BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
model (37)
mine (37)
analysi (34)
api (33)
system (33)

Stem usag$ (all stems)

321 papers:

ECSAECSA-2015-LewisL
Characterization of Cyber-Foraging Usage Contexts (GAL, PL), pp. 195–211.
DACDAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management
Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
ICPCICPC-2015-SaiedABS #api #library #question #source code #using
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICPCICPC-2015-VendomeLBPGP #git #java #scalability
License usage and changes: a large-scale study of Java projects on GitHub (CV, MLV, GB, MDP, DMG, DP), pp. 218–228.
ICSMEICSME-2015-CorleyLQ #developer #web
Web usage patterns of developers (CSC, FL, SQ), pp. 381–390.
ICSMEICSME-2015-GoeminneM #analysis #database #framework #java #towards
Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
MSRMSR-2015-SawantB #api #dataset
A Dataset for API Usage (AAS, AB), pp. 506–509.
MSRMSR-2015-VasquezWBMP #android #execution #generative #mining
Mining Android App Usages for Generating Actionable GUI-Based Execution Scenarios (MLV, MW, CBC, KM, DP), pp. 111–122.
SANERSANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support
Scaling up evaluation of code search tools through developer usage metrics (KD, DCS, LLP), pp. 181–190.
SANERSANER-2015-SaiedBAS #api #mining #multi
Mining Multi-level API Usage Patterns (MAS, OB, HA, HAS), pp. 23–32.
SANERSANER-2015-SaiedSD #api #constraints #documentation
An observational study on API usage constraints and their documentation (MAS, HAS, BD), pp. 33–42.
CHICHI-2015-SamsonovTSKH #towards
You Can’t Smoke Here: Towards Support for Space Usage Rules in Location-aware Technologies (PAS, XT, JS, WK, BH), pp. 971–974.
HCIDUXU-UI-2015-MedolaLBSFP #case study #experience #problem
Experiences, Problems and Solutions in Computer Usage by Subjects with Tetraplegia (FOM, JL, CGB, AS, AEF, LCP), pp. 131–137.
HCIDUXU-UI-2015-ZhuSK #case study #design #smarttech
A Field Study on Basic Usage Patterns of Traditional Watch and Smart Phone for Designing Smart Watch (ZZ, HS, SWK), pp. 597–608.
HCISCSM-2015-HallC #collaboration #information management #performance #process #social
Analysing Yammer Usage Pattern in the Context of Social Collaborative Activity Performance by Knowledge Workers (JH, BBC), pp. 127–137.
CAiSECAiSE-2015-SirenSJ #lifecycle #requirements
The Requirements and Needs of Global Data Usage in Product Lifecycle Management (AS, KS, MJ), pp. 103–117.
ICEISICEIS-v2-2015-SarsharNR #case study #comparison #smarttech
A Study on the Usage of Smartphone Apps in Fire Scenarios — Comparison between GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 469–474.
SEKESEKE-2015-ChenZWQJW #api #mining #protocol
Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
SEKESEKE-2015-GoncalvesW #bibliography #education #how #perspective #project management #tool support
How to Teach the Usage of Project Management Tools in Computer Courses: A Systematic Literature Review (RQG, CGvW), pp. 36–41.
SACSAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing
Concurrent streams in Markov chain usage models for statistical testing of complex systems (DH, JE, RG), pp. 1803–1807.
ICSEICSE-v1-2015-AvdiienkoKGZARB #mining
Mining Apps for Abnormal Usage of Sensitive Data (VA, KK, AG, AZ, SA, SR, EB), pp. 426–436.
ICSEICSE-v2-2015-Avdiienko #mining
Mining Patterns of Sensitive Data Usage (VA), pp. 891–894.
ICSEICSE-v2-2015-Vendome #case study #git #scalability
A Large Scale Study of License Usage on GitHub (CV), pp. 772–774.
ICSTICST-2015-YuC #embedded #generative #stack #testing #worst-case
Guided Test Generation for Finding Worst-Case Stack Usage in Embedded Systems (TY, MBC), pp. 1–10.
ISSTAISSTA-2015-DahseH #case study #empirical #experience #php #security
Experience report: an empirical study of PHP security mechanism usage (JD, TH), pp. 60–70.
ASEASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
CASECASE-2014-HungCYDYW #behaviour #data mining #mining
Data mining for analysing kiosk usage behavior patterns (YSH, KLBC, CTY, GFD, YHY, NCW), pp. 1115–1120.
DACDAC-2014-ChenCDZ #energy #smarttech
Demystifying Energy Usage in Smartphones (XC, YC, MD, J(Z), p. 5.
HTHT-2014-WenLTP #network #twitter
Twitter in academic conferences: usage, networking and participation over time (XW, YRL, CT, DP), pp. 285–290.
ICPCICPC-2014-PetersenHR #api #comparison #eclipse #empirical #groovy #ide #java #type system
An empirical comparison of static and dynamic type systems on API usage in the presence of an IDE: Java vs. groovy with eclipse (PP, SH, RR), pp. 212–222.
ICSMEICSME-2014-SahinTMPC #energy #how #obfuscation #question
How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
ICSMEICSME-2014-ZhuZXJL0 #api #mining
Mining API Usage Examples from Test Code (ZZ, YZ, BX, YJ, ZL, LZ), pp. 301–310.
MSRMSR-2014-VasquezBBOPP #android #api #empirical #energy #mining
Mining energy-greedy API usage patterns in Android apps: an empirical study (MLV, GB, CBC, RO, MDP, DP), pp. 2–11.
MSRMSR-2014-VasquezHBP #android #library #obfuscation #reuse
Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
SCAMSCAM-2014-WuAGA #api #named
ACUA: API Change and Usage Auditor (WW, BA, YGG, GA), pp. 89–94.
HCIDUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people
TAC-ACCESS — Technologies to Support Communication from Interfaces Accessible and Multimodal for People with Disabilities and Diversity: Context-Centered Design of Usage (CdOD, LMP, CdCL, EGS), pp. 141–151.
HCIDUXU-ELAS-2014-Spinillo #how #usability
How Do Patient Information Leaflets Aid Medicine Usage? A Proposal for Assessing Usability of Medicine Inserts (CGS), pp. 115–124.
HCIHCI-AS-2014-StieningerN
Drivers for the Actual Usage of Cloud Services: An Examination of Influencing Factors for Digital Natives (MS, DN), pp. 69–79.
HCISCSM-2014-PapachristosKKIFA #case study #deployment #enterprise #social #social media #tool support
Deployment, Usage and Impact of Social Media Tools in Small and Medium Enterprises: A Case Study (EP, CK, NK, II, CF, NMA), pp. 79–90.
HCISCSM-2014-SchaarVZELJ #motivation #network #social #using
Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
HCISCSM-2014-ShiLYLC #development #network #social #validation
The Development and Validation of the Social Network Sites (SNSs) Usage Questionnaire (YS, YLLL, ZY, YL, HC), pp. 113–124.
ICEISICEIS-v2-2014-GarciaP #as a service #maintenance #requirements
SaaS Usage Information for Requirements Maintenance (AG, ACRP), pp. 323–330.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v2-2014-SamejimaMK #flexibility #resource management
Flexible Peak Shaving in Data Center by Suppression of Application Resource Usage (MS, HTM, NK), pp. 355–360.
SEKESEKE-2014-LiuTA #database #detection
Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
ICMTICMT-2014-WieberAS #automation #graph grammar #model transformation #on the #testing
On the Usage of TGGs for Automated Model Transformation Testing (MW, AA, AS), pp. 1–16.
ICSEICSE-2014-NguyenNNN #interprocedural #javascript #mining #web
Mining interprocedural, data-oriented usage patterns in JavaScript web applications (HVN, HAN, ATN, TNN), pp. 791–802.
HPCAHPCA-2014-WangDDS #concurrent #memory management #multi #named #predict #source code #thread
DraMon: Predicting memory bandwidth usage of multi-threaded programs with high accuracy and low overhead (WW, TD, JWD, MLS), pp. 380–391.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSSICTSS-2014-SamihGBAB #approach #modelling #testing
An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ECSAECSA-2013-AngelovTK #architecture #design
Software Reference Architectures — Exploring Their Usage and Design in Practice (SA, JJMT, RJK), pp. 17–24.
ASEASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
DocEngDocEng-2013-SadallahEMP #documentation #framework #re-engineering
A framework for usage-based document reengineering (MS, BE, AeM, YP), pp. 99–102.
CSMRCSMR-2013-BusingeSB #api #developer #eclipse
Analyzing the Eclipse API Usage: Putting the Developer in the Loop (JB, AS, MvdB), pp. 37–46.
ICPCICPC-2013-RooverLP #api #multi
Multi-dimensional exploration of API usage (CDR, RL, EP), pp. 152–161.
ICSMEICSM-2013-BavotaCPOP #documentation #empirical #maintenance
An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks (GB, GC, MDP, RO, SP), pp. 210–219.
ICSMEICSM-2013-XinQHXZWG #concurrent #empirical #source code
An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs (RX, ZQ, SH, CX, YZ, YW, HG), pp. 100–109.
MSRMSR-2013-WangDZCXZ #api #mining #source code
Mining succinct and high-coverage API usage patterns from source code (JW, YD, HZ, KC, TX, DZ), pp. 319–328.
MSRMSR-2013-WangG #android #api #case study #detection #developer
Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
SCAMSCAM-2013-MendezBM #api #empirical #object-oriented #scalability
Empirical evidence of large-scale diversity in API usage of object-oriented software (DM, BB, MM), pp. 43–52.
IFMIFM-2013-SongT #api #library #model checking
Model-Checking Software Library API Usage Rules (FS, TT), pp. 192–207.
CHICHI-2013-BaillyPDW #named
Métamorphe: augmenting hotkey usage with actuated keys (GB, TP, JD, DJW), pp. 563–572.
CHICHI-2013-ChilanaKWG #case study #crowdsourcing #multi
A multi-site field study of crowdsourced contextual help: usage and perspectives of end users and software teams (PKC, AJK, JOW, TG), pp. 217–226.
CHICHI-2013-MatejkaGF13a #heatmap #named #visualisation
Patina: dynamic heatmaps for visualizing application usage (JM, TG, GWF), pp. 3227–3236.
CHICHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network #privacy
Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
HCIDUXU-CXC-2013-WindlH #aspect-oriented #design
Intercultural Design for Use — Extending Usage-Centered Design by Cultural Aspects (HW, RH), pp. 139–148.
HCIHCI-III-2013-LimD
Evaluating Intelligibility Usage and Usefulness in a Context-Aware Application (BYL, AKD), pp. 92–101.
HCIHIMI-D-2013-LeeY #behaviour #comparison #information management #research
Research on Website Usage Behavior through Information Search Perspective: A Comparison of Experiential and Goal-Directed Behaviors (JL, MY), pp. 456–464.
ICEISICEIS-J-2013-RothPS13a #analysis #twitter
Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
ICEISICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation
Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
CIKMCIKM-2013-LiaoPPL #behaviour #mining #mobile #on the #predict #smarttech
On mining mobile apps usage behavior for predicting apps usage in smartphones (ZXL, YCP, WCP, PRL), pp. 609–618.
ECIRECIR-2013-WilkieA
An Initial Investigation on the Relationship between Usage and Findability (CW, LA), pp. 808–811.
KDDKDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
REFSQREFSQ-2013-BouillonMP #bibliography #requirements #traceability
A Survey on Usage Scenarios for Requirements Traceability in Practice (EB, PM, IP), pp. 158–173.
SACSAC-2013-TangHHC #mobile #named
iLauncher: an intelligent launcher for mobile apps based on individual usage patterns (LYT, PCH, JLH, MSC), pp. 505–512.
CAVCAV-2013-HarrisJLJ #library #validation
Validating Library Usage Interactively (WRH, GJ, SL, SJ), pp. 796–812.
ISSTAISSTA-2013-HillsKV #empirical #perspective #php #static analysis
An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
LICSLICS-2013-AspertiL #cost analysis #λ-calculus
The Cost of Usage in the λ-Calculus (AA, JJL), pp. 293–300.
RTARTA-2013-AvanziniM13a #complexity
Tyrolean Complexity Tool: Features and Usage (MA, GM), pp. 71–80.
DACDAC-2012-JungSB #off the shelf #using
Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
DATEDATE-2012-LafayePBGF #embedded #modelling #resource management #simulation
Model driven resource usage simulation for critical embedded systems (ML, LP, EB, MG, DF), pp. 312–315.
CSMRCSMR-2012-BauerH #api #comprehension #maintenance
Understanding API Usage to Support Informed Decision Making in Software Maintenance (VB, LH), pp. 435–440.
ICSMEICSM-2012-BauerHD #approach #library
A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
MSRMSR-2012-BaysalHG #development #mining
Mining usage data and development artifacts (OB, RH, MWG), pp. 98–107.
WCREWCRE-2012-NodaKA #abstraction #execution
Execution Trace Abstraction Based on Meta Patterns Usage (KN, TK, KA), pp. 167–176.
PEPMPEPM-2012-AlbertCPR #analysis #incremental #resource management
Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
CIAACIAA-2012-DeganoFM #automaton #resource management
Nominal Automata for Resource Usage Control (PD, GLF, GM), pp. 125–137.
CHICHI-2012-FroehlichFORPWLFBPL #design #evaluation #prototype
The design and evaluation of prototype eco-feedback displays for fixture-level water usage data (JF, LF, MO, SR, JP, IW, ECL, FF, MB, SP, JAL), pp. 2367–2376.
CHICHI-2012-LeeKYYK #case study #comprehension #mobile
Understanding mobile Q&A usage: an exploratory study (UL, HK, EY, MY, JK), pp. 3215–3224.
ICEISICEIS-J-2012-BabaianL12a #automation #interface
Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
ICEISICEIS-v3-2012-BabaianL #enterprise
Leveraging Usage History to Support Enterprise System Users (TB, WTL), pp. 35–44.
ICPRICPR-2012-TakahashiI #predict
Predicting battery life from usage trajectory patterns (TT, TI), pp. 2946–2949.
ICPRICPR-2012-TaoKNT #process #recognition
Camera view usage of binary infrared sensors for activity recognition (ST, MK, HN, JT), pp. 1759–1762.
KDIRKDIR-2012-ArbelaitzGLMPP12a #adaptation #mining #web
Enhancing a Web Usage Mining based Tourism Website Adaptation with Content Information (OA, IG, AL, JM, JMP, IP), pp. 287–292.
KDIRKDIR-2012-IkebeKT #learning #predict #smarttech #using
Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
MLDMMLDM-2012-JoenssenB
Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
MLDMMLDM-2012-PaliwalP #clustering #documentation #segmentation
Investigating Usage of Text Segmentation and Inter-passage Similarities to Improve Text Document Clustering (SP, VP), pp. 555–565.
SEKESEKE-2012-Pelto-PiriMT #evaluation #industrial
A Unified Model for Server Usage and Operational Costs Based on User Profiles: An Industrial Evaluation (JPP, PM, RT), pp. 205–210.
SEKESEKE-2012-WauteletHK
A Usage-Based Unified Resource Model (YW, SH, MK), pp. 299–304.
SIGIRSIGIR-2012-Baeza-YatesM #web
(Big) usage data in web search (RABY, YM), pp. 1181–1182.
MODELSMoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
MODELSMoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
RERE-2012-Knauss #ecosystem #elicitation #on the #requirements
On the usage of context for requirements elicitation: End-user involvement in IT ecosystems (AK), pp. 345–348.
SACSAC-2012-DiamantiniPS #mining #repository #workflow
Mining usage patterns from a repository of scientific workflows (CD, DP, ES), pp. 152–157.
FSEFSE-2012-KwonS #component #detection
Detecting and analyzing insecure component usage (TK, ZS), p. 5.
FSEFSE-2012-MirakhorliMC #design pattern #variability
Variability points and design pattern usage in architectural tactics (MM, PM, JCH), p. 52.
ICSEICSE-2012-BuseW #api
Synthesizing API usage examples (RPLB, WW), pp. 782–792.
ICSEICSE-2012-UddinDR #analysis #api #concept
Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
ICSEICSE-2012-ZhangYZFZZO #api #automation #parametricity #recommendation
Automatic parameter recommendation for practical API usage (CZ, JY, YZ, JF, XZ, JZ, PO), pp. 826–836.
HPDCHPDC-2012-ChenA #effectiveness #memory management #optimisation #pipes and filters
Optimizing MapReduce for GPUs with effective shared memory usage (LC, GA), pp. 199–210.
ICSTICST-2012-SprenkleCP #classification #modelling #statistics #web
Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
ASEASE-2011-UddinDR #api
Analyzing temporal API usage patterns (GU, BD, MPR), pp. 456–459.
ASEASE-2011-WangFWLXY #api #effectiveness #java #named #recommendation #web
APIExample: An effective web search based usage example recommendation system for java APIs (LW, LF, LW, GL, BX, FY), pp. 592–595.
SIGMODSIGMOD-2011-ElmeleegyLROE #named
U-MAP: a system for usage-based schema matching and mapping (HE, JL, EKR, MO, AKE), pp. 1287–1290.
MSRMSR-2011-KarusG #case study #evolution #open source
A study of language usage evolution in open source software (SK, HCG), pp. 13–22.
PASTEPASTE-2011-MilevaZ #composition
Assessing modularity via usage changes (YMM, AZ), pp. 37–40.
CHICHI-2011-ChilanaGF #multi #process
Modern software product support processes and the usage of multimedia formats (PKC, TG, GWF), pp. 3093–3102.
CHICHI-2011-HayashiH
A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
HCIDHM-2011-SchafferSM #human-computer #interactive #multimodal
A Model of Shortcut Usage in Multimodal Human-Computer Interaction (SS, RS, SM), pp. 337–346.
HCIDUXU-v1-2011-ChenT #design #industrial #learning #problem #student
Exploring the Learning Problems and Resources Usage of Undergraduate Industrial Design Students in Design Studio (WC, HHT), pp. 43–52.
HCIDUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCIDUXU-v2-2011-ZhangCV #case study #experience #modelling
Modeling Users’ Data Usage Experiences from Scientific Literature (JZ, CC, MSEV), pp. 337–346.
HCIHCD-2011-LinC #research #social #social media
Bridging the Social Media Usage Gap from Old to New: An Elderly Media Interpersonal and Social Research in Taiwan (SHL, WHC), pp. 547–555.
HCIHCI-MIIE-2011-EL-QiremC #development #experience #user interface
Computer Usage and User Experience in Jordan: Development and Application of the Diamond Model of Territorial Factors (FAEQ, GC), pp. 490–499.
KDIRKDIR-2011-BonninBB #mining #predict #web
Handling Tabbing and Backward References for Predictive Web Usage Mining (GB, AB, AB), pp. 503–509.
RecSysRecSys-2011-Alam #clustering #recommendation #web
Intelligent web usage clustering based recommender system (SA), pp. 367–370.
ECOOPECOOP-2011-MilevaWZ #evolution #mining
Mining Evolution of Object Usage (YMM, AW, AZ), pp. 105–129.
PLATEAUPLATEAU-2011-VakilianCNRMJ #refactoring
The need for richer refactoring usage data (MV, NC, SN, BAR, RZM, REJ), pp. 31–38.
GPCEGPCE-2011-SteckLS #modelling #runtime
Model-driven engineering and run-time model-usage in service robotics (AS, AL, CS), pp. 73–82.
SACSAC-2011-Gonzalez-SanchezAGG #empirical #fault #locality #testing
An empirical study on the usage of testability information to fault localization in software (AGS, RA, HGG, AJCvG), pp. 1398–1403.
SACSAC-2011-GuerraF #realtime #resource management
Handling overload of target sensitive real-time applications for increased system utility and improved resource usage (RG, GF), pp. 742–747.
SACSAC-2011-LammelPS #analysis #java #open source #scalability
Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
ESEC-FSEESEC-FSE-2011-BarzilayHY #developer #social #social media #using
Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
ICSEICSE-2011-McMillanGPXF #named
Portfolio: finding relevant functions and their usage (CM, MG, DP, QX, CF), pp. 111–120.
ICSEICSE-2011-McMillanGPXF11a #named
Portfolio: a search engine for finding functions and their usages (CM, MG, DP, QX, CF), pp. 1043–1045.
ICSEICSE-2011-SillittiSV #comprehension #towards
Toward a better understanding of tool usage (AS, GS, JV), pp. 832–835.
ICSTICST-2011-FraserZ #generative #testing
Exploiting Common Object Usage in Test Case Generation (GF, AZ), pp. 80–89.
ICSTICST-2011-Grasland #automation #resource management #testing
Testing Resource Usage in Home Automation Systems (YG), pp. 419–422.
ICSTICST-2011-SprenklePS #case study #modelling #navigation #testing #web
A Study of Usage-Based Navigation Models and Generated Abstract Test Cases for Web Applications (SS, LLP, LS), pp. 230–239.
ICTSSICTSS-2011-BochmannJW #reliability #testing #web
Improved Usage Model for Web Application Reliability Testing (GvB, GVJ, BW), pp. 15–31.
HTHT-2010-PaparrizosKAV #automation #statistics #web
Automatic extraction of structure, content and usage data statistics of web sites (IKP, VAK, LA, AV), pp. 301–302.
ICPCICPC-2010-LammelP #comprehension #domain-specific language
Vivisection of a Non-Executable, Domain-Specific Language — Understanding (the Usage of) the P3P Language (RL, EP), pp. 104–113.
ICPCICPC-2010-Mihancea #named #polymorphism #visualisation
Patrools: Visualizing the Polymorphic Usage of Class Hierarchies (PFM), pp. 36–37.
ICPCICPC-2010-SuttonHM #c++ #identification #library
Identification of Idiom Usage in C++ Generic Libraries (AS, RH, JIM), pp. 160–169.
ICSMEICSM-2010-NasehiM #api #testing
Unit tests as API usage examples (SMN, FM), pp. 1–10.
CHICHI-2010-KarlsonIMRLT #mobile #smarttech
Mobile taskflow in context: a screenshot study of smartphone usage (AKK, STI, BM, GR, KL, JCT), pp. 2009–2018.
CHICHI-2010-KellyCDNG #information management #quality #query
Effects of popularity and quality on the usage of query suggestions during information search (DK, AC, MD, XN, KG), pp. 45–54.
CHICHI-2010-MullerMF #enterprise
Patterns of usage in an enterprise file-sharing service: publicizing, discovering, and telling the news (MJM, DRM, JF), pp. 763–766.
CSCWCSCW-2010-IqbalH #case study
Notifications and awareness: a field study of alert usage and preferences (STI, EH), pp. 27–30.
RecSysRecSys-2010-CastagnosJP #recommendation
Eye-tracking product recommenders’ usage (SC, NJ, PP), pp. 29–36.
SEKESEKE-2010-SieglGH #modelling #testing #variability
Introduction of Time and Timing Variability in Usage Model based Testing (SS, RG, KSJH), pp. 61–66.
SEKESEKE-2010-Spector #logic
Prodigious Data, Logic, Processing, and Usage (AZS), p. 1.
SIGIRSIGIR-2010-KaleBSVVGD #enterprise #named #web
iCollaborate: harvesting value from enterprise web usage (AK, TB, BS, TLPV, LV, MG, MD), p. 699.
OOPSLAOOPSLA-2010-NguyenNWNKN #adaptation #api #approach #graph
A graph-based approach to API usage adaptation (HAN, TTN, GWJ, ATN, MK, TNN), pp. 302–321.
TOOLSTOOLS-EUROPE-2010-ChristBEGL #approach #framework #metamodelling #specification
A Generic Meta-model-Based Approach for Specifying Framework Functionality and Usage (FC, JCB, GE, CG, ML), pp. 21–40.
POPLPOPL-2010-JostHLH #higher-order #resource management #source code
Static determination of quantitative resource usage for higher-order programs (SJ, KH, HWL, MH), pp. 223–236.
RERE-2010-SieglHG #analysis #modelling #requirements #testing
Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
SACSAC-2010-SantanaB #web
Summarizing observational client-side data to reveal web usage patterns (VFdS, MCCB), pp. 1219–1223.
FSEFSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity
Leveraging usage similarity for effective retrieval of examples in code repositories (SKB, JO, CVL), pp. 157–166.
SLESLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
SPLCSPLC-2010-LeeK #feature model
Usage Context as Key Driver for Feature Selection (KL, KCK), pp. 32–46.
CGOCGO-2010-Srisa-anCSS #memory management #self
A self-adjusting code cache manager to balance start-up time and memory usage (WSa, MBC, YS, MS), pp. 82–91.
ICLPICLP-2010-Lopez-GarciaDB10 #debugging #framework #resource management #verification
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification (PLG, LD, FB), pp. 104–113.
ASEASE-2009-KawrykowR #api #automation #detection
Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
ASEASE-2009-PradelG #automation #generative #scalability #specification
Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
ASEASE-2009-WasylkowskiZ #mining #specification
Mining Temporal Specifications from Object Usage (AW, AZ), pp. 295–306.
HTHT-2009-Baeza-Yates #web
Relating content through web usage (RABY), pp. 3–4.
SIGMODSIGMOD-2009-CormodeS #generative #modelling
Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
ICSMEICSM-2009-MaSZS #recommendation
Expert recommendation with usage expertise (DM, DS, TZ, JS), pp. 535–538.
ICSMEICSM-2009-MunozBDT #aspect-oriented #empirical #programming
Inquiring the usage of aspect-oriented programming: An empirical study (FM, BB, RD, YLT), pp. 137–146.
MSRMSR-2009-BajracharyaL #code search #mining #topic
Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
WCREWCRE-1999-AriasAA99a #resource management #scalability
Constructing a Resource Usage View of a Large and Complex Software-Intensive System (TBCA, PA, PA), pp. 247–255.
CHICHI-2009-Beauvisage
Computer usage in daily life (TB), pp. 575–584.
CHICHI-2009-BiB #scalability
Comparing usage of a large high-resolution display to single or dual desktop displays for daily work (XB, RB), pp. 1005–1014.
CHICHI-2009-NewtonKM #comparison #online #word
Autism online: a comparison of word usage in bloggers with and without autism spectrum disorders (ATN, ADIK, DNM), pp. 463–466.
HCIHCD-2009-Stiso
Frequency of Usage and Feelings of Connectedness in Instant Messaging by Age, Sex, and Civil Status (MES), pp. 562–569.
HCIHCI-VAD-2009-AliSLB #student
Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies (NMA, AFS, HL, PB), pp. 567–576.
HCIHIMI-II-2009-FujitaS #case study #process #safety
The Importance of Information in the Process of Acquisition and Usage of a Medicine for Patient Safety: A Study of the Brazilian Context (PLF, CGS), pp. 489–496.
HCIHIMI-II-2009-SpinilloPL #analysis #safety
Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
HCIIDGD-2009-MedhiRT
Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World (IM, AR, KT), pp. 485–494.
HCIIDGD-2009-Morawczynski
Examining the Usage and Impact of Transformational M-Banking in Kenya (OM), pp. 495–504.
ICEISICEIS-J-2009-CabralRLSCF #agile #case study #information management
A Case Study of Knowledge Management Usage in Agile Software Projects (AYC, MBR, APL, MTS, MC, CF), pp. 627–638.
CIKMCIKM-2009-Azzopardi #effectiveness #information retrieval #metric #monitoring #performance
Usage based effectiveness measures: monitoring application performance in information retrieval (LA), pp. 631–640.
CIKMCIKM-2009-MabroukehE #mining #ontology #predict #semantics #using #web
Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
CIKMCIKM-2009-ParekhHRWW #challenge #experience #resource management
Characterizing, constructing and managing resource usage profiles of system S applications: challenges and experience (SP, KH, DR, JLW, KLW), pp. 1177–1186.
KMISKMIS-2009-OsisG #information management
Perspectives on Usage of Agents in Personal Knowledge Management (KO, JG), pp. 332–337.
ECOOPECOOP-2009-ZhongXZPM #api #mining #named #recommendation
MAPO: Mining and Recommending API Usage Patterns (HZ, TX, LZ, JP, HM), pp. 318–343.
SACSAC-2009-DjalalievB #documentation #retrieval
Secure web-based retrieval of documents with usage controls (PD, JCB), pp. 2062–2069.
ESEC-FSEESEC-FSE-2009-NguyenNPAN #graph #mining #multi
Graph-based mining of multiple object usage patterns (TTN, HAN, NHP, JMAK, TNN), pp. 383–392.
CCCC-2009-Abu-MahmeedMBKRHARK #scheduling
Scheduling Tasks to Maximize Usage of Aggregate Variables in Place (SAM, CM, ZB, KK, KR, KH, PA, SR, JK), pp. 204–219.
ISMMISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code
Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
WICSAWICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy
Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
DACDAC-2008-Mitra #verification
Strategies for mainstream usage of formal verification (RSM), pp. 800–805.
DACDAC-2008-PaulB #configuration management #memory management #performance #resource management #using
Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
ICPCICPC-2008-FeilkasR #api #constraints
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints (MF, DR), pp. 248–253.
MSRMSR-2008-SchulerZ #mining
Mining usage expertise from version archives (DS, TZ), pp. 121–124.
SCAMSCAM-2008-StoneSB #analysis #automation #data flow #set
Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
CHICHI-2008-KamvarB #comprehension #mobile #query
Query suggestions for mobile search: understanding usage patterns (MK, SB), pp. 1013–1016.
CHICHI-2008-KramerR #behaviour #modelling #word
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
ICEISICEIS-AIDSS-2008-EsminLYC #information management #interactive #named #web
ArchCollect — A Tool for WEB Usage Knowledge Acquisition from User’s Interactions (AAAE, JdCL, ETY, TGdSC), pp. 375–380.
ICPRICPR-2008-IiyamaHKM #re-engineering
Usage of needle maps and shadows to overcome depth edges in depth map reconstruction (MI, KH, KK, MM), pp. 1–4.
SEKESEKE-2008-YangE #multi #trust
Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
OOPSLAOOPSLA-2008-BeckmanBA #type system #verification
Verifying correct usage of atomic blocks and typestate (NEB, KB, JA), pp. 227–244.
SACSAC-2008-ConstantinA #distributed #ranking #xml
Usage-based ranking of distributed XML data (CC, BA), pp. 1008–1012.
FSEFSE-2008-DufourRS #java #scalability
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications (BD, BGR, GS), pp. 59–70.
ICSEICSE-2008-SchaferJM #framework #mining
Mining framework usage changes from instantiation code (TS, JJ, MM), pp. 471–480.
SLESLE-2008-FritzscheJAMGSBK #automation #embedded #model transformation #modelling
Systematic Usage of Embedded Modelling Languages in Automated Model Transformation Chains (MF, JJ, UA, SM, WG, ITAS, TJB, PK), pp. 134–150.
SLESLE-2008-HageK #analysis #library #named
Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
QoSAQoSA-2007-KoziolekBH #architecture #component #performance #predict
Predicting the Performance of Component-Based Software Architectures with Different Usage Profiles (HK, SB, JH), pp. 145–163.
ASEASE-2007-BrooksM #automation #testing #user interface
Automated gui testing guided by usage profiles (PAB, AMM), pp. 333–342.
ASEASE-2007-KagdiCM #approach #mining
An approach to mining call-usage patternswith syntactic context (HHK, MLC, JIM), pp. 457–460.
DocEngDocEng-2007-ConcolatoFM #documentation #memory management
Timed-fragmentation of SVG documents to control the playback memory usage (CC, JLF, JCM), pp. 121–124.
ICDARICDAR-2007-MaWXD #algorithm #evaluation #locality #performance
Usage-Oriented Performance Evaluation for Text Localization Algorithms (YM, CW, BX, RD), pp. 1033–1037.
FoSSaCSFoSSaCS-2007-BartolettiDFZ #analysis #resource management
Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
ICPCICPC-2007-JiangKRS #api #documentation
Constructing Usage Scenarios for API Redocumentation (JJ, JK, AR, TS), pp. 259–264.
ICSMEICSM-2007-DongG #analysis #dependence #object-oriented
System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
MSRMSR-2007-KagdiCM #mining #source code
Comparing Approaches to Mining Source Code for Call-Usage Patterns (HHK, MLC, JIM), p. 20.
WCREWCRE-2007-SelbyRGG #maintenance
Examining the Effects of Global Data Usage on Software Maintainability (JWAS, FPR, MG, MWG), pp. 60–69.
ICFPICFP-2007-HageHM #analysis
A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
CHICHI-2007-CutrellG #web #what
What are you looking for?: an eye-tracking study of information usage in web search (EC, ZG), pp. 407–416.
CHICHI-2007-ObendorfWHM #web
Web page revisitation revisited: implications of a long-term click-stream study of browser usage (HO, HW, EH, MM), pp. 597–606.
CHICHI-2007-ZiefleSSM #how
How younger and older adults master the usage of hyperlinks in small screen devices (MZ, US, JS, TM), pp. 307–316.
HCIHCI-IDU-2007-WideroosP #empirical #research
Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research (KW, SP), pp. 976–984.
HCIHCI-IPT-2007-WangLSBH
Enhancing the Map Usage for Indoor Location-Aware Systems (HW, HL, AS, JB, UDH), pp. 151–160.
ICEISICEIS-HCI-2007-GiraldoS #communication
Inhibiting Factors for Communication and Information Technologies Usage — Five Colombian SMEs Study (OLG, EAS), pp. 111–116.
CIKMCIKM-2007-DonZGTACSP #mining #visualisation
Discovering interesting usage patterns in text collections: integrating text mining with visualization (AD, EZ, MG, ST, LA, TC, BS, CP), pp. 213–222.
ECIRECIR-2007-BoyerB #natural language #web
Natural Language Processing for Usage Based Indexing of Web Resources (AB, AB), pp. 517–524.
RecSysRecSys-2007-TaghipourKG #approach #learning #recommendation #web
Usage-based web recommendations: a reinforcement learning approach (NT, AAK, SSG), pp. 113–120.
RERE-2007-Rashid #collaboration #named #requirements #specification #towards #visual notation
OpenProposal: Towards Collaborative End-User Participation in Requirements Management By Usage of Visual Requirement Specifications (AR), pp. 371–374.
SACSAC-2007-BraynerM #energy #memory management
Balancing energy consumption and memory usage in sensor data processing (AB, RM), pp. 935–939.
SACSAC-2007-WeynsR #reliability
Sensitivity of software system reliability to usage profile changes (KW, PR), pp. 1440–1444.
ESEC-FSEESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification
Mining API patterns as partial orders from source code: from usage scenarios to specifications (MA, TX, JP, JX), pp. 25–34.
ESEC-FSEESEC-FSE-2007-WasylkowskiZL #detection
Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
ASEASE-2006-LiuYR #library #model checking #using
Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
HTHT-2006-KazienkoP #assessment #mining #web
Hyperlink assessment based on web usage mining (PK, MP), pp. 85–88.
ICPCICPC-2006-ParninG #comprehension
Building Usage Contexts During Program Comprehension (CP, CG), pp. 13–22.
MSRMSR-2006-XieP #api #mining #named #open source #repository
MAPO: mining API usages from open source repositories (TX, JP), pp. 54–57.
PEPMPEPM-2006-IwamaIK #analysis #exception #functional #resource management
Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
CIKMCIKM-2006-NasraouiCRG #collaboration
Collaborative filtering in dynamic usage environments (ON, JC, CR, FAG), pp. 794–795.
ICSEICSE-2006-LiuYR #automation #library #named
LtRules: an automated software library usage rule extraction tool (CL, EY, DJR), pp. 823–826.
SPLCSPLC-2006-BragancaM #case study #metamodelling #specification #uml #variability
Extending UML 2.0 Metamodel for Complementary Usages of the «extend» Relationship within Use Case Variability Specification (AB, RJM), pp. 123–130.
HPCAHPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
VMCAIVMCAI-2006-KobayashiSW #analysis #resource management #π-calculus
Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
CBSECBSE-2005-FredrikssonSA #component #optimisation #realtime #resource management
Optimizing Resource Usage in Component-Based Real-Time Systems (JF, KS, ), pp. 49–65.
CASECASE-2005-ZhangZNZ
Production planning with joint resources usage semiconductor test manufacturing (ZZ, MTZ, SN, LZ), pp. 49–54.
DATEDATE-2005-HeckmannF #abstract interpretation #embedded #safety
erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
ICSMEICSM-2005-SalahDMSV #named #reverse engineering #sequence
Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
IWPCIWPC-2005-OSheaE #abstraction #java
An Investigation of Java Abstraction Usage for Program Modifications (PO, CE), pp. 65–74.
SASSAS-2005-ChinNQR #memory management #object-oriented #source code #verification
Memory Usage Verification for OO Programs (WNC, HHN, SQ, MCR), pp. 70–86.
FMFM-2005-CacheraJPS #analysis #memory management
Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
CHICHI-2005-BrushWTS #difference #metadata #social
Assessing differential usage of usenet social accounting meta-data (AJBB, XW, TCT, MAS), pp. 889–898.
ICEISICEIS-v2-2005-KumarKDB #clustering #mining #using #web
Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
PPDPPPDP-2005-JagadeesanM #approach #constraints #declarative #programming
Timed constraint programming: a declarative approach to usage control (RJ, WM, CP, VAS), pp. 164–175.
PADLPADL-2005-LopesC #memory management
Improving Memory Usage in the BEAM (RL, VSC), pp. 143–157.
RERE-2005-Simmons #design #development
The Usage Model: A Structure for Richly Describing Product Usage during Design and Development (ES), pp. 403–410.
SACSAC-2005-Casale #analysis #mining #network #performance #web
Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
AMOSTAMOST-2005-Sayre #automation #c++ #modelling #testing
Usage model-based automated testing of C++ templates (KS).
ICEISICEIS-v2-2004-HuysmansMVB #mining #web
Web Usage Mining with Time Constrained Association Rules (JH, CM, JV, BB), pp. 343–348.
ICEISICEIS-v4-2004-LimaEMFC #data mining #information management #mining #web
Archcollect Front-End: A Web Usage Data Mining Knowledge Acquisition Mechanism Focused on Static or Dynamic Contenting Applications (JdCL, AAAE, JGdM, BF, TGdSC), pp. 258–262.
ICEISICEIS-v5-2004-SalcedoY #learning #library #metadata
Supporting Course Sequencing in a Digital Library: Usage of Dynamic Metadata for Learning Objects (RMS, YY), pp. 319–324.
KDDKDD-2004-JinZM #analysis #mining #probability #semantics #web
Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
KDDKDD-2004-ShavlikS #detection #effectiveness #evaluation
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage (JWS, MS), pp. 276–285.
SIGIRSIGIR-2004-AzmanO #clustering
Discovery of aggregate usage profiles based on clustering information needs (AA, IO), pp. 470–471.
SACSAC-2004-SheldonJ #embedded #reliability
Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems (FTS, KJ), pp. 826–833.
LCTESLCTES-2004-ScholzHK #optimisation
Optimizing for space and time usage with speculative partial redundancy elimination (BS, RNH, JK), pp. 221–230.
HTHT-2003-KarousosTP #approach #developer #hypermedia
Increasing the usage of open hypermedia systems: a developer-side approach (NK, MT, IP), pp. 148–149.
ICSMEICSM-2003-ObbinkA #architecture #towards
Towards Evergreen Architectures: On the usage of scenarios in system architecting (JHO, PA), p. 298–?.
ICEISICEIS-v2-2003-WangRLC #mining #online #realtime #recommendation #web
Mining Web Usage Data for Real-Time Online Recommendation (MW, SJR, SYL, JKYC), pp. 575–578.
POPLPOPL-2003-HofmannJ #first-order #functional #predict #source code
Static prediction of heap space usage for first-order functional programs (MH, SJ), pp. 185–197.
ICSEICSE-2003-ConstantineL #agile #approach #re-engineering #usability #user interface
Usage-Centered Software Engineering: An Agile Approach to Integrating Users, User Interfaces, and Usability into Software Engineering Practice (LLC, LADL), pp. 746–747.
ASEASE-2002-MaccariRM #automation #on the
On CASE Tool Usage at Nokia (AM, CR, FM), pp. 59–68.
CAiSECAiSE-2002-PaikBH #adaptation
Usage-Centric Adaptation of Dynamic E-Catalogs (HYP, BB, RH), pp. 344–360.
CIKMCIKM-2002-HuangCA #comparison #learning #web
Comparison of interestingness functions for learning web usage patterns (XH, NC, AA), pp. 617–620.
KDDKDD-2002-El-RamlySS #approach #behaviour #mining #runtime
From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
SEKESEKE-2002-FarinaFO #automaton #modelling #network #probability #representation
Representing software usage models with stochastic automata networks (AGF, PF, FMO), pp. 401–407.
POPLPOPL-2002-Boehm #bound #garbage collection
Bounding space usage of conservative garbage collectors (HJB), pp. 93–100.
POPLPOPL-2002-IgarashiK #analysis #resource management
Resource usage analysis (AI, NK), pp. 331–342.
SACSAC-2001-ChenLCC #multi #parametricity #performance
The sustainable-cell-rate usage parameter control with adjustable window for high-speed multimedia communications (SyC, LFL, CSC, CJC), pp. 467–471.
HPCAHPCA-2001-GoemanVB #difference #performance #predict
Differential FCM: Increasing Value Prediction Accuracy by Improving Table Usage Efficiency (BG, HV, KDB), pp. 207–216.
HPDCHPDC-2001-HumphreyT #grid #security
Security Implications of Typical Grid Computing Usage Scenarios (MH, MRT), pp. 95–103.
DACDAC-2000-GebotysGW #architecture #power management
Power minimization derived from architectural-usage of VLIW processors (CHG, RJG, SW), pp. 308–311.
IFLIFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system
A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
CHICHI-2000-ChiPP #predict #usability #web
The scent of a site: a system for analyzing and predicting information scent, usage, and usability of a Web site (EHhC, PP, JEP), pp. 161–168.
AdaEuropeAdaEurope-2000-Pflug #ada #question
Ada after 10 Years of Usage — Is There a Commercial Future? (BP), p. 4.
ICEISICEIS-2000-KalininNSP #network #process
Usage of Instrument of Neural Networks in Control of Complex Chemical-Technological Processes (AK, LN, ES, SP), pp. 521–524.
ICEISICEIS-2000-ThomasASC #enterprise
Evaluatin IT Usage in Small and Medium Sized Enterprises (DTT, AA, HS, DJC), pp. 355–362.
PPDPPPDP-2000-BakewellR #lazy evaluation
A model for comparing the space usage of lazy evaluators (AB, CR), pp. 151–162.
SACSAC-2000-NeumannZ #composition #towards
Towards the Usage of Dynamic Object Aggregations as a Foundation for Composition (GN, UZ), pp. 818–820.
ASEASE-1999-LiuR #component #specification #towards #verification
Towards Discovery, Specification, and Verification of Component Usage (CL, DJR), pp. 331–334.
CSMRCSMR-1999-JonesHKA #modelling #quality
Application of a Usage Profile in Software Quality Models (WDJ, JPH, TMK, EBA), pp. 148–159.
CSMRCSMR-1999-KrikhaarPZ #resource management
Employing Use-cases and Domain Knowledge for Comprehending Resource Usage (RLK, MP, JZ), pp. 14–21.
CHICHI-1999-OmoiguiHGGS #named
Time-Compression: Systems Concerns, Usage, and Benefits (NO, LH, AG, JG, ES), pp. 136–143.
HCIHCI-EI-1999-ColtekinVK
Consequences of Computer Breakdowns on Time Usage (, MV, IMK), pp. 1078–1082.
HCIHCI-EI-1999-NikovP #adaptation #modelling
Combining User and Usage Modelling for User-Adaptivity Systems (AN, WP), pp. 336–340.
CAiSECAiSE-1999-VassiliadisBQ #evolution #towards
Towards Quality-Oriented Data Warehouse Usage and Evolution (PV, MB, CQ), pp. 164–179.
TOOLSTOOLS-EUROPE-1999-Waldron #bytecode #java #object-oriented #source code
Dynamic Bytecode Usage by Object Oriented Java Programs (JW), pp. 384–395.
SOSPSOSP-1999-Vogels #file system
File system usage in Windows NT 4.0 (WV), pp. 93–109.
SIGMODSIGMOD-1998-Whelan #database #documentation
FileNet Integrated Document Management Database Usage and Issues (DSW), p. 533.
AdaSIGAda-1998-Frisberg #ada
Usage of Ada in the Gripen Flight Control System (BF), pp. 140–141.
REICRE-1998-WeidenhauptPJH #development
Scenario Usage in System Development: A Report on Current Practice (KW, KP, MJ, PH), p. 222–?.
ICSEICSE-1998-HilbertR #approach #internet #scalability
An Approach to Large-Scale Collection of Application Usage Data Over the Internet (DMH, DFR), pp. 136–145.
ICSMEICSM-1997-HeSRC #black box #maintenance #testing
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing (ZH, GS, MR, IC), pp. 142–149.
CHICHI-1997-BhavnaniJ #analysis #performance
From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
CHICHI-1997-KieslerKLSM #internet #usability
Usability, Help Desk Calls, and Residential Internet Usage (SBK, REK, VL, WLS, TM), pp. 536–537.
HCIHCI-CC-1997-Seppala #case study #experience #information management
Usage of an Integrated Office Information System: Experiences from a Municipal Organization (PKS), pp. 801–804.
AdaTRI-Ada-1997-Celier #ada
Managing Usage of Dynamic Structures with Ada Controlled Objects (VC), pp. 165–170.
CAVCAV-1997-KamhiWF #automation #performance
Automatic Datapath Extraction for Efficient Usage of HDD (GK, OW, LF), pp. 95–106.
CHICHI-1996-HarrisonV #evaluation
An Experimental Evaluation of Transparent Menu Usage (BLH, KJV), pp. 391–398.
SEKESEKE-1996-LiaoCSC #object-oriented #source code #specification #testing
Testing Object-Oriented Programs Based on Usage Profiles and Formal Specifications (SSL, KHC, SBS, CYC), pp. 9–16.
SASWSA-1993-WrightB #analysis #reduction
Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
FMFME-1993-CraigenGR #formal method #industrial
Formal Methods Reality Check: Industrial Usage (DC, SLG, TR), pp. 250–267.
HCIHCI-SHI-1993-Caldwell93a #feedback #social
Social Implications of Feedback and Delay Characteristics in Electronic Communications Usage (BSC), pp. 843–848.
REICRE-1993-GornyVQD #prototype #user interface
Slow and Principled Prototyping of Usage Surfaces: A Mehtd For User Interface Engineering (PG, AV, LQ, UD), pp. 125–133.
CHICHI-1990-YoungW #analysis #concept #fault #predict #using
Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
ASPLOSASPLOS-1989-AdamsZ #analysis #set #source code
An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
PLDIPLDI-1988-Chow
Minimizing Register Usage Penalty at Procedure Calls (FCC), pp. 85–94.
ASPLOSASPLOS-1982-Wiecek #case study #compilation #execution #set
A Case Study of VAX-11 Instruction Set Usage for Compiler Execution (CAW), pp. 177–184.
VLDBVLDB-1979-OrenA #concept #database #design #logic #statistics
Statistice for the Usage of a Conceptual Data Model as a Basis for Logical Data Base Design (OO, FA), pp. 140–145.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.