmermanFE #design #human-computer #interactive #research
Research through design as a method for interaction design research in HCI (JZ, JF, SE), pp. 493–502.
HCIDHM-2007-ChoiNCC #3d #generative
A Method for Garment Pattern Generation by Flattening 3D Body Scan Data (YLC, YN, KMC, MHC), pp. 803–812.
HCIDHM-2007-DingYYYL #case study
Study on the Appraisal Methods of Hand Fatigue (LD, FY, CY, XY, YL), pp. 33–41.
HCIDHM-2007-HelinVMAM #design #modelling
Digital Human Model Based Participatory Design Method to Improve Work Tasks and Workplaces (KH, JV, JM, SA, TM), pp. 847–855.
HCIDHM-2007-LuoYZ #identification
A Method for Gene Identification by Dynamic Feature Choosing (JL, LY, XZ), pp. 678–683.
HCIDHM-2007-NiuLS #3d #analysis #bibliography #comparison #perspective
Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
HCIDHM-2007-Soltysinski #human-computer #interactive #multimodal #novel
Novel Methods for Human-Computer Interaction in Multimodal and Multidimensional Noninvasive Medical Imaging (TS), pp. 717–726.
HCIDHM-2007-XiangZ07a #database #performance #retrieval #scalability
Motion Retrieval Based on an Efficient Index Method for Large-Scale Mocap Database (JX, HZ), pp. 234–242.
HCIDHM-2007-ZhuXYM #detection #novel
A Novel Method for Cloth-Body Collision Detection (XZ, SX, YY, TM), pp. 1056–1063.
HCIHCI-AS-2007-JeenHKLP #interactive #persuasion
Persuasive Interaction Strategy for Self Diet System: Exploring the Relation of User Attitude and Intervention by Computerized Systematic Methods (YJ, JH, HK, KL, PP), pp. 450–458.
HCIHCI-AS-2007-KojimaIN #documentation #using
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-AS-2007-LinKTKT #design #development #process #verification #visual notation
Verification of Development of Scenarios Method and Visual Formats for Design Process (HL, MK, HT, HK, TT), pp. 1095–1101.
HCIHCI-IDU-2007-CortierdA #java #user interface #validation
Formal Validation of Java/Swing User Interfaces with the Event B Method (AC, Bd, YAA), pp. 1062–1071.
HCIHCI-IDU-2007-DaimotoAMK #case study #research #safety
Application of Micro-Scenario Method (MSM) to User Research for the Motorcycle’s Informatization — A Case Study for the Information Support System for Safety (HD, SA, MM, MK), pp. 49–57.
HCIHCI-IDU-2007-DomingoHM #comprehension #game studies #process
A Game to Promote Understanding About UCD Methods and Process (MGD, MAH, EM), pp. 446–452.
HCIHCI-IDU-2007-Go #design
A Scenario-Based Design Method with Photo Diaries and Photo Essays (KG), pp. 88–97.
HCIHCI-IDU-2007-KangY #difference #performance
Age Differences in Performance, Operation Methods, and Workload While Interacting with an MP3 Player (NEK, WCY), pp. 854–861.
HCIHCI-IDU-2007-KoutsabasisSD #case study #evaluation #usability
Evaluating Usability Evaluation Methods: Criteria, Method and a Case Study (PK, TS, JD), pp. 569–578.
HCIHCI-IDU-2007-ResterPWHMPO #evaluation #interactive
Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
HCIHCI-IPT-2007-HuaP #data access #mobile
WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
HCIHCI-IPT-2007-IshidoKIO #evaluation #interface
Evaluation of Content Handling Methods for Tabletop Interface (RI, KK, TI, KiO), pp. 326–335.
HCIHCI-IPT-2007-LiK #automation #image
A Color Adjustment Method for Automatic Seamless Image Blending (XL, DK), pp. 82–91.
HCIHCI-IPT-2007-OtsukiKNST #artificial reality #interactive #novel
RealSound Interaction: A Novel Interaction Method with Mixed Reality Space by Localizing Sound Events in Real World (MO, AK, TN, FS, HT), pp. 653–662.
HCIHCI-IPT-2007-ParkSKPJ #composition #modelling #user interface
User Customization Methods Based on Mental Models: Modular UI Optimized for Customizing in Handheld Device (BP, SS, JK, WP, HJ), pp. 445–451.
HCIHCI-IPT-2007-SongKPPJ #design
Designing Input Method of Hand-Held Device with International User Studies (SS, JK, WP, BP, HJ), pp. 480–485.
HCIHCI-IPT-2007-WuH #visualisation
The Perceptual Eye View: A User-Defined Method for Information Visualization (LHW, PYH), pp. 181–190.
HCIHCI-IPT-2007-XuRMMB #challenge #evaluation #user interface
Evaluation of Tangible User Interfaces (TUIs) for and with Children — Methods and Challenges (DYX, JCR, EM, SM, MB), pp. 1008–1017.
HCIHCI-MIE-2007-ChanCCHH #detection #multi #using
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-LeePWP #artificial reality #robust
Robust Gaze Tracking Method for Stereoscopic Virtual Reality Systems (ECL, KRP, MCW, JP), pp. 700–709.
HCIHCI-MIE-2007-NodaITF #adaptation #semantics #web
An Adaptive Web Browsing Method for Various Terminals: A Semantic Over-Viewing Method (HN, TI, YT, SF), pp. 440–448.
HCIHIMI-IIE-2007-AndoM #education #student
A New Method for Teachers and Students to Record Daily Progress in a Class (AA, KM), pp. 245–251.
HCIHIMI-IIE-2007-AnseT #evaluation
Evaluation Method of e-Learning Materials by α-Wave and β-Wave of EEG (MA, TT), pp. 252–259.
HCIHIMI-IIE-2007-HorinouchiWAT #case study #effectiveness
A Study of an Effective Rehearsal Method in e-Learning (TH, SW, MA, TT), pp. 328–336.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-KusukawaMA #e-commerce
Impact of E-Commerce Environment on Selection of Sales Methods Considering Delivery Lead Time of Goods (EK, SM, IA), pp. 929–938.
HCIHIMI-IIE-2007-ObayashiKTTHSIY #development
Development of an Illumination Control Method to Improve Office Productivity (FO, MK, MT, KT, YH, HS, HI, HY), pp. 939–947.
HCIHIMI-IIE-2007-ShimodaIHIYOT #development #evaluation
Development of Productivity Evaluation Method to Improve Office Environment (HS, KI, YH, HI, HY, FO, MT), pp. 965–972.
HCIHIMI-IIE-2007-YajimaWS #evaluation #information management #multi
Evaluation of the Participant-Support Method for Information Acquisition in the “Multiplex Risk Communicator” (HY, TW, RS), pp. 195–203.
HCIHIMI-MTT-2007-Jeong #comprehension #using
Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HCIHIMI-MTT-2007-JiGC #comparison #using #word
Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HCIHIMI-MTT-2007-OkaMS #information management
An Information Filtering Method Based on User’s Moods, Situations, and Preferences (MO, HM, MS), pp. 715–719.
HCIHIMI-MTT-2007-ParkK07a #case study #effectiveness #mobile
A Case Study on Effective Application of Inquiry Methods to Find Out Mobile Phone’s New Function (SP, YK), pp. 163–170.
HCIHIMI-MTT-2007-SatoAT
A Method for Constructing a Movie-Selection Support System Based on Kansei Engineering (NS, MA, TT), pp. 526–534.
HCIHIMI-MTT-2007-TsengTW #implementation #process
Implementing the HCD Method into the Developing Process of a CPD System (KCT, THT, KCW), pp. 199–207.
HCIHIMI-MTT-2007-XuLSB
A Method for Rule Extraction by Discernible Vector (EX, LS, ST, BY), pp. 779–784.
HCIHIMI-MTT-2007-YamamotoW #development #image
Development of an Embodied Image Telecasting Method Via a Robot with Speech-Driven Nodding Response (MY, TW), pp. 1017–1025.
HCIHIMI-MTT-2007-YangDJB #human-computer
Human-Friendly HCI Method for the Control of Home Appliance (SEY, JHD, HJ, ZB), pp. 218–226.
HCIOCSC-2007-DayF #analysis #community #concept #named #network #research
CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
HCIOCSC-2007-SagaT #network #ranking #social
Ranking Method for Mediators in Social Network (RS, HT), pp. 151–159.
CAiSECAiSE-2007-DjebbiS #product line #requirements
RED-PL, a Method for Deriving Product Requirements from a Product Line Requirements Model (OD, CS), pp. 279–293.
CAiSECAiSE-2007-ThevenetS
Aligning IS to Organization’s Strategy: The InStAlMethod (LHT, CS), pp. 203–217.
CAiSECAiSE-2007-WeerdBV #concept #empirical #evolution #incremental #requirements #validation
Concepts for Incremental Method Evolution: Empirical Exploration and Validation in Requirements Management (IvdW, SB, JV), pp. 469–484.
ICEISICEIS-AIDSS-2007-CuellarDP #algorithm #hybrid #network #problem
Problems and Features of Evolutionary Algorithms to Build Hybrid Training Methods for Recurrent Neural Networks (MPC, MD, MdCPJ), pp. 204–211.
ICEISICEIS-AIDSS-2007-FurstT #concept #graph #ontology
Heavyweight Ontology Matching — A Method and a Tool based on the Conceptual Graphs Model (FF, FT), pp. 265–270.
ICEISICEIS-DISI-2007-OsbornB #2d
An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
ICEISICEIS-DISI-2007-RayG #using
A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEISICEIS-DISI-2007-SantosB #clustering #named #optimisation
PIN: A partitioning and indexing optimization method for olap (RJS, JB), pp. 170–177.
ICEISICEIS-EIS-2007-KornyshovaS #multi #process #re-engineering
Business Process Priorisation with Multicriteria Methods — Case of Business Process Reengineering (EK, CS), pp. 138–143.
ICEISICEIS-EIS-2007-MaamarBG #design #named #web #web service
CP4WS — A Method for Designing and Developing Systems Based on Web Services (ZM, DB, CG), pp. 452–458.
ICEISICEIS-HCI-2007-Godet-BarRDJ #analysis #human-computer
Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
ICEISICEIS-J-2007-Barjis07a #modelling #process #simulation #using
A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
CIKMCIKM-2007-EavisT #named #performance
Mapgraph: efficient methods for complex olap hierarchies (TE, AT), pp. 465–474.
CIKMCIKM-2007-GarakaniIHH #named #novel #query #xml
Ntjfsatnot: a novel method for query with not-predicates on xml data (VG, SKI, MH, MH), pp. 885–888.
CIKMCIKM-2007-InokuchiT #online
A method for online analytical processing of text data (AI, KT), pp. 455–464.
CIKMCIKM-2007-ShinL #data type #interactive #online
An on-line interactive method for finding association rules data streams (SJS, WSL), pp. 963–966.
ECIRECIR-2007-CasanovaQB #comparison #multi #retrieval #standard
Overall Comparison at the Standard Levels of Recall of Multiple Retrieval Methods with the Friedman Test (JMC, MAPQ, AB), pp. 682–685.
ECIRECIR-2007-HeD #classification #naive bayes #using
Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIRECIR-2007-PanLZTC #retrieval #video
Retrieval Method for Video Content in Different Format Based on Spatiotemporal Features (XP, JL, YZ, ST, JC), pp. 728–731.
ICMLICML-2007-KimP #learning #recursion
A recursive method for discriminative mixture learning (MK, VP), pp. 409–416.
ICMLICML-2007-KropotovV #learning #on the
On one method of non-diagonal regularization in sparse Bayesian learning (DK, DV), pp. 457–464.
ICMLICML-2007-LinWK #scalability #trust
Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
ICMLICML-2007-SriperumbudurTL #programming
Sparse eigen methods by D.C. programming (BKS, DAT, GRGL), pp. 831–838.
KDDKDD-2007-ArnoldLA #modelling #visual notation
Temporal causal modeling with graphical granger methods (AA, YL, NA), pp. 66–75.
KDDKDD-2007-DasguptaDHJM #classification #feature model
Feature selection methods for text classification (AD, PD, BH, VJ, MWM), pp. 230–239.
KDDKDD-2007-DruckPMZ #classification #generative #hybrid
Semi-supervised classification with hybrid generative/discriminative methods (GD, CP, AM, XZ), pp. 280–289.
KDDKDD-2007-WanNHL #privacy
Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
MLDMMLDM-2007-HulsmannF #algorithm #comparison #multi #novel #optimisation #parametricity
Comparison of a Novel Combined ECOC Strategy with Different Multiclass Algorithms Together with Parameter Optimization Methods (MH, CMF), pp. 17–31.
MLDMMLDM-2007-MendezCGRD #performance
Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes (JRM, BC, DGP, FFR, FD), pp. 364–378.
MLDMMLDM-2007-WangLYC #classification #data type #fuzzy #incremental #mining
An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams (TW, ZL, YY, HC), pp. 91–103.
SEKESEKE-2007-HummelJA #component #performance #repository #retrieval
Evaluating the Efficiency of Retrieval Methods for Component Repositories (OH, WJ, CA), pp. 404–409.
SEKESEKE-2007-LiZXS #classification #component #generative #ontology #retrieval
Ontology Based Classification Generating Method for Browsing-Based Component Retrieval (GL, LZ, BX, WS), p. 428–?.
SEKESEKE-2007-ZanattaV #agile #integration #modelling #quality #requirements #towards
Agile Methods and Quality Models: Towards an Integration in Requirements Engineering (ALZ, PV), pp. 173–178.
SEKESEKE-2007-ZiemerC #development #release planning #web
Knowledge Sharing through a Simple Release Planning Method for Web Application Development (SZ, ICC), pp. 686–691.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIRSIGIR-2007-PopoviciMM #documentation #effectiveness
An effective method for finding best entry points in semi-structured documents (EP, PFM, GM), pp. 851–852.
SIGIRSIGIR-2007-ThomasH
Evaluating sampling methods for uncooperative collections (PT, DH), pp. 503–510.
SIGIRSIGIR-2007-TsaiLQCM #named #ranking
FRank: a ranking method with fidelity loss (MFT, TYL, TQ, HHC, WYM), pp. 383–390.
SIGIRSIGIR-2007-YueFRJ #optimisation #precise
A support vector method for optimizing average precision (YY, TF, FR, TJ), pp. 271–278.
MODELSMoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
MODELSMoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
OOPSLAOOPSLA-2007-ShanerLN #composition #higher-order #source code #verification
Modular verification of higher-order methods with mandatory calls specified by model programs (SMS, GTL, DAN), pp. 351–368.
TOOLSTOOLS-EUROPE-2007-DenkerDLM
Sub-Method Reflection (MD, SD, AL, PM), pp. 275–295.
TOOLSTOOLS-EUROPE-2007-KusmierekB
Hygienic methods Ñ Introducing HygJava (JDMK, VB), pp. 209–229.
GPCEGPCE-2007-PirkelbauerSS #c++ #multi
Open multi-methods for c++ (PP, YS, BS), pp. 123–134.
REFSQREFSQ-2007-HerrmannKD
Exploring the Characteristics of NFR Methods — A Dialogue About Two Approaches (AH, DK, JD), pp. 320–334.
SACSAC-OOPS-J-2006-BeugnardS07 #encapsulation
Method Overloading and Overriding Cause Distribution Transparency and Encapsulation Flaws (AB, SS), pp. 31–45.
SACSAC-2007-BarratT #learning #recognition
A progressive learning method for symbols recognition (SB, ST), pp. 627–631.
SACSAC-2007-BoussellaaZA #hybrid #using
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SACSAC-2007-InokiF #approach #evolution #product line
Software product line evolution method based on kaizen approach (MI, YF), pp. 1207–1214.
SACSAC-2007-KarwaczynskiKMN #peer-to-peer #proximity
Dual proximity neighbour selection method for peer-to-peer-based discovery service (PK, DK, JM, MN), pp. 590–591.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-LinsS #algorithm #documentation
A quantitative method for assessing algorithms to remove back-to-front interference in documents (RDL, JMMdS), pp. 610–616.
SACSAC-2007-TetsuyaAHN #ad hoc #generative #network #using
Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SACSAC-2007-TreeprapinKHN #mobile #network
A mobile sensor control method for sparse sensor networks (KT, AK, TH, SN), pp. 886–890.
SACSAC-2007-ZengS #combinator #geometry #optimisation #problem
Semi-mechanization method for a unsolved optimization problem in combinatorial geometry (ZZ, MS), pp. 762–766.
SPLCSPLC-2007-ChangK #adaptation #modelling #variability
A Variability Modeling Method for Adaptable Services in Service-Oriented Computing (SHC, SDK), pp. 261–268.
CCCC-2007-CheremR #analysis #lightweight #summary
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
PPoPPPPoPP-2007-LeeBSSSM #learning #modelling #parallel #performance
Methods of inference and learning for performance modeling of parallel applications (BCL, DMB, BRdS, MS, KS, SAM), pp. 249–258.
PPoPPPPoPP-2007-ZhangSZSG #concurrent
Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
AMOSTAMOST-2007-KorelKT #evaluation #heuristic #modelling
Model-based test prioritization heuristic methods and their evaluation (BK, GK, LHT), pp. 34–43.
CADECADE-2007-Baumgartner #logic
Logical Engineering with Instance-Based Methods (PB), pp. 404–409.
CADECADE-2007-GhilardiNRZ #infinity #model checking #satisfiability
Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems (SG, EN, SR, DZ), pp. 362–378.
CAVCAV-2007-Kropf #debugging #development #formal method #industrial #question
Software Bugs Seen from an Industrial Perspective or Can Formal Methods Help on Automotive Software Development? (TK), p. 3.
ICLPICLP-2007-Morozov #analysis #design #logic programming #visual notation
Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
LICSLICS-2007-Hales #geometry #problem
Some Methods of Problem Solving in Elementary Geometry (TCH), pp. 35–40.
LICSLICS-2007-MontanariP
A Contraction Method to Decide MSO Theories of Deterministic Trees (AM, GP), pp. 141–150.
FATESTestCom-FATES-2007-DesmoulinV #generative #testing
A New Method for Interoperability Test Generation (AD, CV), pp. 58–73.
QoSAQoSA-2006-LiuGBHA #architecture #middleware #named
MEMS: A Method for Evaluating Middleware Architectures (YL, IG, LB, CH, SA), pp. 9–26.
ASEASE-2006-PontissoC #automation #formal method #modelling
TOPCASED Combining Formal Methods with Model-Driven Engineering (NP, DC), pp. 359–360.
ASEASE-2006-Singer #evaluation #testing #tool support
Testing Tools and Techniques: A Mini-Tutorial on Evaluation Methods for ASE (JS), pp. 371–374.
CASECASE-2006-CapachoPGD #assembly #heuristic #problem
Heuristic Methods to Solve the Alternative Subgraphs Assembly Line Balancing Problem (LC, RP, OG, AD), pp. 501–506.
CASECASE-2006-ChengSOYII #performance #scheduling
A fast rescheduling method in semiconductor manufacturing allowing for tardiness and scheduling stability (MC, MS, JO, MY, HI, KI), pp. 100–105.
CASECASE-2006-HuSHL #modelling #probability #using
Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASECASE-2006-LiLWC #automation #component #equation #generative #graph #linear #using
Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASECASE-2006-LiZY #development #fault #integration #probability #research
Research on Computational Method of Fault Probability for New Product Development Based on Intelligence and Integration (FL, LZ, YY), pp. 319–324.
CASECASE-2006-Mishima #development #evaluation #performance
Development of a micro manufacturing system and its efficiency evaluation method (NM), pp. 478–483.
CASECASE-2006-PiPS #problem
Nested Partitions Method for the Local Pickup and Delivery Problem (LP, YP, LS), pp. 375–380.
CASECASE-2006-SunXZ #adaptation #correlation #performance #self
Self-adaptive Surge Adjustment based on Fast Correlation Integral Method in Centrifugal Compressors (TS, GX, CZ), pp. 661–666.
CASECASE-2006-SunZF #convergence #parallel
Convergence of parallel dynamic iteration methods for nonlinear DAEs of index-2 (WS, JHZ, XGF), pp. 129–133.
CASECASE-2006-XiaoX #modelling #monitoring #process
Monitoring of batch processes with non-linear modeling methods (YX, BX), pp. 140–143.
DACDAC-2006-Gluska #verification
Practical methods in coverage-oriented verification of the merom microprocessor (AG), pp. 332–337.
DACDAC-2006-LiZJ #concurrent #named #network #proximity
DyXY: a proximity congestion-aware deadlock-free dynamic routing method for network on chip (ML, QAZ, WBJ), pp. 849–852.
DACDAC-2006-MeiR #robust
A robust envelope following method applicable to both non-autonomous and oscillatory circuits (TM, JSR), pp. 1029–1034.
DACDAC-2006-NakamuraTOTY #design #scalability
Budgeting-free hierarchical design method for large scale and high-performance LSIs (YN, MT, TO, ST, KY), pp. 955–958.
DACDAC-2006-TanimotoYNH #realtime #using
A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DACDAC-2006-WuJYLT #estimation #functional
A systematic method for functional unit power estimation in microprocessors (WW, LJ, JY, PL, SXDT), pp. 554–557.
DATEDATE-2006-HosseinabadyBBN #concurrent #testing
A concurrent testing method for NoC switches (MH, AB, MNB, ZN), pp. 1171–1176.
DATEDATE-2006-JerinicLHM #functional #metric #verification
New methods and coverage metrics for functional verification (VJ, JL, UH, DM), pp. 1025–1030.
DATEDATE-2006-KrautzP0TWV #detection #fault #formal method #logic #using
Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
DATEDATE-2006-KunzliPBT #analysis #formal method #performance #simulation
Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
DATEDATE-2006-Liu
A practical method to estimate interconnect responses to variabilities (FL), pp. 545–546.
DATEDATE-2006-MeiR #analysis #performance #using
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-VandersteenBDR
Systematic stability-analysis method for analog circuits (GV, SB, PD, YR), pp. 150–155.
DATEDATE-2006-ZengFSCZC #domain model #order #reduction
Time domain model order reduction by wavelet collocation method (XZ, LF, YS, WC, DZ, CC), pp. 21–26.
DRRDRR-2006-WangDLL #authentication #documentation
A new document authentication method by embedding deformation characters (XW, XD, HL, CL).
VLDBVLDB-2006-RaoDTC #data analysis
A Deferred Cleansing Method for RFID Data Analytics (JR, SD, HT, LSC), pp. 175–186.
CSEETCSEET-2006-FrezzaT #behaviour #student #testing
Testing as a Mental Discipline: Practical Methods for Affecting Student Behavior (STF, MHT), p. 241.
ITiCSEITiCSE-2006-DonyC #education #programming
A tool for helping teach a programming method (ID, BLC), pp. 212–216.
ICSMEICSM-2006-DraganCM #reverse engineering
Reverse Engineering Method Stereotypes (ND, MLC, JIM), pp. 24–34.
ICSMEICSM-2006-NgoT #fault #maintenance
A Method to Aid Recovery and Maintenance of the Input Error Correction Features (MNN, HBKT), pp. 360–369.
ICSMEICSM-2006-ShenM #architecture #named
ESDM — A Method for Developing Evolutionary Scenarios for Analysing the Impact of Historical Changes on Architectural Elements (YS, NHM), pp. 45–54.
ICSMEICSM-2006-TomaszewskiGL #fault #predict
A Method for an Accurate Early Prediction of Faults in Modified Classes (PT, HG, LL), pp. 487–496.
MSRMSR-2006-ZimmermannBLL #mining
Mining additions of method calls in ArgoUML (TZ, SB, CL, VBL), pp. 169–170.
STOCSTOC-2006-AmbainisSW #bound #quantum #theorem #trade-off
A new quantum lower bound method, : with applications to direct product theorems and time-space tradeoffs (AA, RS, RdW), pp. 618–633.
STOCSTOC-2006-FischerRV #adaptation #convergence #performance
Fast convergence to Wardrop equilibria by adaptive sampling methods (SF, HR, BV), pp. 653–662.
FMFM-2006-BacheriniFTZ #formal method
A Story About Formal Methods Adoption by a Railway Signaling Manufacturer (SB, AF, MT, NZ), pp. 179–189.
FMFM-2006-BackesPW #encryption #formal method
Formal Methods and Cryptography (MB, BP, MW), pp. 612–616.
FMFM-2006-Boute #formal method #independence #problem #using
Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FMFM-2006-Mostowski #java #logic #reasoning
Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic (WM), pp. 444–459.
FMFM-2006-Oheimb #formal method #security
Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche (DvO), pp. 592–597.
FMFM-2006-Stephan #formal method #lightweight #plugin #security
Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline (WS), pp. 587–591.
FMFM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented #using
Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
SEFMSEFM-2006-Rushby06a #automation #formal method #named #tutorial
Tutorial: Automated Formal Methods with PVS, SAL, and Yices (JMR), p. 262.
SFMSFM-2006-GuptaGW #hardware #satisfiability #verification
SAT-Based Verification Methods and Applications in Hardware Verification (AG, MKG, CW), pp. 108–143.
CHICHI-2006-GongT #evaluation #fault #metric
A new error metric for text entry method evaluation (JG, PT), pp. 471–474.
CHICHI-2006-GuanLCR #eye tracking
The validity of the stimulated retrospective think-aloud method as measured by eye tracking (ZG, SL, EC, JR), pp. 1253–1262.
CHICHI-2006-ProschowskySJ
An intuitive text input method for touch wheels (MP, NS, NEJ), pp. 467–470.
CHICHI-2006-RotoPKV #mobile #named #visualisation #web
Minimap: a web page visualization method for mobile phones (VR, AP, AK, EV), pp. 35–44.
CSCWCSCW-2006-PalenB
Of pill boxes and piano benches: “home-made” methods for managing medication (LP, SAB), pp. 79–88.
CAiSECAiSE-2006-HaggmarkA #analysis #logic #principle #why
Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
CAiSECAiSE-2006-Saeki #configuration management
Configuration Management in a Method Engineering Context (MS), pp. 384–398.
CAiSECAiSE-2006-ValderasPP #approach #development #towards #web
Towards an End-User Development Approach for Web Engineering Methods (PV, VP, OP), pp. 528–543.
EDOCEDOC-2006-Hashemzadeh #navigation #network #performance
A Fast and Efficient Route Finding Method for Car Navigation Systems with Neural Networks (MH), pp. 423–426.
ICEISICEIS-AIDSS-2006-BoudjeloudP #data mining #interactive #mining
Semi Interactive Method for Data Mining (LB, FP), pp. 3–10.
ICEISICEIS-AIDSS-2006-Grzeszczyk #evaluation #set
Application of the Rough Set Method for Evaluation of Structural Funds Projects (TAG), pp. 202–207.
ICEISICEIS-HCI-2006-CoppolaCMFP #clustering #distance #empirical
A Fuzzy-Based Distance to Improve Empirical Methods for Menu Clustering (CC, GC, SDM, FF, TP), pp. 59–64.
ICEISICEIS-ISAS-2006-BurmesterG #modelling
Method for User Oriented Modelling of Data Warehouse Systems (LB, MG), pp. 366–374.
ICEISICEIS-ISAS-2006-Ohnishi #generative
Supporting Methods of Generating Alternative Scenarios from a Normal Scenario (AO), pp. 110–117.
CIKMCIKM-2006-HlaouaSB #feedback #retrieval #xml
A structure-oriented relevance feedback method for XML retrieval (LH, KS, MB), pp. 780–781.
CIKMCIKM-2006-LuPLA #feature model #identification #machine learning #query
Coupling feature selection and machine learning methods for navigational query identification (YL, FP, XL, NA), pp. 682–689.
CIKMCIKM-2006-TaylorZCRB #multi #optimisation #parametricity #ranking
Optimisation methods for ranking functions with multiple parameters (MJT, HZ, NC, SR, CB), pp. 585–593.
CIKMCIKM-2006-VieiraSPMCF #detection #performance #robust #web
A fast and robust method for web page template detection and removal (KV, ASdS, NP, ESdM, JMBC, JF), pp. 258–267.
ICMLICML-2006-AgarwalHKS #algorithm
Algorithms for portfolio management based on the Newton method (AA, EH, SK, RES), pp. 9–16.
ICMLICML-2006-ChapelleCZ #continuation
A continuation method for semi-supervised SVMs (OC, MC, AZ), pp. 185–192.
ICMLICML-2006-GeurtsWd #kernel
Kernelizing the output of tree-based methods (PG, LW, FdB), pp. 345–352.
ICMLICML-2006-Haffner #kernel #learning #performance
Fast transpose methods for kernel learning on sparse data (PH), pp. 385–392.
ICMLICML-2006-VishwanathanSSM #probability #random
Accelerated training of conditional random fields with stochastic gradient methods (SVNV, NNS, MWS, KPM), pp. 969–976.
ICMLICML-2006-XiaoSB #reduction
A duality view of spectral methods for dimensionality reduction (LX, JS, SPB), pp. 1041–1048.
ICPRICPR-v1-2006-CaoN
New RHT-Based Ellipsoid Recovery Method (CKC, TSN), pp. 622–625.
ICPRICPR-v1-2006-CaparG #concurrent #performance #recognition #segmentation
Concurrent Segmentation and Recognition with Shape-Driven Fast Marching Methods (, MG), pp. 155–158.
ICPRICPR-v1-2006-CayouetteC #realtime
Generic Real-Time Tracking Method on Semi-Dynamic Scenes (FC, JRC), pp. 711–714.
ICPRICPR-v1-2006-ChenCW #complexity #image
LBT Based Low Complexity Image Compression Method (BC, LC, HW), pp. 941–944.
ICPRICPR-v1-2006-IshidaTIMM #generative #identification #learning
Identification of degraded traffic sign symbols by a generative learning method (HI, TT, II, YM, HM), pp. 531–534.
ICPRICPR-v1-2006-KoTSH #image #learning #segmentation
A New Image Segmentation Method for Removing Background of Object Movies by Learning Shape Priors (CHK, YPT, ZCS, YPH), pp. 323–326.
ICPRICPR-v1-2006-NieseAM #estimation #feature model
A Stereo and Color-based Method for Face Pose Estimation and Facial Feature Extraction (RN, AAH, BM), pp. 299–302.
ICPRICPR-v1-2006-SchrotterZ #analysis #image #modelling #multi #robust
Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
ICPRICPR-v1-2006-ViswanathP #clustering #hybrid #performance
l-DBSCAN : A Fast Hybrid Density Based Clustering Method (PV, RP), pp. 912–915.
ICPRICPR-v1-2006-WangCWG #invariant #recognition #verification
A Verification Method for Viewpoint Invariant Sign Language Recognition (QW, XC, CW, WG), pp. 456–459.
ICPRICPR-v1-2006-WangS #robust
Background Subtraction Based on a Robust Consensus Method (HW, DS), pp. 223–226.
ICPRICPR-v1-2006-WuMLC #segmentation
A New Method of Object Segmentation in the Basketball Videos (LW, XM, XL, SC), pp. 319–322.
ICPRICPR-v1-2006-XuS #robust
A Robust and Accurate Method for Pupil Features Extra (ZX, PS), pp. 437–440.
ICPRICPR-v1-2006-ZhangG #human-computer #interface #kernel #locality
A Kernel-based Signal Localization Method for NIRS Brain-computer Interfaces (HZ, CG), pp. 1158–1161.
ICPRICPR-v1-2006-ZhuWCW #classification #human-computer #interface #predict
GMM-Based Classification Method for Continuous Prediction in Brain-Computer Interface (XZ, JW, YC, YW), pp. 1171–1174.
ICPRICPR-v2-2006-ChenS #graph #verification
A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
ICPRICPR-v2-2006-ChouKC #nearest neighbour #reduction
The Generalized Condensed Nearest Neighbor Rule as A Data Reduction Method (CHC, BHK, FC), pp. 556–559.
ICPRICPR-v2-2006-GanLY #analysis #detection
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
ICPRICPR-v2-2006-JiangDR #recognition #string
Substring Alignment Method for Lexicon Based Handwritten Chinese String Recognition and Its Application to Address Line Recognition (YJ, XD, ZR), pp. 683–686.
ICPRICPR-v2-2006-JinM #learning #parametricity #recognition
A Non-Parametric HMM Learning Method for Shape Dynamics with Application to Human Motion Recognition (NJ, FM), pp. 29–32.
ICPRICPR-v2-2006-KelmPM #classification #generative #learning #multi
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning (BMK, CP, AM), pp. 828–832.
ICPRICPR-v2-2006-KoideY #kernel #symmetry
Asymmetric kernel method and its application to Fisher’s discriminant (NK, YY), pp. 820–824.
ICPRICPR-v2-2006-LeL #hybrid
A Hybrid License Plate Extraction Method for Complex Scenes (WL, SL), pp. 324–327.
ICPRICPR-v2-2006-LiLW #feature model #hybrid #ranking
A Hybrid Method of Unsupervised Feature Selection Based on Ranking (YL, BLL, ZFW), pp. 687–690.
ICPRICPR-v2-2006-LuX #estimation
A PDE-Based Method For Optical Flow Estimation (ZL, WX), pp. 78–81.
ICPRICPR-v2-2006-MaceA #documentation #online
A Generic Method for Eager Interpretation of On-Line Handwritten Structured Documents (SM, ÉA), pp. 1106–1109.
ICPRICPR-v2-2006-MahiniKDD #locality #performance
An Efficient Features — Based License Plate Localization Method (HM, SK, FD, FD), pp. 841–844.
ICPRICPR-v2-2006-RaoGSK #image
A Heterogeneous Feature-based Image Alignment Method (CR, YG, HSS, RK), pp. 345–350.
ICPRICPR-v2-2006-SadriSB #clustering #recognition
A New Clustering Method for Improving Plasticity and Stability in Handwritten Character Recognition Systems (JS, CYS, TDB), pp. 1130–1133.
ICPRICPR-v2-2006-ShiratoriGK #performance #using
An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPRICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering #using
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPRICPR-v2-2006-ViswanathJ #clustering #performance
A Fast and Efficient Ensemble Clustering Method (PV, KJ), pp. 720–723.
ICPRICPR-v2-2006-YaslanC #classification #feature model #music #using
Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ), pp. 573–576.
ICPRICPR-v2-2006-ZhengLY #kernel #learning #problem
Weakly Supervised Learning on Pre-image Problem in Kernel Methods (WSZ, JHL, PCY), pp. 711–715.
ICPRICPR-v3-2006-BaudrierMNR #comparison #performance #quantifier
A fast binary-image comparison method with local-dissimilarity quantification (EB, GM, FN, SR), pp. 216–219.
ICPRICPR-v3-2006-ChengC #problem
A Complementary Ordering Method for Class Imbalanced Problem (HTC, CSC), pp. 429–432.
ICPRICPR-v3-2006-FujitaMH #detection
A Method for Crack Detection on a Concrete Structure (YF, YM, YH), pp. 901–904.
ICPRICPR-v3-2006-HuangL #image #using
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPRICPR-v3-2006-JinJL #image #modelling
A Method of Reducing Speckle Noise of SAR Images Based on Wavelets and Wedgelet HMT Models (HyJ, LJ, FL), pp. 635–638.
ICPRICPR-v3-2006-KananFE #locality #performance #recognition #using
An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPRICPR-v3-2006-LenzS
Lie Methods in Color Signal Processing: Illumination Effects (RL, MS), pp. 738–741.
ICPRICPR-v3-2006-NagasakiMKS #adaptation #classification #image
A Coupon Classification Method Based on Adaptive Image Vector Matching (TN, KM, TK, HS), pp. 280–283.
ICPRICPR-v3-2006-PeiLX #detection #information retrieval
A Method For IR Point Target Detection Based on Spatial-temporal Bilateral Filter (JP, ZL, WX), pp. 846–849.
ICPRICPR-v3-2006-PengWT #image #performance
A New Efficient SVM-based Image Registration Method (DP, DW, JWT), pp. 782–785.
ICPRICPR-v3-2006-PozdnoukhovB #graph #invariant #kernel #pattern matching #pattern recognition #recognition
Graph-based transformation manifolds for invariant pattern recognition with kernel methods (AP, SB), pp. 1228–1231.
ICPRICPR-v3-2006-RothausJL #comparison #estimation #parametricity
Comparison of Methods for Hyperspherical Data Averaging and Parameter Estimation (KR, XJ, ML), pp. 395–399.
ICPRICPR-v3-2006-SalmonDW #detection
A new method to detect arcs and segments from curvature profiles (JPS, IDR, LW), pp. 387–390.
ICPRICPR-v3-2006-SuSDW #multimodal #recognition
A Multimodal and Multistage Face Recognition Method for Simulated Portrait (GS, YS, CD, JW), pp. 1013–1017.
ICPRICPR-v3-2006-XieQW
Bootstrap Methods for Reject Rules of Fisher LDA (JX, ZQ, JW), pp. 425–428.
ICPRICPR-v3-2006-ZhengYYWY #agile #feature model #recognition
A Complete and Rapid Feature Extraction Method for Face Recognition (YJZ, JYY, JY, XW, DY), pp. 469–472.
ICPRICPR-v4-2006-ChaiWJZ #novel #recognition
A Novel Human Gait Recognition Method by Segmenting and Extracting the Region Variance Feature (YC, QW, JJ, RZ), pp. 425–428.
ICPRICPR-v4-2006-DuB #image #segmentation
A New Hierarchical Image Segmentation Method (XD, TDB), pp. 108–112.
ICPRICPR-v4-2006-GurevichKMSV #analysis #automation
Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
ICPRICPR-v4-2006-HeCTW
Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
ICPRICPR-v4-2006-KwonYKL #clustering #using
Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPRICPR-v4-2006-LienY #performance #predict