BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (113)
system (80)
use (70)
learn (60)
test (58)

Stem strategi$ (all stems)

968 papers:

ECSAECSA-2015-Gerostathopoulos #adaptation #cyber-physical
Meta-Adaptation Strategies for Adaptation in Cyber-Physical Systems (IG, TB, PH, AH, FP, DS), pp. 45–52.
CASECASE-2015-0002KL #evaluation
Quantitative evaluation of coarse-to-fine loading strategies for material rehandling (MM, TK, AJL), pp. 450–455.
CASECASE-2015-FantiMRUP #energy #strict
A control strategy for district energy management (MPF, AMM, MR, WU, SP), pp. 432–437.
CASECASE-2015-ForstnerM #optimisation #safety #using
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASECASE-2015-HuangHCC #performance #synthesis
Efficient grasp synthesis and control strategy for robot hand-arm system (MBH, HPH, CCC, CAC), pp. 1256–1257.
CASECASE-2015-KeroglouH #communication #constraints #distributed #using
Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASECASE-2015-SchletteR #assembly
Utilization of motion planning strategies for micro-optical assembly (CS, JR), pp. 781–786.
CASECASE-2015-WangSH #concurrent
A three-stage deadlock prevention strategy for S3PR nets (SW, CS, LH), pp. 286–291.
CASECASE-2015-ZouLLJX #locality #online
A mutual information based online access point selection strategy for WiFi indoor localization (HZ, YL, XL, HJ, LX), pp. 180–185.
DACDAC-2015-RahimiCMGB #clustering #embedded #hardware #memory management #scheduling #variability
Task scheduling strategies to mitigate hardware variability in embedded shared memory clusters (AR, DC, AM, RKG, LB), p. 6.
DATEDATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics #using
Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DocEngDocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary #using
Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DRRDRR-2015-MiouletBCPB #architecture #multi #network #recognition
Exploring multiple feature combination strategies with a recurrent neural network architecture for off-line handwriting recognition (LM, GB, CC, TP, SB).
SIGMODSIGMOD-2015-LiBCGM #named #network #towards
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks (HL, SSB, JC, YG, JM), pp. 1525–1537.
SIGMODSIGMOD-2015-VerroiosLG #crowdsourcing #named
tDP: An Optimal-Latency Budget Allocation Strategy for Crowdsourced MAXIMUM Operations (VV, PL, HGM), pp. 1047–1062.
ITiCSEITiCSE-2015-MishraI #data type #student
Question-Posing strategies used by students for exploring Data Structures (SM, SI), pp. 171–176.
FoSSaCSFoSSaCS-2015-Mamouras #hoare #logic #nondeterminism #synthesis
Synthesis of Strategies and the Hoare Logic of Angelic Nondeterminism (KM), pp. 25–40.
TACASTACAS-2015-BassetKTW #game studies #multi #probability #synthesis
Strategy Synthesis for Stochastic Games with Multiple Long-Run Objectives (NB, MZK, UT, CW), pp. 256–271.
ICSMEICSME-2015-Aniche #detection #development #smell #web
Detection strategies of smells in web software development (MFA), pp. 598–601.
ICALPICALP-v2-2015-ScheweTV #symmetry
Symmetric Strategy Improvement (SS, AT, TV), pp. 388–400.
CHICHI-2015-MitraHG #quality
Comparing Person- and Process-centric Strategies for Obtaining Quality Data on Amazon Mechanical Turk (TM, CJH, EG), pp. 1345–1354.
CHICHI-2015-OttleyYC #how #predict #visualisation
Personality as a Predictor of User Strategy: How Locus of Control Affects Search Strategies on Tree Visualizations (AO, HY, RC), pp. 3251–3254.
HCIHCI-DE-2015-BorzaM #assurance #design #process #usability
Incorporating Marketing Strategies to Improve Usability Assurance in User-Centered Design Processes (ICB, JAM), pp. 152–162.
HCIHIMI-IKC-2015-Frimodt-MollerB #information management
Possible Strategies for Facilitating the Exchange of Tacit Knowledge in a Team of Creative Professionals (SRFM, NB, EPB, YG), pp. 467–475.
HCILCT-2015-Chu #editing
Dual-Coding Strategy for the Chinese Characters Learners: Chinese PCS Editor (CNC), pp. 43–49.
HCISCSM-2015-VillelaXP #collaboration #identification #network
Identifying Collaboration Strategies in Scientific Collaboration Networks (MLBV, SX, ROP), pp. 253–264.
KDDKDD-2015-AdamopoulosT #effectiveness #social #social media
The Effectiveness of Marketing Strategies in Social Media: Evidence from Promotional Events (PA, VT), pp. 1641–1650.
KDDKDD-2015-BegumUWK #clustering #novel
Accelerating Dynamic Time Warping Clustering with a Novel Admissible Pruning Strategy (NB, LU, JW, EJK), pp. 49–58.
KDDKDD-2015-TengTYC #constraints #effectiveness
An Effective Marketing Strategy for Revenue Maximization with a Quantity Constraint (YWT, CHT, PSY, MSC), pp. 1175–1184.
SIGIRSIGIR-2015-MaxwellAJK #adaptation
An Initial Investigation into Fixed and Adaptive Stopping Strategies (DM, LA, KJ, HK), pp. 903–906.
OOPSLAOOPSLA-2015-OhYY #adaptation #learning #optimisation #program analysis
Learning a strategy for adapting a program analysis via bayesian optimisation (HO, HY, KY), pp. 572–588.
SACSAC-2015-AldeaIHQBF #modelling
Modelling strategy with ArchiMate (AA, MEI, JvH, DACQ, LB, HMF), pp. 1211–1218.
SACSAC-2015-HuangSZSXD #privacy #pseudo
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
SACSAC-2015-Messaoud #collaboration #named
Dynamic: a collaborative filtering strategy for assigning examination’s rooms to supervisors (MBM), pp. 264–266.
SACSAC-2015-RighiVRRCFA #parallel #source code
Rescheduling and checkpointing as strategies to run synchronous parallel programs on P2P desktop grids (RdRR, AV, VFR, GR, CAdC, KF, AMA), pp. 501–504.
SACSAC-2015-SugiyamaS #learning #multi
Meta-strategy for cooperative tasks with learning of environments in multi-agent continuous tasks (AS, TS), pp. 494–500.
ICSEICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing #using
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSEICSE-v2-2015-FalknerSVF #development #evolution
Evolution of Software Development Strategies (KEF, CS, RV, NJGF), pp. 243–252.
ICSEICSE-v2-2015-Mead #collaboration #education #industrial #re-engineering
Industry/University Collaboration in Software Engineering Education: Refreshing and Retuning Our Strategies (NRM), pp. 273–275.
ICSEICSE-v2-2015-Ouriques #modelling #testing
Strategies for Prioritizing Test Cases Generated Through Model-Based Testing Approaches (JFSO), pp. 879–882.
ICSEICSE-v2-2015-Szabo #comprehension #maintenance
Novice Code Understanding Strategies during a Software Maintenance Assignment (CS), pp. 276–284.
ASPLOSASPLOS-2015-AgarwalNSOK #memory management
Page Placement Strategies for GPUs within Heterogeneous Memory Systems (NA, DWN, MS, MO, SWK), pp. 607–618.
CADECADE-2015-JacquemardKS #bottom-up #constraints #term rewriting
Term Rewriting with Prefix Context Constraints and Bottom-Up Strategies (FJ, YK, MS), pp. 137–151.
CADECADE-2015-MaricJM #correctness #higher-order #proving #using
Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADECADE-2015-SatoW #dependence #encoding
Encoding Dependency Pair Techniques and Control Strategies for Maximal Completion (HS, SW), pp. 152–162.
CAVCAV-2015-BrazdilCCFK #learning #markov #process
Counterexample Explanation by Learning Small Strategies in Markov Decision Processes (TB, KC, MC, AF, JK), pp. 158–177.
CSLCSL-2015-Klein0 #game studies #lookahead #what
What are Strategies in Delay Games? Borel Determinacy for Games with Lookahead (FK, MZ), pp. 519–533.
LICSLICS-2015-CanavoiGLP #fixpoint #logic
Defining Winning Strategies in Fixed-Point Logic (FC, EG, SL, WP), pp. 366–377.
LICSLICS-2015-CarayolS #game studies #how #question
How Good Is a Strategy in a Game with Nature? (AC, OS), pp. 609–620.
RTARTA-2015-CirsteaLM #encoding #programmable #term rewriting
A faithful encoding of programmable strategies into term rewriting systems (HC, SL, PEM), pp. 74–88.
RTARTA-2015-Kirchner #data analysis #graph
Port Graphs, Rules and Strategies for Dynamic Data Analytics — Extended Abstract (Invited Talk) (HK), pp. 1–4.
TAPTAP-2015-HubnerHP #equivalence #evaluation #novel #testing
Experimental Evaluation of a Novel Equivalence Class Partition Testing Strategy (FH, WlH, JP), pp. 155–172.
ECSAECSA-2014-LewisLP #architecture #bibliography #perspective
Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review (GAL, PL, GP), pp. 154–169.
CASECASE-2014-MurookaNNKOI #learning #physics #scalability
Manipulation strategy learning for carrying large objects based on mapping from object physical property to object manipulation action in virtual environment (MM, SN, SN, YK, KO, MI), pp. 263–270.
CASECASE-2014-NodaMNKOI #behaviour #maintenance #online #predict
Online maintaining behavior of high-load and unstable postures based on whole-body load balancing strategy with thermal prediction (SN, MM, SN, YK, KO, MI), pp. 1166–1171.
DACDAC-2014-RoyMIT #multi #performance
Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves (DBR, DM, MI, JT), p. 6.
DATEDATE-2014-AfacanAFDB #automation #design #modelling #optimisation
Model based hierarchical optimization strategies for analog design automation (EA, SA, FVF, GD, IFB), pp. 1–4.
DATEDATE-2014-DogaruSR #flexibility
A flexible BIST strategy for SDR transmitters (ED, FVdS, WR), pp. 1–6.
DATEDATE-2014-WettinMKYPH #evaluation #network #performance
Performance evaluation of wireless NoCs in presence of irregular network routing strategies (PW, JM, RK, XY, PPP, DHH), pp. 1–6.
DATEDATE-2014-YangHKKCPK #parallel #predict #simulation
Predictive parallel event-driven HDL simulation with a new powerful prediction strategy (SY, JH, DK, NK, DC, JP, JK), pp. 1–3.
VLDBVLDB-2014-BoehmTRSTBV #hybrid #machine learning #parallel #scalability
Hybrid Parallelization Strategies for Large-Scale Machine Learning in SystemML (MB, ST, BR, PS, YT, DB, SV), pp. 553–564.
VLDBVLDB-2014-BrunoKW #distributed #scalability
Advanced Join Strategies for Large-Scale Distributed Computation (NB, YK, MCW), pp. 1484–1495.
CSEETCSEET-2014-BreivoldC #education #in the cloud
Cloud Computing education strategies (HPB, IC), pp. 29–38.
ITiCSEITiCSE-2014-FalknerVF #identification #learning #self
Identifying computer science self-regulated learning strategies (KF, RV, NJGF), pp. 291–296.
ITiCSEITiCSE-2014-WhalleyK
A qualitative think-aloud study of novice programmers’ code writing strategies (JLW, NK), pp. 279–284.
FoSSaCSFoSSaCS-2014-Chatterjee0NV #complexity #game studies #probability
The Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies (KC, LD, SN, MYV), pp. 242–257.
SASSAS-2014-MonniauxS
Speeding Up Logico-Numerical Strategy Iteration (DM, PS), pp. 253–267.
FMFM-2014-AntoninoSW #analysis #concurrent #csp #network #process #refinement
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
CHICHI-2014-MarshallL #self
Searching for myself: motivations and strategies for self-search (CCM, SEL), pp. 3675–3684.
CHICHI-2014-WisniewskiXC #adaptation #comprehension #facebook #timeline
Understanding user adaptation strategies for the launching of facebook timeline (PJW, HX, YC), pp. 2421–2430.
CHICHI-2014-ZhangH #comprehension #modelling #multi
Understanding multitasking through parallelized strategy exploration and individualized cognitive modeling (YZ, AJH), pp. 3885–3894.
CSCWCSCW-2014-Vitak #facebook #maintenance #strict
Facebook makes the heart grow fonder: relationship maintenance strategies among geographically dispersed and communication-restricted connections (JV), pp. 842–853.
CSCWCSCW-2014-YuAKK #comparison #learning #quality #social
A comparison of social, learning, and financial strategies on crowd engagement and output quality (LY, PA, AK, RK), pp. 967–978.
HCIDHM-2014-GuarneriA #design
Active Prevention by Motivating and Engaging Teenagers in Adopting Healthier Lifestyles: — PEGASO Strategy in Designing Future Healthcare Pillars (RG, GA), pp. 351–360.
HCIDHM-2014-ZhangTWHFC #modelling
Modeling Human Control Strategies in Simulated RVD Tasks through the Time-Fuel Optimal Control Model (SZ, YT, CW, SH, YF, SC), pp. 661–670.
HCIDUXU-TMT-2014-ZellerGD #design
basil.js — Bridging Mouse and Code Based Design Strategies (LZ, BG, TD), pp. 686–696.
HCIHCI-AS-2014-Fragoso #design #interface
Interface Design Strategies and Disruptions of Gameplay: Notes from a Qualitative Study with First-Person Gamers (SF), pp. 593–603.
HCIHCI-AS-2014-PortouliP #adaptation #multi
Adaptive Warning Strategies from Multiple Systems: A Simulator Study with Drivers with Different Reaction Times (EP, VP), pp. 485–493.
HCIHIMI-DE-2014-LeeY14a #documentation
Types of Document Search Tasks and Users’ Cognitive Information Seeking Strategies (HEL, WCY), pp. 449–460.
HCIHIMI-DE-2014-LiH
Improving Academic Listening Skills of Second Language by Building up Strategy Object Mashups (HL, SH), pp. 384–395.
HCISCSM-2014-RayaRRP #adaptation #game studies #using
Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
ICEISICEIS-v1-2014-GuilavoguiKF #hybrid
A Hybrid Strategy for Integrating Sensor Information (KG, LK, MF), pp. 281–286.
ICEISICEIS-v1-2014-PintoNH #multi #optimisation
Multi-objective Optimization of Investment Strategies — Based on Evolutionary Computation Techniques, in Volatile Environments (JMP, RFN, NH), pp. 480–488.
ICEISICEIS-v2-2014-ChangS #multi
Cooperation Strategies for Multi-user Transmission in Manhattan Environment (JC, WS), pp. 415–419.
ICEISICEIS-v2-2014-KhashabGAK #comprehension #towards
Scoping Customer Relationship Management Strategy in HEI — Understanding Steps towards Alignment of Customer and Management Needs (BK, SRG, AA, MK), pp. 267–274.
ICEISICEIS-v3-2014-PereiraV #approach #enterprise #named
e-Strategy — An Enterprise Engineer Approach to Strategic Management (RP, AV), pp. 472–477.
CIKMCIKM-2014-RahmanH #network #strict #using
Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
ICPRICPR-2014-BouillonA #classification #evolution #gesture #learning #online
Supervision Strategies for the Online Learning of an Evolving Classifier for Gesture Commands (MB, ÉA), pp. 2029–2034.
ICPRICPR-2014-HuangW #image
A Filtration Strategy Based on FD-CRF for Image Matching (SH, WW), pp. 3286–3291.
ICPRICPR-2014-LiuCVC #classification
Leaf Species Classification Based on a Botanical Shape Sub-classifier Strategy (HL, DC, LV, GC), pp. 1496–1501.
ICPRICPR-2014-LiZ #hybrid
A Nonlocal Filter-Based Hybrid Strategy for Depth Map Enhancement (LL, CZ), pp. 4394–4399.
ICPRICPR-2014-WilliamsCD #automation #human-computer #on the #recognition
On Human Perception and Automatic Target Recognition: Strategies for Human-Computer Cooperation (DPW, MC, SD), pp. 4690–4695.
KDDKDD-2014-DongYTYC #mobile #network #social
Inferring user demographics and social strategies in mobile social networks (YD, YY, JT, YY, NVC), pp. 15–24.
KDDKDD-2014-PolozovG #automation #named #web
LaSEWeb: automating search strategies over semi-structured web data (OP, SG), pp. 741–750.
KMISKMIS-2014-Milakovich #collaboration #quality
Digital Governance and Collaborative Strategies for Improving Service Quality (MEM), pp. 109–118.
MLDMMLDM-2014-AlshdaifatCD #classification #multi
A Multi-path Strategy for Hierarchical Ensemble Classification (EA, FC, KD), pp. 198–212.
MLDMMLDM-2014-AnanpiriyakulPV #classification #multi
Label Correction Strategy on Hierarchical Multi-Label Classification (TA, PP, PV), pp. 213–227.
MLDMMLDM-2014-SandovalH #learning #network #using
Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDMMLDM-2014-UtkinZC #classification #data-driven #database #robust
A Robust One-Class Classification Model with Interval-Valued Data Based on Belief Functions and Minimax Strategy (LVU, YAZ, AIC), pp. 107–118.
SEKESEKE-2014-DalliloAF #approach #multi #process
Making the link between strategy and process model collections: a multi-layered approach (FD, JPdA, MF), pp. 387–392.
SEKESEKE-2014-SantosM #detection #identification
Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SIGIRSIGIR-2014-Voorhees #metric
The effect of sampling strategy on inferred measures (EMV), pp. 1119–1122.
PLATEAUPLATEAU-2014-DornerFM #named
EUKLAS: Supporting Copy-and-Paste Strategies for Integrating Example Code (CD, AF, BAM), pp. 13–20.
SACSAC-2014-CalvoOFR #distributed #multi #parametricity
Parametric investigation of a distributed strategy for multiple agents systems applied to cooperative tasks (RC, JdO, MF, RAR), pp. 207–212.
SACSAC-2014-GraziadioDSSUME #game studies #identification #video
Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation (SG, RD, KS, KMAS, GU, GM, JAE), pp. 20–24.
SACSAC-2014-HusemannR #multi #predict #scalability #video
Introduction of a multi-layer predictive search strategy for scalable video coding (RH, VR), pp. 985–986.
SACSAC-2014-KuhnCJN #flexibility #modelling
Flexible modeling of policy-driven upstream notification strategies (EK, SC, GJ, MN), pp. 1352–1354.
SACSAC-2014-WangEB #evolution #orthogonal
Mirrored orthogonal sampling with pairwise selection in evolution strategies (HW, ME, TB), pp. 154–156.
FSEFSE-2014-SeoK #how #testing
How we get there: a context-guided search strategy in concolic testing (HS, SK), pp. 413–424.
HPCAHPCA-2014-GuevaraLL #design
Strategies for anticipating risk in heterogeneous system design (MG, BL, BCL), pp. 154–164.
HPDCHPDC-2014-BeaumontM #analysis #matrix #multi #scheduling
Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
CAVCAV-2014-CermakLMM #logic #model checking #named #specification #verification
MCMAS-SLK: A Model Checker for the Verification of Strategy Logic Specifications (PC, AL, FM, AM), pp. 525–532.
ICSTICST-2014-LiO #analysis #empirical #modelling #testing
An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
IJCARIJCAR-2014-EchenimPT #equation #logic
A Rewriting Strategy to Generate Prime Implicates in Equational Logic (ME, NP, ST), pp. 137–151.
LICSLICS-CSL-2014-Velner #multi #robust #synthesis
Finite-memory strategy synthesis for robust multidimensional mean-payoff objectives (YV), p. 10.
CASECASE-2013-MuZ #research
Research on sensing strategy for exoskeleton robot control (TM, XZ), pp. 546–549.
CASECASE-2013-QiaoMG #algorithm #data-driven #scheduling
Attribute selection algorithm of data-based scheduling strategy for semiconductor manufacturing (FQ, YM, XG), pp. 410–415.
DATEDATE-2013-EbrahimiDP #3d #algorithm #fault tolerance #using
Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATEDATE-2013-ShenQ #energy #performance #smarttech #streaming #video
User-aware energy efficient streaming strategy for smartphone based video playback applications (HS, QQ), pp. 258–261.
ICDARICDAR-2013-ShivramZSNG #online #random #recognition #segmentation #word
Segmentation Based Online Word Recognition: A Conditional Random Field Driven Beam Search Strategy (AS, BZ, SS, MN, VG), pp. 852–856.
VLDBVLDB-2013-CherniakZZ #optimisation #testing
Optimization Strategies for A/B Testing on HADOOP (AC, HZ, VZ), pp. 973–984.
CSEETCSEET-2013-LongstreetC #development #education #re-engineering
Positive transitions from the classroom to the cubicle: Creating strategies for augmenting professional development in the software engineering curriculum (CSL, KMLC), pp. 365–367.
ITiCSEITiCSE-WGR-2013-KorhonenNBCKMMM #design #interactive #open source #requirements
Requirements and design strategies for open source interactive computer science eBooks (AK, TLN, CB, PC, VK, LM, BM, BM, SHR, RR, CAS), pp. 53–72.
FoSSaCSFoSSaCS-2013-Winskel
Strategies as Profunctors (GW), pp. 418–433.
CSMRCSMR-2013-BertranGCS #architecture #detection
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
ICSMEICSM-2013-SchwartzD #effectiveness #fuzzy #testing
A Fuzzy Expert System for Cost-Effective Regression Testing Strategies (AS, HD), pp. 1–10.
MSRMSR-2013-GreilerZDS #evolution #smell
Strategies for avoiding text fixture smells during software evolution (MG, AZ, AvD, MADS), pp. 387–396.
ICALPICALP-v2-2013-Gelderie #composition #game studies
Strategy Composition in Compositional Games (MG), pp. 263–274.
GT-VMTGT-VMT-2013-TeusnerGRK #behaviour #interactive #modelling #validation
Interactive Strategy-Based Validation of Behavioral Models (RT, GG, SR, SK).
CHICHI-2013-FasteRES #design #distributed #human-computer
Brainstorm, Chainstorm, Cheatstorm, Tweetstorm: new ideation strategies for distributed HCI design (HF, NR, RE, ES), pp. 1343–1352.
HCIDUXU-NTE-2013-TeixeiraVDNRS #artificial reality #development #interface
Strategy for the Development of a Walk-In-Place Interface for Virtual Reality (LT, EV, ED, PN, FR, FMdS), pp. 419–426.
HCIDUXU-PMT-2013-ChiuT #design #effectiveness #idea #network #process #social
User Involvement in Idea Brainstorming of Design Process: Finding the Effective Strategy in Social Network Service (SCC, KT), pp. 593–598.
HCIDUXU-WM-2013-JangJ #case study #design
Studies on the Design Marketing Strategies in the Experiential Economy through the Case Study of “the Starbucks Company” (YJJ, ECJ), pp. 30–36.
HCIDUXU-WM-2013-OzturkR #implementation #information management #navigation #web
Selection and Implementation of Navigation and Information Search Strategies in Bank Web Sites: Turkish Case (ÖÖ, KR), pp. 284–293.
HCIHCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech #using
A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
HCIHCI-UC-2013-Brouwers #comparison #hypermedia #navigation #physics
Search Strategies in Hypermedia Navigation and Spatial Abilities: A Comparison with Physical Navigation (AB), pp. 136–145.
HCIHIMI-HSM-2013-BattisteCMSVCS #automation #student #tool support
The Effects of Early Training with Automation Tools on the Air Traffic Management Strategies of Student ATCos (HB, WC, TM, KS, KPLV, DC, TZS), pp. 13–21.
HCIHIMI-LCCB-2013-SatonakaS #mining #visualisation
Sales Strategy Mining System with Visualization of Action History (HS, WS), pp. 588–597.
HCIHIMI-LCCB-2013-Tanaka-YamawakiI #prototype
Finding a Prototype Form of Sustainable Strategies for the Iterated Prisoners Dilemma (MTY, RI), pp. 616–624.
ICEISICEIS-v1-2013-CoutinhoPB #energy #scheduling
A Scheduling Strategy for Global Scientific Grids — Minimizing Simultaneously Time and Energy Consumption (FC, LLP, CTB), pp. 545–553.
ICEISICEIS-v1-2013-RibeiroRBFE #coordination #policy
Updating Strategies of Policies for Coordinating Agent Swarm in Dynamic Environments (RR, AFR, MACB, FF, FE), pp. 345–356.
CIKMCIKM-2013-TongWL #web
Latency-aware strategy for static list caching in flash-based web search engines (JT, GW, XL), pp. 1209–1212.
KDDKDD-2013-LuceyOCRM #using
Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
KDIRKDIR-KMIS-2013-GonzagaLSO #case study #performance
Performance Indicators and their Relationship with Organizational Strategy — A Study in Brazilian Companies (RPG, ATMdL, FdAeS, MPVdO), pp. 559–566.
SEKESEKE-2013-RamosRO #process #source code #towards
Towards a strategy for analysing benefits of Software Process Improvement programs (CSR, ARR, KMdO), pp. 638–643.
SEKESEKE-2013-YuFCL #in the cloud #modelling
Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
SIGIRSIGIR-2013-Galuscakova #documentation #retrieval #segmentation
Segmentation strategies for passage retrieval in audio-visual documents (PG), p. 1143.
OOPSLAOOPSLA-2013-BolzDT
Storage strategies for collections in dynamically typed languages (CFB, LD, LT), pp. 167–182.
POPLPOPL-2013-Goyet #calculus
The λ λ-Bar calculus: a dual calculus for unconstrained strategies (AG), pp. 155–166.
RERE-2013-RempelMK #empirical #traceability
An empirical study on project-specific traceability strategies (PR, PM, TK), pp. 195–204.
SACSAC-2013-CamposFHV #personalisation #query #ranking #using #xml
XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SACSAC-2013-MaiaB #modelling #network #performance #predict #query
Sensor-field modeling based on in-network data prediction: an efficient strategy for answering complex queries in wireless sensor networks (JEBM, AB), pp. 554–559.
SACSAC-2013-MeloC #automation #case study #difference #evolution #generative
Automatic generation of evolutionary operators: a study with mutation strategies for the differential evolution (VVdM, GLCC), pp. 188–193.
SACSAC-2013-MouraMNS #named #network #novel
ABOI: a novel strategy to mitigate the blocking due to outdated information in OCS/OBS network (IM, FM, JMN, ACBS), pp. 640–645.
SACSAC-2013-PapadakisT #classification #mutation testing #testing #using
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
ICSEICSE-2013-ApelRWGB #case study #product line #verification
Strategies for product-line verification: case studies and experiments (SA, AvR, PW, AG, DB), pp. 482–491.
ICSEICSE-2013-LiuYCY #monitoring #novel #parallel #process
Selecting checkpoints along the time line: a novel temporal checkpoint selection strategy for monitoring a batch of parallel business processes (XL, YY, DC, DY), pp. 1281–1284.
ICSEICSE-2013-ZhangH0RM #testing
Bridging the gap between the total and additional test-case prioritization strategies (LZ, DH, LZ, GR, HM), pp. 192–201.
SPLCSPLC-2013-MannionS #architecture #product line #requirements
Aligning product line business and technical strategies: mapping product line requirements to a product line architecture (MM, JS), p. 278.
PPoPPPPoPP-2013-0003CTT #configuration management #scheduling
Work-stealing with configurable scheduling strategies (MW, DC, JLT, PT), pp. 315–316.
CSLCSL-2013-Mellies #game studies #on the
On dialogue games and coherent strategies (PAM), pp. 540–562.
ICLPICLP-J-2013-KaminskiSSV #logic #network
Minimal intervention strategies in logical signaling networks with ASP (RK, TS, AS, SV), pp. 675–690.
ICSTICST-2013-GreilerDS #automation #detection #smell
Automated Detection of Test Fixture Strategies and Smells (MG, AvD, MADS), pp. 322–331.
LICSLICS-2013-MogaveroMS #behaviour #bound #on the
On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
VMCAIVMCAI-2013-SchrammelS
Logico-Numerical Max-Strategy Iteration (PS, PS), pp. 414–433.
CASECASE-2012-ChenC #collaboration
An expert decision-making strategy based on collaborative cloud system (CCC, APC), pp. 777–781.
CASECASE-2012-DotoliFIR #agile #modelling #simulation #using
A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASECASE-2012-FantiIMU #case study #design #evaluation #performance
A three level strategy for the design and performance evaluation of Hospital Departments: A case study (MPF, GI, AMM, WU), pp. 323–328.
CASECASE-2012-LakshmiNBSSBV #reduction
A strategy-proof and budget balanced mechanism for carbon footprint reduction by global companies (LUL, YN, DB, PS, SVS, SB, NV), pp. 64–69.
CASECASE-2012-SchmidtH #automation #data transformation #fault
Managing data for a zero defect production — the contribution of manufacturing automation to a corporate strategy (GS, TH), pp. 70–73.
CASECASE-2012-ZhangXG #implementation
Promise surgery start times and implementation strategies (ZZ, XX, NG), pp. 143–149.
DACDAC-2012-0001AG #memory management #realtime #runtime
Run-time power-down strategies for real-time SDRAM memory controllers (KC, BA, KG), pp. 988–993.
DACDAC-2012-Seok #design
Decoupling capacitor design strategy for minimizing supply noise of ultra low voltage circuits (MS), pp. 968–973.
DACDAC-2012-WangBDS #memory management #metadata #named #reliability
Meta-Cure: a reliability enhancement strategy for metadata in NAND flash memory storage systems (YW, LADB, NDD, ZS), pp. 214–219.
DATEDATE-2012-WangBSD #3d #memory management #named
3D-FlashMap: A physical-location-aware block mapping strategy for 3D NAND flash memory (YW, LADB, ZS, NDD), pp. 1307–1312.
DATEDATE-2012-ZimmermannBR #analysis #multi #power management
Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
SIGMODSIGMOD-2012-OhKKL #sorting
Reducing cache misses in hash join probing phase by pre-sorting strategy (abstract only) (GHO, JMK, WHK, SWL), p. 864.
ITiCSEITiCSE-2012-Bunimovich #education #problem
Teachers’ perception of teaching problem-solving strategies to novices (LB), p. 393.
WRLAWRLA-2012-BruniCGLV #adaptation #maude #modelling #self
Modelling and Analyzing Adaptive Self-assembly Strategies with Maude (RB, AC, FG, ALL, AV), pp. 118–138.
ICALPICALP-v1-2012-AmbainisBBKOSV #game studies #quantum
Quantum Strategies Are Better Than Classical in Almost Any XOR Game (AA, AB, KB, DK, RO, JS, MV), pp. 25–37.
SEFMSEFM-2012-CiobanuKS #semantics
A Timed Mobility Semantics Based on Rewriting Strategies (GC, MK, LJS), pp. 141–155.
CHICHI-2012-JianuL #evaluation #how #user interface
An evaluation of how small user interface changes can improve scientists’ analytic strategies (RJ, DHL), pp. 2953–2962.
CHICHI-2012-TeradaYI #adaptation #game studies
Experimental investigation of human adaptation to change in agent’s strategy through a competitive two-player game (KT, SY, AI), pp. 2807–2810.
CHICHI-2012-WillettHA #crowdsourcing #data analysis #social
Strategies for crowdsourcing social data analysis (WW, JH, MA), pp. 227–236.
CHICHI-2012-ZiemkiewiczGL #analysis #graph #visualisation
Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
CAiSECAiSE-2012-DaskalakiP #approach #multi
OtO Matching System: A Multi-strategy Approach to Instance Matching (ED, DP), pp. 286–300.
EDOCEDOC-2012-BinzLNS #analysis #enterprise #graph transformation #segmentation
Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
EDOCEDOC-2012-IacobQJ #architecture #enterprise
Capturing Business Strategy and Value in Enterprise Architecture to Support Portfolio Valuation (MEI, DACQ, HJ), pp. 11–20.
ICEISICEIS-J-2012-AversanoGT12a #bibliography
A Literature Review of Business/IT Alignment Strategies (LA, CG, MT), pp. 471–488.
ICEISICEIS-v1-2012-ClavijoQG #health #named
DISEArch — A Strategy for Searching Electronic Medical Health Records (DEPC, APQ, RAG), pp. 151–156.
ICEISICEIS-v3-2012-AversanoGT #framework
A Characterization Framework for Evaluating Business/IT Alignment Strategies (LA, CG, MT), pp. 155–164.
CIKMCIKM-2012-CuiMWGL #image #keyword #semantics
Semantically coherent image annotation with a learning-based keyword propagation strategy (CC, JM, SW, SG, TL), pp. 2423–2426.
ECIRECIR-2012-AliciAOCU #adaptation #query #web
Adaptive Time-to-Live Strategies for Query Result Caching in Web Search Engines (SA, ISA, RO, BBC, ÖU), pp. 401–412.
ECIRECIR-2012-OzcanAU #information management #lazy evaluation #web
In Praise of Laziness: A Lazy Strategy for Web Information Extraction (RO, ISA, ÖU), pp. 565–568.
ICPRICPR-2012-KongW #clustering #learning #multi
A multi-task learning strategy for unsupervised clustering via explicitly separating the commonality (SK, DW), pp. 771–774.
ICPRICPR-2012-PinquierKLGMBGD #multi #process #recognition #smarttech
Strategies for multiple feature fusion with Hierarchical HMM: Application to activity recognition from wearable audiovisual sensors (JP, SK, LL, PG, RM, JBP, YG, JFD), pp. 3192–3195.
KDIRKDIR-2012-dAciernoLSV #performance #retrieval
An Efficient Strategy for Spatio-temporal Data Indexing and Retrieval (Ad, ML, AS, MV), pp. 227–232.
KEODKEOD-2012-RuizHM #education #evaluation #learning #ontology #quality
A New Proposal for Learning Objects Quality Evaluation in Learning Strategies based on Ontology for Education (LMGR, JMH, AMG), pp. 373–376.
KMISKMIS-2012-VanharantaK #ontology
Strategy Needs Structure — Structure Needs Ontologies — Dynamic Ontologies Carry Meanings (HV, JK), pp. 261–264.
KRKR-2012-Huang12a #constraints #simulation
Search Strategy Simulation in Constraint Booleanization (JH).
MLDMMLDM-2012-HoaD #learning
A New Learning Strategy of General BAMs (NTH, TDB), pp. 213–221.
OnwardOnward-2012-LohSC #abstraction #composition
Managed data: modular strategies for data abstraction (AL, TvdS, WRC), pp. 179–194.
SPLCSPLC-2012-NohrerBE #comparison #consistency #nondeterminism
A comparison of strategies for tolerating inconsistencies during decision-making (AN, AB, AE), pp. 11–20.
PPoPPPPoPP-2012-BaskaranVML #automation #communication #memory management #optimisation #reuse
Automatic communication optimizations through memory reuse strategies (MMB, NV, BM, RL), pp. 277–278.
CSLCSL-2012-Berardid #learning
Knowledge Spaces and the Completeness of Learning Strategies (SB, Ud), pp. 77–91.
CSLCSL-2012-GradelL #game studies
Banach-Mazur Games with Simple Winning Strategies (EG, SL), pp. 305–319.
ICSTICST-2012-FraserA #search-based #testing
The Seed is Strong: Seeding Strategies in Search-Based Software Testing (GF, AA), pp. 121–130.
ASEASE-2011-InsaS #algorithm #debugging
An optimal strategy for algorithmic debugging (DI, JS), pp. 203–212.
ASEASE-2011-WinbladhR #testing
Evaluating test selection strategies for end-user specified flow-based applications (KW, AR), pp. 400–403.
DACDAC-2011-HsuCHKD #file system #reliability
A version-based strategy for reliability enhancement of flash file systems (PHH, YHC, PCH, TWK, DHCD), pp. 29–34.
DACDAC-2011-SeokJCBS #design #energy #performance #pipes and filters
Pipeline strategy for improving optimal energy efficiency in ultra-low voltage design (MS, DJ, CC, DB, DS), pp. 990–995.
DACDAC-2011-XuLY #design #power management
Decoupling for power gating: sources of power noise and design strategies (TX, PL, BY), pp. 1002–1007.
DATEDATE-2011-BoosNSHHGKS #analysis
Strategies for initial sizing and operating point analysis of analog circuits (VB, JN, MS, SH, SH, HG, DK, RS), pp. 1672–1674.
ICDARICDAR-2011-BurgerKP #recognition #word
Dempster-Shafer Based Rejection Strategy for Handwritten Word Recognition (TB, YK, TP), pp. 528–532.
VLDBVLDB-2011-FontouraJLVZZ #evaluation #query
Evaluation Strategies for Top-k Queries over Memory-Resident Inverted Indexes (MF, VJ, JL, SV, XZ, JYZ), pp. 1213–1224.
CSEETCSEET-2011-BrownNOKL #game studies
Hard choice: A game for balancing strategy for agility (NB, RLN, IO, PK, EL), p. 553.
CSEETCSEET-2011-ChookittikulM #collaboration #effectiveness #security
Effective real-world project collaboration: Strategies from a cyber security degree program (WC, PEM), pp. 429–433.
CSEETCSEET-2011-GannodABB #communication #education #integration #question #re-engineering
Is integration of communication and technical instruction across the SE curriculum a viable strategy for improving the real-world communication abilities of software engineering graduates? (GCG, PVA, JEB, AB), pp. 525–529.
ITiCSEITiCSE-2011-MartinezC #algebra #education #relational
A cooperative learning-based strategy for teaching relational algebra (AM, AC), pp. 263–267.
ESOPESOP-2011-GawlitzaM #smt
Improving Strategies via SMT Solving (TMG, DM), pp. 236–255.
FASEFASE-2011-EhrigET #graph #using #version control
A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
ICPCICPC-J-2009-ParninR11 #programming
Resumption strategies for interrupted programming tasks (CP, SR), pp. 5–34.
ICSMEICSM-2011-HouP #api #code completion #evaluation #sorting
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
ICSMEICSM-2011-NishizonoMVM #comprehension #empirical #evolution #industrial #maintenance #metric #predict #source code
Source code comprehension strategies and metrics to predict comprehension effort in software maintenance and evolution tasks — an empirical study with industry practitioners (KN, SM, RV, KiM), pp. 473–481.
IFMIFM-J-2009-SchneiderT11 #csp #interface #refinement
Changing system interfaces consistently: A new refinement strategy for CSP||B (SS, HT), pp. 837–860.
CHICHI-2011-KannabiranBB #how #human-computer #research
How HCI talks about sexuality: discursive strategies, blind spots, and opportunities for future research (GK, JB, SB), pp. 695–704.
CHICHI-2011-Kaye #self
Self-reported password sharing strategies (JK), pp. 2619–2622.
CHICHI-2011-KuznetsovTKHPS #bound
Breaking boundaries: strategies for mentoring through textile computing workshops (SK, LCT, CK, IH, EP, DPS), pp. 2957–2966.
HCIDUXU-v1-2011-SirotkinM #difference #experience #in the cloud #user interface #why
The New Experience for Business: Why User Experience Is the Differentiation Strategy in the Cloud Context (AS, BM), pp. 491–499.
HCIHCI-DDA-2011-YinR #elicitation #induction
An Inductive Inference Model to Elicit Noncompensatory Judgment Strategies (JY, LR), pp. 414–422.
HCIHCI-UA-2011-Fox #architecture
Self Replicating Robotic Strategies as a Catalyst for Autonomous Architectural Construction (MAF), pp. 307–317.
HCIHCI-UA-2011-HuangCLHYCCT #comprehension
Effects of Print-Storybooks and E-Storybooks with Reading Comprehension Strategies on Fifth Graders’ Reading Comprehension Ability (HSH, SLC, YML, HCH, CYY, YYC, CLC, YYT), pp. 570–579.
ICEISICEIS-v1-2011-MakkiAGJ #evaluation #performance #query #semantics
Performance Evaluation of Query Trimming Strategies in Semantic Caching Environment (SKM, SA, YG, MSJ), pp. 169–176.
ICEISICEIS-v3-2011-Zang #development #multimodal #research
Research on International Multimodal Transport Development Strategy in China (XZ), pp. 333–336.
ICEISICEIS-v3-2011-Zhao #analysis #contest #industrial
The Competitive Strategy Analysis of Express Industry based on Time-based Competition (JZ), pp. 502–506.
ICEISICEIS-v4-2011-OndoaDS #case study #evaluation #industrial #process
A Cross Industry Evaluation of Critical Success Factors for Alignment of Strategy and Business Processes — A Case Study of SMEs in the Region of Jönköping in Sweden (MNEO, FAD, US), pp. 338–347.
CIKMCIKM-2011-BarbosaB #crawling #modelling
Focusing on novelty: a crawling strategy to build diverse language models (LB, SB), pp. 755–764.
ECIRECIR-2011-BadrinathVM #query #summary #using
Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
ECIRECIR-2011-BuffoniTG #ranking
The Importance of the Depth for Text-Image Selection Strategy in Learning-To-Rank (DB, ST, PG), pp. 743–746.
KMISKMIS-2011-TangPI #behaviour
Employees’ Innovation Behavior — The Role of External Information Awareness and Proactiveness of Innovation Strategy (JT, LGP, JI), pp. 5–17.
MLDMMLDM-2011-Sullins #smarttech
Exploration Strategies for Learned Probabilities in Smart Terrain (JS), pp. 224–238.
SEKESEKE-2011-KhoshgoftaarGN #case study #comparative #predict #quality
A Comparative Study of Different Strategies for Predicting Software Quality (TMK, KG, AN), pp. 65–70.
SIGIRSIGIR-2011-DingGIKN #quality
Indexing strategies for graceful degradation of search quality (SD, SG, SI, KK, AN), pp. 575–584.
SIGIRSIGIR-2011-TonellottoMO #order #retrieval
Effect of different docid orderings on dynamic pruning retrieval strategies (NT, CM, IO), pp. 1179–1180.
LOPSTRLOPSTR-2011-FernandezKN #graph grammar
A Strategy Language for Graph Rewriting (MF, HK, ON), pp. 173–188.
SACSAC-2011-CollavizzaVRDG #constraints #generative
A dynamic constraint-based BMC strategy for generating counterexamples (HC, NLV, MR, SD, TG), pp. 1633–1638.
SACSAC-2011-HuLCHXL #image #segmentation #using
Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
SACSAC-2011-LucenaCSAS #architecture #modelling #named #requirements
Stream: a strategy for transition between requirements models and architectural models (ML, JC, CTLLS, FMRA, ES), pp. 699–704.
SACSAC-2011-MonfroyCCF #adaptation
Adaptive hybridization strategies (EM, CC, BC, CF), pp. 922–923.
LDTALDTA-2011-MametjanovWL #precise #type system
More precise typing of rewrite strategies (AM, VLW, RL), p. 3.
SPLCSPLC-2011-Bosch #architecture #ecosystem
Software Ecosystems — Implications for Strategy, Business Model and Architecture (JB), p. 351.
CGOCGO-2011-SanchezASPS #compilation #using
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
ICLPICLP-J-2011-AreiasR #evaluation #logic programming #on the #source code
On combining linear-based strategies for tabled evaluation of logic programs (MA, RR), pp. 681–696.
ICSTICST-2011-SantelicesH #testing
Applying aggressive propagation-based strategies for testing changes (RAS, MJH), pp. 11–20.
LICSLICS-2011-RideauW #concurrent
Concurrent Strategies (SR, GW), pp. 409–418.
CASECASE-2010-BonillaGCMLCZ #industrial
A vision-based, impedance control strategy for industrial robot manipulators (IB, EJGG, CACO, MOM, ALF, FRC, BZ), pp. 216–221.
CASECASE-2010-KimHS #outsourcing
Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
DATEDATE-2010-AlordaTBS #power management
Static and dynamic stability improvement strategies for 6T CMOS low-power SRAMs (BA, GT, SAB, JS), pp. 429–434.
DATEDATE-2010-RickettsSRVP #power management
Investigating the impact of NBTI on different power saving cache strategies (AJR, JS, KR, NV, DKP), pp. 592–597.
DocEngDocEng-2010-Hassan #algorithm #evaluation #recognition #towards
Towards a common evaluation strategy for table structure recognition algorithms (TH), pp. 255–258.
VLDBVLDB-2010-ChengLYLLX #database #effectiveness #scalability
Explore or Exploit? Effective Strategies for Disambiguating Large Databases (RC, EL, XSY, MHL, XL, XX), pp. 815–825.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition #using
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
ICPCICPC-2010-BeronPOC #problem
SVS, BORS, SVSi: Three Strategies to Relate Problem and Program Domains (MMB, MJVP, NO, DCdC), pp. 60–61.
CHICHI-2010-ChinF #difference #interactive #interface #performance
Interactive effects of age and interface differences on search strategies and performance (JC, WTF), pp. 403–412.
CHICHI-2010-DornG #design #learning #programming #web
Learning on the job: characterizing the programming knowledge and learning strategies of web designers (BD, MG), pp. 703–712.
CHICHI-2010-ForlizziBS #collaboration #design #interactive #navigation
Where should i turn: moving from individual to collaborative navigation strategies to inform the interaction design of future navigation systems (JF, WCB, TS), pp. 1261–1270.
CHICHI-2010-GrigoreanuBR #approach #debugging #design #tool support
A strategy-centric approach to the design of end-user debugging tools (VG, MMB, GGR), pp. 713–722.
CHICHI-2010-NieuwenhuizenAM
Insight into goal-directed movement strategies (KN, DA, JBM), pp. 883–886.
ICEISICEIS-AIDSS-2010-CacoveanuBP #framework #predict
Evaluating Prediction Strategies in an Enhanced Meta-learning Framework (SC, CVB, RP), pp. 148–156.
ICEISICEIS-AIDSS-2010-GilS #implementation #performance #process #using
Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICEISICEIS-AIDSS-2010-MasvoulaKM #bibliography #learning
A Review of Learning Methods Enhanced in Strategies of Negotiating Agents (MM, PK, DM), pp. 212–219.
ICEISICEIS-DISI-2010-SandeSMFH #named
PW-Plan — A Strategy to Support Iteration-based Software Planning (DS, AS, RM, SF, EMH), pp. 66–74.
ICEISICEIS-J-2010-PotoleaCL #evaluation #framework #predict
Meta-learning Framework for Prediction Strategy Evaluation (RP, SC, CL), pp. 280–295.
ICEISICEIS-J-2010-SandeSMFH10a #agile #paradigm
A Strategy to Support Software Planning Based on Piece of Work and Agile Paradigm (DS, AS, RM, SF, EMH), pp. 104–118.
CIKMCIKM-2010-CoffmanW #database #framework #keyword
A framework for evaluating database keyword search strategies (JC, ACW), pp. 729–738.
CIKMCIKM-2010-DondioB #comparison
Comparison of six aggregation strategies to compute users’ trustworthiness (PD, SB), pp. 1773–1776.
CIKMCIKM-2010-TripathyBM #case study #network #social
A study of rumor control strategies on social networks (RMT, AB, SM), pp. 1817–1820.
ICPRICPR-2010-AbdalaWJ #clustering #random
Ensemble Clustering via Random Walker Consensus Strategy (DDA, PW, XJ), pp. 1433–1436.
ICPRICPR-2010-CaronJC #estimation #image #multi
Search Strategies for Image Multi-distortion Estimation (ALC, PMJ, CC), pp. 2824–2827.
ICPRICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition #using
A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
ICPRICPR-2010-DuboisPM #adaptation #analysis #component #composition #using
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-FausserS #approximate #learning
Learning a Strategy with Neural Approximated Temporal-Difference Methods in English Draughts (SF, FS), pp. 2925–2928.
ICPRICPR-2010-PlazaP #image #order
Impact of Vector Ordering Strategies on Morphological Unmixing of Remotely Sensed Hyperspectral Images (AP, JP), pp. 4412–4415.
ICPRICPR-2010-SoltanaACA #adaptation #algorithm #search-based #using
Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
ICPRICPR-2010-VajdaF #network #performance
Exploring Pattern Selection Strategies for Fast Neural Network Training (SV, GAF), pp. 2913–2916.
RecSysRecSys-2010-BerkovskyF #analysis #recommendation
Group-based recipe recommendations: analysis of data aggregation strategies (SB, JF), pp. 111–118.
SEKESEKE-2010-XuDWG #evaluation #fault #locality
An Evaluation of Tie-Breaking Strategies for Fault Localization Techniques (XX, VD, WEW, DG), pp. 123–128.
OOPSLAOOPSLA-2010-JinTLL #concurrent #debugging
Instrumentation and sampling strategies for cooperative concurrency bug isolation (GJ, AVT, BL, SL), pp. 241–255.
SACSAC-2010-JiaLLZ #satisfiability
Local lemma: a new strategy of pruning in SAT solvers (XJ, RL, SL, JZ), pp. 2071–2072.
SACSAC-2010-Kulic #adaptation #relational #xml
Adaptability in XML-to-relational mapping strategies (LK), pp. 1674–1679.
SACSAC-2010-MarascuML #approximate #performance #set #streaming
A fast approximation strategy for summarizing a set of streaming time series (AM, FM, YL), pp. 1617–1621.
SPLCSPLC-2010-Jarzabek #product line #variability
Pragmatic Strategies for Variability Management in Product Lines in Small- to Medium-Size Companies (SJ), pp. 503–504.
SPLCSPLC-2010-MannionS #product line
Aligning Business and Technical Strategies for Software Product Lines (MM, JS), pp. 406–419.
SPLCSPLC-2010-TekinerdoganTS #approach #classification #multi #product line
Multidimensional Classification Approach for Defining Product Line Engineering Transition Strategies (BT, ET, ES), pp. 461–465.
CCCC-2010-Hoflehner
Strategies for Predicate-Aware Register Allocation (GH), pp. 185–204.
CGOCGO-2010-WangCDLFY #adaptation #scheduling
An adaptive task creation strategy for work-stealing scheduling (LW, HC, YD, FL, XF, PCY), pp. 266–277.
HPDCHPDC-2010-ChenSTS #optimisation
A layout-aware optimization strategy for collective I/O (YC, HS, RT, XHS), pp. 360–363.
ICSTICST-2010-Kasurinen #process #testing
Elaborating Software Test Processes and Strategies (JK), pp. 355–358.
ICSTICST-2010-PerrouinSKBT #automation #generative #product line #scalability #testing
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines (GP, SS, JK, BB, YLT), pp. 459–468.
ICSTICST-2010-YanCZZZ #clustering #execution
A Dynamic Test Cluster Sampling Strategy by Leveraging Execution Spectra Information (SY, ZC, ZZ, CZ, YZ), pp. 147–154.
ASEASE-2009-AletiGMM #deployment #optimisation
Let the Ants Deploy Your Software — An ACO Based Deployment Optimisation Strategy (AA, LG, IM, IM), pp. 505–509.
CASECASE-2009-DayamaJ #multi
Multi-strategy supplier selection for commodity sourcing (PSD, BJ), pp. 19–24.
DACDAC-2009-Bertacco #debugging
Debugging strategies for mere mortals (VB), pp. 635–638.
DACDAC-2009-ChangK #performance #reliability
A commitment-based management strategy for the performance and reliability enhancement of flash-memory storage systems (YHC, TWK), pp. 858–863.
DATEDATE-2009-ChuHCK #reliability
A set-based mapping strategy for flash-memory reliability enhancement (YSC, JWH, YHC, TWK), pp. 405–410.
HTHT-2009-MahmoodR #adaptation #recommendation
Improving recommender systems with adaptive conversational strategies (TM, FR), pp. 73–82.
ICDARICDAR-2009-AlmaksourA #incremental #learning #online #performance #recognition
Fast Incremental Learning Strategy Driven by Confusion Reject for Online Handwriting Recognition (AA, ÉA), pp. 81–85.
ICDARICDAR-2009-SantosKOSKB #evaluation #recognition
Evaluation of Different Strategies to Optimize an HMM-Based Character Recognition System (MS, AHRK, LSO, RS, ALK, AdSBJ), pp. 666–670.
ICDARICDAR-2009-YinHTSN #classification #multi #recognition
Rejection Strategies with Multiple Classifiers for Handwritten Character Recognition (XCY, HWH, YFT, JS, SN), pp. 1126–1130.
VLDBVLDB-2009-YangRW #execution #mining #multi #streaming
A Shared Execution Strategy for Multiple Pattern Mining Requests over Streaming Data (DY, EAR, MOW), pp. 874–885.
CSEETCSEET-2009-PrayagaWB
Innovative Strategies to Build IT Workforce (LP, LJW, SB), pp. 202–209.
ITiCSEITiCSE-2009-KiesmullerB #algorithm #automation #identification #problem
Automatically identifying learners’ problem solving strategies in-process solving algorithmic problems (UK, TB), p. 354.
WRLAWRLA-2008-AndreiL09 #calculus #proving
Strategy-Based Proof Calculus for Membrane Systems (OA, DL), pp. 23–43.
WRLAWRLA-2008-Marti-OlietMV09 #maude #semantics
A Rewriting Semantics for Maude Strategies (NMO, JM, AV), pp. 227–247.
TACASTACAS-2009-KuijperP #game studies #safety
Computing Weakest Strategies for Safety Games of Imperfect Information (WK, JvdP), pp. 92–106.
ICPCICPC-2009-ParninR #programming
Resumption strategies for interrupted programming tasks (CP, SR), pp. 80–89.
CIAACIAA-2009-Zimmermann #game studies
Time-Optimal Winning Strategies for Poset Games (MZ0), pp. 217–226.
ICALPICALP-v2-2009-CooperIKK #graph #random #using
Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
IFMIFM-2009-SchneiderT #csp #interface #refinement
Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B (SS, HT), pp. 103–117.
CHICHI-2009-BrumbySH #adaptation #constraints #how
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving (DPB, DDS, AH), pp. 1629–1638.
CHICHI-2009-ChinFK #adaptation #information management #interactive
Adaptive information search: age-dependent interactions between cognitive profiles and strategies (JC, WTF, TGK), pp. 1683–1692.
CHICHI-2009-ConsolvoML #behaviour #design
Theory-driven design strategies for technologies that support behavior change in everyday life (SC, DWM, JAL), pp. 405–414.
CHICHI-2009-EcklesWCTBF #mobile #self #social
Social responses in mobile messaging: influence strategies, self-disclosure, and source orientation (DE, DW, CC, AT, MBF, BJF), pp. 1651–1654.
HCIHCI-AUII-2009-PirhonenK #comparison #design #interface
Flight Searching — A Comparison of Two User-Interface Design Strategies (AP, NK), pp. 179–188.
HCIHCI-NIMT-2009-MaceA #composition #interactive #pattern matching #pattern recognition #recognition #sketching
Pattern Recognition Strategies for Interactive Sketch Composition (SM, ÉA), pp. 840–849.
HCIHCI-VAD-2009-NielloFGFBV #set
A Set of Rules and Strategies for UNSAM Virtual Campus (JFN, FVCF, MG, RFZ, SB, MV), pp. 101–110.
HCIIDGD-2009-BoseS #hypermedia
The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
ICEISICEIS-AIDSS-2009-BratuP #data mining #mining #preprocessor #towards
Towards a Unified Strategy for the Preprocessing Step in Data Mining (CVB, RP), pp. 230–235.
ICEISICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #using #web
Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
ICEISICEIS-J-2009-ChenPZQ #case study #hybrid
A Study of Indexing Strategies for Hybrid Data Spaces (CC, SP, QZ, GQ), pp. 149–159.
ICEISICEIS-SAIC-2009-BalzanoSL #ajax #collaboration #realtime #web
A Scheme of Strategies for Real-time Web Collaboration based on AJAX/Comet Techniques for Live RIA (WB, MRDS, LDL), pp. 35–40.
ICEISICEIS-SAIC-2009-WuFL #implementation #integration #online #physics #process
A Process for Implementing Online and Physical Business based on a Strategy Integration Aspect (ILW, CYF, CWL), pp. 5–11.
CIKMCIKM-2009-DengKL #retrieval #using
Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
CIKMCIKM-2009-HuangE #query #web
Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
ECIRECIR-2009-AltingovdeOU #cost analysis #query #web
A Cost-Aware Strategy for Query Result Caching in Web Search Engines (ISA, RO, ÖU), pp. 628–636.
ECIRECIR-2009-EsuliS #classification #learning #multi
Active Learning Strategies for Multi-Label Text Classification (AE, FS), pp. 102–113.
ECIRECIR-2009-JohoHJ #collaboration #information retrieval
Revisiting IR Techniques for Collaborative Search Strategies (HJ, DH, JMJ), pp. 66–77.
KDDKDD-2009-HanhijarviOVPTM #data mining #mining
Tell me something I don’t know: randomization strategies for iterative data mining (SH, MO, NV, KP, NT, HM), pp. 379–388.
KDDKDD-2009-YangCWHZM #crawling #incremental #web
Incorporating site-level knowledge for incremental crawling of web forums: a list-wise strategy (JMY, RC, CW, HH, LZ, WYM), pp. 1375–1384.
KDIRKDIR-2009-Abbadeni #multi #representation #retrieval
Texture Representation and Retrieval based on Multiple Strategies (NA), pp. 53–61.
KDIRKDIR-2009-GhemtioSDSM #approach #design
A KDD Approach for Designing Filtering Strategies to Improve Virtual Screening (LG, MST, MDD, MS, BM), pp. 146–151.
KDIRKDIR-2009-Kirsch #implementation
KM Implementation Strategy (DK), p. 11.
KEODKEOD-2009-Kirsch #implementation
KM Implementation Strategy (DK), p. 11.
KEODKEOD-2009-RenaudZR #ontology
A Compound Strategy for Ontologies Combining (DR, CZM, FR), pp. 200–205.
KMISKMIS-2009-Grundstein
Distinguishing Knowledge from Information — A Prerequisite for Elaborating KM Initiative Strategy (MG), pp. 135–140.
KMISKMIS-2009-Kirsch #implementation
KM Implementation Strategy (DK), p. 11.
SEKESEKE-2009-AlvesPCL #approach #development #lifecycle #lightweight #outsourcing
From Strategy to Solution: A Lightweight Semi-prescriptive Approach for Software Development Lifecycle with Outsourcing Support (NA, SP, AC, ELJ), pp. 672–675.
ICMTICMT-2009-BergmannHRV #model transformation #pattern matching #performance
Efficient Model Transformations by Combining Pattern Matching Strategies (GB, ÁH, IR, DV), pp. 20–34.
ICMTICMT-2009-SenBM #automation #generative #model transformation #testing
Automatic Model Generation Strategies for Model Transformation Testing (SS, BB, JMM), pp. 148–164.
LOPSTRLOPSTR-2009-AstefanoaeiBR #testing #using
Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
PPDPPPDP-2009-KaiserL #higher-order #traversal
An Isabelle/HOL-based model of stratego-like traversal strategies (MK, RL), pp. 93–104.
REFSQREFSQ-2009-KhurumGAF #empirical #requirements
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
SACSAC-2009-ChenJ #evolution
A gradient oriented recombination scheme for evolution strategies (HC, GJ), pp. 1080–1084.
SACSAC-2009-HuangCZLT #java #testing
An optimized change-driven regression testing selection strategy for binary Java applications (SH, YC, JZ, ZJL, HT), pp. 558–565.
SACSAC-2009-KrocSS #heuristic #message passing #satisfiability
Message-passing and local heuristics as decimation strategies for satisfiability (LK, AS, BS), pp. 1408–1414.
SACSAC-2009-ShenU #approximate #composition #concept #matrix #multi
A class of multistep sparse matrix strategies for concept decomposition matrix approximation (CS, MU), pp. 1714–1718.
SACSAC-2009-WangCH #learning #multi #music #retrieval
Music retrieval based on a multi-samples selection strategy for support vector machine active learning (TW, GC, PH), pp. 1750–1751.
SPLCSPLC-2009-CetinaHZFP #runtime #variability
Strategies for variability transformation at run-time (CC, ØH, XZ, FF, VP), pp. 61–70.
SPLCSPLC-2009-Jarzabek #product line #variability
Pragmatic strategies for variability management in product lines in small- to medium-size companies (SJ), p. 327.
HPDCHPDC-2009-LingrandMG #modelling
Modeling user submission strategies on production grids (DL, JM, TG), pp. 121–130.
PPoPPPPoPP-2009-SpearDMS #memory management #transaction
A comprehensive strategy for contention management in software transactional memory (MFS, LD, VJM, MLS), pp. 141–150.
LICSLICS-2009-Friedmann #algorithm #bound #exponential #game studies
An Exponential Lower Bound for the Parity Game Strategy Improvement Algorithm as We Know it (OF), pp. 145–156.
RTARTA-2009-ThiemannS
Loops under Strategies (RT, CS), pp. 17–31.
ICSTSAT-2009-HaimW #machine learning #using
Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
TLCATLCA-2009-FaggianP #linear #partial order
Partial Orders, Event Structures and Linear Strategies (CF, MP), pp. 95–111.
ASEASE-2008-PortOM #requirements #simulation #using
Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
DACDAC-2008-Mitra #verification
Strategies for mainstream usage of formal verification (RSM), pp. 800–805.
DATEDATE-2008-BriaoBW #realtime
Dynamic Task Allocation Strategies in MPSoC for Soft Real-time Applications (EWB, DB, FRW), pp. 1386–1389.
DATEDATE-2008-BrisolaraORLCW #code generation #uml #using
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-GizopoulosRGNW #power management #testing
Power-Aware Testing and Test Strategies for Low Power Devices (DG, KR, PG, NN, XW).
DATEDATE-2008-RavikumarHW #power management
Test Strategies for Low Power Devices (CPR, MH, XW), pp. 728–733.
DocEngDocEng-2008-Giannetti
An exploratory mapping strategy for web-driven magazines (FG), pp. 223–229.
CSMRCSMR-2008-CeccatoTM #goto #java #legacy #migration
Goto Elimination Strategies in the Migration of Legacy Code to Java (MC, PT, CM), pp. 53–62.
PLDIPLDI-2008-AndersonGEB #c #named #parallel #thread
SharC: checking data sharing strategies for multithreaded C (ZRA, DG, RE, EAB), pp. 149–158.
CHICHI-2008-SubrahmaniyanBGBWNBDF #debugging #testing #what
Testing vs. code inspection vs. what else?: male and female end users’ debugging strategies (NS, LB, VG, MMB, SW, VN, KB, RD, XZF), pp. 617–626.
CHICHI-2008-TsengH #adaptation #visual notation
The adaptation of visual search strategy to expected information gain (YCT, AH), pp. 1075–1084.
ICEISICEIS-DISI-2008-MendezPM #testing
Improving Software Test Strategy with a Method to Specify Test Cases (MSTC) (EMM, MAP, LEM), pp. 159–164.
ICEISICEIS-HCI-2008-AkoumianakisMKV #component #interactive #visual notation
Generic Strategies for Manipulating Graphical Interaction Objects: Augmenting, Expanding and Integrating Components (DA, GM, DK, GV), pp. 21–29.
CIKMCIKM-2008-MiaoLD #integration #mining
An integration strategy for mining product features and opinions (QM, QL, RD), pp. 1369–1370.
ICMLICML-2008-BowlingJBS #evaluation #game studies
Strategy evaluation in extensive games with importance sampling (MHB, MJ, NB, DS), pp. 72–79.
ICPRICPR-2008-LotteML #design #human-computer #interface #self
Pattern rejection strategies for the design of self-paced EEG-based Brain-Computer Interfaces (FL, HM, AL), pp. 1–5.
KRKR-2008-RamanujamS #game studies #logic
Dynamic Logic on Games with Structured Strategies (RR, SES), pp. 49–58.
SEKESEKE-2008-OliveiraO #approach #comparison #difference
Model Comparison: a Strategy-Based Approach (KSFO, TCdO), pp. 912–917.
SIGIRSIGIR-2008-WangYLCZM #crawling #traversal #web
Exploring traversal strategy for web forum crawling (YW, JMY, WL, RC, LZ, WYM), pp. 459–466.
SACSAC-2008-FilhoPRA #memory management #mobile #visualisation
A strategy for memory traffic management of bitmap fonts for text visualization in mobile devices (JBFF, HSP, RR, RMCA), pp. 449–450.
SACSAC-2008-PavelecJBO #identification #independence #using
Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SACSAC-2008-RochaO #scheduling
Strategies for QoS improvement on the time-interval scheduling (FRdlR, RSdO), pp. 320–321.
SACSAC-2008-VasiraniO #coordination #distributed #problem
Decentralized coordination strategies for the vehicle routing problem (MV, SO), pp. 130–131.
ICSEICSE-2008-FlemingKSXD #case study #concurrent #maintenance #student
A study of student strategies for the corrective maintenance of concurrent software (SDF, EK, REKS, SX, LKD), pp. 759–768.
CCCC-2008-CooperHW #adaptation
An Adaptive Strategy for Inline Substitution (KDC, TJH, TW), pp. 69–84.
HPDCHPDC-2008-RamakrishnanR #fault tolerance #modelling #scheduling #workflow
Performability modeling for scheduling and fault tolerance strategies for scientific workflows (LR, DAR), pp. 23–34.
CSLCSL-2008-Schewe #algorithm #game studies
An Optimal Strategy Improvement Algorithm for Solving Parity and Payoff Games (SS), pp. 369–384.
ICSTICST-2008-TappendenM #testing
A Three-Tiered Testing Strategy for Cookies (AFT, JM), pp. 131–140.
RTARTA-2008-EchahedP #pointer
A Needed Rewriting Strategy for Data-Structures with Pointers (RE, NP), pp. 63–78.
ICSTSAT-2008-Biere #adaptation #satisfiability
Adaptive Restart Strategies for Conflict Driven SAT Solvers (AB), pp. 28–33.
CASECASE-2007-ChienW
Structuring Manufacturing Strategy (CFC, JZW), pp. 265–269.
CASECASE-2007-KaberST #interactive #research
Human-automation Interaction Strategies for Life Science Applications: Implications and Future Research (DK, NS, KT), pp. 615–620.
CASECASE-2007-KaberST07a #interactive #research
Human-Automation Interaction Strategies for Life Science Applications: Implications and Future Research (DK, NS, KT), p. 92–?.
CASECASE-2007-LeungG #behaviour #locality #multi
Multi-Robot Localization and Mapping Strategy: Utilizing Behavior Based Dynamic Tree Structure and Observer-explorer Routine (KKKL, GG), pp. 881–886.
DACDAC-2007-PaulaH #effectiveness #simulation
An Effective Guidance Strategy for Abstraction-Guided Simulation (FMdP, AJH), pp. 63–68.
ICDARICDAR-2007-BoubakerKA #modelling #online
New Strategy for the On-Line Handwriting Modelling (HB, MK, AMA), pp. 1233–1247.
ICDARICDAR-2007-FuDLL #classification #effectiveness #recognition
An Effective and Practical Classifier Fusion Strategy for Improving Handwritten Character Recognition (QF, XD, TL, CL), pp. 1038–1042.
ICDARICDAR-2007-JlaielKAM #difference
Three decision levels strategy for Arabic and Latin texts differentiation in printed and handwritten natures (MBJ, SK, AMA, RM), pp. 1103–1107.
ICDARICDAR-2007-MozaffariFMA #reduction #scalability
Strategies for Large Handwritten Farsi/Arabic Lexicon Reduction (SM, KF, VM, HEA), pp. 98–102.
ICDARICDAR-2007-SilvaL #documentation #synthesis
Color Document Synthesis as a Compression Strategy (JMS, RL), pp. 466–470.
ICDARICDAR-2007-SuZHZ
HMM-Based Recognizer with Segmentation-free Strategy for Unconstrained Chinese Handwritten Text (THS, TWZ, HJH, YZ), pp. 133–137.
ICDARICDAR-2007-YinSNFFKT #documentation #image #mobile #multi
A Multi-Stage Strategy to Perspective Rectification for Mobile Phone Camera-Based Document Images (XCY, JS, SN, KF, YF, KK, HT), pp. 574–578.
SIGMODSIGMOD-2007-ElhemaliGGJ #execution #sql
Execution strategies for SQL subqueries (ME, CAGL, TG, MJ), pp. 993–1004.
ITiCSEITiCSE-2007-CukiermanT #learning
Learning strategies sessions within the classroom in computing science university courses (DC, DMT), p. 341.
ITiCSEITiCSE-2007-McCartneyEMSZ #student
Successful students’ strategies for getting unstuck (RM, AE, JEM, KS, CZ), pp. 156–160.
ESOPESOP-2007-GawlitzaS #fixpoint #precise
Precise Fixpoint Computation Through Strategy Iteration (TG, HS), pp. 300–315.
FoSSaCSFoSSaCS-2007-Chatterjee #game studies #probability #synthesis
Optimal Strategy Synthesis in Stochastic Müller Games (KC), pp. 138–152.
SCAMSCAM-2007-MarinMD #migration
An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW (MM, LM, AvD), pp. 101–110.
CIAACIAA-2007-HoltmannL #game studies #infinity #memory management #reduction
Memory Reduction for Strategies in Infinite Games (MH, CL), pp. 253–264.
ICALPICALP-2007-MoranNS #independence #information management
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories (TM, MN, GS), pp. 303–315.
CHICHI-2007-GrossmanDB #learning #online
Strategies for accelerating on-line learning of hotkeys (TG, PD, RB), pp. 1591–1600.
HCIDHM-2007-KanezashiMO #difference #interface
Strategy to Operate Cylindrical Interface-Operation Difference According to the Dimension of the Cylinder and That of the Hand (OK, NM, JO), pp. 865–873.
HCIHCI-AS-2007-JeenHKLP #interactive #persuasion
Persuasive Interaction Strategy for Self Diet System: Exploring the Relation of User Attitude and Intervention by Computerized Systematic Methods (YJ, JH, HK, KL, PP), pp. 450–458.
HCIHCI-AS-2007-SteinickeRBH #3d #design #interactive #modelling
3D Modeling and Design Supported Via Interscopic Interaction Strategies (FS, TR, GB, KHH), pp. 1160–1169.
HCIHCI-IDU-2007-GuoGW #adaptation #evaluation
Adaptive Evaluation Strategy Based on Surrogate Model (YNG, DWG, HW), pp. 472–481.
HCIHCI-MIE-2007-BaranDC #approach #eye tracking #how #problem
How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, ), pp. 555–563.
HCIHCI-MIE-2007-ZhouZ #eye tracking #metric
Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data (RZ, KZ), pp. 789–798.
HCIHIMI-MTT-2007-MorganWKP #information management #performance
Harder to Access, Better Performance? The Effects of Information Access Cost on Strategy and Performance (PLM, SMW, SLK, JP), pp. 115–125.
CAiSECAiSE-2007-PijpersG #comprehension #named
e3forces: Understanding Strategies of Networked e 3 value Constellations by Analyzing Environmental Forces (VP, JG), pp. 188–202.
CAiSECAiSE-2007-ThevenetS
Aligning IS to Organization’s Strategy: The InStAlMethod (LHT, CS), pp. 203–217.
ICEISICEIS-AIDSS-2007-Calvo-FloresNGF07a #empirical
An Empirical Study of Significant Variables for Trading Strategies (MDCF, JFNN, EGG, CMF), pp. 330–335.
ICEISICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #approach #design #identification #information management
Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
ICEISICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy #using
Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
ICEISICEIS-DISI-2007-OsbornB #2d
An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
ICEISICEIS-EIS-2007-Custers #problem #profiling
Risk Profiling of Money Laundering and Terrorism Funding — Practical Problems of Current Information Strategies (BHMC), pp. 90–94.
ICEISICEIS-EIS-2007-FosterLHS #security
A Change Strategy for Organisational Security: The Role of Critical Success Factors (SF, KL, PH, AS), pp. 375–380.
CIKMCIKM-2007-DornelesHOSM #approximate
A strategy for allowing meaningful and comparable scores in approximate matching (CFD, CAH, VMO, ASdS, ESdM), pp. 303–312.
CIKMCIKM-2007-OuyangLL #learning #summary #topic
Developing learning strategies for topic-based summarization (OY, SL, WL), pp. 79–86.
ECIRECIR-2007-GengWLZ #ranking
Fighting Link Spam with a Two-Stage Ranking Strategy (GG, CW, QL, YZ), pp. 699–702.
MLDMMLDM-2007-GomezF #2d #algorithm #evolution #hybrid #image #learning
A Hybrid Algorithm Based on Evolution Strategies and Instance-Based Learning, Used in Two-Dimensional Fitting of Brightness Profiles in Galaxy Images (JCG, OF), pp. 716–726.
MLDMMLDM-2007-HulsmannF #algorithm #comparison #multi #novel #optimisation #parametricity
Comparison of a Novel Combined ECOC Strategy with Different Multiclass Algorithms Together with Parameter Optimization Methods (MH, CMF), pp. 17–31.
RecSysRecSys-2007-WinterboerM #recommendation
Evaluating information presentation strategies for spoken recommendations (AW, JDM), pp. 157–160.
SIGIRSIGIR-2007-CormackL07a #bias #set
Power and bias of subset pooling strategies (GVC, TRL), pp. 837–838.
SIGIRSIGIR-2007-Huis
Strategy follows technology (EvH), p. 1.
SIGIRSIGIR-2007-SteinEP #documentation
Strategies for retrieving plagiarized documents (BS, SMzE, MP), pp. 825–826.
SIGIRSIGIR-2007-Wan #clustering #documentation #evaluation #named #using
OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
SIGIRSIGIR-2007-YuanB #framework #multi
Supporting multiple information-seeking strategies in a single system framework (XJY, NJB), pp. 247–254.
SACSAC-2007-BrunauerLMMP #evolution
Evolution of iterated prisoner’s dilemma strategies with different history lengths in static and cultural environments (RB, AL, HAM, GM, HP), pp. 720–727.
SACSAC-2007-ChenTL
A priority assignment strategy of processing elements over an on-chip bus (YSC, SJT, SWL), pp. 1176–1180.
SACSAC-2007-LiuD #performance #web #web service
An efficient dual caching strategy for web service-enabled PDAs (XL, RD), pp. 788–794.
SPLCSPLC-2007-GanesanKKHM #case study #cost analysis #product line
Comparing Costs and Benefits of Different Test Strategies for a Software Product Line: A Study from Testo AG (DG, JK, RK, UH, GM), pp. 74–83.
CCCC-2007-ChoAUP #effectiveness #multi #preprocessor #scheduling
Preprocessing Strategy for Effective Modulo Scheduling on Multi-issue Digital Signal Processors (DC, RA, GRU, YP), pp. 16–31.
CSLCSL-2007-GawlitzaS #invariant #precise #relational
Precise Relational Invariants Through Strategy Iteration (TG, HS), pp. 23–40.
LICSLICS-2007-HarmerHM #category theory #combinator
Categorical Combinatorics for Innocent Strategies (RH, MH, PAM), pp. 379–388.
CASECASE-2006-PengWL #image
A Strategy Improving Registration Accuracy Progressively for INSAR Complex Image (SP, YW, GL), pp. 626–629.
DACDAC-2006-MuraliABM #fault tolerance #multi #network
A multi-path routing strategy with guaranteed in-order packet delivery and fault-tolerance for networks on chip (SM, DA, LB, GDM), pp. 845–848.
HTHT-2006-JensenM #corpus #multi #retrieval #web
Different indexing strategies for multilingual web retrieval: experiments with the EuroGOV corpus (NJ, TM), pp. 169–170.
ICPCICPC-2006-SmithOK #architecture #comprehension #migration #web #web service
Working Session: Program Comprehension and Migration Strategies for Web Service and Service-Oriented Architectures (DBS, LO, KK), pp. 235–240.
ICSMEICSM-2006-LuciaFSTV #architecture #eclipse #legacy #migration #multi
A Strategy and an Eclipse Based Environment for the Migration of Legacy Systems to Multi-tier Web-based Architectures (ADL, RF, GS, GT, NV), pp. 438–447.
FMFM-2006-DonaldsonM #approximate #model checking #reduction #symmetry
Exact and Approximate Strategies for Symmetry Reduction in Model Checking (AFD, AM), pp. 541–556.
IFLIFL-2006-Hidalgo-HerreroOR #evaluation #functional #parallel
Comparing Alternative Evaluation Strategies for Stream-Based Parallel Functional Languages (MHH, YOM, FR), pp. 55–72.
EDOCEDOC-2006-PatelG #adaptation #transaction
An Adaptive Negotiation Strategy for Electronic Transactions (DP, AG), pp. 243–252.
ICEISICEIS-AIDSS-2006-KafkasBY #algebra #equation #implementation
Implementation Strategies for “Equation Guru” — A User Friendly Intelligent Algebra Tutor (SK, ZB, HY), pp. 58–65.
ICEISICEIS-DISI-2006-RinderleBR #framework #process #semantics
A Framework for Semantic Recovery Strategies in Case of Process Activity Failures (SR, SB, MR), pp. 136–143.
CIKMCIKM-2006-AnhM #query
Pruning strategies for mixed-mode querying (VNA, AM), pp. 190–197.
CIKMCIKM-2006-ShiN #adaptation #corpus #information retrieval #parallel
Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval (LS, JYN), pp. 814–815.
ICPRICPR-v1-2006-LiHH #clustering
A Coarse-to-Fine Strategy for Vehicle Motion Trajectory Clustering (XL, WH, WH), pp. 591–594.
ICPRICPR-v2-2006-MouchereA
A Unified Strategy to Deal with Different Natures of Reject (HM, ÉA), pp. 792–795.
ICPRICPR-v3-2006-ChatelainHP #documentation
A two-stage outlier rejection strategy for numerical field extraction in handwritten documents (CC, LH, TP), pp. 224–227.
ICPRICPR-v3-2006-EscaleraP #named #novel
ECOC-ONE: A Novel Coding and Decoding Strategy (SE, OP), pp. 578–581.
ICPRICPR-v4-2006-FengFDW #locality
Iris Localization with Dual Coarse-to-fine Strategy (XF, CF, XD, YW), pp. 553–556.
KDDKDD-2006-YooHS #clustering #graph #integration #refinement #representation #semantics
Integration of semantic-based bipartite graph representation and mutual refinement strategy for biomedical literature clustering (IY, XH, IYS), pp. 791–796.
LOPSTRLOPSTR-2006-Silva #algorithm #case study #comparative #debugging
A Comparative Study of Algorithmic Debugging Strategies (JS), pp. 143–159.
RERE-2006-GordijnPW #comprehension #modelling #using
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
SACSAC-2006-DuranX #algorithm #scheduling #search-based
The effects of two replacement strategies on a genetic algorithm for scheduling jobs on computational grids (BD, FX), pp. 960–961.
SACSAC-2006-HabichWLP #clustering #set
Two-phase clustering strategy for gene expression data sets (DH, TW, WL, CP), pp. 145–150.
ICSEICSE-2006-DamianHA #assessment #design #development #education #framework
Instructional design and assessment strategies for teaching global software development: a framework (DED, AH, BAA), pp. 685–690.
ICSEICSE-2006-Grunske #architecture #design #identification #multi #optimisation
Identifying “good” architectural design alternatives with multi-objective optimization strategies (LG), pp. 849–852.
HPDCHPDC-2006-ChingFLMC #parallel #tool support
Exploring I/O Strategies for Parallel Sequence-Search Tools with S3aSim (AC, WcF, HL, XM, ANC), pp. 229–240.
RTARTA-2006-BournezG #proving #termination
Proving Positive Almost Sure Termination Under Strategies (OB, FG), pp. 357–371.
ICSTSAT-2006-Zhang #random
A Complete Random Jump Strategy with Guiding Paths (HZ), pp. 96–101.
WICSAWICSA-2005-LandBLC #architecture #case study #experience #industrial #integration
Architectural Concerns When Selecting an In-House Integration Strategy — Experiences from Industry (RL, LB, SL, IC), pp. 274–275.
ASEASE-2005-FriasGSB #analysis #performance #relational #specification #verification
A strategy for efficient verification of relational specifications, based on monotonicity analysis (MFF, RG, GS, LB), pp. 305–308.
DACDAC-2005-GuardianiBDMM #effectiveness #process
An effective DFM strategy requires accurate process and IP pre-characterization (CG, MB, ND, MM, PM), pp. 760–761.
DATEDATE-2005-LuIPWCC #performance #satisfiability
An Efficient Sequential SAT Solver With Improved Search Strategies (FL, MKI, GP, LCW, KTC, KCC), pp. 1102–1107.
DATEDATE-2005-MarconCMSRH #energy
Exploring NoC Mapping Strategies: An Energy and Timing Aware Technique (CAMM, NLVC, FGM, AAS, IMR, FH), pp. 502–507.
DocEngDocEng-2005-BeheraLI #documentation #identification
Influence of fusion strategies on feature-based identification of low-resolution documents (AB, DL, RI), pp. 20–22.
ICDARICDAR-2005-CecottiB #adaptation #network #recognition
Rejection strategy for Convolutional Neural Network by adaptive topology applied to handwritten digits recognition (HC, AB), pp. 765–769.
ICDARICDAR-2005-MilewskiSG #reduction
A Lexicon Reduction Strategy in the Context of Handwritten Medical Forms (RM, SS, VG), pp. 1146–1150.
ICDARICDAR-2005-ZanibbiBC05a #recognition
The Recognition Strategy Language (RZ, DB, JRC), pp. 565–569.
CSEETCSEET-2005-BunseGOPS #education #learning #re-engineering
xd Software Engineering Education Applying a Blended Learning Strategy for (CB, IG, MO, CP, SSN), pp. 95–102.
WRLAWRLA-2004-Marti-OlietMV05 #maude #towards
Towards a Strategy Language for Maude (NMO, JM, AV), pp. 417–441.
TACASTACAS-2005-HardingRS #algorithm #game studies #ltl #synthesis
A New Algorithm for Strategy Synthesis in LTL Games (AH, MR, PYS), pp. 477–492.
ICSMEICSM-2005-AlvesCVSDBR #analysis #comparative #game studies #migration
Comparative Analysis of Porting Strategies in J2ME Games (VA, IC, HV, PHMS, ALGD, PB, GR), pp. 123–132.
STOCSTOC-2005-CicaleseL #query
A new strategy for querying priced information (FC, ESL), pp. 674–683.
SEFMSEFM-2005-MesquitaSM #composition #framework
A Strategy for the Formal Composition of Frameworks (WM, AS, ACVdM), pp. 404–413.
SFMSFM-2005-AcquavivaBL #power management #standard
Dynamic Power Management Strategies Within the IEEE 802.11 Standard (AA, EB, EL), pp. 190–214.
IFLIFL-2005-Mackie #encoding #interactive #λ-calculus
Encoding Strategies in the λ Calculus with Interaction Nets (IM), pp. 19–36.
SOFTVISSOFTVIS-2005-GhoniemCFJ #constraints #graph #programming #using #visualisation
Peeking in solver strategies using explanations visualization of dynamic graphs for constraint programming (MG, HC, JDF, NJ), pp. 27–36.
AdaEuropeAdaEurope-2005-BordinV #ada
A New Strategy for the HRT-HOOD to Ada Mapping (MB, TV), pp. 51–66.
ICEISICEIS-v2-2005-Hakansson #comprehension #problem
Transferring Problem Solving Strategies from the Expert to the End Users — Supporting Understanding (AH), pp. 3–10.
ECIRECIR-2005-RenJ #segmentation #video
Football Video Segmentation Based on Video Production Strategy (RR, JMJ), pp. 433–446.
ICMLICML-2005-GroisW #approach #comprehension #learning
Learning strategies for story comprehension: a reinforcement learning approach (EG, DCW), pp. 257–264.
SEKESEKE-2005-HeBZH #framework #integration
Dynamic Integration Strategy for Mediation Framework (LH, HB, JZ, CH), pp. 520–524.
SEKESEKE-2005-Short #re-engineering
Software Engineering Strategies for Seamless Computing (CS), p. 2.
SEKESEKE-2005-YangE #framework #integration
Dynamic Integration Strategy for Mediation Framework (LY, RKE), pp. 525–530.
SIGIRSIGIR-2005-ArtilesGV #people
A testbed for people searching strategies in the WWW (JA, JG, FV), pp. 569–570.
SIGIRSIGIR-2005-StrohmanTC #optimisation #query
Optimization strategies for complex queries (TS, HRT, WBC), pp. 219–225.
PPDPPPDP-2005-CortierRZ #encryption #protocol #verification
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
RERE-2005-Corniou #challenge #information management #policy
The Role of Information Systems within Corporate Strategy and Management Policies: New Challenges (JPC), p. 4.
SACSAC-2005-BartakR
Limited assignments: a new cutoff strategy for incomplete depth-first search (RB, HR), pp. 388–392.
SACSAC-2005-LambertMS #constraints #using
Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
SACSAC-2005-ManceboA #component #multi
A strategy for selecting multiple components (EM, AAA), pp. 1505–1510.
SACSAC-2005-ZhangP #analysis
Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
SPLCSPLC-2005-DiazTA #process
Supporting Production Strategies as Refinements of the Production Process (OD, ST, FIA), pp. 210–221.
SPLCSPLC-2005-Niemela #architecture #development #product line
Strategies of Product Family Architecture Development (EN), pp. 186–197.
CCCC-2005-OlmosV #data flow #text-to-text
Composing Source-to-Source Data-Flow Transformations with Rewriting Strategies and Dependent Dynamic Rewrite Rules (KO, EV), pp. 204–220.
HPCAHPCA-2005-DuatoJFNGF #effectiveness #multi #network #scalability
A New Scalable and Cost-Effective Congestion Management Strategy for Lossless Multistage Interconnection Networks (JD, IJ, JF, FN, PJG, TNF), pp. 108–119.
HPDCHPDC-2005-MandalKKMMLJ #grid #scheduling #workflow
Scheduling strategies for mapping application workflows onto the grid (AM, KK, CK, GM, JMMC, BL, SLJ), pp. 125–134.
CADECADE-2005-MeierM #multi #proving #theorem proving
System Description: Multi A Multi-strategy Proof Planner (AM, EM), pp. 250–254.
CSLCSL-2005-CurienF
L-Nets, Strategies and Proof-Nets (PLC, CF), pp. 167–183.
ICLPICLP-2005-RochaSC #evaluation #logic programming #source code
Dynamic Mixed-Strategy Evaluation of Tabled Logic Programs (RR, FMAS, VSC), pp. 250–264.
CBSECBSE-2004-AldaC #adaptation #architecture #component #peer-to-peer #self
Strategies for a Component-Based Self-adaptability Model in Peer-to-Peer Architectures (SA, ABC), pp. 59–67.
DACDAC-2004-SentovichALR #industrial
Competitive strategies for the electronics industry (ES, JA, PL, BR), p. 264.
DACDAC-2004-ShehataA #composition #verification
A general decomposition strategy for verifying register renaming (HIS, MA), pp. 234–237.
DATEDATE-v1-2004-BenabdenbiGPVT #named #testing
STEPS: Experimenting a New Software-Based Strategy for Testing SoCs Containing P1500-Compliant IP Cores (MB, AG, FP, EV, MT), pp. 712–713.
DATEDATE-v1-2004-NikitovicB #mobile #power management
A Low Power Strategy for Future Mobile Terminals (MN, MB), pp. 702–703.
DATEDATE-v1-2004-PaschalisG #effectiveness #embedded #online #self #testing
Effective Software-Based Self-Test Strategies for On-Line Periodic Testing of Embedded Processors (AMP, DG), pp. 578–583.
DATEDATE-v1-2004-SrinivasanBCC #metric #performance #using
Efficient Test Strategy for TDMA Power Amplifiers Using Transient Current Measurements: Uses and Benefit (GS, SB, SC, AC), pp. 280–285.
DATEDATE-v2-2004-GrunewaldNPR #multi #network
A Mapping Strategy for Resource-Efficient Network Processing on Multiprocessor SoC (MG, JCN, MP, UR), pp. 758–763.
DocEngDocEng-2004-MeneguzziMMOS #documentation #optimisation
Strategies for document optimization in digital publishing (FRM, LLM, FTMM, JBSdO, ACBdS), pp. 163–170.
VLDBVLDB-2004-CunninghamGG #execution #optimisation
PIVOT and UNPIVOT: Optimization and Execution Strategies in an RDBMS (CC, GG, CAGL), pp. 998–1009.
ITiCSEITiCSE-2004-ArgolloHMBFBLMR #collaboration #learning #research #student
Graduate students learning strategies through research collaboration (EA, MH, DM, GB, PCF, FB, EL, JCM, DR), p. 262.
ITiCSEITiCSE-2004-ChesnevarGM #automaton #formal method #learning
Didactic strategies for promoting significant learning in formal languages and automata theory (CIC, MPG, AGM), pp. 7–11.
ITiCSEITiCSE-2004-Sheard #community #learning
Electronic learning communities: strategies for establishment and management (JS), pp. 37–41.
ICSMEICSM-2004-Gustavsson #evolution #problem #process #runtime
Strategies for Handling the Activity Problem in Runtime Software Evolution by Reducing Activity (JG), p. 525.
ICSMEICSM-2004-Marinescu #design #detection
Detection Strategies: Metrics-Based Rules for Detecting Design Flaws (RM), pp. 350–359.
IWPCIWPC-2004-OBrienS #architecture #comprehension #web #web service
Working Session: Program Comprehension Strategies for Web Service and Service-oriented Architectures (LO, DBS), pp. 260–263.
IWPCIWPC-2004-StoermerOV #architecture
Architectural Views through Collapsing Strategies (CS, LO, CV), pp. 100–110.
WCREWCRE-2004-MarinescuR #design #object-oriented #quality
Quantifying the Quality of Object-Oriented Design: The Factor-Strategy Model (RM, DR), pp. 192–201.
CHICHI-2004-EverettB #visual notation
Unintended effects: varying icon spacing changes users’ visual search strategy (SPE, MDB), pp. 695–702.
CHICHI-2004-Oulasvirta #research
Finding meaningful uses for context-aware technologies: the humanistic research strategy (AO), pp. 247–254.
CSCWCSCW-2004-MorrisMW #communication
Individual audio channels with single display groupware: effects on communication and task strategy (MRM, DM, TW), pp. 242–251.
EDOCEDOC-2004-BalasubramanianSDO #middleware #performance
Evaluating the Performance of Middleware Load Balancing Strategies (JB, DCS, LWD, OO), pp. 135–146.
ICEISICEIS-v3-2004-LancM #information management
A Holistic Information Systems Strategy for Organisational Management (HISSOM), Applied to Europe’s Largest Bancassurer (DL, LMM), pp. 427–437.
ICEISICEIS-v4-2004-QuadrosHBS #how
Strategies for the Digital Entrepreunership: How to Survive in the Actual Dotcom Reallity (FZQ, HCH, AB, FPdS), pp. 527–530.
ICEISICEIS-v5-2004-EscribanoCGC #internet
Basic Strategies to Enhance Teleoperation Platforms through the Internet (JE, JAC, RG, CC), pp. 242–245.
ICPRICPR-v2-2004-BaiH04a #detection #documentation #image #multi #using
Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
ICPRICPR-v2-2004-ZimmermannBB #recognition
Rejection Strategies for Offline Handwritten Sentence Recognition (MZ, RB, HB), pp. 550–553.
ICPRICPR-v4-2004-PagesSF
A New Optimised De Bruijn Coding Strategy for Structured Light Patterns (JP, JS, JF), pp. 284–287.
KRKR-2004-EveraereKM #on the
On Merging Strategy-Proofness (PE, SK, PM), pp. 357–368.
KRKR-2004-MeyerFKZ #logic
Logical Foundations of Negotiation: Strategies and Preferences (TAM, NYF, RK, DZ), pp. 311–318.
SIGIRSIGIR-2004-Yuan #framework #multi
Supporting multiple information-seeking strategies in a single system framework (abstract only) (XY), p. 604.
SACSAC-2004-DerntlM #case study #concept #evaluation #experience #learning
Patterns for blended, Person-Centered learning: strategy, concepts, experiences, and evaluation (MD, RMP), pp. 916–923.
SACSAC-2004-KampsR #effectiveness #information retrieval
The effectiveness of combining information retrieval strategies for European languages (JK, MdR), pp. 1073–1077.
HPDCHPDC-2004-ZhangKPCNWS #algorithm #parallel #using
Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms (XZ, TMK, TP, ÜVÇ, SN, PW, JHS), pp. 4–13.
DACDAC-2003-MathysC #integration #verification
Verification strategy for integration 3G baseband SoC (YM, AC), pp. 7–10.
DATEDATE-2003-KandemirKZ #energy #evaluation #implementation #on-demand
Implementation and Evaluation of an On-Demand Parameter-Passing Strategy for Reducing Energy (MTK, IK, WZ), pp. 11058–11063.
ICDARICDAR-2003-MoritaSBS #recognition #verification #word
A Recognition and Verification Strategy for Handwritten Word Recognition (MEM, RS, FB, CYS), p. 482–?.
VLDBVLDB-2003-TianD #distributed #tuple
Tuple Routing Strategies for Distributed Eddies (FT, DJD), pp. 333–344.
CSEETCSEET-2003-Mason #development #process #re-engineering
Aligning Workforce Development & Software Process Improvement Strategy for Accelerated Adoption of Software Engineering Capability (JM), pp. 70–77.
TACASTACAS-2003-AlurTM #composition #game studies #graph #recursion
Modular Strategies for Recursive Game Graphs (RA, SLT, PM), pp. 363–378.
TACASTACAS-2003-BDSV #analysis #encryption #information management #protocol #representation
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
TACASTACAS-2003-ConchonK
Strategies for Combining Decision Procedures (SC, SK), pp. 537–552.
CSMRCSMR-2003-ChaimMJ #debugging #requirements
A Debugging Strategy Based on Requirements of Testin (MLC, JCM, MJ), pp. 160–169.
IWPCIWPC-2003-KoU #comprehension #difference #programming
Individual Differences in Program Comprehension Strategies in Unfamiliar Programming Systems (AJK, BU), pp. 175–184.
ICALPICALP-2003-Schonhage #adaptation #optimisation #performance
Adaptive Raising Strategies Optimizing Relative Efficiency (AS), pp. 611–623.
FMFME-2003-DuranCS #compilation #inheritance
A Strategy for Compiling Classes, Inheritance, and Dynamic Binding (AD, AC, AS), pp. 301–320.
ICFPICFP-2003-EnnalsJ #adaptation #evaluation #source code #strict
Optimistic evaluation: an adaptive evaluation strategy for non-strict programs (RE, SLPJ), pp. 287–298.
CHICHI-2003-BhavnaniCJLPSS
Strategy hubs: next-generation domain portals with search procedures (SKB, CKB, TMJ, RJL, FAP, JLS, VJS), pp. 393–400.
CHICHI-2003-HornofH #eye tracking
Cognitive strategies and eye movements for searching hierarchical computer displays (AJH, TH), pp. 249–256.
ICEISICEIS-v1-2003-GouveiaG #roadmap
Assuming a Roadmap Strategy for E-Business: Matching the Right Solution Over a Thousand Answers (FRG, LBG), pp. 550–553.
ICEISICEIS-v1-2003-WallS
The Kinds of IT Services Most Appropriate for a Particular Sourcing Strategy (PW, LS), pp. 590–593.
CIKMCIKM-2003-ChenC #parallel #replication #retrieval
Replication and retrieval strategies of multidimensional data on parallel disks (CMC, CTC), pp. 32–39.
ICMLICML-2003-JohnsonTG #crawling #evolution #web
Evolving Strategies for Focused Web Crawling (JJ, KT, CLG), pp. 298–305.
KDDKDD-2003-BoltonA
An iterative hypothesis-testing strategy for pattern discovery (RJB, NMA), pp. 49–58.
KDDKDD-2003-WangHP #mining
CLOSET+: searching for the best strategies for mining frequent closed itemsets (JW, JH, JP), pp. 236–245.
SEKESEKE-2003-DaiD
Software Warehouse and Its Management Strategies (HD, WD), pp. 685–690.
SEKESEKE-2003-NiaziWZ #design #effectiveness #framework #implementation #process
A Framework for Guiding the Design of Effective Implementation Strategies for Software Process Improvement (MN, DW, DZ), pp. 366–371.
SEKESEKE-2003-YanZZ #independence
A Database-Independent Strategy for Confidence Determination (XY, CZ, SZ), pp. 621–625.
SIGIRSIGIR-2003-McDonaldT #image #retrieval
Search strategies in content-based image retrieval (SM, JT), pp. 80–87.
PPDPPPDP-2003-FissoreGK #rule-based #termination
Simplification and termination of strategies in rule-based languages (OF, IG, HK), pp. 124–135.
SACSAC-2003-Abdellatif-KaddourTW #testing
Property-Oriented Testing: A Strategy for Exploring Dangerous Scenarios (OAK, PTF, HW), pp. 1128–1134.
SACSAC-2003-BeitzelJCFGG #analysis #data fusion #effectiveness #information retrieval
Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies (SMB, ECJ, AC, OF, DAG, NG), pp. 823–827.
SACSAC-2003-FuT
A Dynamic Load Distribution Strategy for Systems Under High Task Variation and Heavy Traffic (BF, ZT), pp. 1031–1037.
SACSAC-2003-RaisanenW #communication #evaluation #multi #network #optimisation #problem
Multi-objective Optimization in the Area Coverage Problems for Cellular Communication Networks: Evaluation of an Elitist Evolutionary Strategy (LR, RMW), pp. 714–720.
SACSAC-2003-Traore #object-oriented #testing
A Transition-based Strategy for Object-oriented Software Testing (IT), pp. 1055–1062.
ESEC-FSEESEC-FSE-2003-JeffordsH #requirements #verification
A strategy for efficiently verifying requirements (RDJ, CLH), pp. 28–37.
CAVCAV-2003-AlurTM #composition #game studies #graph #infinity #recursion
Modular Strategies for Infinite Games on Recursive Graphs (RA, SLT, PM), pp. 67–79.
CSLCSL-2003-Duparc #game studies #persistent
Positive Games and Persistent Strategies (JD), pp. 183–196.
CSLCSL-2003-Walukiewicz #synthesis #tutorial
Winning Strategies and Synthesis of Controllers (Tutorial) (IW), p. 574.
ICSTSAT-2003-EglySTWZ #quantifier
Comparing Different Prenexing Strategies for Quantified Boolean Formulas (UE, MS, HT, SW, MZ), pp. 214–228.
ICSTSAT-2003-LiSB #effectiveness #performance #satisfiability #using
A Local Search SAT Solver Using an Effective Switching Strategy and an Efficient Unit Propagation (XYL, MFMS, FB), pp. 53–68.
DACDAC-2002-KadayifKK #adaptation #energy #parallel
An energy saving strategy based on adaptive loop parallelization (IK, MTK, MK), pp. 195–200.
DATEDATE-2002-BrockELSDBOK #design #power management
Power Crisis in SoC Design: Strategies for Constructing Low-Power, High-Performance SoC Designs (KB, CE, RL, US, AD, JB, DO, MK), p. 538.
DATEDATE-2002-IraniGS #analysis #multi #power management
Competitive Analysis of Dynamic Power Management Strategies for Systems with Multiple Power Savings States (SI, RKG, SKS), pp. 117–123.
PODSPODS-2002-ChenC #clustering #multi #query
From Discrepancy to Declustering: Near optimal multidimensional declustering strategies for range queries (CMC, CTC), pp. 29–38.
WRLAWRLA-2002-AlpuenteEL
Correct and Complete (Positive) Strategy Annotations for OBJ (MA, SE, SL), pp. 70–89.
CSMRCSMR-2002-AlbaneseBGT #case study #migration #tool support
A Toolkit for Applying a Migration Strategy: A Case Study (CA, TB, EG, MT), pp. 154–163.
ICSMEICSM-2002-Seaman #information management #maintenance
The Information Gathering Strategies of Software Maintainers (CBS), pp. 141–149.
IWPCIWPC-2002-Exton #comprehension
Constructivism and Program Comprehension Strategies (CE), pp. 281–284.
WCREWCRE-2002-HenrardHTH #re-engineering
Strategies for Data Reengineering (JH, JMH, PT, JLH), pp. 211–220.
ICALPICALP-2002-AkcogluDK #performance
Fast Universalization of Investment Strategies with Provably Good Relative Returns (KA, PD, MYK), pp. 888–900.
ICALPICALP-2002-Cachat #automaton #game studies #graph #synthesis
Symbolic Strategy Synthesis for Games on Pushdown Graphs (TC), pp. 704–715.
ICALPICALP-2002-KumarM #scheduling
Improved Results for Stackelberg Scheduling Strategies (VSAK, MVM), pp. 776–787.
EDOCEDOC-2002-SalinesiP #adaptation #information management
A Method to Analyse Changes in the Realisation of Business Intentions and Strategies for Information System Adaptation (CS, MJP), pp. 84–95.
ICEISICEIS-2002-HanlonS #framework
A Framework for the Dynamic Alignment of Strategies (SH, LS), pp. 752–757.
ICEISICEIS-2002-Heng
Rethinking the Strategy of Amazon.com (MSHH), pp. 915–921.
ICEISICEIS-2002-Oliver #automation
A Training Environment for Automated Sales Agents to Learn Negotiation Strategies (JRO), pp. 410–417.
CIKMCIKM-2002-TangZ #set
An iterative strategy for pattern discovery in high-dimensional data sets (CT, AZ), pp. 10–17.
CIKMCIKM-2002-WibowoW #categorisation #fault #web
Strategies for minimising errors in hierarchical web categorisation (WW, HEW), pp. 525–531.
ICPRICPR-v1-2002-ArlandisPC #classification #metric
Rejection Strategies and Confidence Measures for a k- NN Classifier in an OCR Task (JA, JCPC, JCP), pp. 576–579.
ICPRICPR-v3-2002-LiZL #set
A New Strategy for Selecting Working Sets Applied in SMO (JL, BZ, FL), pp. 427–430.
SIGIRSIGIR-2002-XuFW #empirical #retrieval
Empirical studies in strategies for Arabic retrieval (JX, AMF, RMW), pp. 269–274.
PPDPPPDP-2002-FissoreGK #induction #proving #termination
System Presentation — CARIBOO: An induction based proof tool for termination with strategies (OF, IG, HK), pp. 62–73.
SACSAC-2002-MorvanH #execution #memory management #parallel #query
Dynamic memory allocation strategies for parallel query execution (FM, AH), pp. 897–901.
SACSAC-2002-OConnorC #comparison #process
Strategies for personal process improvement a comparison (RO, GC), pp. 1036–1040.
LDTALDTA-2002-DolstraV
Building Interpreters with Rewriting Strategies (ED, EV), pp. 57–76.
CSLCSL-2002-FaggianH #design
Designs, Disputes and Strategies (CF, MH), pp. 442–457.
RTARTA-2002-BournezK #probability
Probabilistic Rewrite Strategies. Applications to ELAN (OB, CK), pp. 252–266.
RTARTA-2002-BravenboerV
Rewriting Strategies for Instruction Selection (MB, EV), pp. 237–251.
RTARTA-2002-Pol #named
JITty: A Rewriter with Strategy Annotations (JvdP), pp. 367–370.
RTARTA-2002-RetyV #set
Regular Sets of Descendants by Some Rewrite Strategies (PR, JV), pp. 129–143.
ASEASE-2001-ParissisV #automation #testing
Strategies for Automated Specification-Based Testing of Synchronous Software (IP, JV), pp. 364–367.
DACDAC-2001-OckunzziP #algorithm
Test Strategies for BIST at the Algorithmic and Register-Transfer Levels (KAO, CAP), pp. 65–70.
DATEDATE-2001-GerfersM #design #power management
A design strategy for low-voltage low-power continuous-time sigma-delta A/D converters (FG, YM), pp. 361–369.
ICDARICDAR-2001-GauthierAGD #online #recognition
Strategies for Combining On-line and Off-line Information in an On-line Handwriting Recognition System (NG, TA, PG, BD), pp. 412–416.
ICDARICDAR-2001-VielhauerSM #transitive #verification
Transitivity Based Enrollment Strategy for Signature Verification (CV, RS, AM), p. 1263–?.
VLDBVLDB-2001-LabrinidisR #quality #web
Update Propagation Strategies for Improving the Quality of Data on the Web (AL, NR), pp. 391–400.
CSEETCSEET-2001-DonaldsonJ01a #approach
Systems Failures: An Approach to Building a Coping Strategy (JD, JJ), pp. 187–190.
FASEFASE-J-1998-MotaS01 #industrial #model checking #tool support
Model-checking CSP-Z: strategy, tool support and industrial application (AM, AS), pp. 59–96.
TACASTACAS-2001-CiardoLS #generative #named #performance
Saturation: An Efficient Iteration Strategy for Symbolic State-Space Generation (GC, GL, RS), pp. 328–342.
CSMRCSMR-2001-MartinM #c #java #migration
Strategies for Migration from C to Java (JM, HAM), pp. 200–209.
STOCSTOC-2001-Roughgarden #scheduling
Stackelberg scheduling strategies (TR), pp. 104–113.
FLOPSFLOPS-J1-1998-BorovanskyKKR01 #functional #semantics
Rewriting with Strategies in ELAN: A Functional Semantics (PB, CK, HK, CR), pp. 69–95.
ICALPICALP-2001-BofillG #on the
On the Completeness of Arbitrary Selection Strategies for Paramodulation (MB, GG), pp. 951–962.
CAiSECAiSE-2001-TreschJ #evolution
Evolution not Revolution: The Data Warehousing Strategy at Credit Suisse Financial Services (MT, DJ), pp. 36–45.
EDOCEDOC-2001-VasconcelosCNSMT #framework #information management #modelling #process
A Framework for Modeling Strategy, Business Processes and Information Systems (AV, AC, JN, PS, RM, JMT), p. 69–?.
ICEISICEIS-v1-2001-Maamar
Moving Code (Servlet Strategy) vs. Inviting Code (Applet Strategy) (ZM), pp. 295–303.
ICEISICEIS-v1-2001-RuizEGG #adaptation #development #information management
A Strategy to Development Adaptive Workers Information Management Systems (ILR, ELE, GCG, MÁGN), pp. 271–274.
ICEISICEIS-v1-2001-SharpED #architecture #multi
A Layered Architecture for Multi-Agent Systems to Support a Water Main Rehabilitation Strategy 299 (BS, ERE, AD), pp. 304–310.
ICEISICEIS-v2-2001-AbidiC #enterprise #information management
A Knowledge Creation Strategy to Enrich Enterprise Information Systems with Enterprise-Specific Tacit Knowledge (SSRA, YNC), pp. 633–638.
ICEISICEIS-v2-2001-MendesVCNST #modelling #representation
Representing Business Strategy through Goal Modeling (RM, AV, AC, JN, PS, JMT), pp. 884–887.
ICEISICEIS-v2-2001-NunesP #enterprise #identification #information management #modelling
The Use of Information Systems Modelling to Identify and Evaluate E-Business Strategies for Small and Medium Enterprises (SMES) (JMBN, DP), pp. 1018–1025.
SIGIRSIGIR-2001-ChowdhuryFGM #analysis #multi #retrieval
Analyses of Multiple-Evidence Combinations for Retrieval Strategies (AC, OF, DAG, MCM), pp. 394–395.
SIGIRSIGIR-2001-Yang #case study #categorisation
A Study on Thresholding Strategies for Text Categorization (YY), pp. 137–145.
ECOOPECOOP-2001-HanhATJ #comparison #integration #object-oriented #performance #testing
Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies (VLH, KA, YLT, JMJ), pp. 381–401.
PPDPPPDP-2001-AntoyHMS #implementation
An Implementation of Narrowing Strategies (SA, MH, BM, FS), pp. 207–217.
PADLPADL-2001-Cirstea #authentication #protocol #specification #using
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
RERE-2001-FarbeyF #analysis
Software Acquisition: A Business Strategy Analysis (BF, AF), pp. 76–83.
SACSAC-2001-HuangC #evolution
Diversity-based selection pooling scheme in evolution strategies (TYH, YYC), pp. 351–355.
SACSAC-2001-KallesK #design #game studies #learning #on the #using #verification
On verifying game designs and playing strategies using reinforcement learning (DK, PK), pp. 6–11.
SACSAC-2001-YajimaHTN #correlation #scheduling
Scheduling and caching strategies for broadcasting correlated data (EY, TH, MT, SN), pp. 504–510.
FSEESEC-FSE-2001-NordPSS #architecture #design
Software architecture in a changing world: developing design strategies that anticipate change (RLN, DJP, RWS, DS), pp. 309–310.
LCTESLCTES-OM-2001-PyaraliSCS #concurrent #corba #optimisation #realtime #thread
Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA (IP, MS, RC, DCS), pp. 214–222.
RTARTA-2001-Visser #named #program transformation #stratego
Stratego: A Language for Program Transformation Based on Rewriting Strategies (EV), pp. 357–362.
VLDBVLDB-2000-YagoubFIV #data-driven #web
Caching Strategies for Data-Intensive Web Sites (KY, DF, VI, PV), pp. 188–199.
CSEETCSEET-2000-DupuisB #information management #re-engineering
Guide to the Software Engineering Body of Knowledge Diffusion and Experimentation Strategy (RD, PB), pp. 49–50.
ITiCSEITiCSE-2000-OuCLL #learning #web
Instructional instruments for Web group learning systems: the grouping, intervention, and strategy (KLO, GDC, CCL, BJL), pp. 69–72.
ESOPESOP-2000-Danvy #continuation #formal method #implementation
Formalizing Implementation Strategies for First-Class Continuations (OD), pp. 88–103.
WRLAWRLA-2000-KirchnerG #normalisation #proving #termination
Termination and normalisation under strategy Proofs in ELAN (HK, IG), pp. 93–120.
WRLAWRLA-2000-NakamuraO #evaluation #normalisation #on-demand
The evaluation strategy for head normal form with and without on-demand flags (MN, KO), pp. 212–228.
IWPCIWPC-2000-Muller #comprehension #migration
Program Comprehension and Software Migration Strategies (HAM), p. 5–?.
STOCSTOC-2000-CharikarFGKRS #query
Query strategies for priced information (extended abstract) (MC, RF, VG, JMK, PR, AS), pp. 582–591.
CIAACIAA-2000-SchmitzV #algorithm #finite #game studies #implementation
Implementation of a Strategy Improvement Algorithm for Finite-State Parity Games (DS, JV), pp. 263–271.
ICEISICEIS-2000-LancM #information management
A Holistic Information Systems Strategy for Organisational Management-HISSOM (DL, LMM), pp. 304–309.
CIKMCIKM-2000-BressanGOT #framework #modelling
A Framework for Modeling Buffer Replacement Strategies (SB, CLG, BCO, KLT), pp. 62–69.
ICMLICML-2000-YangAP #effectiveness #learning #multi #validation
Combining Multiple Learning Strategies for Effective Cross Validation (YY, TA, TP), pp. 1167–1174.
ICPRICPR-v1-2000-Louchet #analysis #evolution #using
Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
ICPRICPR-v1-2000-MullerMMPS #feedback #image #retrieval
Strategies for Positive and Negative Relevance Feedback in Image Retrieval (HM, WM, SMM, TP, DS), pp. 5043–5042.
ICPRICPR-v2-2000-AlkootK #performance
Improving the Performance of the Product Fusion Strategy (FMA, JK), pp. 2164–2167.
ICPRICPR-v2-2000-Figueiredo #approximate #learning #on the
On Gaussian Radial Basis Function Approximations: Interpretation, Extensions, and Learning Strategies (MATF), pp. 2618–2621.
ICPRICPR-v2-2000-KangL #classification #multi
An Information-Theoretic Strategy for Constructing Multiple Classifier Systems (HJK, SWL), pp. 2483–2486.
ICPRICPR-v2-2000-MollinedaFV #classification #clustering #prototype
A Cluster-Based Merging Strategy for Nearest Prototype Classifiers (RAM, FJF, EV), pp. 2755–2758.
ICPRICPR-v3-2000-Levienaise-ObadiaKC #retrieval #similarity
Defining Quantization Strategies and a Perceptual Similarity Measure for Texture-Based Annotation and Retrieval (BLO, JK, WJC), pp. 3453–3457.
ICPRICPR-v3-2000-SalembierG
Connected Operators Based on Region-Tree Pruning Strategies (PS, JLG), pp. 3371–3374.
ICPRICPR-v4-2000-BergerABSP #3d #convergence #modelling #realtime
3D Model Based Pose Determination in Real-Time: Strategies, Convergence, Accurac (MB, TA, GB, SS, AP), pp. 4567–4570.
ICPRICPR-v4-2000-BrunelliM #image #query #retrieval
Query Simplification and Strategy Selection for Image Retrieval (RB, OM), pp. 4279–4282.
ICPRICPR-v4-2000-RahmanF #comparison #multi #performance
Comparison of Some Multiple Expert Strategies: An Investigation of Resource Prerequisites and Achievable Performance (AFRR, MCF), pp. 4841–4844.
ECOOPECOOP-2000-EckelG #empirical #optimisation
Empirical Study of Object-Layout Strategies and Optimization Techniques (NE, JYG), pp. 394–421.
TOOLSTOOLS-ASIA-2000-XuHWC #corba #persistent #web
A Strategy for Persistent Object Service under CORBA and WEB Environment (DX, XH, JW, YC), pp. 100–107.
TOOLSTOOLS-USA-2000-Anton #agile #development #effectiveness #object-oriented
Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MA), pp. 407–408.
LOPSTRLOPSTR-2000-FioravantiPP #automation #constraints #logic programming #source code
Automated strategies for specializing constraint logic programs (FF, AP, MP).
LOPSTRLOPSTR-J-2000-FioravantiPP #automation #constraints #logic programming #source code
Automated Strategies for Specializing Constraint Logic Programs (FF, AP, MP), pp. 125–146.
SACSAC-2000-OgataF #evaluation #on-demand #semantics
Operational Semantics of Rewriting with the On-demand Evaluation Strategy (KO, KF), pp. 756–764.
HPDCHPDC-2000-Anglano #comparative #evaluation #network
A Comparative Evaluation of Implicit Coscheduling Strategies for Networks of Workstations (CA), pp. 221–228.
CAVCAV-2000-VogeJ #algorithm #game studies
A Discrete Strategy Improvement Algorithm for Solving Parity Games (JV, MJ), pp. 202–215.
ICLPCL-2000-MelisM #multi #proving #theorem proving
Proof Planning with Multiple Strategies (EM, AM), pp. 644–659.
ISSTAISSTA-2000-SouterP #named #object-oriented #testing
OMEN: A strategy for testing object-oriented software (ALS, LLP), pp. 49–59.
LICSLICS-2000-McMillan #model checking #proving #theorem
Some Strategies for Proving Theorems with a Model Checker (KLM), pp. 305–306.
DACDAC-1999-YueW #design
Design Strategy of On-Chip Inductors for Highly Integrated RF Systems (CPY, SSW), pp. 982–987.
DATEDATE-1999-SantosoMRA #generative #named #testing #using
FreezeFrame: Compact Test Generation Using a Frozen Clock Strategy (YS, MCM, EMR, MA), p. 747–?.
HTHT-1999-Bouvin #web
Unifying Strategies for Web Augmentation (NOB), pp. 91–100.
ICDARICDAR-1999-AdamOCMGL #multi #recognition
Multi-scaled and Multi-oriented Character Recognition: An Original Strategy (SA, JMO, CC, RM, JG, YL), pp. 45–48.
ICDARICDAR-1999-ChaudhuryS #identification
Trainable Script Identification Strategies for Indian Languages (SC, RS), pp. 657–660.
ICDARICDAR-1999-TakatsukaCWV #distributed #representation
Symbolic Representation and Distributed Matching Strategies for Schematics (MT, TC, GAWW, SV), pp. 693–696.
SIGMODSIGMOD-1999-JagadishLS #clustering
Snakes and Sandwiches: Optimal Clustering Strategies for a Data Warehouse (HVJ, LVSL, DS), pp. 37–48.
ITiCSEITiCSE-1999-EllisHSLDCRT #collaboration #education #java #programming
A collaborative strategy for developing shared Java teaching resources to support first year programming (AE, DH, JS, JL, WD, AC, JR, ST), pp. 84–87.
ITiCSEITiCSE-1999-SternSN #algorithm #animation #complexity
A strategy for managing content complexity in algorithm animation (LS, HS, LN), pp. 127–130.
ITiCSEITiCSE-1999-Taylor99a #education #learning
Math link: linking curriculum, instructional strategies, and technology to enhance teaching and learning (HGT), p. 201.
STOCSTOC-1999-ChenKLW #bound
Optimal Buy-and-Hold Strategies for Financial Markets with Bounded Daily Returns (GHC, MYK, YDL, HKW), pp. 119–128.
FLOPSFLOPS-1999-AntoyT #higher-order
Typed Higher-Order Narrowing without Higher-Order Strategies (SA, APT), pp. 335–353.
CHICHI-1999-MoherJOG #learning
Bridging Strategies for VR-Based Learning (TGM, AEJ, SO, MG), pp. 536–543.
HCIHCI-CCAD-1999-LinDF #comprehension #data flow #diagrams #difference
Strategy differences in data flow diagram comprehension between intermediates and novices (CJL, TCD, YMF), pp. 48–52.
HCIHCI-CCAD-1999-WainwrightL #integration
Virtual vertical integration as a strategy for agility (CEW, PGL), pp. 1245–1249.
HCIHCI-EI-1999-Wolff #design #html #user interface
Design strategy for an HTML administration and management user interface (TW), pp. 595–599.
KDDKDD-1999-BonchiGMP #classification #detection
A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
TOOLSTOOLS-ASIA-1999-LiXXZ
Strategies and Techniques of Freeze/Melt (YL, YX, GX, ZZ), pp. 98–107.
TOOLSTOOLS-USA-1999-Anton #agile #development #effectiveness #object-oriented
Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MPA), pp. 505–517.
RERE-1999-AlspaughABM
An Integrated Scenario Management Strategy (TAA, AIA, TB, BWM), pp. 142–149.
RERE-1999-Potts #named #requirements
ScenIC: A Strategy for Inquiry-Driven Requirements Determination (CP), pp. 58–65.
SACSAC-1999-SodanT #fuzzy #implementation
Hierarchical Fuzzy Configuration of Implementation Strategies (AS, VT), pp. 250–259.
CADECADE-1999-Bishop
A Breadth-First Strategy for Mating Search (MB), pp. 359–373.
CADECADE-1999-Lopes #automation #generative #higher-order #logic #proving
Automatic Generation of Proof Search Strategies for Second-order Logic (RHCL), pp. 414–428.
ICTSSIWTCS-1999-BaumgartenH #bound #testing
Testability with Unbounded Testing Strategies (BB, OH), pp. 43–60.
TLCATLCA-1999-Berardid
Total Functionals and Well-Founded Strategies (SB, Ud), pp. 54–68.
DACDAC-1998-Zorian #tutorial
System-Chip Test Strategies (Tutorial) (YZ), pp. 752–757.
DATEDATE-1998-KahngMSS
Interconnect Tuning Strategies for High-Performance Ics (ABK, SM, ES, RS), pp. 471–478.
DATEDATE-1998-KoegstGCW #analysis #design #reuse
A Systematic Analysis of Reuse Strategies for Design of Electronic Circuits (MK, DG, PC, MGW), pp. 292–296.
SIGMODSIGMOD-1998-RaoR #correlation #invariant #query #reuse
Reusing Invariants: A New Strategy for Correlated Queries (JR, KAR), pp. 37–48.
VLDBVLDB-1998-ZhangL
Buffering and Read-Ahead Strategies for External Mergesort (WZ, PÅL), pp. 523–533.
ITiCSEITiCSE-1998-Clear #collaboration #communication #database #education
A generic collaborative database — part of a strategy to internationalise the curriculum and develop teamwork and communication capabilities (poster) (AGC), p. 274.
ITiCSEITiCSE-1998-King #education #evaluation #student #topic
An evaluation of strategies for teaching technical computing topics to students at different levels (poster) (CK), p. 285.
ITiCSEITiCSE-1998-Roberts #education #using
Strategies for using technology in the teaching of ethics (ER), pp. 209–212.
WRLAWRLA-1998-Borovansky #implementation
Controlling rewriting: study and implementation of a strategy formalism (PB), pp. 299–310.
WRLAWRLA-1998-BruniMM #implementation
Internal strategies in a rewriting implementation of tile systems (RB, JM, UM), pp. 263–284.
WRLAWRLA-1998-Eker #evaluation #term rewriting
Term rewriting with operator evaluation strategies (SE), pp. 311–330.
CSMRCSMR-1998-Castelli #database #maintenance
A Strategy for Reducing the Effort for Database Schema Maintenance (DC), pp. 29–36.
IWPCIWPC-1998-DetienneBW #comprehension #object-oriented #programming
The Effect of Object-Oriented Programming Expertise in Several Dimensions of Comprehension Strategies (FD, JMB, SW), pp. 82–89.
WCREWCRE-1998-CimitileCL #analysis #data flow #incremental #migration
Incremental Migration Strategies: Data Flow Analysis For Wrapping (AC, UdC, ADL), pp. 59–68.
FLOPSFLOPS-1998-BorovanskyKK #functional #semantics
A Functional View of Rewriting and Strategies for a Semantics of ELAN (PB, CK, HK), pp. 143–166.
ICALPICALP-1998-MartinezR
Optimal Sampling Strategies in Quicksort (CM, SR), pp. 327–338.
ICFPICFP-1998-VisserBT
Building Program Optimizers with Rewriting Strategies (EV, ZEAB, APT), pp. 13–26.
CSCWCSCW-1998-FussellKLSMC #communication #coordination #performance
Coordination, Overload and Team Performance: Effects of Team Communication Strategies (SRF, REK, FJL, WLS, MMM, JJC), pp. 275–284.
ECIRACIR-1998-Smeaton #data fusion #effectiveness #independence #information retrieval
Independence of Contributing Retrieval Strategies in Data Fusion for Effective Information Retrieval (AFS).
CIKMCIKM-1998-NagD #memory management #query
Memory Allocation Strategies for Complex Decision Support Queries (BN, DJD), pp. 116–123.
ICMLICML-1998-AbeM #learning #query #using
Query Learning Strategies Using Boosting and Bagging (NA, HM), pp. 1–9.
ICMLICML-1998-AlerBI #approach #learning #multi #programming #search-based
Genetic Programming and Deductive-Inductive Learning: A Multi-Strategy Approach (RA, DB, PI), pp. 10–18.
ICPRICPR-1998-HojjatoleslamiK #classification
Strategies for weighted combination of classifiers employing shared and distinct representations (AH, JK), pp. 338–340.
KRKR-1998-WilliamsA
A Strategy for Revising Default Theory Extensions (MAW, GA), pp. 24–35.
SIGIRSIGIR-1998-SaitoO #user satisfaction #web
A Cognitive Model for Searching for Ill-Defined Targets on the Web: The Relationship Between Search Strategies and User Satisfaction (MS, KO), pp. 155–163.
SACSAC-1998-BarkatakiHDJ #component #reuse
Strategies for developing reusable software components in Ada-95 (SB, SH, PJD, GJ), pp. 10–17.
SACSAC-1998-CornoRS #algorithm #optimisation
The selfish gene algorithm: a new evolutionary optimization strategy (FC, MSR, GS), pp. 349–355.
SACSAC-1998-SandadlidisSR #combinator #evolution
A combinatorial evolution strategy for dynamic channel assignment in cellular radio (HGS, PPS, JRT), pp. 303–307.
SACSAC-1998-WieseG #algorithm #search-based
Keep-best reproduction: a selection strategy for genetic algorithms (KCW, SDG), pp. 343–348.
CCCC-1998-MizushimaK #recursion
Storage Allocation Strategies for Recursive Attributes Evaluators (KM, TK), pp. 50–64.
HPDCHPDC-1998-AndersenA #case study #clustering #implementation #multi
Implementation and Utilization of a Heterogeneous Multicomputer Cluster for the Study of Load Balancing Strategies (PHA, JKA), pp. 362–363.
HPDCHPDC-1998-RussBGJRL #integration #named
Hectiling: An Integration of Fine and Coarse-Grained Load-Balancing Strategies (SHR, IB, SG, BJ, JR, RL), pp. 106–113.
ICLPJICSLP-1998-RaoRR #on the #scheduling
On the Optimality of Scheduling Strategies in Subsumption-based Tabled Resolution (PR, CRR, IVR), pp. 310–324.
ICLPJICSLP-1998-Ruiz-AndinoR #integration #optimisation #probability
Integration of CLP and Stochastic Optimisation Strategies (ARA, JJR), pp. 351–352.
ASEASE-1997-MatskinT #source code #synthesis
Strategies of Structural Synthesis of Programs (MM, ET), pp. 305–306.
DATEEDTC-1997-DargelasGB #multi #named
MOSAIC: a multiple-strategy oriented sequential ATPG for integrated circuits (AD, CG, YB), pp. 29–36.
ICDARICDAR-1997-EglinE #development #documentation #grid #segmentation #visual notation
Logarithmic Spiral Grid and Gaze Control for the Development of Strategies of Visual Segmentation on a Document (VE, HE), pp. 689–692.
ICDARICDAR-1997-HuttonCEH #online #sketching
A Strategy for On-line Interpretation of Sketched Engineering Drawings (GH, MC, DE, CH), pp. 771–775.
ICDARICDAR-1997-LinDW #multi #recognition #using
Handwritten Numeral Recognition Using MFNN Based Multiexpert Combination Strategy (XL, XD, YW), pp. 471–474.
VLDBVLDB-1997-LeeLWS #database #design #multi #physics
A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations (JHL, YKL, KYW, IYS), pp. 416–425.
FMFME-1997-SilvaSB #clustering #hardware #normalisation #reduction
A Normal Form Reduction Strategy for Hardware/Software Partitioning (LS, AS, EB), pp. 624–643.
HCIHCI-CC-1997-BrandtH #case study #enterprise #experience
Applying the Sociotechnical Strategy to the Redesign of Organizations: Experiences in German Manufacturing and Service Enterprises (DB, KH), pp. 217–220.
HCIHCI-CC-1997-DobronetsSV #identification
Ergodynamic Method of Identification of the Cognitive Strategy Used by the Human-Operator (BSD, AAS, VFV), pp. 837–840.
HCIHCI-SEC-1997-ChangKC #development #maintenance
Development Strategies on an Intelligent Software System for Total Operation and Maintenance of Nuclear Power Plants (SHC, HGK, SSC), pp. 229–232.
HCIHCI-SEC-1997-KrishnanM
Strategies for Integrating and Separating Pen-Based Operational States (SNK, SM), pp. 439–442.
HCIHCI-SEC-1997-Lockett #modelling
Task Netwoerk Modeling of Human Workload Coping Strategies (JFLI), pp. 71–74.
HCIHCI-SEC-1997-PedottiFB
Human Motor Strategies in Long Term Space Flights (AP, GF, GB), pp. 1009–1012.
EDOCEDOC-1997-LoftusOIV #code generation #corba #internet
A Code Generation Strategy for CORBA-Based Internet Applications (CWL, AO, EI, PV), pp. 160–169.
ICMLICML-1997-SchuurmansUF #performance
Characterizing the generalization performance of model selection strategies (DS, LHU, DPF), pp. 340–348.
OOPSLAOOPSLA-1997-OlerLC #biology #experience #lessons learnt #migration #relational
Migrating Relational Data to an OODB: Strategies and Lessons from a Molecular Biology Experience (JRO, GL, TC), pp. 243–252.
PPDPPLILP-1997-OgataF #evaluation #implementation #term rewriting
Implementation of Term Rewritings with the Evaluation Strategy (KO, KF), pp. 225–239.
SACSAC-1997-LiuLS #clustering #concurrent #multi #performance #thread
An efficient processor partitioning and thread mapping strategy for mesh-connected multiprocessor systems (HL, WML, YS), pp. 403–412.
SACSAC-1997-SchusterH #scalability #workflow
A workflow data distribution strategy for scalable workflow management systems (HS, PH), pp. 174–176.
ICSEICSE-1997-Muller #migration #reverse engineering #tutorial
Reverse Engineering Strategies for Software Migration (Tutorial) (HAM), pp. 659–660.
ASF+SDFASF+SDF-1997-BorovanskyK #partial evaluation
Strategies of ELAN: meta-interpretation and partial evaluation (PB, HK), p. 2.
ASF+SDFASF+SDF-1997-LuttikV #specification
Specification of rewriting strategies (SPL, EV), p. 9.
HPCAHPCA-1997-AugustCGH #architecture #branch #predict
Architectural Support for Compiler-Synthesized Dynamic Branch Prediction Strategies: Rationale and Initial Results (DIA, DAC, JCG, WmWH), pp. 84–93.
PPoPPPPoPP-1997-TauraY #effectiveness #garbage collection #parallel #programming language #scalability
An Effective Garbage Collection Strategy for Parallel Programming Languages on Large Scale Distributed-Memory Machines (KT, AY), pp. 264–275.
ICLPICLP-1997-AntoyEH #evaluation #functional #logic #parallel
Parallel Evaluation Strategies for Functional Logic Languages (SA, RE, MH), pp. 138–152.
ICLPICLP-1997-ShimajiriSI #modelling
Incorporating a Pruning Strategy into the Computation of Stable Models based on MGTP (YS, HS, HI), pp. 376–390.
RTARTA-1997-Statman #combinator #effectiveness #reduction
Effective Reduction and Conversion Strategies for Combinators (RS), pp. 299–307.
DACDAC-1996-CarleyGRS #synthesis #tool support
Synthesis Tools for Mixed-Signal ICs: Progress on Frontend and Backend Strategies (LRC, GGEG, RAR, WMCS), pp. 298–303.
DACDAC-1996-PopescuM #design #verification
Innovative Verification Strategy Reduces Design Cycle Time for High-End Sparc Processor (VP, BM), pp. 311–314.
DACDAC-1996-VercauterenLM96a #architecture #embedded #kernel #realtime
A Strategy for Real-Time Kernel Support in Application-Specific HW/SW Embedded Architectures (SV, BL, HDM), pp. 678–683.
WRLARWLW-1996-ClavelM #logic
Reflection and strategies in rewriting logic (MC, JM), pp. 126–148.
TACASTACAS-1996-BuhrkeLV #infinity
Strategy Construction in Infinite Ganes with Streett and Rabin Chain Winning Conditions (NB, HL, JV), pp. 207–224.
CHICHI-1996-DarkenS #behaviour #scalability
Wayfinding Strategies and Behaviors in Large Virtual Worlds (RPD, JLS), pp. 142–149.
AdaTRI-Ada-1996-MeyerR #design #embedded #safety
Design and Test Strategies for a Safety-Critical Embedded Executive (CAM, MGR), pp. 29–37.
ICPRICPR-1996-KimGS #recognition #segmentation
A segmentation and recognition strategy for handwritten phrases (GK, VG, SNS), pp. 510–514.
ICPRICPR-1996-LamY #detection #performance
Efficient circular object detection with hypothesis filtering strategy and Hough transform (WCYL, SYY), pp. 542–546.
ICPRICPR-1996-ShiniK #3d #analysis #metric
3D measurement strategy based on a projection invariance motion analysis with an artificial retina sensor (CWS, KIK), pp. 369–373.
KDDKDD-1996-WirthR #approach #database #detection #multi
Detecting Early Indicator Cars in an Automotive Database: A Multi-Strategy Approach (RW, TPR), pp. 76–81.
SEKESEKE-1996-Balmas96a #formal method #named #programming #source code
PRISME: Formalizing Programming Strategies as a Way to Understand Programs (FB), pp. 361–368.
ECOOPECOOP-1996-Goldberg #metric
Measurement Strategies (AG), p. 1.
PPDPPLILP-1996-BenaissaLR #modelling #recursion #reduction #using
Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
PPDPPLILP-1996-FreireSW #logic programming #scheduling #source code
Beyond Depth-First: Improving Tabled Logic Programs through Alternative Scheduling Strategies (JF, TS, DSW), pp. 243–258.
SACSAC-1996-LiuC #algorithm #distributed #heuristic #query
A heuristic algorithm for partition strategy in distributed query processing (CL, HC), pp. 196–200.
FSEFSE-1996-RosenblumW #effectiveness #predict #testing
Predicting the Cost-Effectiveness of Regression Testing Strategies (DSR, EJW), pp. 118–126.
ICSEICSE-1996-WatanabeS #adaptation #generative #operating system #standard #testing
A Specification-Based Adaptive Test Case Generation Strategy for Open Operating System Standards (AW, KS), pp. 81–89.
CADECADE-1996-Dixon #logic
Search Strategies for Resolution in Temporal Logics (CD), pp. 673–687.
DACDAC-1995-KriegerBK #fault #multi #simulation
Symbolic Fault Simulation for Sequential Circuits and the Multiple Observation Time Test Strategy (RK, BB, MK), pp. 339–344.
ASEKBSE-1995-EllmanKMS #design #interactive #optimisation
A Transformation System for Interactive Reformulation of Design Optimization Strategies (TE, JEK, TM, MS), pp. 44–51.
ICDARICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification
An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
ICDARICDAR-v2-1995-CaseyL #bibliography #segmentation
Strategies in character segmentation: a survey (RGC, EL), pp. 1028–1033.
VLDBVLDB-1995-BassiliadesV #database #parallel
A Non-Uniform Data Fragmentation Strategy for Parallel Main-Menory Database Systems (NB, IPV), pp. 370–381.
VLDBVLDB-1995-MoserKK #data flow #interactive #multi #named
L/MRP: A Buffer Management Strategy for Interactive Continuous Data Flows in a Multimedia DBMS (FM, AK, WK), pp. 275–286.
ICALPICALP-1995-Le #game studies #on the
On Determining Optimal Strategies in Pursiut Games in the Plane (NML), pp. 499–510.
AdaEuropeAdaEurope-1995-RybinSZ #implementation #problem
ASIS for GNAT: Goals, Problems and Implementation Strategy (SR, AS, EZ), pp. 139–151.
CAiSECAiSE-1995-GeppertD #database #reuse
Strategies and Techniques: Reusable Artifacts for the Construction of Database Management Systems (AG, KRD), pp. 297–310.
CIKMCIKM-1995-BrunstromLS #database #distributed #evaluation
Experimental Evaluation of Dynamic Data Allocation Strategies in A Distributed Database with Changing Workloads (AB, STL, RS), pp. 395–402.
CIKMCIKM-1995-LeongS #multi
Data Broadcasting Strategies over Multiple Unreliable Wireless Channels (HVL, AS), pp. 96–104.
ICMLICML-1995-TowellVGJ #information retrieval #learning
Learning Collection FUsion Strategies for Information Retrieval (GGT, EMV, NKG, BJL), pp. 540–548.
KDDKDD-1995-ZhongO #multi #towards
Toward a Multi-Strategy and Cooperative Discovery System (NZ, SO), pp. 337–343.
SIGIRSIGIR-1995-IwayamaT #categorisation #clustering #comparison
Cluster-Based Text Categorization: A Comparison of Category Search Strategies (MI, TT), pp. 273–280.
SIGIRSIGIR-1995-VoorheesGJ #learning
Learning Collection Fusion Strategies (EMV, NKG, BJL), pp. 172–179.
LOPSTRLOPSTR-1995-KreitzOS #development #proving
Guiding Program Development Systems by a Connection Based Proof Strategy (CK, JO, SS), pp. 137–151.
PPDPPLILP-1995-ButowGOT #semantics
A New Strategy for Semantic Matching (BB, RG, EO, ST), pp. 81–96.
SACSAC-1995-PittasSS #documentation #hypermedia #modelling #multi
Reader’s document models and access strategies in hypermedia and multimedia systems (MP, SS, DS), pp. 253–257.
PPoPPPPoPP-1995-BordawekarCKKP #compilation #parallel #source code
A Model and Compilation Strategy for Out-of-Core Data Parallel Programs (RB, ANC, KK, CK, MHP), pp. 1–10.
ICLPILPS-1995-Prehofer #call-by #functional #higher-order #logic programming
A Call-by-Need Strategy for Higher-Order Functional-Logic Programming (CP), pp. 147–161.
DACDAC-1994-SchobingerN #design #power management
Low Power CMOS Design Strategies (MS, TGN), pp. 594–595.
DATEEDAC-1994-DumasGLP #effectiveness #fault
Effectiveness of a Variable Sampling Time Strategy for Delay Fault Diagnosis (DD, PG, CL, SP), pp. 518–523.
SIGMODSIGMOD-1994-BarbaraI #mobile
Sleepers and Workaholics: Caching Strategies in Mobile Environments (DB, TI), pp. 1–12.
VLDBVLDB-1994-KemperK
Dual-Buffering Strategies in Object Bases (AK, DK), pp. 427–438.
ESOPESOP-1994-CiceroneP #composition #design #interface
Strategies in Modular System Design by Interface Rewriting (SC, FPP), pp. 165–179.
STOCSTOC-1994-KollerMS #algorithm #game studies #performance #random
Fast algorithms for finding randomized strategies in game trees (DK, NM, BvS), pp. 750–759.
STOCSTOC-1994-LiptonY #complexity #game studies #scalability
Simple strategies for large zero-sum games with applications to complexity theory (RJL, NEY), pp. 734–740.
ICALPICALP-1994-MeiI #navigation #performance
Efficient Strategies for Robot Navigation in Unknown Environment (AM, YI), pp. 630–641.
FMFME-1994-Naftalin #design #refinement
Informal Strategies in Design by Refinement (MN), pp. 401–420.
FMFME-1994-StoreyH #using
A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
AdaEuropeAdaEurope-1994-FrancolaM #realtime #validation
Test Philosophy and Validation Strategy of On-Board Real Time Software in Envisat-1 Satellite Radar-Altimeter (SF, MM), pp. 270–281.
AdaEuropeAdaEurope-1994-Gale #ada #development #recommendation
Recommendations and Proposals for an Ada Strategy in the Space Software Development Environment (LPG), pp. 175–203.
ECOOPECOOP-1994-ChenTK #multi #performance
Efficient Dynamic Look-Up Strategy for Multi-Methods (WC, VT, WK), pp. 408–431.
PPDPALP-1994-AntoyM #reduction
A Sequential Reduction Strategy (SA, AM), pp. 168–185.
POPLPOPL-1994-AntoyEH
A Needed Narrowing Strategy (SA, RE, MH), pp. 268–279.
SACSAC-1994-AfshariG #fuzzy #modelling
A fuzzy model-based optimal control strategy (AA, CG), pp. 120–125.
CADECADE-1994-Plaisted #performance #proving #theorem proving
The Search Efficiency of Theorem Proving Strategies (DAP), pp. 57–71.
ICLPICLP-1994-ProiettiP #logic
Completeness of Some Transformation Strategies for Avoiding Unnecessary Logical Variables (MP, AP), pp. 714–729.
ICLPILPS-1994-Dutra #logic programming #parallel #scheduling
Strategies for Scheduling And- and Or-Parallel Work in Parallel Logic Programming Systems (IdCD), pp. 289–304.
ISSTAISSTA-1994-Damodaran-KamalF #parallel #source code #testing
Testing Races in Parallel Programs with an OtOt Strategy (SKDK, JMF), pp. 216–227.
DACDAC-1993-ChessL #fault #simulation
Bridge Fault simulation strategies for CMOS integrated Circuits (BC, TL), pp. 458–462.
DACDAC-1993-SrinivasanGB #clustering #performance #pseudo #testing
An Efficient Partitioning Strategy for Pseudo-Exhaustive Testing (RS, SKG, MAB), pp. 242–248.
ICDARICDAR-1993-GillouxLB #markov #modelling #recognition #using #word
Strategies for handwritten words recognition using hidden Markov models (MG, ML, JMB), pp. 299–304.
ICDARICDAR-1993-PlessisSHMLDM #classification #multi #recognition #word
A multi-classifier combination strategy for the recognition of handwritten cursive words (BP, AS, LH, EM, EL, OD, JVM), pp. 642–645.
VLDBVLDB-1993-LanzelotteVZ #effectiveness #execution #on the #optimisation #parallel
On the Effectiveness of Optimization Search Strategies for Parallel Execution Spaces (RSGL, PV, MZ), pp. 493–504.
VLDBVLDB-1993-Lomet #concurrent
Key Range Locking Strategies for Improved Concurrency (DBL), pp. 655–664.
VLDBVLDB-1993-RahmM #analysis #database #parallel
Analysis of Dynamic Load Balancing Strategies for Parallel Shared Nothing Database Systems (ER, RM), pp. 182–193.
PEPMPEPM-1993-Chin #automation #towards
Towards an Automated Tupling Strategy (WNC), pp. 119–132.
HCIHCI-ACS-1993-BrinkmanS #analysis #fault
Analysis and Support of Fault Diagnosis Strategies (JAB, TWvdS), pp. 115–120.
HCIHCI-ACS-1993-Chung #using
Decision Maker’s Knowledge Level and the Selection of Decision Strategies in Using a Decision Support System (HMMC), pp. 487–491.
HCIHCI-ACS-1993-Davies #design #process
Articulating the Design Process: TheEffects of Verbalisation Upon Design Strategies (SPD), pp. 528–533.
HCIHCI-ACS-1993-Sanchez #education
Metalearning and Metaknowledge Strategies to Produce Educational Software (JHS), pp. 368–373.
HCIHCI-ACS-1993-SonntagS #fault #maintenance #optimisation #process
Strategies and Training for Maintenance Personnel: Optimizing Fault Diagnosis Activities (KS, NS), pp. 90–95.
HCIHCI-ACS-1993-StanneyS #human-computer #information management #performance
The Influence of Information Processing Strategies on Human-Computer Performance (KMS, GS), pp. 463–468.
HCIHCI-ACS-1993-WestlanderSCA #evaluation
The Success of an Ambtious Broad QWL Strategy — Our Methods of Evaluation and Interpretation of the Findings (GW, IS, BC, ), pp. 857–862.
HCIHCI-ACS-1993-ZimolongK #interactive #maintenance
Interactive Support System for Maintenance and Repair: Diagnosis Strategies (BZ, UK), pp. 86–89.
HCIHCI-SHI-1993-HowardC #towards
Snapshots from the Eye: Toward Strategies for Viewing Bibliographic Citations (DLH, MEC), pp. 488–493.
HCIHCI-SHI-1993-YeS #design #interface #problem
Introducing Problem Solving Strategies of Users into the Interface Design (NY, GS), pp. 873–878.
AdaTRI-Ada-1993-MathiasR #ada
Ada/X Window System Bindings: Conversion Strategies (KSM, MAR), pp. 29–36.
CIKMCIKM-1993-ChanS #learning #multi
Experiments on Multi-Strategy Learning by Meta-Learning (PKC, SJS), pp. 314–323.
SEKESEKE-1993-LeloucheV #automation #knowledge-based #testing #using
Using the Inference Engine Strategy in the Automatic Construction of Test Cases for a Knowledge-Based System (RL, LV), pp. 388–395.
SIGIRSIGIR-1993-CallanC #evaluation #query #using
An Evaluation of Query Processing Strategies Using the TIPSTER Collection (JPC, WBC), pp. 347–355.
ECOOPECOOP-1993-RossonC #programming #reuse
Active Programming Strategies in Reuse (MBR, JMC), pp. 4–20.
LOPSTRLOPSTR-1993-Johansson #incremental #interactive #using
Interactive Program Derivation Using Program Schemata and Incrementally Generated Strategies (ALJ), pp. 100–112.
PPDPPLILP-1993-Letichevsky #development
Development of Rewriting Strategies (AAL), pp. 378–390.
PPDPPLILP-1993-LoogenFR #lazy evaluation
A Demand Driven Computation Strategy for Lazy Narrowing (RL, FJLF, MRA), pp. 184–200.
RERE-1993-LeiteF #concept
A strategy for conceptual model acquisition (JCSdPL, APMF), pp. 243–246.
SACSAC-1993-GrimmLT #multi #problem
A Parallelized Search Strategy for Solving a Multicriteria Aircraft Routing Problem (JJG, GBL, AJT), pp. 570–577.
HTHT-ECHT-1992-OgawaTTH #design #hypermedia
Design Strategies for Scenario-Based Hypermedia: Description of its Structure, Dynamics, and Style (RO, ET, DT, KH), pp. 71–80.
PODSPODS-1992-Greiner #learning #performance #query
Learning Efficient Query Processing Strategies (RG), pp. 33–46.
SIGMODSIGMOD-1992-GhandeharizadehDQ #analysis #clustering #multi #performance
A Performance Analysis of Alternative Multi-Attribute Declustering Strategies (SG, DJD, WQ), pp. 29–38.
SIGMODSIGMOD-1992-LanzelotteVZ #object-oriented #optimisation #query #recursion #using
Optimization of Object-Oriented Recursive Queries using Cost-Controlled Strategies (RSGL, PV, MZ), pp. 256–265.
VLDBVLDB-1992-WhiteD #performance #pointer
A Performance Study of Alternative Object Faulting and Pointer Swizzling Strategies (SJW, DJD), pp. 419–431.
PEPMPEPM-1992-ShermanS #equation #logic programming #source code
Call Unfolding Strategies for Equational Logic Programs (DS, RS), pp. 48–53.
CHICHI-1992-TealR #performance
A performance model of system delay and user strategy selection (SLT, AIR), pp. 295–305.
CAiSECAiSE-1992-HainautCDM #architecture #automation #database #design #flexibility
Database CASE Tool Architecture: Principles for Flexible Design Strategies (JLH, MC, BD, OM), pp. 187–207.
ICMLML-1992-OliveiraS #feature model #induction #using
Constructive Induction Using a Non-Greedy Strategy for Feature Selection (ALO, ALSV), pp. 355–360.
ICMLML-1992-Tesauro #difference #learning
Temporal Difference Learning of Backgammon Strategy (GT), pp. 451–457.
PPDPALP-1992-Echahed
Uniform Narrowing Strategies (RE), pp. 259–275.
PPDPALP-1992-Socher-Ambrosius
A Goal Oriented Strategy Based on Completion (RSA), pp. 435–445.
LOPSTRLOPSTR-1992-ProiettiP #incremental #logic programming #source code
Best-first Strategies for Incremental Transformations of Logic Programs (MP, AP), pp. 82–98.
CADECADE-1992-Hines
The Central Variable Strategy of Str+ve (LMH), pp. 35–49.
CAVCAV-1992-BalarinS #verification
A Verification Strategy for Timing-Constrained Systems (FB, ALSV), pp. 151–163.
DACDAC-1991-RaithB
A New Hypergraph Based Rip-Up and Reroute Strategy (MR, MB), pp. 54–59.
DACDAC-1991-SteinNGR #adaptation #named #simulation
ADAPTS: A Digital Transient Simulation Strategy for Integrated Circuits (ADS, TVN, BJG, RAR), pp. 26–31.
ASEKBSE-1991-Sasso
Motivating Adoption of KBSA: Issues, Arguments, and Strategies (WCS), pp. 90–96.
SIGMODSIGMOD-1991-IoannidisK #analysis #optimisation #query
Left-Deep vs. Bushy Trees: An Analysis of Strategy Spaces and its Implications for Query Optimization (YEI, YCK), pp. 168–177.
VLDBVLDB-1991-Joshi #adaptation #multi
Adaptive Locking Strategies in a Multi-node Data Sharing Environment (AMJ), pp. 181–191.
SASWSA-1991-Breuer #analysis #learning #synthesis
An Analysis/Synthesis Language with Learning Strategies (PTB), pp. 202–209.
CHICHI-1991-KoenemannR #comprehension #problem
Expert problem solving strategies for program comprehension (JK, SPR), pp. 125–130.
KRKR-1991-GreinerO #approximate
Probably Approximately Optimal Derivation Strategies (RG, PO), pp. 277–288.
ICMLML-1991-GratchD #approach #effectiveness #hybrid
A Hybrid Approach to Guaranteed Effective Control Strategies (JG, GD), pp. 509–513.
ICMLML-1991-JonesV
A Computational Model of Acquisition for Children’s Addtion Strategies (RMJ, KV), pp. 65–69.
ICMLML-1991-Nedellec
A Smallest Generalization Step Strategy (CN), pp. 529–533.
SIGIRSIGIR-1991-WendlandtD #analysis #documentation #retrieval #semantics
Incorporating a Semantic Analysis into a Document Retrieval Strategy (EBW, JRD), pp. 270–279.
LOPSTRLOPSTR-1991-ProiettiP #automation #logic programming #source code
An Automatic Transfomation Strategy for Avoiding Unnecessary Variables in Logic Programs (Extended Abstract) (MP, AP), pp. 126–128.
PPDPPLILP-1991-LangendoenV #memory management #named #parallel #reduction
FRATS: A Parallel Reduction Strategy for Shared Memory (KL, WGV), pp. 99–110.
RTARTA-1991-BonacinaH #on the #proving #theorem proving
On Fairness of Completion-Based Theorem Proving Strategies (MPB, JH), pp. 348–360.
RTARTA-1991-Hermann #on the #proving
On Proving Properties of Completion Strategies (MH), pp. 398–410.
RTARTA-1991-SnyderL
Goal Directed Strategies for Paramodulation (WS, CL), pp. 150–161.
ISSTATAV-1991-WeyukerWH #comparison #testing
Comparison of Program Testing Strategies (EJW, SNW, RGH), pp. 1–10.
PODSPODS-1990-Tay #multi #on the
On the Optimality of Strategies for Multiple Joins (YCT), pp. 124–131.
VLDBVLDB-1990-CheineyM #clustering #parallel #transitive
A Parallel Strategy for Transitive Closure usind Double Hash-Based Clustering (JPC, CdM), pp. 347–358.
VLDBVLDB-1990-GhandeharizadehD #clustering #database #multi
Hybrid-Range Partitioning Strategy: A New Declustering Strategy for Multiprocessor Database Machines (SG, DJD), pp. 481–492.
SIGIRSIGIR-1990-Burkowski #retrieval #set
Surrogate Subsets: A Free Space Management Strategy for the Index of a Text Retrieval System (FJB), pp. 211–226.
PODSPODS-1989-CohenW #knowledge base #parallel #why
Why a Single Parallelization Strategy in not Enough in Knowledge Bases (SRC, OW), pp. 200–216.
CHICHI-1989-LangeM #object-oriented #programming #reuse
Some strategies of reuse in an object-oriented programming environment (BML, TGM), pp. 69–73.
CAiSECAiSE-1989-HernbackL #analysis #automation #classification #framework #implementation #tool support
A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
ICMLML-1989-Grefenstette #algorithm #incremental #learning #search-based
Incremental Learning of Control Strategies with Genetic algorithms (JJG), pp. 340–344.
ICMLML-1989-Selfridge #adaptation #case study #contest #learning
Atoms of Learning II: Adaptive Strategies A Study of Two-Person Zero-Sum Competition (OGS), pp. 412–415.
ICMLML-1989-TecuciK #learning #multi
Multi-Strategy Learning in Nonhomongeneous Domain Theories (GT, YK), pp. 14–16.
ICMLML-1989-VanLehn #problem #what
Discovering Problem Solving Strategies: What Humans Do and Machines Don’t (Yet) (KV), pp. 215–217.
OOPSLAOOPSLA-1989-WaltherP #prototype #smalltalk
Strategies for Scientific Prototyping in Smalltalk (SSW, RLP), pp. 159–167.
ESECESEC-1989-Shutt #development #program analysis #specification #tool support #using
A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
ISSTATAV-1989-RowlandZ #comparison
Experimental Comparison of Three System Test Strategies Preliminary Report (JHR, YZ), pp. 141–149.
VLDBVLDB-1988-NakayamaK #using
Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
STOCSTOC-1988-LoeblN #problem #set
Linearity and Unprovability of Set Union Problem Strategies (ML, JN), pp. 360–366.
LISPLFP-1988-ClingerHO #continuation #implementation
Implementation Strategies for Continuations (WDC, AH, EO), pp. 124–131.
LISPLFP-1988-Pugh
An Improved Replacement Strategy for Function Aaching (WP), pp. 269–276.
CSCWCSCW-1988-Greenbaum #analysis
In Search of Cooperation: An Historical Analysis of Work Organization and Management Strategies (JG), pp. 102–114.
SIGIRSIGIR-1988-SmeatonR #documentation #empirical #query #retrieval
Experiment on Incorporation Syntactic Processing of User Queries into a Document Retrieval Strategy (AFS, CJvR), pp. 31–51.
ICSEICSE-1988-DucasseE #automation #bibliography #debugging
A Review of Automated Debugging Systems: Knowledge, Strategies, and Techniques (MD, AME), pp. 162–173.
CADECADE-1988-HeiselRS #implementation #verification
Implementing Verification Strategies in the KIV-System (MH, WR, WS), pp. 131–140.
HTHT-1987-Charney
Comprehending Non-Linear Text: The Role of Discourse Cues and Reading Strategies (DC), pp. 109–120.
SIGMODSIGMOD-1987-Hanson #analysis #performance
A Performance Analysis of View Materialization Strategies (ENH), pp. 440–453.
VLDBVLDB-1987-Lu #database #transitive
New Strategies for Computing the Transitive Closure of a Database Relation (HL), pp. 267–274.
VLDBVLDB-1987-Nejdl #query #recursion
Recursive Strategies for Answering Recursive Queries — The RQA/FQI Strategy (WN), pp. 43–50.
HCIHCI-CE-1987-Salvendy #development #human-computer #interactive #research #what
What We Know and What We Should Know About Human-Computer Interaction: Strategies for Research and Development (GS), pp. 13–19.
RTARTA-1987-Padawitz #reduction
Strategy-Controlled Reduction and Narrowing (PP), pp. 242–255.
SIGMODSIGMOD-1986-BancilhonR #query #recursion
An Amateur’s Introduction to Recursive Query Processing Strategies (FB, RR), pp. 16–52.
SIGMODSIGMOD-1986-Bocca #evaluation #on the
On the Evaluation Strategy of EDUCE (JBB), pp. 368–378.
VLDBVLDB-1986-RaschidS #parallel #query #recursion
A Parallel Processing Strategy for Evaluating Recursive Queries (LR, SYWS), pp. 412–419.
CSCWCSCW-1986-GarrettSM #design #documentation #hypermedia #named
Intermedia: issues, strategies, and tactics in the design of a hypermedia document system (LNG, KES, NKM), pp. 163–174.
SIGIRSIGIR-1986-BelkinK #documentation #retrieval #using
Using Structural Representations of Anomalous States of Knowledge for Choosing Document Retrieval Strategies (NJB, BHK), pp. 11–22.
SIGIRSIGIR-1986-Smeaton #documentation #retrieval
Incorporating Syntactic Information into a Document Retrieval Strategy: An Investigation (AFS), pp. 103–113.
LICSLICS-1986-HalpernWW
Good Rewrite Strategies for FP (JYH, JHW, ELW), pp. 149–162.
ICLPSLP-1986-RossR86 #memory management #prolog
Paging Strategy for Prolog Based Dynamic Virtual Memory (MLR, KR), pp. 46–57.
VLDBVLDB-1985-ChouD #database #evaluation #relational
An Evaluation of Buffer Management Strategies for Relational Database Systems (HTC, DJD), pp. 127–141.
ICLPSLP-1985-GlasgowJM85 #parallel
User Defined Parallel Control Strategies in Nial (JIG, MAJ, CM), pp. 22–28.
DACDAC-1984-Richard #standard
A standard cell initial placement strategy (BDR), pp. 392–398.
VLDBVLDB-1984-DeenAT #query
A Strategy for Decomposing Complex Queries in a Heterogeneous DDB (SMD, RRA, MCT), pp. 397–400.
LISPLFP-1984-Pettorossi #performance #source code
A Powerful Strategy for Deriving Efficient Programs by Transformation (AP), pp. 273–281.
SIGIRSIGIR-1984-CroftT #adaptation #documentation #retrieval
The Use of Adaptive Mechanisms for Selection of Search Strategies in Document Retrieval Systems (WBC, RT), pp. 95–110.
ICSEICSE-1984-Ntafos #evaluation #testing
An Evaluation of Required Element Testing Strategies (SCN), pp. 250–256.
CADECADE-1984-ForsytheM #deduction #implementation
Implementation Strategies for Plan-Based Deduction (KF, SM), pp. 426–444.
ICLPILPC-1984-WolframML84 #logic programming #source code
A Unified Treatment of Resolution Strategies for Logic Programs (DAW, MJM, JLL), pp. 263–276.
ICLPSLP-1984-SubrahmanyamY84 #concept #evaluation #functional #logic programming
Conceptual Basis and Evaluation Strategies for Integrating Functional and Logic Programming (PAS, JHY), pp. 144–153.
ICLPSLP-1984-Warren84 #flexibility #memory management #performance #prolog
Efficient Prolog Memory Management for Flexible Control Strategies (DSW), pp. 198–202.
DACDAC-1983-JainS
Test strategy for microprocessers (SKJ, AKS), pp. 703–708.
SIGMODSIGMOD-1983-YuC #database #design #distributed #on the #query
On the Design of a Query Processing Strategy in a Distributed Database Environment (CTY, CCC), pp. 30–39.
SIGMODSIGMOD-1982-JarkeS #database #pascal #query #relational
Query Processing Strategies in the PASCAL/R Relational Database Management System (MJ, JWS), pp. 256–264.
PLDISCC-1982-RudmikM #compilation #performance #scalability #source code
An Efficient Separate Compilation Strategy for Very Large Programs (AR, BGM), pp. 301–307.
STOCSTOC-1982-Leighton #layout
A Layout Strategy for VLSI which Is Provably Good (Extended Abstract) (FTL), pp. 85–98.
SIGIRSIGIR-1982-BuellK #named #query #testing
LIARS: A Software Environment for Testing Query Processing Strategies (DAB, DHK), pp. 20–27.
CADECADE-1982-PietrzykowskiM #backtracking #deduction #exponential #performance
Exponential Improvement of Efficient Backtracking: A Strategy for Plan-Based Deduction (TP, SM), pp. 223–239.
DACDAC-1981-DeesS #performance
Performance of interconnection rip-up and reroute strategies (WADJ, RJSI), pp. 382–390.
DACDAC-1981-Heinisch
Aiming at a general routing strategy (JH), pp. 668–675.
VLDBVLDB-1981-MakinouchiTKA #evaluation #optimisation #query
The Optimization Strategy for Query Evaluation in RDB/V1 (AM, MT, HK, SA), pp. 518–529.
ICALPICALP-1981-FraenkelL #exponential
Computing a Perfect Strategy for n*n Chess Requires Time Exponential in N (ASF, DL), pp. 278–293.
ICSEICSE-1981-ZeilW #analysis #testing
Sufficient Tset Sets for Path Analysis Testing Strategies (SJZ, LJW), pp. 184–194.
SOSPSOSP-1981-MeyrowitzM #adaptation #design #named
BRUWIN: An Adaptable Design Strategy for Window Manager / Virtual Terminal Systems (NKM, MM), pp. 180–189.
VLDBVLDB-1980-EpsteinS #analysis #database #distributed
Analysis of Distributed Data Base Processing Strategies (RSE, MS), pp. 92–101.
VLDBVLDB-1980-Walter #database #distributed #transaction
Strategies for Handling Transactions in Distributed Data Base Systems During Recovery (BW), pp. 384–389.
ICALPICALP-1980-RaoultV #bound #semiparsing
Optimal Unbounded Search Strategies (JCR, JV), pp. 512–530.
LISPLISP-1980-Steele #abstraction #lisp
Strategies for Data Abstraction in LISP (BS), pp. 173–178.
PLDISCC-1979-Morris #abstraction #implementation
Data abstraction: A static implementation strategy (JBM), pp. 1–7.
PLDISCC-1979-PaiK #fault #parsing #syntax
Global context recovery: A new strategy for parser recovery from syntax errors (ABP, RBK), pp. 158–167.
SIGIRSIGIR-1979-RaghavanB #clustering #effectiveness #process
A Clustering Strategy Based on a Formalism of the Reproductive Process in Natural Systems (VVR, KB), pp. 10–22.
DACDAC-1978-Cha #testing
A testing strategy for PLAs (CWC), pp. 326–334.
POPLPOPL-1977-Harrison #code generation #compilation #optimisation
A New Strategy for Code Generation — The General Purpose Optimizing Compiler (WHH), pp. 29–37.
SOSPSOSP-1977-Masuda #memory management
Effect of Program Localities on Memory Management Strategies (TM), pp. 117–124.
SIGMODSIGMOD-1976-WongY #composition #named #query
Decomposition — A Strategy for Query Processing (Abstract) (EW, KY), p. 155.
VLDBVLDB-1975-Weldon #database #implementation
Implementation Strategies for the Census Data Base (JLW), pp. 589–590.
SOSPSOSP-1973-ChamberlinFL #memory management #multi
A Page Allocation Strategy for Multiprogramming Systems with Virtual Memory (DDC, SHF, LYL), pp. 66–72.
STOCSTOC-1970-Reiter #proving #theorem proving
The Predicate Elimination Strategy in Theorem Proving (RR), pp. 180–183.
DACDAC-1969-KrolakBCG #effectiveness #simulation
A simulation model for evaluating the effectiveness of various stock market strategies (PDK, REB, AC, HG), pp. 351–356.
SOSPSOSP-1969-VarehaRG
Strategies for structuring two level memories in a paging environment (ALV, RMR, MMG), pp. 54–59.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.