BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (8)
predict (7)
bug (6)
charact (6)
recognit (6)

Stem sever$ (all stems)

53 papers:

SACSAC-2015-ZhangYLC #concept #debugging #mining #predict #repository
Predicting severity of bug report by mining bug repository with concept profile (TZ, GY, BL, ATSC), pp. 1553–1558.
PPoPPPPoPP-2015-TallentVDDKH
Diagnosing the causes and severity of one-sided message contention (NRT, AV, HvD, JD, DJK, AH), pp. 130–139.
ICPRICPR-2014-WuTS #3d #learning #rank
Learning to Rank the Severity of Unrepaired Cleft Lip Nasal Deformity on 3D Mesh Data (JW, RT, LGS), pp. 460–464.
SACSAC-2014-PedrosaP #using
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
CASECASE-2013-ChenZS #metric #using
A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
WCREWCRE-2012-TianLS #classification #debugging #fine-grained #information retrieval #nearest neighbour #predict
Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction (YT, DL, CS), pp. 215–224.
CIKMCIKM-2012-GangadharaiahC #named
PriSM: discovering and prioritizing severe technical issues from product discussion forums (RG, RC), pp. 1627–1631.
MLDMMLDM-2012-KalpakisYHMSSS #analysis #permutation #predict #using
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
CBSECBSE-2011-SaudraisC #automation #component
Automatic relocation of AUTOSAR components among several ECUs (SS, KC), pp. 199–204.
DRRDRR-2011-ChenCL #constraints #identification #using
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
ICDARICDAR-2011-PanZSN #invariant #using
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
CSMRCSMR-2011-LamkanfiDSV #algorithm #debugging #mining #predict
Comparing Mining Algorithms for Predicting the Severity of a Reported Bug (AL, SD, QDS, TV), pp. 249–258.
SACSAC-2011-Fournier-VigerNT #mining #named #sequence
RuleGrowth: mining sequential rules common to several sequences by pattern-growth (PFV, RN, VSMT), pp. 956–961.
CSLCSL-2011-Kieronski #decidability #linear #logic #order
Decidability Issues for Two-Variable Logics with Several Linear Orders (EK), pp. 337–351.
MSRMSR-2010-LamkanfiDGG #debugging #predict
Predicting the severity of a reported bug (AL, SD, EG, BG), pp. 1–10.
ICPRICPR-2010-AlvaroS #recognition
Comparing Several Techniques for Offline Recognition of Printed Mathematical Symbols (FA, JAS), pp. 1953–1956.
ASPLOSASPLOS-2010-ZhangSL #approach #concurrent #debugging #detection #named
ConMem: detecting severe concurrency bugs through an effect-oriented approach (WZ, CS, SL), pp. 179–192.
ISSTAISSTA-2010-DobolyiW #fault #modelling #testing #web
Modeling consumer-perceived web application fault severities for testing (KD, WW), pp. 97–106.
ICDARICDAR-2009-ZhouLT #recognition
Character Recognition under Severe Perspective Distortion (PZ, LL, CLT), pp. 676–680.
CHICHI-2009-Hornof #design
Designing with children with severe motor impairments (AJH), pp. 2177–2180.
ICMLICML-2009-TrespY #dependence #learning #summary #tutorial
Tutorial summary: Learning with dependencies between several response variables (VT, KY), p. 14.
ICMTICMT-2009-Garcia-MagarinoGF #algorithm #generative #model transformation
Model Transformation By-Example: An Algorithm for Generating Many-to-Many Transformation Rules in Several Model Transformation Languages (IGM, JJGS, RFF), pp. 52–66.
CASECASE-2008-PatilS #adaptation #nondeterminism
Adapting product and supply chain systems under severe uncertainty (LP, KS), pp. 285–290.
ICSMEICSM-2008-MenziesM #assessment #automation #fault
Automated severity assessment of software defect reports (TM, AM), pp. 346–355.
ICPRICPR-2008-ChenTZ #classification #novel
Spam filtering with several novel bayesian classifiers (CC, YT, CZ), pp. 1–4.
ICPRICPR-2008-LiT08a #recognition
Character recognition under severe perspective distortion (LL, CLT), pp. 1–4.
ICPRICPR-2008-MerchanOS #identification #image
Identification and pose under severe occlusion in range images (PM, AAO, SS), pp. 1–4.
ICDARICDAR-2007-ChenW #documentation #image #kernel
Exploiting Fisher Kernels in Decoding Severely Noisy Document Images (JC, YW), pp. 417–421.
CHICHI-2005-BlackmonKP #effectiveness #navigation #predict #problem
Tool for accurately predicting website navigation problems, non-problems, problem severity, and effectiveness of repairs (MHB, MK, PGP), pp. 31–40.
CHICHI-2005-HornofC #named
EyeDraw: enabling children with severe motor impairments to draw with their eyes (AJH, AC), pp. 161–170.
RERE-2004-KaiyaOK #case study #diagrams #identification
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems (HK, AO, KK), pp. 112–121.
SACSAC-2004-Calderon-BenavidesGAGD #algorithm #collaboration #comparison #multi #predict
A comparison of several predictive algorithms for collaborative filtering on multi-valued ratings (MLCB, CNGC, JdJPA, JCGD, JD), pp. 1033–1039.
SACSAC-2004-SheldonJ #embedded #reliability
Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems (FTS, KJ), pp. 826–833.
ICDARICDAR-2003-SarkarBZ #image
Training on Severely Degraded Text-Line Images (PS, HSB, XZ), pp. 38–43.
ICPRICPR-v3-2002-GeH #case study #comparative #modelling #recognition #scalability
A Comparative Study of Several Modeling Approaches for Large Vocabulary Offline Recognition of Handwritten Chinese Characters (YG, QH), pp. 85–88.
ICPRICPR-v3-2002-ZhouZ #algorithm #recognition
Face Recognition by Combining Several Algorithms (JZ, DZ), p. 497–?.
SIGIRSIGIR-2002-KeskustaloHA #framework #query
UTACLIR -: general query translation framework for several language pairs (HK, TH, EA), p. 448.
TOOLSTOOLS-USA-2002-MiliMS #aspect-oriented #functional #named
CorbaViews: Distributing objects that support several functional aspects (HM, HM, SS), pp. 207–229.
ICSEICSE-2001-ElbaumMR #fault #testing
Incorporating Varying Test Costs and Fault Severities into Test Case Prioritization (SGE, AGM, GR), pp. 329–338.
ICLPICLP-2001-Colmerauer #approximate #constraints #multi
Solving the Multiplication Constraint in Several Approximation Spaces (AC), p. 1.
UMLUML-2000-DammHTT #strict #uml
Supporting Several Levels of Restriction in the UML (CHD, KMH, MT, MT), pp. 396–409.
HCIHCI-CCAD-1999-BarretoSA #human-computer #interface
Hands-off human-computer interfaces for individuals with severe motor disabilities (AB, SS, MA), pp. 970–974.
IWPCIWPC-1998-DetienneBW #comprehension #object-oriented #programming
The Effect of Object-Oriented Programming Expertise in Several Dimensions of Comprehension Strategies (FD, JMB, SW), pp. 82–89.
PPDPALP-PLILP-1998-SmausHK #logic programming #source code #termination
Termination of Logic Programs with block Declarations Running in Several Modes (JGS, PMH, AK), pp. 73–88.
ASPLOSASPLOS-1998-JacobM #memory management
A Look at Several Memory Management Units, TLB-Refill Mechanisms, and Page Table Organizations (BLJ, TNM), pp. 295–306.
ICDARICDAR-1997-ChungY #comparison #feature model #performance #recognition
Performance comparison of several feature selection methods based on node pruning in handwritten character recognition (KC, JY), pp. 11–15.
ICDARICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification
An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
ICMLICML-1995-Littlestone #algorithm #learning
Comparing Several Linear-threshold Learning Algorithms on Tasks Involving Superfluous Attributes (NL), pp. 353–361.
ICDARICDAR-1993-OhkuraSSH #on the #using
On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
HCIHCI-ACS-1993-Westlander #health #research
The Simultaneous Attack on Several Work Environment Factors — An Organizational Change Project Inspired of Occupational Health Research Findings (GW), pp. 833–838.
HCIHCI-SHI-1993-BorgesBLT #design #education #framework #knowledge base #using
A Framework for Building a Knowledge Based System Using Several Experts — With an Application for Curriculum Design of Engineering Degree Courses (MNB, YB, ML, MTT), pp. 344–349.
CHIINTERCHI-1993-AlmTEN #people
Computer aided conversation for severely physically impaired non-speaking people (NA, JT, LE, AFN), pp. 236–241.
FMVDME-1991-1-Goldschlag #formal method
A Mechanical Formalization of Several Fairness Notions (DMG), pp. 125–148.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.