BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
constraint (93)
model (85)
time (54)
base (44)
system (43)

Stem under$ (all stems)

633 papers:

CASECASE-2015-LuSJSX #approach #multi #nondeterminism #programming
A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-YuYS #multi
Motion planning and manipulation of multiple nanowires simultaneouly under electric-fields in fluid suspension (KY, JY, JS), pp. 489–494.
DACDAC-2015-BockHKS #algorithm #modelling
Local search algorithms for timing-driven placement under arbitrary delay models (AB, SH, NK, US), p. 6.
DACDAC-2015-GangopadhyayNR #power management
Integrated power management in IoT devices under wide dynamic ranges of operation (SG, SBN, AR), p. 6.
DACDAC-2015-HuangCZL #behaviour #named #realtime #scheduling
PASS: priority assignment of real-time tasks with dynamic suspending behavior under fixed-priority scheduling (WHH, JJC, HZ, CL), p. 6.
DACDAC-2015-JangPGB #self
Self-correcting STTRAM under magnetic field attacks (JWJ, JP, SG, SB), p. 6.
DACDAC-2015-RoyLUP #multi #named #optimisation #paradigm #performance
OSFA: a new paradigm of gate-sizing for power/performance optimizations under multiple operating conditions (SR, DL, JU, DZP), p. 6.
DATEDATE-2015-PaoneRPZSS #constraints #framework #performance
Customization of OpenCL applications for efficient task mapping under heterogeneous platform constraints (EP, FR, GP, VZ, IS, CS), pp. 736–741.
DATEDATE-2015-WangWXWWYDLMW #adaptation #process
Adaptively tolerate power-gating-induced power/ground noise under process variations (ZW, XW, JX, XW, ZW, PY, LHKD, HL, RKVM, ZW), pp. 483–488.
HTHT-2015-AhlersM #challenge #collaboration #concept #network #semantics
Everything is Filed under “File”: Conceptual Challenges in Applying Semantic Search to Network Shares for Collaborative Work (DA, MM), pp. 327–328.
PODSPODS-2015-KoutrisW #complexity #consistency #constraints #query #self
The Data Complexity of Consistent Query Answering for Self-Join-Free Conjunctive Queries Under Primary Key Constraints (PK, JW), pp. 17–29.
SIGMODSIGMOD-2015-MishimaF #database #middleware #migration #named
Madeus: Database Live Migration Middleware under Heavy Workloads for Cloud Environment (TM, YF), pp. 315–329.
SIGMODSIGMOD-2015-SongZWY #constraints #named
SCREEN: Stream Data Cleaning under Speed Constraints (SS, AZ, JW, PSY), pp. 827–841.
ICSMEICSME-2015-CodobanRDB #case study #developer #how #lens #why
Software history under the lens: A study on why and how developers examine it (MC, SSR, DD, BB), pp. 1–10.
SCAMSCAM-2015-GhafariGR #automation #identification #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
ICALPICALP-v1-2015-BjorklundDH #exponential #problem #random #set #strict
The Parity of Set Systems Under Random Restrictions with Applications to Exponential Time Problems (AB, HD, TH), pp. 231–242.
LATALATA-2015-VerdierR #constraints #reachability #specification
Quotient of Acceptance Specifications Under Reachability Constraints (GV, JBR), pp. 299–311.
HCIDUXU-IXD-2015-KarbayR #case study
The Turkish Central Doctor Rendezvous System Under Spotlight: A User Study with Turkish Senior Users (EBK, KR), pp. 628–637.
HCIHIMI-IKC-2015-ZhouI #adaptation #behaviour
Effect of Adaptive Caution on Driver’s Lane-Change Behavior under Cognitively Distracted Condition (HZ, MI), pp. 262–271.
ICMLICML-2015-GasseAE #classification #composition #multi #on the #set
On the Optimality of Multi-Label Classification under Subset Zero-One Loss for Distributions Satisfying the Composition Property (MG, AA, HE), pp. 2531–2539.
ICMLICML-2015-HallakSMM #learning #modelling
Off-policy Model-based Learning under Unknown Factored Dynamics (AH, FS, TAM, SM), pp. 711–719.
ICMLICML-2015-RichmanM #classification #constraints
Dynamic Sensing: Better Classification under Acquisition Constraints (OR, SM), pp. 267–275.
ICMLICML-2015-WuGS #combinator #feedback #finite #identification #on the
On Identifying Good Options under Combinatorially Structured Feedback in Finite Noisy Environments (YW, AG, CS), pp. 1283–1291.
KDDKDD-2015-Kaban #bound #random
Improved Bounds on the Dot Product under Random Projection and Random Sign Projection (AK), pp. 487–496.
KDDKDD-2015-LeeWK #consistency #constraints #difference #privacy
Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints (JL, YW, DK), pp. 635–644.
OOPSLAOOPSLA-2015-DietrichHS #analysis #java #points-to
Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
SACSAC-2015-BechetCCC #constraints #mining #multi #sequence
Sequence mining under multiple constraints (NB, PC, TC, BC), pp. 908–914.
SACSAC-2015-BrideJM #approximate #generative #testing
Tri-modal under-approximation of event systems for test generation (HB, JJ, PAM), pp. 1737–1744.
SACSAC-2015-MainiS #communication #distributed #multi #using
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SACSAC-2015-OliveiraLV #framework #performance #security #web #web service
Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
ESEC-FSEESEC-FSE-2015-MorenoCGS #adaptation #approach #model checking #nondeterminism #probability #self
Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
ASPLOSASPLOS-2015-MishraZLH #approach #constraints #energy #modelling #performance #probability #visual notation
A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
ASPLOSASPLOS-2015-WangJZY #memory management #named #reliability
SD-PCM: Constructing Reliable Super Dense Phase Change Memory under Write Disturbance (RW, LJ, YZ, JY), pp. 19–31.
ICLPICLP-2015-LeeMW #logic #markov #semantics
Markov Logic Style Weighted Rules under the Stable Model Semantics (JL, YM, YW).
VMCAIVMCAI-2015-DanMVY #abstraction #effectiveness #memory management #modelling #verification
Effective Abstractions for Verification under Relaxed Memory Models (AMD, YM, MTV, EY), pp. 449–466.
QoSAQoSA-2014-EtxeberriaTCS #hardware #nondeterminism #parametricity
Performance-based selection of software and hardware features under parameter uncertainty (LE, CT, VC, GS), pp. 23–32.
CASECASE-2014-HaoLGC #effectiveness #flexibility #markov #network #nondeterminism #problem #scheduling
An effective Markov network based EDA for flexible job shop scheduling problems under uncertainty (XCH, LL, MG, CFC), pp. 131–136.
CASECASE-2014-LeeJMC #framework #identification #recognition #robust
Iterative identification framework for robust hand-written digit recognition under extremely noisy conditions (HL, SJ, TM, NYC), pp. 728–733.
CASECASE-2014-ZhangHSL #coordination
Inventory hedging and coordination under inventory-level-dependent demand (TZ, GQH, YS, SL), pp. 658–664.
DACDAC-2014-RehmanKSSH #adaptation #code generation #dependence #named #process #reliability
dTune: Leveraging Reliable Code Generation for Adaptive Dependability Tuning under Process Variation and Aging-Induced Effects (SR, FK, DS, MS, JH), p. 6.
DACDAC-2014-SutariaRZRMC #modelling #random #simulation #validation
BTI-Induced Aging under Random Stress Waveforms: Modeling, Simulation and Silicon Validation (KS, AR, RZ, RR, YM, YC), p. 6.
DATEDATE-2014-BanerjeeD #calculus #constraints #generative #random #realtime #sequence
Acceptance and random generation of event sequences under real time calculus constraints (KB, PD), pp. 1–6.
DATEDATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance
Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATEDATE-2014-RehmanKSH #compilation #reliability
Compiler-driven dynamic reliability management for on-chip systems under variabilities (SR, FK, MS, JH), pp. 1–4.
DocEngDocEng-2014-Fan0N #using
Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
SIGMODSIGMOD-2014-AilamakiLTPP #how #multi
How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
SIGMODSIGMOD-2014-IleanaCDK #constraints #query
Complete yet practical search for minimal query reformulations under constraints (II, BC, AD, YK), pp. 1015–1026.
VLDBVLDB-2014-KonstantinidisA #constraints #integration #optimisation #scalability
Optimizing the Chase: Scalable Data Integration under Constraints (GK, JLA), pp. 1869–1880.
VLDBVLDB-2014-LiHMW #algorithm #difference #privacy #query
A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy (CL, MH, GM, YW), pp. 341–352.
VLDBVLDB-2014-SongCY0 #constraints
Repairing Vertex Labels under Neighborhood Constraints (SS, HC, JXY, LC), pp. 987–998.
WRLAWRLA-2014-AlrahmanABL #concurrent #maude #memory management #modelling #question #source code
Can We Efficiently Check Concurrent Programs Under Relaxed Memory Models in Maude? (YAA, MA, AB, ALL), pp. 21–41.
SANERCSMR-WCRE-2014-HoraEADV #api #evolution #named
APIEvolutionMiner: Keeping API evolution under control (AH, AE, NA, SD, MTV), pp. 420–424.
SASSAS-2014-BakhirkinBP #abstraction #analysis #approximate
Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
STOCSTOC-2014-ImKM #algorithm #constraints #scheduling
Competitive algorithms from competitive equilibria: non-clairvoyant scheduling under polyhedral constraints (SI, JK, KM), pp. 313–322.
ICALPICALP-v1-2014-CanonneR #probability #testing
Testing Probability Distributions Underlying Aggregated Data (CLC, RR), pp. 283–295.
ICALPICALP-v1-2014-DvirOS #equivalence #testing
Testing Equivalence of Polynomials under Shifts (ZD, RMdO, AS), pp. 417–428.
FMFM-2014-MaricS #hardware #memory management #transaction #verification
Verification of a Transactional Memory Manager under Hardware Failures and Restarts (OM, CS), pp. 449–464.
CHICHI-2014-HernandezPRC
Under pressure: sensing stress of computer users (JH, PP, AR, MC), pp. 51–60.
CHICHI-2014-LeeLKKHC #approach
An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
CHICHI-2014-MasseyLW #repository
Cloudy forecast: an exploration of the factors underlying shared repository use (CM, TL, SW), pp. 2461–2470.
CHICHI-2014-PolitisBP #multimodal
Evaluating multimodal driver displays under varying situational urgency (IP, SAB, FEP), pp. 4067–4076.
HCIDUXU-DP-2014-MukherjeeWHCR #design #tool support
Designing Financial Literacy and Saving Tools for the Unbanked and under-banked in Brazil (AM, CW, SH, FC, WR), pp. 71–80.
HCIDUXU-TMT-2014-Greiner-PetterM #design
Reframing Design under Technical Conditions (MGP, CM), pp. 96–103.
HCIDUXU-TMT-2014-SakamotoM #elicitation #interactive #mobile #named #perspective #requirements
M4REMAIP: Method for Requirements Elicitation Based on Mobile Applications under an Interaction Perspective (SGS, LCdM), pp. 74–85.
ICEISICEIS-v1-2014-KozievitchHNT #data fusion #image #retrieval
Exploring Data Fusion under the Image Retrieval Domain (NPK, CSH, JN, RdST), pp. 171–178.
ICMLICML-c2-2014-AzarLB #correlation #feedback #online #optimisation #probability
Online Stochastic Optimization under Correlated Bandit Feedback (MGA, AL, EB), pp. 1557–1565.
ICMLICML-c2-2014-GunasekarRG #constraints #exponential #matrix #product line
Exponential Family Matrix Completion under Structural Constraints (SG, PR, JG), pp. 1917–1925.
ICMLICML-c2-2014-KpotufeSJS #consistency
Consistency of Causal Inference under the Additive Noise Model (SK, ES, DJ, BS), pp. 478–486.
ICMLICML-c2-2014-LiuZBP #dependence #modelling #multi #testing #visual notation
Multiple Testing under Dependence via Semiparametric Graphical Models (JL, CZ, ESB, DP), pp. 955–963.
ICMLICML-c2-2014-WangHS #learning
Active Transfer Learning under Model Shift (XW, TKH, JS), pp. 1305–1313.
ICMLICML-c2-2014-WangL #estimation #metric #robust
Robust Inverse Covariance Estimation under Noisy Measurements (JKW, SdL), pp. 928–936.
ICMLICML-c2-2014-WenYG #learning #nondeterminism #robust
Robust Learning under Uncertain Test Distributions: Relating Covariate Shift to Model Misspecification (JW, CNY, RG), pp. 631–639.
ICPRICPR-2014-DanismanBD #evaluation #gender #normalisation #recognition
Cross-Database Evaluation of Normalized Raw Pixels for Gender Recognition under Unconstrained Settings (TD, IMB, CD), pp. 3144–3149.
ICPRICPR-2014-FerisBPS #detection
Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
ICPRICPR-2014-HuynhR #image
Recovery of Spectral Sensitivity Functions from a Colour Chart Image under Unknown Spectrally Smooth Illumination (CPH, ARK), pp. 708–713.
ICPRICPR-2014-JoshiGG #automation #predict #using #visual notation
Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPRICPR-2014-KaradagV #image #markov #random
Fusion of Image Segmentations under Markov, Random Fields (ÖÖK, FTYV), pp. 930–935.
ICPRICPR-2014-KimK #estimation #image #multi #pattern matching #robust
Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions (JK, MK), pp. 4560–4563.
ICPRICPR-2014-MesterC #statistics
When Patches Match — A Statistical View on Matching under Illumination Variation (RM, CC), pp. 4364–4369.
ICPRICPR-2014-QuLWXT #framework #robust #set
Robust Point Set Matching under Variational Bayesian Framework (HBQ, JCL, JQW, LX, HJT), pp. 58–63.
ICPRICPR-2014-SattaGB #gender #information management #recognition
Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information (RS, JG, LB), pp. 357–362.
ICPRICPR-2014-SongSLZZC #detection #image
Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
ICPRICPR-2014-VilaltaGM #adaptation #classification
Domain Adaptation under Data Misalignment: An Application to Cepheid Variable Star Classification (RV, KDG, LM), pp. 3660–3665.
KDDKDD-2014-LuIBL #recommendation #social
Optimal recommendations under attraction, aversion, and social influence (WL, SI, SB, LVSL), pp. 811–820.
KDDKDD-2014-LuM #difference #estimation #exponential #graph #privacy #random
Exponential random graph estimation under differential privacy (WL, GM), pp. 921–930.
KRKR-2014-Lin14a #axiom #first-order #higher-order #induction #semantics
A First-Order Semantics for Golog and ConGolog under a Second-Order Induction Axiom for Situations (FL).
SACSAC-2014-SpiegelJA #classification #distance #performance
Fast time series classification under lucky time warping distance (SS, BJJ, SA), pp. 71–78.
LICSLICS-CSL-2014-LosemannM #query
MSO queries on trees: enumerating answers under updates (KL, WM), p. 10.
QoSAQoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance
Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
CASECASE-2013-DotoliEFPST #network #realtime
A real time traffic management model for regional railway networks under disturbances (MD, NE, MF, AP, FS, BT), pp. 892–897.
CASECASE-2013-LinG #detection #framework #network #optimisation #synthesis
Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
CASECASE-2013-SunSS #optimisation #scheduling
Integrated operating room scheduling optimization under particularly workload constrain of surgeon (BS, JS, LS), pp. 972–977.
CASECASE-2013-WangBR #modelling #monitoring #using
Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
DACDAC-2013-AxerE #fault #probability #scheduling
Stochastic response-time guarantee for non-preemptive, fixed-priority scheduling under errors (PA, RE), p. 7.
DACDAC-2013-BanerjeeDSC #adaptation #constraints #energy #performance #realtime
Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints (DB, SKD, SS, AC), p. 7.
DACDAC-2013-CalimeraMP #constraints #energy #fault #scheduling
Energy-optimal SRAM supply voltage scheduling under lifetime and error constraints (AC, EM, MP), p. 6.
DACDAC-2013-LuoCH #design #nondeterminism
Design of cyberphysical digital microfluidic biochips under completion-time uncertainties in fluidic operations (YL, KC, TYH), p. 7.
DACDAC-2013-YousofshahiOLH #capacity #identification #nondeterminism
Gene modification identification under flux capacity uncertainty (MY, MO, KL, SH), p. 5.
DATEDATE-2013-ChenRSIFC #analysis #process
A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
DATEDATE-2013-Hara-AzumiFKT #process
Instruction-set extension under process variation and aging effects (YHA, FF, SK, MBT), pp. 182–187.
DATEDATE-2013-LuZ #constraints #fault
Retiming for Soft Error Minimization Under Error-Latching Window Constraints (YL, HZ), pp. 1008–1013.
PODSPODS-2013-AgarwalAHPYZ #nearest neighbour #nondeterminism
Nearest neighbor searching under uncertainty II (PKA, BA, SHP, JMP, KY, WZ), pp. 115–126.
VLDBVLDB-2014-KaranasosKM13 #capacity #constraints #named #scalability
Delta: Scalable Data Dissemination under Capacity Constraints (KK, AK, IM), pp. 217–228.
ESOPESOP-2013-JagadeesanPPR #composition #memory management #modelling #reasoning
Quarantining Weakness — Compositional Reasoning under Relaxed Memory Models (Extended Abstract) (RJ, GP, CP, JR), pp. 492–511.
TACASTACAS-2013-AbdullaACLR #automation #precise
Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO (PAA, MFA, YFC, CL, AR), pp. 530–536.
TACASTACAS-2013-KempfBM #nondeterminism #probability #scheduling
As Soon as Probable: Optimal Scheduling under Stochastic Uncertainty (JFK, MB, OM), pp. 385–400.
STOCSTOC-2013-AndoniGMP #sketching
Homomorphic fingerprints under misalignments: sketching edit and shift distances (AA, AG, AM, EP), pp. 931–940.
STOCSTOC-2013-Bernstein #graph #maintenance
Maintaining shortest paths under deletions in weighted directed graphs: [extended abstract] (AB), pp. 725–734.
STOCSTOC-2013-BrandaoH #metric #quantum #theorem
Quantum de finetti theorems under local measurements with applications (FGSLB, AWH), pp. 861–870.
IFLIFL-2013-HackettHJ #approach #optimisation #recursion #source code
The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
HCIDUXU-WM-2013-GotzeCKSB #concept #evaluation
Evaluation of a New Cockpit Color Concept under Mesopic Lighting for Urban Driving (MG, ASC, AK, TS, KB), pp. 359–366.
HCIHCI-AMTE-2013-FedericiBM #assessment #evaluation #framework #interactive #process
Environmental Evaluation of a Rehabilitation Aid Interaction under the Framework of the Ideal Model of Assistive Technology Assessment Process (SF, SB, MLM), pp. 203–210.
HCIHIMI-D-2013-WuCLB #evaluation #usability
Usability Evaluation of the Universal Computer Workstation under Supine, Sitting and Standing Postures (HCW, MCC, CLL, MYB), pp. 151–156.
EDOCEDOC-2013-GuediHMN
Sizing the Underlying Factorization Structure of a Class Model (AOG, MH, AM, CN), pp. 167–172.
ICEISICEIS-v3-2013-HsuK #case study
A Study of Cognitive Effort of Decision Makers with Different NC under Framing (CWH, ClK), pp. 75–82.
ICMLICML-c1-2013-RamdasS #optimisation #probability
Optimal rates for stochastic convex optimization under Tsybakov noise condition (AR, AS), pp. 365–373.
ICMLICML-c3-2013-0002YY #linear
Guaranteed Sparse Recovery under Linear Transformation (JL, LY, JY), pp. 91–99.
ICMLICML-c3-2013-ChenCM #robust
Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
ICMLICML-c3-2013-DalalyanHMS #learning #modelling #programming
Learning Heteroscedastic Models by Convex Programming under Group Sparsity (ASD, MH, KM, JS), pp. 379–387.
ICMLICML-c3-2013-JoulaniGS #feedback #learning #online
Online Learning under Delayed Feedback (PJ, AG, CS), pp. 1453–1461.
ICMLICML-c3-2013-MenonNAC #algorithm #classification #consistency #on the #statistics
On the Statistical Consistency of Algorithms for Binary Classification under Class Imbalance (AKM, HN, SA, SC), pp. 603–611.
ICMLICML-c3-2013-ZhangSMW #adaptation
Domain Adaptation under Target and Conditional Shift (KZ, BS, KM, ZW), pp. 819–827.
KDDKDD-2013-AbbassiMT #constraints
Diversity maximization under matroid constraints (ZA, VSM, MT), pp. 32–40.
KEODKEOD-2013-NogueiraG #multi #nondeterminism #programming #set
Supply Chain Tracing of Multiple Products under Uncertainty and Incomplete Information — An Application of Answer Set Programming (MLN, NPG), pp. 399–406.
MLDMMLDM-2013-WilliamsHFR #classification #distance #evaluation #probability
Area under the Distance Threshold Curve as an Evaluation Measure for Probabilistic Classifiers (SW, MH, JDF, DSR), pp. 644–657.
QAPLQAPL-2013-GazeauMP #difference #privacy #semantics
Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
SACSAC-2013-BellatrecheBCM #algorithm #clustering #incremental #query
Horizontal partitioning of very-large data warehouses under dynamically-changing query workloads via incremental algorithms (LB, RB, AC, SM), pp. 208–210.
SACSAC-2013-VukovicD #distributed #estimation #on the #security
On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
ICSEICSE-2013-EsfahaniMR #architecture #named #nondeterminism
GuideArch: guiding the exploration of architectural solution space under uncertainty (NE, SM, KR), pp. 43–52.
CAVCAV-2013-KroeningLW #approximate #c #detection #performance #source code
Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
CAVCAV-2013-PauleveAK #approximate #automaton #network #reachability #scalability #set
Under-Approximating Cut Sets for Reachability in Large Scale Automata Networks (LP, GA, HK), pp. 69–84.
ICSTICST-2013-AbadABCFGMMRV #bound #contract #generative #incremental #satisfiability #testing
Improving Test Generation under Rich Contracts by Tight Bounds and Incremental SAT Solving (PA, NA, VSB, DC, MFF, JPG, TSEM, MMM, NR, IV), pp. 21–30.
WICSA-ECSAWICSA-ECSA-2012-SzlenkZK #architecture #modelling #requirements
Modelling Architectural Decisions under Changing Requirements (MS, AZ, SK), pp. 211–214.
CASECASE-2012-LiuS #injection #modelling #validation
Modeling and experimental validation of air-fuel ratio under individual cylinder fuel injection for port-injection engines (YL, TS), pp. 256–260.
CASECASE-2012-TangLY #nondeterminism #using
Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
DACDAC-2012-KarakonstantisRBB #fault #on the
On the exploitation of the inherent error resilience of wireless systems under unreliable silicon (GK, CR, CB, AB), pp. 510–515.
DACDAC-2012-MengKC #3d #constraints #energy #manycore #optimisation #performance
Optimizing energy efficiency of 3-D multicore systems with stacked DRAM under power and thermal constraints (JM, KK, AKC), pp. 648–655.
DACDAC-2012-VelamalaSSC #matter #physics #predict #statistics
Physics matters: statistical aging prediction under trapping/detrapping (JBV, KS, TS, YC), pp. 139–144.
DATEDATE-2012-JiangSCBP #algorithm #constraints #generative #memory management #on the
On the optimality of K longest path generation algorithm under memory constraints (JJ, MS, AC, BB, IP), pp. 418–423.
DATEDATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-WanK #embedded #monitoring
Monitoring active filters under automotive aging scenarios with embedded instrument (JW, HGK), pp. 1096–1101.
HTHT-2012-KlienS #analysis #network
Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
PODSPODS-2012-AgarwalESZ #nearest neighbour #nondeterminism
Nearest-neighbor searching under uncertainty (PKA, AE, SS, WZ), pp. 225–236.
SIGMODSIGMOD-2012-PengYZWY #difference #multi #named #privacy
DP-tree: indexing multi-dimensional data under differential privacy (abstract only) (SP, YY, ZZ, MW, YY), p. 864.
VLDBVLDB-2012-AngelKSS #identification #maintenance #realtime #streaming
Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification (AA, NK, NS, DS), pp. 574–585.
VLDBVLDB-2012-LiM #adaptation #difference #privacy #query
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy (CL, GM), pp. 514–525.
VLDBVLDB-2012-YuanZWXYH #difference #optimisation #privacy #query #rank
Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy (GY, ZZ, MW, XX, YY, ZH), pp. 1352–1363.
VLDBVLDB-2012-ZhangZXYW #analysis #difference #functional #privacy
Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
VLDBVLDB-2013-CalvaneseGLV12 #database #graph #query #relational
Query Processing under GLAV Mappings for Relational and Graph Databases (DC, GDG, ML, MYV), pp. 61–72.
FASEFASE-2012-EckhardtMAMW
Stable Availability under Denial of Service Attacks through Formal Patterns (JE, TM, MA, JM, MW), pp. 78–93.
TACASTACAS-2012-AbdullaACLR
Counter-Example Guided Fence Insertion under TSO (PAA, MFA, YFC, CL, AR), pp. 204–219.
TACASTACAS-2012-AlbarghouthiGC #approximate
From Under-Approximations to Over-Approximations and Back (AA, AG, MC), pp. 157–172.
TACASTACAS-2012-ChadhaMV #reachability
Reachability under Contextual Locking (RC, PM, MV), pp. 437–450.
WRLAWRLA-2012-BaeM #locality #model checking
Model Checking LTLR Formulas under Localized Fairness (KB, JM), pp. 99–117.
STOCSTOC-2012-GargMSV #algorithm
A complementary pivot algorithm for markets under separable, piecewise-linear concave utilities (JG, RM, MAS, VVV), pp. 1003–1016.
DLTDLT-2012-ManeaMN #permutation
The Avoidability of Cubes under Permutations (FM, MM, DN), pp. 416–427.
ICALPICALP-v1-2012-AzarG #constraints #linear #performance
Efficient Submodular Function Maximization under Linear Packing Constraints (YA, IG), pp. 38–50.
ICALPICALP-v1-2012-BalcanL #clustering
Clustering under Perturbation Resilience (MFB, YL), pp. 63–74.
ICALPICALP-v1-2012-BuchbinderNRS #algorithm #approximate #constraints #online #rank
Approximation Algorithms for Online Weighted Rank Function Maximization under Matroid Constraints (NB, JN, RR, MS), pp. 145–156.
ICALPICALP-v2-2012-ChiesaBEP #complexity
Computational Complexity of Traffic Hijacking under BGP and S-BGP (MC, GDB, TE, MP), pp. 476–487.
ICGTICGT-2012-GadducciLV #approximate #infinity #modelling
Exploiting Over- and Under-Approximations for Infinite-State Counterpart Models (FG, ALL, AV), pp. 51–65.
AdaEuropeAdaEurope-2012-MartinezV #component #development #modelling #requirements
Handling Synchronization Requirements under Separation of Concerns in Model-Driven Component-Based Development (PLM, TV), pp. 89–104.
CAiSECAiSE-2012-BoerLBGAGTBAA #distributed #information management #interface #named
RadioMarché: Distributed Voice- and Web-Interfaced Market Information Systems under Rural Conditions (VdB, PDL, AB, NBG, CvA, CG, WT, SB, MA, HA), pp. 518–532.
CIKMCIKM-2012-DuttingHW #recommendation #trust
Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
CIKMCIKM-2012-LiangZ #classification #performance
An efficient and simple under-sampling technique for imbalanced time series classification (GL, CZ), pp. 2339–2342.
CIKMCIKM-2012-LiYHCS #mvc #network #robust
Measuring robustness of complex networks under MVC attack (RHL, JXY, XH, HC, ZS), pp. 1512–1516.
CIKMCIKM-2012-WangYYLM
Diversionary comments under political blog posts (JW, CTY, PSY, BL, WM), pp. 1789–1793.
ICMLICML-2012-PlessisS #learning
Semi-Supervised Learning of Class Balance under Class-Prior Change by Distribution Matching (MCdP, MS), p. 159.
ICMLICML-2012-XuWC #learning
The Greedy Miser: Learning under Test-time Budgets (ZEX, KQW, OC), p. 169.
ICMLICML-2012-YuS #analysis #kernel
Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
ICPRICPR-2012-FangC #re-engineering
Dense reconstruction by stereo-motion under perspective camera model (MF, RC), pp. 2480–2483.
ICPRICPR-2012-GuK #learning #online #visual notation
Grassmann manifold online learning and partial occlusion handling for visual object tracking under Bayesian formulation (IYHG, ZHK), pp. 1463–1466.
ICPRICPR-2012-KanekoTAT
Daylight spectrum model under weather conditions from clear sky to cloudy (EK, MT, HA, MT), pp. 1438–1435.
ICPRICPR-2012-KawabataK #approach #multi #using
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-MadabusiG #detection #image
Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
ICPRICPR-2012-MichaelsenS #precise
Estimating the precision of under-water video-mosaics (EM, NSN), pp. 775–779.
ICPRICPR-2012-NikanA #recognition #using
Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
ICPRICPR-2012-TurkovKM #concept #pattern matching #pattern recognition #problem #recognition
The Bayesian logistic regression in pattern recognition problems under concept drift (PAT, OK, VM), pp. 2976–2979.
KDDKDD-2012-RakthanmanonCMBWZZK #mining #sequence
Searching and mining trillions of time series subsequences under dynamic time warping (TR, BJLC, AM, GEAPAB, MBW, QZ, JZ, EJK), pp. 262–270.
KDDKDD-2012-Zhang #challenge #information management
A new challenge of information processing under the 21st century (BZ), p. 224.
KMISKMIS-2012-LageA12a #approach #process
Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
KRKR-2012-GrauJKZ #constraints #evolution #ontology #semantics
Ontology Evolution Under Semantic Constraints (BCG, EJR, EK, DZ).
KRKR-2012-WangZZZ #equivalence #logic programming #source code
Forgetting in Logic Programs under Strong Equivalence (YW, YZ, YZ, MZ).
OOPSLAOOPSLA-2012-TamayoABS #behaviour #comprehension #database
Understanding the behavior of database operations under program control (JMT, AA, NGB, MS), pp. 983–996.
SACSAC-2012-GrooteOW #case study #experience #formal method
Experience report on developing the Front-end client unit under the control of formal methods (JFG, AO, JHW), pp. 1183–1190.
SACSAC-2012-MinervinidF #concept #learning #logic #probability
Learning probabilistic Description logic concepts: under different Assumptions on missing knowledge (PM, Cd, NF), pp. 378–383.
HPCAHPCA-2012-SuhAD #markov #multi #named #reliability
MACAU: A Markov model for reliability evaluations of caches under Single-bit and Multi-bit Upsets (JS, MA, MD), pp. 3–14.
HPDCHPDC-2012-LohrmannWK #constraints
Massively-parallel stream processing under QoS constraints with Nephele (BL, DW, OK), pp. 271–282.
ICSTICST-2012-TonellaMNJLH #approximate #execution #modelling
Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs (PT, AM, DCN, YJ, KL, MH), pp. 21–30.
IJCARIJCAR-2012-ChekolEGL #query
SPARQL Query Containment under RDFS Entailment Regime (MWC, JE, PG, NL), pp. 134–148.
ICSTSAT-2012-NadelR #performance #satisfiability
Efficient SAT Solving under Assumptions (AN, VR), pp. 242–255.
QoSAQoSA-ISARCS-2011-MeedeniyaMAG #architecture #evaluation #nondeterminism #reliability
Architecture-based reliability evaluation under uncertainty (IM, IM, AA, LG), pp. 85–94.
DACDAC-2011-HaddadN #analysis #grid #power management #using
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-HuangQFQ #constraints #realtime #throughput
Throughput maximization for periodic real-time systems under the maximal temperature constraint (HH, GQ, JF, MQ), pp. 363–368.
DACDAC-2011-IqbalSH #dependence #fault #monte carlo #named #power management #probability #scheduling
SEAL: soft error aware low power scheduling by Monte Carlo state space under the influence of stochastic spatial and temporal dependencies (NI, MAS, JH), pp. 134–139.
DACDAC-2011-KernZSNT #network
Accuracy of ethernet AVB time synchronization under varying temperature conditions for automotive networks (AK, HZ, TS, JN, JT), pp. 597–602.
DACDAC-2011-LeeJ #framework #modelling #named #process
CACTI-FinFET: an integrated delay and power modeling framework for FinFET-based caches under process variations (CYL, NKJ), pp. 866–871.
DATEDATE-2011-HuangQ #constraints #energy #realtime
Leakage aware energy minimization for real-time systems under the maximum temperature constraint (HH, GQ), pp. 479–484.
DATEDATE-2011-VatajeluF #analysis #in memory #memory management #robust
Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
DRRDRR-2011-Saund #challenge #documentation
Scientific challenges underlying production document processing (ES), pp. 1–10.
PODSPODS-2011-KimelfeldS #constraints
Finding a minimal tree pattern under neighborhood constraints (BK, YS), pp. 235–246.
SIGMODSIGMOD-2011-Quiane-RuizPSD #pipes and filters
RAFT at work: speeding-up mapreduce applications under task and node failures (JAQR, CP, JS, JD), pp. 1225–1228.
VLDBVLDB-2011-ChiMH #incremental #linear #named #scheduling
iCBS: Incremental Costbased Scheduling under Piecewise Linear SLAs (YC, HJM, HH), pp. 563–574.
VLDBVLDB-2011-OrsiP #constraints #ontology #optimisation #query
Optimizing Query Answering under Ontological Constraints (GO, AP), pp. 1004–1015.
FoSSaCSFoSSaCS-2011-BorealePP #information management
Asymptotic Information Leakage under One-Try Attacks (MB, FP, MP), pp. 396–410.
ICPCICPC-2011-SyerAH #behaviour #case study #comprehension #industrial
Industrial Case Study on Supporting the Comprehension of System Behaviour under Load (MDS, BA, AEH), pp. 215–216.
PLDIPLDI-2011-ZhouCC #algorithm #execution
An SSA-based algorithm for optimal speculative code motion under an execution profile (HZ, WC, FCC), pp. 98–108.
CHICHI-2011-ReederBCRV #usability
More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
HCIHCI-ITE-2011-AbeOO #analysis #detection #image
Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
HCIHIMI-v1-2011-WatanabeMNMN #generative #metric
Support for Generation of Sympathetic Embodied Awareness: Measurement of Hand Contact Improvisation under Load Fluctuation Stress (TW, YM, GN, NM, HN), pp. 508–518.
HCIHIMI-v2-2011-NguyenBRHVSB #how #multi
How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
ICEISICEIS-v1-2011-ChengL #anti #network
An Anti-phishing Model for Ecommerce under a Network Environment (YC, GL), pp. 400–404.
ICEISICEIS-v2-2011-JiaWLW #higher-order #research
The Research on Stability of Supply Chain under High Order Delay (SJ, LW, CL, QW), pp. 361–367.
ICEISICEIS-v3-2011-Li11d #bibliography #modelling
A Survey on Inventory Models Under Trade Credit (ML), pp. 511–516.
ICEISICEIS-v3-2011-Zhu #e-commerce #information management
The Information System of Bank Under the e-Commerce Environment (LZ), pp. 554–558.
CIKMCIKM-2011-WangL #framework #learning #named #rank
CoRankBayes: bayesian learning to rank under the co-training framework and its application in keyphrase extraction (CW, SL), pp. 2241–2244.
ICMLICML-2011-MeyerBS #approach #constraints #linear
Linear Regression under Fixed-Rank Constraints: A Riemannian Approach (GM, SB, RS), pp. 545–552.
KMISKMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism #using
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
MLDMMLDM-2011-ArmstrongD #database #scalability
Unsupervised Discovery of Motifs under Amplitude Scaling and Shifting in Time Series Databases (TA, ED), pp. 539–552.
SIGIRSIGIR-2011-PolitzS #constraints #learning #rank
Learning to rank under tight budget constraints (CP, RS), pp. 1173–1174.
RERE-2011-Waldmann #agile #constraints #development #requirements #what
There’s never enough time: Doing requirements under resource constraints, and what requirements engineering can learn from agile development (BW), pp. 301–305.
SACSAC-2011-ChenHT #clustering #power management #quality #requirements
Power management schemes for heterogeneous clusters under quality of service requirements (JJC, KH, LT), pp. 546–553.
SACSAC-2011-FormigaLSDT #assessment #matrix #recognition #scalability
An assessment of data matrix barcode recognition under scaling, rotation and cylindrical warping (AdAF, RDL, SJS, GD, MT), pp. 266–267.
SACSAC-2011-KimPHC #adaptation #network #peer-to-peer
Adaptive link recovery scheme for structured peer-to-peer networks under churn (SK, GP, JH, YC), pp. 611–615.
SACSAC-2011-Zhang #analysis #constraints #geometry #graph #problem
Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
PPoPPPPoPP-2011-RoyHH #consistency #memory management
Weak atomicity under the x86 memory consistency model (AR, SH, TLH), pp. 291–292.
CAVCAV-2011-BaeM #ltl #model checking #parametricity
State/Event-Based LTL Model Checking under Parametric Generalized Fairness (KB, JM), pp. 132–148.
ICLPICLP-J-2011-RiguzziS #nondeterminism #reasoning
The PITA system: Tabling and answer subsumption for reasoning under uncertainty (FR, TS), pp. 433–449.
TAPTAP-2011-BueJM #approximate #generative #modelling #testing
Association of Under-Approximation Techniques for Generating Tests from Models (PCB, JJ, PAM), pp. 51–68.
CASECASE-2010-LinYG
Sensor configuration selection for discrete-event systems under unreliable observations (WCL, TSY, HEG), pp. 477–484.
CASECASE-2010-MazierXS #scheduling
Scheduling inpatient admission under high demand of emergency patients (AM, XX, MS), pp. 792–797.
DACDAC-2010-ChenDC #synthesis
Clock tree synthesis under aggressive buffer insertion (YYC, CD, DC), pp. 86–89.
DACDAC-2010-HuangX #performance #process #scheduling
Performance yield-driven task allocation and scheduling for MPSoCs under process variation (LH, QX), pp. 326–331.
DACDAC-2010-SilvaPS #analysis #modelling #parametricity
Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
DACDAC-2010-XieD #predict #variability
Representative path selection for post-silicon timing prediction under variability (LX, AD), pp. 386–391.
DACDAC-2010-XiongW #algorithm #constraints #grid #linear #performance #power management #verification
An efficient dual algorithm for vectorless power grid verification under linear current constraints (XX, JW), pp. 837–842.
DATEDATE-2010-GanapathyCGR #estimation #modelling #multi #variability
Circuit propagation delay estimation through multivariate regression-based modeling under spatio-temporal variability (SG, RC, AG, AR), pp. 417–422.
DATEDATE-2010-HuangX10a #constraints #energy #multi #reliability #scheduling
Energy-efficient task allocation and scheduling for multi-mode MPSoCs under lifetime reliability constraint (LH, QX), pp. 1584–1589.
PODSPODS-2010-LiHRMM #difference #linear #optimisation #privacy #query
Optimizing linear counting queries under differential privacy (CL, MH, VR, GM, AM), pp. 123–134.
VLDBVLDB-2010-BeskalesIG #constraints #dependence #functional
Sampling the Repairs of Functional Dependency Violations under Hard Constraints (GB, IFI, LG), pp. 197–207.
VLDBVLDB-2010-WeiRM #quality #xml
Achieving High Output Quality under Limited Resources through Structure-based Spilling in XML Streams (MW, EAR, MM), pp. 1267–1278.
WRLAWRLA-2010-AsavoaeA #abstraction #framework #semantics #𝕂
Collecting Semantics under Predicate Abstraction in the 𝕂 Framework (IMA, MA), pp. 123–139.
CSMRCSMR-2010-MarchettoTR #ajax #approximate #modelling
Under and Over Approximation of State Models Recovered for Ajax Applications (AM, PT, FR), pp. 236–239.
ICPCICPC-2010-SharifM #eye tracking #identifier
An Eye Tracking Study on camelCase and under_score Identifier Styles (BS, JIM), pp. 196–205.
ICSMEICSM-2010-QusefOL #testing #traceability
Recovering traceability links between unit tests and classes under test: An improved method (AQ, RO, ADL), pp. 1–10.
STOCSTOC-2010-CardinalFJJM #algorithm #sorting
Sorting under partial information (without the ellipsoid algorithm) (JC, SF, GJ, RMJ, JIM), pp. 359–368.
STOCSTOC-2010-DworkNPR #difference #privacy
Differential privacy under continual observation (CD, MN, TP, GNR), pp. 715–724.
STOCSTOC-2010-FraigniaudG #network #on the
On the searchability of small-world networks with arbitrary underlying structure (PF, GG), pp. 389–398.
ICALPICALP-v2-2010-ChristodoulouLP
Contention Resolution under Selfishness (GC, KL, EP), pp. 430–441.
CIKMCIKM-2010-WangML #constraints #ranking
Ranking under temporal constraints (LW, DM, JJL), pp. 79–88.
ICMLICML-2010-BordesUW #ambiguity #learning #ranking #semantics
Label Ranking under Ambiguous Supervision for Learning Semantic Correspondences (AB, NU, JW), pp. 103–110.
ICMLICML-2010-Yu #convergence #difference
Convergence of Least Squares Temporal Difference Methods Under General Conditions (HY), pp. 1207–1214.
ICPRICPR-2010-CanavanJRZYS #classification #evaluation #multi
Evaluation of Multi-frame Fusion Based Face Classification Under Shadow (SJC, BJ, MR, YZ, LY, JRS), pp. 1265–1268.
ICPRICPR-2010-Demirci #performance #retrieval
Efficient Shape Retrieval Under Partial Matching (MFD), pp. 3057–3060.
ICPRICPR-2010-DornaikaR #estimation
Person-Specific Face Shape Estimation under Varying Head Pose from Single Snapshots (FD, BR), pp. 3496–3499.
ICPRICPR-2010-HendrikseVS #verification
Verification Under Increasing Dimensionality (AH, RNJV, LJS), pp. 589–592.
ICPRICPR-2010-IwahoriIWKFK #performance
Extending Fast Marching Method under Point Light Source Illumination and Perspective Projection (YI, KI, RJW, HK, SF, KK), pp. 1650–1653.
ICPRICPR-2010-LiangLXL #composition #image #perspective
Face Hallucination under an Image Decomposition Perspective (YL, JHL, XX, WL), pp. 2158–2161.
ICPRICPR-2010-PatrauceanGC #identification #invariant #using
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-ScandaliarisS #invariant
Discriminant and Invariant Color Model for Tracking under Abrupt Illumination Changes (JS, AS), pp. 1840–1843.
ICPRICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
ICPRICPR-2010-UekiSI #adaptation #estimation
Perceived Age Estimation under Lighting Condition Change by Covariate Shift Adaptation (KU, MS, YI), pp. 3400–3403.
ICPRICPR-2010-XuHL10a #how #image #recognition #robust
Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination (LX, LH, CL), pp. 2692–2695.
ICPRICPR-2010-ZhangHTW #3d #evaluation #framework #modelling #using
3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
KDDKDD-2010-AttenbergP #classification #learning #modelling #why
Why label when you can search?: alternatives to active learning for applying human resources to build classification models under extreme class imbalance (JA, FJP), pp. 423–432.
KDDKDD-2010-ZouGL #database #graph #nondeterminism #probability #semantics
Discovering frequent subgraphs over uncertain graph databases under probabilistic semantics (ZZ, HG, JL), pp. 633–642.
KDIRKDIR-2010-GohrSH #documentation #evolution #social #visual notation
Visually Summarizing the Evolution of Documents under a Social Tag (AG, MS, AH), pp. 85–94.
KRKR-2010-GebserGISSTV #biology #consistency #network #nondeterminism #predict #programming #scalability #set
Repair and Prediction (under Inconsistency) in Large Biological Networks with Answer Set Programming (MG, CG, MI, TS, AS, ST, PV).
KRKR-2010-GiacomoPS #constraints
Generalized Planning with Loops under Strong Fairness Constraints (GDG, FP, SS).
KRKR-2010-LarbiKM
A Characterization of Optimality Criteria for Decision Making under Complete Ignorance (RBL, SK, PM).
KRKR-2010-XiaoLMQ #consistency #metric #multi #nondeterminism #satisfiability #semantics
Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers (GX, ZL, YM, GQ).
RecSysRecSys-2010-DeryKRS #nondeterminism #recommendation
Iterative voting under uncertainty for group recommender systems (LND, MK, LR, BS), pp. 265–268.
SEKESEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering #using
Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
REFSQREFSQ-2010-BrillSK #case study #question #requirements
Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure? (OB, KS, EK), pp. 30–44.
SACSAC-2010-GhoshS #constraints #design #energy #performance
Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraints (PG, AS), pp. 535–541.
SACSAC-2010-SardanaJ #network
Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
ICLPICLP-J-2010-Delgrande #approach #logic programming #semantics #set #source code
A program-level approach to revising logic programs under the answer set semantics (JPD), pp. 565–580.
CASECASE-2009-KarnikTS #capacity #modelling #nondeterminism #robust
Robust models for manufacturing capacity planning under demand uncertainty (AK, CST, AS), pp. 310–315.
CASECASE-2009-XuK #nondeterminism
Discrete event control under nondeterministic partial observation (SX, RK), pp. 127–132.
CASECASE-2009-ZiedSN #maintenance #probability #random
An optimal production/maintenance planning under stochastic random demand, service level and failure rate (ZH, SD, NR), pp. 292–297.
DACDAC-2009-HanumaiahRVC #constraints #manycore #throughput
Throughput optimal task allocation under thermal constraints for multi-core processors (VH, RR, SBKV, KSC), pp. 776–781.
DACDAC-2009-LuSZZYZ #analysis #process #reliability #statistics
Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
DACDAC-2009-PanKOMC #process
Selective wordline voltage boosting for caches to manage yield under process variations (YP, JK, SO, GM, SWC), pp. 57–62.
DACDAC-2009-YeLCC #analysis #layout #process #variability
Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
DATEDATE-2009-CongG #energy #multi #performance #scheduling
Energy efficient multiprocessor task scheduling under input-dependent variation (JC, KG), pp. 411–416.
DATEDATE-2009-FahmyRJ #bound #distributed #memory management #multi #on the #realtime #transaction
On bounding response times under software transactional memory in distributed multiprocessor real-time systems (SFF, BR, EDJ), pp. 688–693.
DATEDATE-2009-HanumaiahVC #constraints #manycore #performance
Performance optimal speed control of multi-core processors under thermal constraints (VH, SBKV, KSC), pp. 1548–1551.
DATEDATE-2009-LudoviciVMRGLGB #constraints #design
Assessing fat-tree topologies for regular network-on-chip design under nanoscale technology constraints (DL, FGV, SM, CGR, MEG, PL, GNG, DB), pp. 562–565.
DATEDATE-2009-OzturkK #compilation #execution #memory management #using
Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
ICDARICDAR-2009-ZhouLT #recognition
Character Recognition under Severe Perspective Distortion (PZ, LL, CLT), pp. 676–680.
TACASTACAS-2009-VechevYY
Inferring Synchronization under Limited Observability (MTV, EY, GY), pp. 139–154.
CSMRCSMR-2009-RompaeyD #testing #traceability
Establishing Traceability Links between Unit Test Cases and Units under Test (BVR, SD), pp. 209–218.
ICPCICPC-2009-BinkleyDLM
To camelcase or under_score (DB, MD, DL, CM), pp. 158–167.
STOCSTOC-2009-LeeMNS #constraints
Non-monotone submodular maximization under matroid and knapsack constraints (JL, VSM, VN, MS), pp. 323–332.
LATALATA-2009-Moore #data access #documentation #generative #problem
The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
HCIDHM-2009-Sugiyama
Harmonic Gait under Primitive DOF for Biped Robot (SS), pp. 150–159.
HCIHCI-VAD-2009-TamaokiTM #user interface
Developing Some User Interfaces of TV under Enormous Channels Environment (ST, TT, HM), pp. 624–631.
ICEISICEIS-J-2009-Al-NoryBN #composition #framework #nondeterminism
A Service Composition Framework for Decision Making under Uncertainty (MTAN, AB, HN), pp. 363–375.
ICEISICEIS-J-2009-BittencourtBCPVDL #modelling #semantics #web
Modeling JADE Agents from GAIA Methodology under the Perspective of Semantic Web (IIB, PB, EdBC, JPP, DV, DD, HPLL), pp. 780–789.
CIKMCIKM-2009-CaoCYX #recommendation
Enhancing recommender systems under volatile userinterest drifts (HC, EC, JY, HX), pp. 1257–1266.
ECIRECIR-2009-DonmezC #learning #optimisation #rank
Active Sampling for Rank Learning via Optimizing the Area under the ROC Curve (PD, JGC), pp. 78–89.
SEKESEKE-2009-McElroyR #approach #nondeterminism
A Layered Approach for Planning Releases under Uncertain Capacities (JM, GR), pp. 649–654.
ECOOPECOOP-2009-SteimannT #java #refactoring #source code
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility (FS, AT), pp. 419–443.
SACSAC-2009-CorreaNBC #evaluation #health
Evaluation of VR medical training applications under the focus of professionals of the health area (CGC, FLSN, AB, PMCJ), pp. 821–825.
SACSAC-2009-HeinenE #2d #evaluation #modelling #similarity #visual notation
Evaluation of visual attention models under 2D similarity transformations (MRH, PME), pp. 1156–1160.
SACSAC-2009-WangDLL #performance #process
An efficient and accurate lattice for pricing derivatives under a jump-diffusion process (CJW, TSD, YDL, YCL), pp. 966–970.
CADECADE-2009-CiobacaDK #convergence #equation #protocol #security
Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
CAVCAV-2009-FarzanMS
Meta-analysis for Atomicity Violations under Nested Locking (AF, PM, FS), pp. 248–262.
CAVCAV-2009-SunLDP #flexibility #named #towards #verification
PAT: Towards Flexible Verification under Fairness (JS, YL, JSD, JP), pp. 709–714.
ICLPICLP-2009-DelgrandeSTW #logic programming #semantics #set #source code
Merging Logic Programs under Answer Set Semantics (JPD, TS, HT, SW), pp. 160–174.
ICLPICLP-2009-HolldoblerR #logic programming #semantics #source code
Logic Programs under Three-Valued Lukasiewicz Semantics (SH, CDPKR), pp. 464–478.
ICSTICST-2009-AydalPUW #modelling #specification #testing #validation
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation (EGA, RFP, MU, JW), pp. 131–140.
ICSTICST-2009-DavidLLN #testing
Timed Testing under Partial Observability (AD, KGL, SL, BN), pp. 61–70.
RTARTA-2009-ThiemannS
Loops under Strategies (RT, CS), pp. 17–31.
TAPTAP-2009-AyraultHP #development
Development of a Generic Voter under FoCal (PA, TH, FP), pp. 10–26.
CASECASE-2008-PatilS #adaptation #nondeterminism
Adapting product and supply chain systems under severe uncertainty (LP, KS), pp. 285–290.
CASECASE-2008-StirlingN #coordination #nash
Rational coordination under risk: Coherence and the Nash bargain (WCS, MSN), pp. 122–127.
DACDAC-2008-CaseKMB
Merging nodes under sequential observability (MLC, VNK, AM, RKB), pp. 540–545.
DACDAC-2008-HurstMB #constraints #scalability
Scalable min-register retiming under timing and initializability constraints (APH, AM, RKB), pp. 534–539.
DACDAC-2008-YeLNC #modelling #simulation #statistics
Statistical modeling and simulation of threshold variation under dopant fluctuations and line-edge roughness (YY, FL, SRN, YC), pp. 900–905.
DATEDATE-2008-Brand #design #manycore #optimisation
Optimization of Design Flows for Multi-Core x86 Microprocessors in 45 and 32nm Technologies under Productivity Considerations (HJB), pp. 938–939.
DATEDATE-2008-CalimeraBM #constraints #performance #power management
Optimal MTCMOS Reactivation Under Power Supply Noise and Performance Constraints (AC, LB, EM), pp. 973–978.
DATEDATE-2008-FranchinoBF #protocol
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme (GF, GCB, TF), pp. 1051–1056.
DATEDATE-2008-JungP #nondeterminism #power management
Resilient Dynamic Power Management under Uncertainty (HJ, MP), pp. 224–229.
DATEDATE-2008-XueSSQ #clustering #constraints #effectiveness #memory management #scheduling
Effective Loop Partitioning and Scheduling under Memory and Register Dual Constraints (CJX, EHMS, ZS, MQ), pp. 1202–1207.
VLDBVLDB-2008-AvanesF #adaptation #constraints #network #resource management #scheduling #workflow
Adaptive workflow scheduling under resource allocation constraints and network dynamics (AA, JCF), pp. 1631–1637.
VLDBVLDB-2008-DeutchM08a #modelling #nondeterminism #query
Querying web-based applications under models of uncertainty (DD, TM), pp. 1659–1665.
VLDBVLDB-2008-LuM #database #named #strict
AuditGuard: a system for database auditing under retention restrictions (WL, GM), pp. 1484–1487.
VLDBVLDB-2008-MoonCDHZ #database #evolution #query #transaction
Managing and querying transaction-time databases under schema evolution (HJM, CC, AD, CYH, CZ), pp. 882–895.
TACASTACAS-2008-LalTKR #analysis #bound #concurrent #interprocedural #source code
Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
ICALPICALP-A-2008-FanelliFM #convergence #game studies
The Speed of Convergence in Congestion Games under Best-Response Dynamics (AF, MF, LM), pp. 796–807.
ICEISICEIS-ISAS1-2008-Yang #flexibility #information management
Better IT Governance for Organizations — A Model for Improving Flexibility and Capabilities of Strategic Information Systems Planning (SISP) through EA and BPR under e-Business Environment (JY), pp. 30–41.
ECIRECIR-2008-EuachongprasitR #multi #normalisation #performance #retrieval #scalability
Efficient Multimedia Time Series Data Retrieval Under Uniform Scaling and Normalisation (WE, CAR), pp. 506–513.
ICPRICPR-2008-BitsakosYYF #symmetry
Bilateral symmetry of object silhouettes under perspective projection (KB, HY, LY, CF), pp. 1–4.
ICPRICPR-2008-GuZ #metric #similarity
A similarity measure under Log-Euclidean metric for stereo matching (QG, JZ), pp. 1–4.
ICPRICPR-2008-LiT08a #recognition
Character recognition under severe perspective distortion (LL, CLT), pp. 1–4.
ICPRICPR-2008-MerchanOS #identification #image
Identification and pose under severe occlusion in range images (PM, AAO, SS), pp. 1–4.
ICPRICPR-2008-VanacloigOGG #constraints #people #realtime #recognition
People and luggage recognition in airport surveillance under real-time constraints (VLAV, JARO, GAG, JMVG), pp. 1–4.
ICPRICPR-2008-VazquezRC #image #recognition
A new image division for LBP method to improve face recognition under varying lighting conditions (HMV, EBGR, YCM), pp. 1–4.
ICPRICPR-2008-WangWH #matrix
Structure and motion factorization under quasi-perspective projection with missing data in tracking matrix (GW, QMJW, WH), pp. 1–4.
KDDKDD-2008-WuLCC #learning #symmetry
Asymmetric support vector machines: low false-positive learning under the user tolerance (SHW, KPL, CMC, MSC), pp. 749–757.
KRKR-2008-CaliGK #constraints #infinity #query #relational
Taming the Infinite Chase: Query Answering under Expressive Relational Constraints (AC, GG, MK), pp. 70–80.
KRKR-2008-DelgrandeSTW #logic programming #semantics #set #source code
Belief Revision of Logic Programs under Answer Set Semantics (JPD, TS, HT, SW), pp. 411–421.
SIGIRSIGIR-2008-HeMO #metric #retrieval #using
Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
SACSAC-2008-BatistaDF #grid #nondeterminism #scheduling
Scheduling grid tasks under uncertain demands (DMB, ACD, NLSdF), pp. 2041–2045.
SACSAC-2008-CardenasG #architecture #comparison #network #performance
Performance comparison of Flow Aware Networking (FAN) architectures under GridFTP traffic (CC, MG), pp. 2079–2084.
SACSAC-2008-SchmitzAA #implementation #nondeterminism #order
A method for defining the implementation order of software projects under uncertainty (EAS, AJA, CMdA), pp. 844–845.
PPoPPPPoPP-2008-ZhaiWYH #compilation #concurrent #optimisation #thread
Compiler optimizations for parallelizing general-purpose applications under thread-level speculation (AZ, SW, PCY, GH), pp. 271–272.
CAVCAV-2008-LalR #analysis #bound #concurrent
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
ICLPICLP-2008-OetschT #semantics
Program Correspondence under the Answer-Set Semantics: The Non-ground Case (JO, HT), pp. 591–605.
ICLPICLP-2008-PuhrerTW #source code
Elimination of Disjunction and Negation in Answer-Set Programs under Hyperequivalence (JP, HT, SW), pp. 561–575.
ICLPICLP-2008-Riguzzi #logic programming #semantics #source code
Inference with Logic Programs with Annotated Disjunctions under the Well Founded Semantics (FR), pp. 667–671.
RTARTA-2008-EndrullisV #reduction
Reduction Under Substitution (JE, RCdV), pp. 425–440.
CASECASE-2007-YooG #analysis #network #process
Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
DACDAC-2007-ChenZ #performance #process
Fast Min-Cost Buffer Insertion under Process Variations (RC, HZ), pp. 338–343.
DACDAC-2007-KangKIAR #estimation #metric #online #reliability #using
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
DACDAC-2007-LiuS #predict #process #scalability #statistics
Confidence Scalable Post-Silicon Statistical Delay Prediction under Process Variations (QL, SSS), pp. 497–502.
DATEDATE-2007-AtasuDMLOD #constraints #optimisation
Optimizing instruction-set extensible processors under data bandwidth constraints (KA, RGD, OM, WL, CCÖ, GD), pp. 588–593.
DATEDATE-2007-GrossschadlTRHM #constraints #energy #evaluation #implementation #memory management
Energy evaluation of software implementations of block ciphers under memory constraints (JG, ST, CR, MH, MM), pp. 1110–1115.
DATEDATE-2007-JungP #nondeterminism #power management
Dynamic power management under uncertain information (HJ, MP), pp. 1060–1065.
DATEDATE-2007-NiM #self
Self-heating-aware optimal wire sizing under Elmore delay model (MN, SOM), pp. 1373–1378.
DATEDATE-2007-WatanabeKINN #constraints #energy #interactive #multi #performance #scheduling
Interactive presentation: Task scheduling under performance constraints for reducing the energy consumption of the GALS multi-processor SoC (RW, MK, MI, HN, TN), pp. 797–802.
DATEDATE-2007-ZhuZCXZ #grid #probability #process
A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology (HZ, XZ, WC, JX, DZ), pp. 1514–1519.
SIGMODSIGMOD-2007-BeyerHRSG #estimation #multi #on the
On synopses for distinct-value estimation under multiset operations (KSB, PJH, BR, YS, RG), pp. 199–210.
SASSAS-2007-GoubaultP #approximate
Under-Approximations of Computations in Real Numbers Based on Generalized Affine Arithmetic (EG, SP), pp. 137–152.
ICALPICALP-2007-DershowitzT #complexity #proving
Complexity of Propositional Proofs Under a Promise (ND, IT), pp. 291–302.
ICALPICALP-2007-KatrielKU #nondeterminism #probability #problem
Commitment Under Uncertainty: Two-Stage Stochastic Matching Problems (IK, CKM, EU), pp. 171–182.
GT-VMTGT-VMT-2007-WrobelEP #framework #graph #product line
Graph-Based Engineering Systems — A Family of Software Applications and their Underlying Framework (GW, REE, MP).
HCIDHM-2007-OhS #behaviour #comprehension #nondeterminism
Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty (IO, MS), pp. 443–452.
ICEISICEIS-AIDSS-2007-ChanL #nondeterminism #rule-based
Rule Based Stability Criteria for Coalition Formation Under Uncertainty (CKC, HfL), pp. 171–177.
ICEISICEIS-DISI-2007-DangelmaierRHBKDT #information management #named #reliability
OOPUS — a production planning information system to assure high delivery reliability under short-term demand changes and production disturbances (WD, TR, TH, DB, DK, AD, TT), pp. 423–432.
ICEISICEIS-EIS-2007-Sarbo #logic #on the
On the Logic Underlying Common Sense (JJS), pp. 395–400.
KDDKDD-2007-Fayyad #internet #mining #web
From mining the web to inventing the new sciences underlying the internet (UMF), pp. 2–3.
KDDKDD-2007-YankovKMCZ #detection #scalability
Detecting time series motifs under uniform scaling (DY, EJK, JM, BYcC, VBZ), pp. 844–853.
SEKESEKE-2007-YasudaM #concurrent
Tree Hash Under Concurrency Control (KY, TM), pp. 574–579.
SACSAC-2007-ThierryMS #constraints #geometry #towards
Towards an homogeneous handling of under-constrained and well-constrained systems of geometric constraints (SEBT, PM, PS), pp. 773–777.
ESEC-FSEESEC-FSE-2007-FosterEKMRU #composition #constraints #model checking
Model checking service compositions under resource constraints (HF, WE, JK, JM, DSR, SU), pp. 225–234.
LCTESLCTES-2007-BouchezDR #complexity #on the
On the complexity of spill everywhere under SSA form (FB, AD, FR), pp. 103–112.
CAVCAV-2007-AmitRRSY #abstraction #comparison #verification
Comparison Under Abstraction for Verifying Linearizability (DA, NR, TWR, MS, EY), pp. 477–490.
CSLCSL-2007-Murawski
Bad Variables Under Control (ASM), pp. 558–572.
ICLPICLP-2007-GrecoM #consistency #database #query #semantics
Querying and Repairing Inconsistent Databases Under Three-Valued Semantics (SG, CM), pp. 149–164.
ISSTAISSTA-2007-EnglerD #automation #execution #scalability
Under-constrained execution: making automatic code destruction easy and scalable (DRE, DD), pp. 1–4.
VMCAIVMCAI-2007-BallK #approximate #source code
Better Under-Approximation of Programs by Hiding Variables (TB, OK), pp. 314–328.
CASECASE-2006-WuN #constraints #evaluation #network #reliability
Evaluation of the Reliability of Emergency Networks under Time Constraints (WwW, XxN), pp. 259–263.
DACDAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis #using
Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
DACDAC-2006-AnanthanR #physics #process
A fully physical model for leakage distribution under process variations in Nanoscale double-gate CMOS (HA, KR), pp. 413–418.
DACDAC-2006-HerreraV #embedded #framework #modelling #specification
A framework for embedded system specification under different models of computation in SystemC (FH, EV), pp. 911–914.
DACDAC-2006-HuebbersDI #parametricity #performance #process
Computation of accurate interconnect process parameter values for performance corners under process variations (FH, AD, YII), pp. 797–800.
DACDAC-2006-LinZ #algorithm #constraints #performance
An efficient retiming algorithm under setup and hold constraints (CL, HZ), pp. 945–950.
DACDAC-2006-PandeyG #communication #constraints #scalability #statistics #synthesis
Statistical on-chip communication bus synthesis and voltage scaling under timing yield constraint (SP, MG), pp. 663–668.
DACDAC-2006-SinghMPO #nondeterminism #runtime
Gain-based technology mapping for minimum runtime leakage under input vector uncertainty (AKS, MM, RP, MO), pp. 522–527.
DACDAC-2006-WangZ #bound
Optimal jumper insertion for antenna avoidance under ratio upper-bound (JW, HZ), pp. 761–766.
DATEDATE-2006-CherrounDF #constraints #equation #scheduling #using
Scheduling under resource constraints using dis-equations (HC, AD, PF), pp. 1067–1072.
DATEDATE-2006-HealyVEBLLL #architecture #performance #trade-off
Microarchitectural floorplanning under performance and thermal tradeoff (MBH, MV, ME, CSB, SKL, HHSL, GHL), pp. 1288–1293.
DATEDATE-2006-HsuCK #constraints #energy #multi #realtime #synthesis
Multiprocessor synthesis for periodic hard real-time tasks under a given energy constraint (HRH, JJC, TWK), pp. 1061–1066.
DATEDATE-2006-PaulKKAR #design #estimation #performance #reliability
Temporal performance degradation under NBTI: estimation and design for improved reliability of nanoscale circuits (BCP, KK, HK, MAA, KR), pp. 780–785.
DATEDATE-2006-PomeranzR06a #fault
Test compaction for transition faults under transparent-scan (IP, SMR), pp. 1264–1269.
DATEDATE-2006-ZhouW #constraints #self
Software-based self-test of processors under power constraints (JZ, HJW), pp. 430–435.
PODSPODS-2006-MotwaniX #evolution #graph #modelling #random #web
Evolution of page popularity under random web graph models (RM, YX), pp. 134–142.
VLDBVLDB-2006-KeoghWXLV #distance #metric
LB_Keogh Supports Exact Indexing of Shapes under Rotation Invariance with Arbitrary Representations and Distance Measures (EJK, LW, XX, SHL, MV), pp. 882–893.
STOCSTOC-2006-KushilevitzLR #composition #protocol #security
Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
DLTDLT-2006-ItoLS #bound
Closure of Language Classes Under Bounded Duplication (MI, PL, KST), pp. 238–247.
ICALPICALP-v1-2006-Kapoutsis
Small Sweeping 2NFAs Are Not Closed Under Complement (CAK), pp. 144–156.
ICALPICALP-v2-2006-AlurCZ #refinement
Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
ICMLICML-2006-DenisMR #classification #learning #naive bayes #performance
Efficient learning of Naive Bayes classifiers under class-conditional classification noise (FD, CNM, LR), pp. 265–272.
ICMLICML-2006-NarasimhanVS #constraints #latency #markov #modelling #online
Online decoding of Markov models under latency constraints (MN, PAV, MS), pp. 657–664.
ICPRICPR-v1-2006-DoYC #detection #estimation #using
Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPRICPR-v1-2006-GimelfarbLMD #concurrent #image
Concurrent Stereo under Photometric Image Distortions (GLG, JL, JM, PD), pp. 111–114.
ICPRICPR-v1-2006-HadidP #approach #detection #hybrid
A Hybrid Approach to Face Detection under Unconstrained Environments (AH, MP), pp. 227–230.
ICPRICPR-v1-2006-ParkAB #detection #metric #performance
Efficient Measurement of Eye Blinking under Various Illumination Conditions for Drowsiness Detection Systems (IP, JHA, HB), pp. 383–386.
ICPRICPR-v1-2006-ShimawakiSMS #estimation #image #sequence #video
Estimation of Ball Route under Overlapping with Players and Lines in Soccer Video Image Sequence (TS, TS, JM, YS), pp. 359–362.
ICPRICPR-v1-2006-TongSS #estimation
Continuous-Discrete Filtering for Cardiac Kinematics Estimation under Spatio-Temporal Biomechanical Constrains (ST, AJS, PS), pp. 167–170.
ICPRICPR-v1-2006-TongWZJ #multi #using
Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
ICPRICPR-v1-2006-YingZ06a #image #using
Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
ICPRICPR-v2-2006-BarakatB #using
Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
ICPRICPR-v2-2006-CorneliusL #detection #symmetry
Detecting Rotational Symmetry Under Affine Projection (HC, GL), pp. 292–295.
ICPRICPR-v3-2006-BalciAF
Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling (MB, MA, HF), pp. 607–610.
ICPRICPR-v3-2006-QingSCG #probability #recognition
Face Recognition under Varying Lighting Based on the Probabilistic Model of Gabor Phase (LQ, SS, XC, WG), pp. 1139–1142.
ICPRICPR-v3-2006-ShenLCF #video
Video Completion for Perspective Camera Under Constrained Motion (YS, FL, XC, HF), pp. 63–66.
ICPRICPR-v4-2006-TaxD #linear #optimisation
Linear model combining by optimizing the Area under the ROC curve (DMJT, RPWD), pp. 119–122.
ICPRICPR-v4-2006-ZhaoG #detection #robust
Robust Eye Detection under Active Infrared Illumination (SZ, RRG), pp. 481–484.
KDDKDD-2006-FanD #bias #classification #framework #performance #testing
Reverse testing: an efficient framework to select amongst classifiers under sample selection bias (WF, ID), pp. 147–156.
KRKR-2006-SardinaGLL #nondeterminism #on the #strict
On the Limits of Planning over Belief States under Strict Uncertainty (SS, GDG, YL, HJL), pp. 463–471.
KRKR-2006-Straccia #logic programming #query #source code
Query Answering under the Any-World Assumption for Normal Logic Programs (US), pp. 329–339.
SIGIRSIGIR-2006-ZhangOFM #analysis #linear #recommendation
Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
GPCEGPCE-2006-BromanNF #constraints #equation #using
Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
ICLPICLP-2006-PontelliS #logic programming #semantics #set #source code
Justifications for Logic Programs Under Answer Set Semantics (EP, TCS), pp. 196–210.
ICLPICLP-2006-WittocxVMDB #semantics
Predicate Introduction Under Stable and Well-Founded Semantics (JW, JV, MM, MD, MB), pp. 242–256.
RTARTA-2006-BournezG #proving #termination
Proving Positive Almost Sure Termination Under Strategies (OB, FG), pp. 357–371.
CASECASE-2005-LauS #evaluation #multi
Evaluation of time-varying availability in multi-echelon inventory system under combat damage (HCL, HS), pp. 226–231.
DACDAC-2005-ChangS #analysis #correlation #power management #process
Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
DACDAC-2005-ManiDO #algorithm #constraints #performance #statistics
An efficient algorithm for statistical minimization of total power under timing yield constraints (MM, AD, MO), pp. 309–314.
DACDAC-2005-Pomeranz #detection
N-detection under transparent-scan (IP), pp. 129–134.
DACDAC-2005-XuNC #constraints #design #embedded #multi #optimisation
Multi-frequency wrapper design and optimization for embedded cores under average power constraints (QX, NN, KC), pp. 123–128.
DATEDATE-2005-DattaBMBR #design #modelling #pipes and filters #process #statistics
Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies (AD, SB, SM, NB, KR), pp. 926–931.
DATEDATE-2005-MajhiAGLEB #evaluation #industrial #memory management #testing
Memory Testing Under Different Stress Conditions: An Industrial Evaluation (AKM, MA, GG, ML, SE, FB), pp. 438–443.
DATEDATE-2005-WuRJ #energy #realtime #scheduling
Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model (HW, BR, EDJ), pp. 474–479.
DRRDRR-2005-HopkinsA #framework #open source #recognition
A Fourier-descriptor-based character recognition engine implemented under the Gamera open-source document-processing framework (JH, TLA), pp. 111–118.
PODSPODS-2005-SakuraiYF #distance #named #performance #similarity
FTW: fast similarity search under the time warping distance (YS, MY, CF), pp. 326–337.
TACASTACAS-2005-Jiang #invariant #on the
On Some Transformation Invariants Under Retiming and Resynthesis (JHRJ), pp. 413–428.
ICALPICALP-2005-AtseriasDG #finite
Preservation Under Extensions on Well-Behaved Finite Structures (AA, AD, MG), pp. 1437–1449.
ICEISICEIS-v1-2005-KarydisNPM #distance #network #retrieval
Musical Retrieval in P2P Networks under the Warping Distance (IK, AN, ANP, YM), pp. 100–107.
CIKMCIKM-2005-GriecoLRR #algorithm #consistency #dependence #query
Consistent query answering under key and exclusion dependencies: algorithms and experiments (LG, DL, RR, MR), pp. 792–799.
KDDKDD-2005-YanFB #constraints #industrial
Enhancing the lift under budget constraints: an application in the mutual fund industry (LY, MF, PB), pp. 509–515.
RERE-2005-RegevW #requirements
Where do Goals Come from: the Underlying Principles of Goal-Oriented Requirements Engineering (GR, AW), pp. 353–362.
SACSAC-2005-KimKS #database #optimisation #sequence
Optimization of subsequence matching under time warping in time-series databases (MSK, SWK, MS), pp. 581–586.
LCTESLCTES-2005-ZhangP #compilation #migration #performance
Efficient application migration under compiler guidance (KZ, SP), pp. 10–20.
AMOSTAMOST-2005-CaiL #detection #fault #test coverage #testing
The effect of code coverage on fault detection under different testing profiles (XC, MRL).
ICLPICLP-2005-NomikosRW #equivalence #semantics
A Sufficient Condition for Strong Equivalence Under the Well-Founded Semantics (CN, PR, WWW), pp. 414–415.
LICSLICS-2005-Rossman
Existential Positive Types and Preservation under Homomorphisisms (BR), pp. 467–476.
DACDAC-2004-ChoiPR #algorithm #novel #process
Novel sizing algorithm for yield improvement under process variation in nanometer technology (SHC, BCP, KR), pp. 454–459.
DACDAC-2004-Pomeranz #functional #generative #on the #testing
On the generation of scan-based test sets with reachable states for testing under functional operation conditions (IP), pp. 928–933.
DATEDATE-v1-2004-HuM #architecture #communication #constraints #energy #realtime #scheduling
Energy-Aware Communication and Task Scheduling for Network-on-Chip Architectures under Real-Time Constraints (JH, RM), pp. 234–239.
HTHT-2004-Kolb #hypermedia
Twin media: hypertext structure under pressure (DK), pp. 26–27.
PODSPODS-2004-AtseriasDK #morphism #on the #query
On Preservation under Homomorphisms and Unions of Conjunctive Queries (AA, AD, PGK), pp. 319–329.
PODSPODS-2004-NashL #data access #first-order #query
Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
SASSAS-2004-Schmidt #approximate #logic
Closed and Logical Relations for Over- and Under-Approximation of Powersets (DAS), pp. 22–37.
ICALPICALP-2004-AbadiC #equation #protocol #security
Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
IFMIFM-2004-WangRL #csp #independence #reachability
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption (XW, AWR, RL), pp. 247–266.
ICEISICEIS-v4-2004-JahankhaniY #e-commerce #framework
Underlying Platform of the E-Commerce System: J2EE vs. NET (HJ, MY), pp. 250–257.
CIKMCIKM-2004-HoreHIM #constraints
Indexing text data under space constraints (BH, HH, BRI, SM), pp. 198–207.
ICMLICML-2004-HerschtalR #optimisation #using
Optimising area under the ROC curve using gradient descent (AH, BR).
ICMLICML-2004-Zadrozny #bias #classification #learning
Learning and evaluating classifiers under sample selection bias (BZ).
ICPRICPR-v1-2004-PnevmatikakisP #comparison
Comparison of Eigenface-Based Feature Vectors under Different Impairments (AP, LP), pp. 296–299.
ICPRICPR-v1-2004-WeiL #recognition #robust
Robust Face Recognition under Lighting Variations (SDW, SHL), pp. 354–357.
ICPRICPR-v2-2004-CourteilleCDG #towards
Towards Shape from Shading under Realistic Photographic Conditions (FC, AC, JDD, PG), pp. 277–280.
ICPRICPR-v3-2004-DuOSS #estimation
Reflectance Estimation from Motion under Complex Illumination (FD, TO, YS, AS), pp. 218–222.
ICPRICPR-v3-2004-JoshiC
Photometric Stereo Under Blurred Observations (MVJ, SC), pp. 169–172.
ICPRICPR-v3-2004-LiMH
New Method for Sparse Point-Sets Matching with Underlying Non-Rigidity (BL, QM, HH), pp. 8–11.
ICPRICPR-v3-2004-MakiharaSS #interactive #learning #online #recognition
Online Learning of Color Transformation for Interactive Object Recognition under Various Lighting Conditions (YM, YS, NS), pp. 161–164.
ICPRICPR-v3-2004-ShimizuYO #image
Super-Resolution under Image Deformation (MS, TY, MO), pp. 586–589.
ICPRICPR-v4-2004-ChoH #image
Extending Dynamic Range of Two Color Images under Different Exposures (WhC, KSH), pp. 853–856.
ICPRICPR-v4-2004-WangJ #detection #multi
Multi-View Face Detection under Complex Scene based on Combined SVMs (PW, QJ), pp. 179–182.
SACSAC-2004-PaulussenZHBPL #nondeterminism #scheduling
Patient scheduling under uncertainty (TOP, AZ, AH, LB, AP, WL), pp. 309–310.
ICLPICLP-2004-Pearce #logic programming #semantics #set #source code
Simplifying Logic Programs Under Answer Set Semantics (DP), pp. 210–224.
DACDAC-2003-AtasuPI #architecture #automation #constraints
Automatic application-specific instruction-set extensions under microarchitectural constraints (KA, LP, PI), pp. 256–261.
DACDAC-2003-El-GamalBBHMOP #implementation #performance
Fast, cheap and under control: the next implementation fabric (AEG, IB, AB, CH, PM, ZOB, LTP), pp. 354–355.
DACDAC-2003-SzymanekK #constraints #graph
Partial task assignment of task graphs under heterogeneous resource constraints (RS, KK), pp. 244–249.
DATEDATE-2003-KimSLLNN #data flow #distributed #graph
Distributed Synchronous Control Units for Dataflow Graphs under Allocation of Telescopic Arithmetic Units (EK, HS, JGL, DIL, HN, TN), pp. 10276–10281.
PODSPODS-2003-GrahneT #constraints #query #using
Query containment and rewriting using views for regular path queries under constraints (GG, AT), pp. 111–122.
VLDBVLDB-2003-KoudasGGSV #approximate #constraints #optimisation #parametricity #performance #query
Efficient Approximation Of Optimization Queries Under Parametric Aggregation Constraints (SG, DG, NK, DS, MV), pp. 778–789.
VLDBVLDB-2003-VelegrakisMP #adaptation #evolution
Mapping Adaptation under Evolving Schemas (YV, RJM, LP), pp. 584–595.
TACASTACAS-2003-AbdeddaimAM #nondeterminism #on the #scheduling
On Optimal Scheduling under Uncertainty (YA, EA, OM), pp. 240–253.
ICEISICEIS-v1-2003-BouchouALD #automaton #constraints #validation #xml
Extending Tree Automata to Model XML Validation Under Element and Attribute Constraints (BB, MHFA, DL, DD), pp. 184–190.
ICEISICEIS-v1-2003-KaramEII #algorithm #constraints #maintenance
The Enhanced Greedy Interchange Algorithm for the Selection of Materialized Views Under a Maintenance Cost Constraint in Data Warehouses (OHK, MES, OI, RI), pp. 279–284.
CIKMCIKM-2003-TangZ #mining #multi
Mining multiple phenotype structures underlying gene expression profiles (CT, AZ), pp. 418–425.
ICMLICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
SEKESEKE-2003-Ngo-TheR #nondeterminism #requirements
Requirements Negotiation under Incompleteness and Uncertainty (ANT, GR), pp. 586–593.
SACSAC-2003-FuT
A Dynamic Load Distribution Strategy for Systems Under High Task Variation and Heavy Traffic (BF, ZT), pp. 1031–1037.
ICLPICLP-2003-EiterF #equivalence #logic programming #semantics #source code
Uniform Equivalence of Logic Programs under the Stable Model Semantics (TE, MF), pp. 224–238.
DATEDATE-2002-HuangLWG #constraints
Maze Routing with Buffer Insertion under Transition Time Constraints (LDH, ML, DFW, YG), pp. 702–707.
DATEDATE-2002-SulimmaKNV #constant
Improving Placement under the Constant Delay Model (KS, WK, IN, LPPPvG), pp. 677–682.
DATEDATE-2002-VandersteenWDV #evaluation #performance
High-Frequency Nonlinear Amplifier Model for the Efficient Evaluation of Inband Distortion Under Nonlinear Load-Pull Conditions (GV, PW, SD, FV), pp. 586–590.
VLDBVLDB-2002-SenkulKT #constraints #framework #logic #resource management #scheduling #workflow
A Logical Framework for Scheduling Workflows under Resource Allocation Constraints (PS, MK, IHT), pp. 694–705.
SASSAS-2002-PierroHW #approximate
Analysing Approximate Confinement under Uniform Attacks (ADP, CH, HW), pp. 310–325.
ICALPICALP-2002-LungoFNV #constraints #re-engineering
Discrete Tomography: Reconstruction under Periodicity Constraints (ADL, AF, MN, LV), pp. 38–56.
ICALPICALP-2002-Merkle #probability #sequence
The Kolmogorov-Loveland Stochastic Sequences Are Not Closed under Selecting Subsequences (WM), pp. 390–400.
IFMIFM-2002-BarradasB #liveness #proving #specification
Specification and Proof of Liveness Properties under Fairness Assumptions in B Event Systems (HRB, DB), pp. 360–379.
CSCWCSCW-2002-PalenS #mobile
Voice-mail diary studies for naturalistic data capture under mobile conditions (LP, MCS), pp. 87–95.
CAiSECAiSE-2002-CaliCGL #constraints #integration
Data Integration under Integrity Constraints (AC, DC, GDG, ML), pp. 262–279.
ICMLICML-2002-FerriFH #learning #using
Learning Decision Trees Using the Area Under the ROC Curve (CF, PAF, JHO), pp. 139–146.
ICPRICPR-v1-2002-TengLCH #robust
Robust Computation of Optical Flow under Non-Uniform Illumination Variations (CHT, SHL, YSC, WHH), pp. 327–330.
ICPRICPR-v2-2002-JoganLWB #locality #mobile
Mobile Robot Localization Under Varying Illumination (MJ, AL, HW, HB), pp. 741–744.
ICPRICPR-v3-2002-FortunaSC #comparison #recognition
A Comparison of PCA and ICA for Object Recognition Under Varying Illumination (JF, DCS, DWC), pp. 11–15.
ICPRICPR-v3-2002-JohnsonB #identification #metric
Relationship between Identification Metrics: Expected Confusion and Area Under a ROC Curve (AYJ, AFB), pp. 662–666.
ICPRICPR-v3-2002-KimKRK #image #robust
A Robust License-Plate Extraction Method under Complex Image Conditions (SK, DK, YR, GK), pp. 216–219.
ICPRICPR-v4-2002-ZhuJFL #eye tracking #information retrieval #realtime
Combining Kalman Filtering and Mean Shift for Real Time Eye Tracking under Active IR Illumination (ZZ, QJ, KF, KL), p. 318–?.
KDDKDD-2002-ChudovaS #markov #sequence
Pattern discovery in sequences under a Markov assumption (DC, PS), pp. 153–162.
LSOLSO-2002-NeuB #comprehension #learning #process #simulation
Learning and Understanding a Software Process through Simulation of Its Underlying Model (HN, UBK), pp. 81–93.
SEKESEKE-2002-HarzallahLT #education #modelling #named
CommOnCV: modelling the competencies underlying a curriculum vitae (MH, ML, FT), pp. 65–71.
SEKESEKE-2002-PaganelliP #automation #design #interactive #re-engineering #web
Automatic reconstruction of the underlying interaction design of web applications (LP, FP), pp. 439–445.
SACSAC-2002-CarlssonJ #difference #game studies
Differences between the iterated prisoner’s dilemma and the chicken game under noisy conditions (BC, KIJ), pp. 42–48.
CAVCAV-2002-BarnerG #approximate #model checking #reduction #symmetry
Combining Symmetry Reduction and Under-Approximation for Symbolic Model Checking (SB, OG), pp. 93–106.
DACDAC-2001-DoboliV #constraints #design #synthesis
Integrated High-Level Synthesis and Power-Net Routing for Digital Design under Switching Noise Constraints (AD, RV), pp. 629–634.
DACDAC-2001-LepakLH #constraints
Simultaneous Shield Insertion and Net Ordering under Explicit RLC Noise Constraint (KML, IL, LH), pp. 199–202.
DACDAC-2001-LiuCBK #constraints #embedded #power management #scheduling
Power-Aware Scheduling under Timing Constraints for Mission-Critical Embedded Systems (JL, PHC, NB, FJK), pp. 840–845.
DATEDATE-2001-Chen #grid #on the #power management
On the impact of on-chip inductance on signal nets under the influence of power grid noise (TC), pp. 451–459.
DATEDATE-2001-Doboli #constraints #design #embedded #latency
Integrated hardware-software co-synthesis for design of embedded systems under power and latency constraints (AD), pp. 612–619.
DATEDATE-2001-GaoW #algorithm #graph #modelling
A graph based algorithm for optimal buffer insertion under accurate delay models (YG, DFW), pp. 535–539.
DATEDATE-2001-SarkarK #constraints
Repeater block planning under simultaneous delay and transition time constraints (PS, CKK), pp. 540–545.
ICDARICDAR-2001-JinT #composition #locality #using
Text Area Localization under Complex-Background Using Wavelet Decomposition (NJ, YYT), pp. 1126–1130.
STOCSTOC-2001-IckingM #3d #bound #complexity #diagrams #distance
A tight bound for the complexity of voroni diagrams under polyhedral convex distance functions in 3D (CI, LM), pp. 316–321.
ICALPICALP-2001-Woeginger #constraints #on the #precedence #scheduling
On the Approximability of Average Completion Time Scheduling under Precedence Constraints (GJW), pp. 887–897.
AdaEuropeAdaEurope-2001-KallbergS #architecture #evolution
Ship System 2000, a Stable Architecture under Continuous Evolution (BK, RS), pp. 371–379.
AdaSIGAda-2001-KallbergS #architecture #evolution
Ship system 2000, a stable architecture under continuous evolution (BK, RS), pp. 47–52.
CIKMCIKM-2001-Collins-ThompsonSD #string
Improved String Matching Under Noisy Channel Conditions (KCT, CS, STD), pp. 357–364.
CIKMCIKM-2001-ParkKCP #approach #database #effectiveness #named #sequence
Prefix-Querying: An Approach for Effective Subsequence Matching Under Time Warping in Sequence Databases (SP, SWK, JSC, SP), pp. 255–262.
HPDCHPDC-2001-NatrajanFHGWCB #case study #experience #grid #using
Studying Protein Folding on the Grid: Experiences Using CHARMM on NPACI Resources under Legion (AN, ADF, MAH, ASG, NWD, MC, CLBI), pp. 14–21.
IJCARIJCAR-2001-AngerKL #logic programming #reasoning #semantics #set #source code
NoMoRe : A System for Non-monotonic Reasoning with Logic Programs under Answer Set Semantics (CA, KK, TL), pp. 325–330.
ICSTSAT-2001-BuningZ #satisfiability
Satisfiable Formulas Closed Under Replacement (HKB, XZ), pp. 48–58.
DACDAC-2000-Chakrabarty #architecture #constraints #design
Design of system-on-a-chip test access architectures under place-and-route and power constraints (KC), pp. 432–437.
DACDAC-2000-CongY
Routing tree construction under fixed buffer locations (JC, XY), pp. 379–384.
DATEDATE-2000-VardanianM #concurrent #detection #fault
Improving the Error Detection Ability of Concurrent Checkers by Observation Point Insertion in the Circuit Under Check (VAV, LBM), p. 762.
WRLAWRLA-2000-KirchnerG #normalisation #proving #termination
Termination and normalisation under strategy Proofs in ELAN (HK, IG), pp. 93–120.
PLDIPLDI-2000-CierniakLS #java #optimisation
Practicing JUDO: Java under dynamic optimizations (MC, GYL, JMS), pp. 13–26.
ICMLICML-2000-EspositoFFS #refinement
Ideal Theory Refinement under Object Identity (FE, NF, SF, GS), pp. 263–270.
ICPRICPR-v1-2000-RomdhaniPG #scalability
A Generic Face Appearance Model of Shape and Texture under Very Large Pose Variations from Profile to Profile Views (SR, AP, SG), pp. 5060–5063.
ICPRICPR-v1-2000-SorianoMHL #detection #video
Skin Detection in Video under Changing Illumination Conditions (MS, BM, SH, ML), pp. 1839–1842.
ICPRICPR-v1-2000-YiW #3d #recognition
3D Artificial Objects Recognition under Virtual Environment (MY, PSPW), pp. 1995–1998.
ICPRICPR-v2-2000-FredL #clustering #difference
Clustering Under a Hypothesis of Smooth Dissimilarity Increments (ALNF, JMNL), pp. 2190–2194.
ICPRICPR-v3-2000-ChoiL #analysis #distance
Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
ICPRICPR-v3-2000-DaoudiM #invariant #multi #representation
New Multiscale Planar Shape Invariant Representation under a General Affine Transformations (MD, SM), pp. 3794–3797.
ICPRICPR-v4-2000-TauberLD #retrieval #visual notation
Locale-Based Visual Object Retrieval under Illumination Change (ZT, ZNL, MSD), pp. 4043–4046.
TOOLSTOOLS-ASIA-2000-XuHWC #corba #persistent #web
A Strategy for Persistent Object Service under CORBA and WEB Environment (DX, XH, JW, YC), pp. 100–107.
TOOLSTOOLS-USA-2000-Lauinger00a
Good Software under Bad Conditions (TL), pp. 433–434.
SACSAC-2000-ChenAZ #network
Broadcasting Under Network Ignorance Scenario (XC, HA, SZ), pp. 615–619.
ICLPCL-2000-EiterFLPP #information management
Planning under Incomplete Knowledge (TE, WF, NL, GP, AP), pp. 807–821.
DATEDATE-1999-BuhlerPKB #approach #performance #process #simulation #using
Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
SIGMODSIGMOD-1999-RundensteinerKZWLLN #evolution #maintenance
Evolvable View Environment (EVE): Non-Equivalent View Maintenance under Schema Changes (EAR, AK, XZ, AvW, YL, AJL, AN), pp. 553–555.
STOCSTOC-1999-Bar-NoyGNS #approximate #multi #realtime #scheduling #throughput
Approximating the Throughput of Multiple Machines Under Real-Time Scheduling (ABN, SG, JN, BS), pp. 622–631.
CIKMCIKM-1999-HuLL #clustering #scheduling
Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling (QH, WCL, DLL), pp. 351–358.
ICMLICML-1999-NgHR #policy #theory and practice
Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
PODSPODS-1998-CalvaneseGL #constraints #decidability #on the #query
On the Decidability of Query Containment under Constraints (DC, GDG, ML), pp. 149–158.
ICFPICFP-1998-GibbonsJ
The Under-Appreciated Unfold (JG, GJ), pp. 273–279.
ICPRICPR-1998-LeiW #detection #novel #symmetry
A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
ICPRICPR-1998-PengZB #automation #recognition
A fully automated face recognition system under different conditions (HP, CZ, ZB), pp. 1223–1225.
ICPRICPR-1998-SeoAH #video
Video augmentation by image-based rendering under the perspective camera model (YS, MHA, KSH), pp. 1694–1696.
ICPRICPR-1998-WengH #learning #recognition #sequence
Sensorimotor action sequence learning with application to face recognition under discourse (J(W, WSH), pp. 252–254.
KRKR-1998-DuboisGPZ
Making Decision in a Qualitative Setting: from Decision under Uncertaintly to Case-based Decision (DD, LG, HP, AZ), pp. 594–607.
SACSAC-1998-HuizingaS #linux
File hoarding under NFS and Linux (DMH, HS), pp. 409–415.
SACSAC-1998-LiII #algorithm #constraints #estimation #recursion
A recursive time estimation algorithm for program traces under resource constraints (DL, YI, NI), pp. 635–640.
ISSTAISSTA-1998-MitchellZ #empirical #reliability #testing
An Experiment in Estimating Reliability Growth Under Both Representative and Directed Testing (BM, SJZ), pp. 32–41.
ASEASE-1997-Sucrow #graph grammar #human-computer #interactive #specification
Formal Specification of Human-Computer Interaction by Graph Grammars under Consideration of Information Resources (BS), pp. 28–35.
DACDAC-1997-PomeranzR #approach #fault #multi #simulation #using
Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
DACDAC-1997-TianS #agile #fault #parametricity #simulation
Rapid Frequency-Domain Analog Fault Simulation Under Parameter Tolerances (MWT, CJRS), pp. 275–280.
DATEEDTC-1997-ManichF #process
Maximizing the weighted switching activity in combinational CMOS circuits under the variable delay model (SM, JF), pp. 597–602.
HCIHCI-CC-1997-MetakidesGW #user interface
User Interface Software & Technology (UIST) Under ESPRIT: Current Work and Future Directions (GM, AG, JW), pp. 485–488.
KDDKDD-1997-ProvostF #analysis #classification #comparison #performance #visualisation
Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
PPDPPLILP-1997-Xi #abstraction #evaluation
Evaluation Under λ Abstraction (HX), pp. 259–273.
CAVCAV-1997-GyurisS #model checking #on the fly #symmetry
On-the-Fly Model Checking Under Fairness That Exploits Symmetry (VG, APS), pp. 232–243.
DACDAC-1996-ChenCW96a
Optimal Wire-Sizing Formular Under the Elmore Delay Model (CPC, YPC, DFW), pp. 487–490.
DACDAC-1996-KahngM #analysis
Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
DACDAC-1996-KudvaGJN #multi #network #synthesis
Synthesis for Hazard-free Customized CMOS Complex-Gate Networks Under Multiple-Input Changes (PK, GG, HMJ, SMN), pp. 77–82.
ICPRICPR-1996-HoriuchiYY #nondeterminism #robust
Robust relaxation method for structural matching under uncertainty (TH, KY, HY), pp. 176–180.
ICPRICPR-1996-YuCXY #3d #approximate #higher-order
3D shape and motion by SVD under higher-order approximation of perspective projection (HY, QC, GX, MY), pp. 456–460.
DACDAC-1995-XiD #power management #process
Buffer Insertion and Sizing Under Process Variations for Low Power Clock Distribution (JGX, WWMD), pp. 491–496.
ICDARICDAR-v2-1995-JangKHK #recognition
Two-stage recognition of freight train ID number under outdoor environment (JHJ, JHK, KSH, JHK), pp. 986–991.
STOCSTOC-1995-NisanT #symmetry
Symmetric logspace is closed under complement (NN, ATS), pp. 140–146.
ICALPICALP-1995-Henzinger #approximate
Approximating Minimum Cuts under Insertions (MRH), pp. 280–291.
ICALPICALP-1995-MetivierRW #set #word
Computing the Closure of Sets of Words Under Partial Commutations (YM, GR, PAW), pp. 75–86.
FPCAFPCA-1995-Rittri #polymorphism #recursion
Dimension Inference Under Polymorphic Recursion (MR), pp. 147–159.
LOPSTRLOPSTR-1995-Renault #logic programming #proving #source code #towards
Towards a Complete Proof Procedure to Prove Properties of Normal Logic Programs under the Completion (SR), pp. 204–218.
CAVCAV-1995-DillW #approximate #realtime #verification
Verification of Real-Time Systems by Successive Over and Under Approximation (DLD, HWT), pp. 409–422.
CAVCAV-1995-EmersonS #approach #model checking #symmetry
Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automata-theoretic Approach (EAE, APS), pp. 309–324.
DACDAC-1994-Sapatnekar #optimisation
RC Interconnect Optimization Under the Elmore Delay Model (SSS), pp. 387–391.
HTHT-ECHT-1994-Haake #hypermedia #implementation
Under CoVer: The Implementation of a Contextual Version Server for Hypertext Applications (AH), pp. 81–93.
ICALPICALP-1994-Sanchez-CousoF #analysis #pattern matching #probability
Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
AdaEuropeAdaEurope-1994-NunezP #constraints #development #lightweight #process
Development of a Lightweight Object-Based Software Process Model Under Pragmatic Constraints (FJN, RP), pp. 231–257.
AdaTRI-Ada-1994-Kempe #ada #data type
Abstract Data Types are Under Full Control with Ada 9X (MK), pp. 141–152.
KRKR-1994-TanP #evaluation #nondeterminism #specification
Specification and Evaluation of Preferences Under Uncertainty (SWT, JP), pp. 530–539.
REICRE-1994-Soares #concept #process #specification
Underlying concepts in process specification (JOPS), pp. 48–52.
SACSAC-1994-LeeA #c++
C++ style class support under FIG Forth (YML, DJA), pp. 341–345.
DACDAC-1993-LeeJW #behaviour #synthesis
Behavioral Synthesis of Highly Testable Data Paths under the Non-Scan and Partial Scan Environments (TCL, NKJ, WW), pp. 292–297.
ICDARICDAR-1993-MykaG #automation #documentation #hypermedia #re-engineering #using
Using electronic facsimiles of documents for automatic reconstruction of underlying hypertext structures (AM, UG), pp. 528–532.
PODSPODS-1993-ChenW #evaluation #query #semantics
Query Evaluation under the Well Founded Semantics (WC, DSW), pp. 168–179.
FMFME-1993-RossL #consistency #maintenance #specification
Maintaining Consistency Under Changes to Formal Specifications (KJR, PAL), pp. 558–577.
ICMLICML-1993-Idestam-Almquist #anti #recursion
Generalization under Implication by Recursive Anti-unification (PIA), pp. 151–158.
RERE-1993-JarkeBRSV #bibliography #requirements
Theories underlying requirements engineering: an overview of NATURE at Genesis (MJ, JABJ, CR, AGS, YV), pp. 19–31.
CAVCAV-1993-LincolnR #algorithm #consistency #fault #hybrid #interactive #verification
The Formal Verification of an Algorithm for Interactive Consistency under a Hybrid Fault Model (PL, JMR), pp. 292–304.
ICLPICLP-1993-BolD
The Underlying Search for Magic Templates and Tabulation (RNB, LD), pp. 793–811.
DACDAC-1992-ChaudharyP #algorithm #constraints
A Near Optimal Algorithm for Technology Mapping Minimizing Area under Delay Constraints (KC, MP), pp. 492–498.
DACDAC-1992-LeeP #constraints #functional #generative #testing
Hierarchical Test Generation under Intensive Global Functional Constraints (JL, JHP), pp. 261–266.
LISPLFP-1992-Henessey #lisp #named #performance
WCL: Delivering Efficient Common Lisp Applications Under Unix (WH), pp. 260–269.
CHICHI-1992-MulliganDNPRR #constraints #design
Designing Usable Systems Under Real-World Constraints: A Practitioners Forum (RMM, MD, JN, SEP, DR, SER), pp. 149–152.
DACDAC-1991-ChengDK #design #generative #robust #standard #synthesis #testing
Robust Delay-Fault Test Generation and Synthesis for Testability Under A Standard Scan Design Methodology (KTC, SD, KK), pp. 80–86.
STOCSTOC-1991-BeigelRS
PP Is Closed Under Intersection (Extended Abstract) (RB, NR, DAS), pp. 1–9.
STOCSTOC-1991-CoffmanCGJMSWY #analysis #case study
Fundamental Discrepancies between Average-Case Analyses under Discrete and Continuous Distributions: A Bin Packing Case Study (EGCJ, CC, MRG, DSJ, LAM, PWS, RRW, MY), pp. 230–240.
ICLPISLP-1991-Nakayama #principle #program transformation #proving
Program Transformation under the Principle of Proof as Program (HN), pp. 626–640.
ICTSSIWPTS-1991-CorbiS #embedded #protocol #testing
Common Abstract Test Suite for the Connection Oriented Presentation Protocol Embedded Under Different Application Contexts (CC, GS), pp. 143–149.
DACDAC-1990-HwangHL #constraints #heuristic #scheduling
Optimum and Heuristic Data Path Scheduling Under Resource Constraints (CTH, YCH, YLL), pp. 65–70.
DACDAC-1990-KuM #constraints #scheduling
Relative Scheduling Under Timing Constraints (DCK, GDM), pp. 59–64.
VLDBVLDB-1990-MuntzL #analysis #array #performance
Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
STOCSTOC-1990-Hastad #generative #pseudo
Pseudo-Random Generators under Uniform Assumptions (JH), pp. 395–404.
STOCSTOC-1990-SchmidtS #analysis
The Analysis of Closed Hashing under Limited Randomness (Extended Abstract) (JPS, AS), pp. 224–234.
SEKESEKE-1990-SunK #development
Graphics Application Development Under Window Environment (TSS, CYK), pp. 234–238.
ICLPJICSCP-1988-SekiI88 #evaluation #query #source code
A Query Evaluation Method for Stratified Programs Under the Extended CWA (HS, HI), pp. 195–211.
VLDBVLDB-1987-AtzeniC #database #dependence #functional #independence
Independent Database Schemes under Functional and Inclusion Dependencies (PA, EPFC), pp. 159–166.
STOCSTOC-1987-Munro
Searching a Two Key Table Under a Single Key (JIM), pp. 383–387.
ICALPICALP-1987-Josko #liveness #model checking
Modelchecking of CTL Formulae under Liveness Assumptions (BJ), pp. 280–289.
ICSEICSE-1987-CurtisKSI #modelling #on the #process
On Building Software Process Models Under the Lamppost (BC, HK, VYS, NI), pp. 96–105.
CADECADE-1986-BuningL #first-order #satisfiability
Classes of First Order Formulas Under Various Satisfiability Definitions (HKB, TL), pp. 553–563.
RTARTA-1985-Fortenbach #algebra #commutative #unification
An Algebraic Approch to Unification Under Assoiativity and Commutativity (AF), pp. 381–397.
PODSPODS-1982-JohnsonK #dependence #functional #query #testing
Testing Containment of Conjunctive Queries Under Functional and Inclusion Dependencies (DSJ, ACK), pp. 164–169.
STOCSTOC-1982-Bach #algorithm #performance
Fast Algorithms under the Extended Riemann Hypothesis: A Concrete Estimate (EB), pp. 290–295.
STOCSTOC-1981-Simon #bound #complexity #probability #turing machine
Space-Bounded Probabilistic Turing Machine Complexity Classes Are Closed under Complement (Preliminary Version) (JS), pp. 158–167.
ICALPICALP-1980-Vitanyi #on the #power of #realtime #specification
On the Power of Real-Time Machines Under Varying Specifications (Extended Abstract) (PMBV), pp. 658–671.
ICALPICALP-1979-CremersH #requirements
Arbitration and Queuing Under Limited Shared Storage Requirements (Preliminary Report) (ABC, TNH), pp. 147–160.
ICALPICALP-1978-AlbertMR #generative
Simple EOL Forms under Uniform Interpretation Generating CF Languages (JA, HAM, GR), pp. 1–14.
ICALPICALP-1977-Streinu #finite #ll
LL(k) Languages are Closed Under Union with Finite Languages (IS), pp. 504–508.
ICALPICALP-1974-DilgerR #monad #strict
Monadic Program Schemes Under Restricted Classes of Free Interpretations (WD, PR), pp. 547–561.
DACDAC-1972-Dudnik #architecture #nondeterminism #optimisation
Optimization of planning and architectural decisions under conditions of uncertain demand (EED), pp. 213–219.
STOCSTOC-1970-Lewis70a #product line
Closure of Families of Languages under Substitution Operators (DJL), pp. 100–108.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.