321 papers:
- ECSA-2015-LewisL
- Characterization of Cyber-Foraging Usage Contexts (GAL, PL), pp. 195–211.
- DAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management
- Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
- ICPC-2015-SaiedABS #api #library #question #source code #using
- Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
- ICPC-2015-VendomeLBPGP #git #java #scalability
- License usage and changes: a large-scale study of Java projects on GitHub (CV, MLV, GB, MDP, DMG, DP), pp. 218–228.
- ICSME-2015-CorleyLQ #developer #web
- Web usage patterns of developers (CSC, FL, SQ), pp. 381–390.
- ICSME-2015-GoeminneM #analysis #database #framework #java #towards
- Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
- MSR-2015-SawantB #api #dataset
- A Dataset for API Usage (AAS, AB), pp. 506–509.
- MSR-2015-VasquezWBMP #android #execution #generative #mining
- Mining Android App Usages for Generating Actionable GUI-Based Execution Scenarios (MLV, MW, CBC, KM, DP), pp. 111–122.
- SANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support
- Scaling up evaluation of code search tools through developer usage metrics (KD, DCS, LLP), pp. 181–190.
- SANER-2015-SaiedBAS #api #mining #multi
- Mining Multi-level API Usage Patterns (MAS, OB, HA, HAS), pp. 23–32.
- SANER-2015-SaiedSD #api #constraints #documentation
- An observational study on API usage constraints and their documentation (MAS, HAS, BD), pp. 33–42.
- CHI-2015-SamsonovTSKH #towards
- You Can’t Smoke Here: Towards Support for Space Usage Rules in Location-aware Technologies (PAS, XT, JS, WK, BH), pp. 971–974.
- DUXU-UI-2015-MedolaLBSFP #case study #experience #problem
- Experiences, Problems and Solutions in Computer Usage by Subjects with Tetraplegia (FOM, JL, CGB, AS, AEF, LCP), pp. 131–137.
- DUXU-UI-2015-ZhuSK #case study #design #smarttech
- A Field Study on Basic Usage Patterns of Traditional Watch and Smart Phone for Designing Smart Watch (ZZ, HS, SWK), pp. 597–608.
- SCSM-2015-HallC #collaboration #information management #performance #process #social
- Analysing Yammer Usage Pattern in the Context of Social Collaborative Activity Performance by Knowledge Workers (JH, BBC), pp. 127–137.
- CAiSE-2015-SirenSJ #lifecycle #requirements
- The Requirements and Needs of Global Data Usage in Product Lifecycle Management (AS, KS, MJ), pp. 103–117.
- ICEIS-v2-2015-SarsharNR #case study #comparison #smarttech
- A Study on the Usage of Smartphone Apps in Fire Scenarios — Comparison between GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 469–474.
- SEKE-2015-ChenZWQJW #api #mining #protocol
- Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
- SEKE-2015-GoncalvesW #bibliography #education #how #perspective #project management #tool support
- How to Teach the Usage of Project Management Tools in Computer Courses: A Systematic Literature Review (RQG, CGvW), pp. 36–41.
- SAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing
- Concurrent streams in Markov chain usage models for statistical testing of complex systems (DH, JE, RG), pp. 1803–1807.
- ICSE-v1-2015-AvdiienkoKGZARB #mining
- Mining Apps for Abnormal Usage of Sensitive Data (VA, KK, AG, AZ, SA, SR, EB), pp. 426–436.
- ICSE-v2-2015-Avdiienko #mining
- Mining Patterns of Sensitive Data Usage (VA), pp. 891–894.
- ICSE-v2-2015-Vendome #case study #git #scalability
- A Large Scale Study of License Usage on GitHub (CV), pp. 772–774.
- ICST-2015-YuC #embedded #generative #stack #testing #worst-case
- Guided Test Generation for Finding Worst-Case Stack Usage in Embedded Systems (TY, MBC), pp. 1–10.
- ISSTA-2015-DahseH #case study #empirical #experience #php #security
- Experience report: an empirical study of PHP security mechanism usage (JD, TH), pp. 60–70.
- ASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
- Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
- CASE-2014-HungCYDYW #behaviour #data mining #mining
- Data mining for analysing kiosk usage behavior patterns (YSH, KLBC, CTY, GFD, YHY, NCW), pp. 1115–1120.
- DAC-2014-ChenCDZ #energy #smarttech
- Demystifying Energy Usage in Smartphones (XC, YC, MD, J(Z), p. 5.
- HT-2014-WenLTP #network #twitter
- Twitter in academic conferences: usage, networking and participation over time (XW, YRL, CT, DP), pp. 285–290.
- ICPC-2014-PetersenHR #api #comparison #eclipse #empirical #groovy #ide #java #type system
- An empirical comparison of static and dynamic type systems on API usage in the presence of an IDE: Java vs. groovy with eclipse (PP, SH, RR), pp. 212–222.
- ICSME-2014-SahinTMPC #energy #how #obfuscation #question
- How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
- ICSME-2014-ZhuZXJL0 #api #mining
- Mining API Usage Examples from Test Code (ZZ, YZ, BX, YJ, ZL, LZ), pp. 301–310.
- MSR-2014-VasquezBBOPP #android #api #empirical #energy #mining
- Mining energy-greedy API usage patterns in Android apps: an empirical study (MLV, GB, CBC, RO, MDP, DP), pp. 2–11.
- MSR-2014-VasquezHBP #android #library #obfuscation #reuse
- Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
- SCAM-2014-WuAGA #api #named
- ACUA: API Change and Usage Auditor (WW, BA, YGG, GA), pp. 89–94.
- DUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people
- TAC-ACCESS — Technologies to Support Communication from Interfaces Accessible and Multimodal for People with Disabilities and Diversity: Context-Centered Design of Usage (CdOD, LMP, CdCL, EGS), pp. 141–151.
- DUXU-ELAS-2014-Spinillo #how #usability
- How Do Patient Information Leaflets Aid Medicine Usage? A Proposal for Assessing Usability of Medicine Inserts (CGS), pp. 115–124.
- HCI-AS-2014-StieningerN
- Drivers for the Actual Usage of Cloud Services: An Examination of Influencing Factors for Digital Natives (MS, DN), pp. 69–79.
- SCSM-2014-PapachristosKKIFA #case study #deployment #enterprise #social #social media #tool support
- Deployment, Usage and Impact of Social Media Tools in Small and Medium Enterprises: A Case Study (EP, CK, NK, II, CF, NMA), pp. 79–90.
- SCSM-2014-SchaarVZELJ #motivation #network #social #using
- Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
- SCSM-2014-ShiLYLC #development #network #social #validation
- The Development and Validation of the Social Network Sites (SNSs) Usage Questionnaire (YS, YLLL, ZY, YL, HC), pp. 113–124.
- ICEIS-v2-2014-GarciaP #as a service #maintenance #requirements
- SaaS Usage Information for Requirements Maintenance (AG, ACRP), pp. 323–330.
- ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
- ICEIS-v2-2014-SamejimaMK #flexibility #resource management
- Flexible Peak Shaving in Data Center by Suppression of Application Resource Usage (MS, HTM, NK), pp. 355–360.
- SEKE-2014-LiuTA #database #detection
- Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
- ICMT-2014-WieberAS #automation #graph grammar #model transformation #on the #testing
- On the Usage of TGGs for Automated Model Transformation Testing (MW, AA, AS), pp. 1–16.
- ICSE-2014-NguyenNNN #interprocedural #javascript #mining #web
- Mining interprocedural, data-oriented usage patterns in JavaScript web applications (HVN, HAN, ATN, TNN), pp. 791–802.
- HPCA-2014-WangDDS #concurrent #memory management #multi #named #predict #source code #thread
- DraMon: Predicting memory bandwidth usage of multi-threaded programs with high accuracy and low overhead (WW, TD, JWD, MLS), pp. 380–391.
- ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
- ICTSS-2014-SamihGBAB #approach #modelling #testing
- An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
- ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
- Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
- ECSA-2013-AngelovTK #architecture #design
- Software Reference Architectures — Exploring Their Usage and Design in Practice (SA, JJMT, RJK), pp. 17–24.
- ASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
- ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
- DocEng-2013-SadallahEMP #documentation #framework #re-engineering
- A framework for usage-based document reengineering (MS, BE, AeM, YP), pp. 99–102.
- CSMR-2013-BusingeSB #api #developer #eclipse
- Analyzing the Eclipse API Usage: Putting the Developer in the Loop (JB, AS, MvdB), pp. 37–46.
- ICPC-2013-RooverLP #api #multi
- Multi-dimensional exploration of API usage (CDR, RL, EP), pp. 152–161.
- ICSM-2013-BavotaCPOP #documentation #empirical #maintenance
- An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks (GB, GC, MDP, RO, SP), pp. 210–219.
- ICSM-2013-XinQHXZWG #concurrent #empirical #source code
- An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs (RX, ZQ, SH, CX, YZ, YW, HG), pp. 100–109.
- MSR-2013-WangDZCXZ #api #mining #source code
- Mining succinct and high-coverage API usage patterns from source code (JW, YD, HZ, KC, TX, DZ), pp. 319–328.
- MSR-2013-WangG #android #api #case study #detection #developer
- Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
- SCAM-2013-MendezBM #api #empirical #object-oriented #scalability
- Empirical evidence of large-scale diversity in API usage of object-oriented software (DM, BB, MM), pp. 43–52.
- IFM-2013-SongT #api #library #model checking
- Model-Checking Software Library API Usage Rules (FS, TT), pp. 192–207.
- CHI-2013-BaillyPDW #named
- Métamorphe: augmenting hotkey usage with actuated keys (GB, TP, JD, DJW), pp. 563–572.
- CHI-2013-ChilanaKWG #case study #crowdsourcing #multi
- A multi-site field study of crowdsourced contextual help: usage and perspectives of end users and software teams (PKC, AJK, JOW, TG), pp. 217–226.
- CHI-2013-MatejkaGF13a #heatmap #named #visualisation
- Patina: dynamic heatmaps for visualizing application usage (JM, TG, GWF), pp. 3227–3236.
- CHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network #privacy
- Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
- DUXU-CXC-2013-WindlH #aspect-oriented #design
- Intercultural Design for Use — Extending Usage-Centered Design by Cultural Aspects (HW, RH), pp. 139–148.
- HCI-III-2013-LimD
- Evaluating Intelligibility Usage and Usefulness in a Context-Aware Application (BYL, AKD), pp. 92–101.
- HIMI-D-2013-LeeY #behaviour #comparison #information management #research
- Research on Website Usage Behavior through Information Search Perspective: A Comparison of Experiential and Goal-Directed Behaviors (JL, MY), pp. 456–464.
- ICEIS-J-2013-RothPS13a #analysis #twitter
- Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
- ICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation
- Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
- CIKM-2013-LiaoPPL #behaviour #mining #mobile #on the #predict #smarttech
- On mining mobile apps usage behavior for predicting apps usage in smartphones (ZXL, YCP, WCP, PRL), pp. 609–618.
- ECIR-2013-WilkieA
- An Initial Investigation on the Relationship between Usage and Findability (CW, LA), pp. 808–811.
- KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
- REFSQ-2013-BouillonMP #bibliography #requirements #traceability
- A Survey on Usage Scenarios for Requirements Traceability in Practice (EB, PM, IP), pp. 158–173.
- SAC-2013-TangHHC #mobile #named
- iLauncher: an intelligent launcher for mobile apps based on individual usage patterns (LYT, PCH, JLH, MSC), pp. 505–512.
- CAV-2013-HarrisJLJ #library #validation
- Validating Library Usage Interactively (WRH, GJ, SL, SJ), pp. 796–812.
- ISSTA-2013-HillsKV #empirical #perspective #php #static analysis
- An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
- LICS-2013-AspertiL #cost analysis #λ-calculus
- The Cost of Usage in the λ-Calculus (AA, JJL), pp. 293–300.
- RTA-2013-AvanziniM13a #complexity
- Tyrolean Complexity Tool: Features and Usage (MA, GM), pp. 71–80.
- DAC-2012-JungSB #off the shelf #using
- Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
- DATE-2012-LafayePBGF #embedded #modelling #resource management #simulation
- Model driven resource usage simulation for critical embedded systems (ML, LP, EB, MG, DF), pp. 312–315.
- CSMR-2012-BauerH #api #comprehension #maintenance
- Understanding API Usage to Support Informed Decision Making in Software Maintenance (VB, LH), pp. 435–440.
- ICSM-2012-BauerHD #approach #library
- A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
- MSR-2012-BaysalHG #development #mining
- Mining usage data and development artifacts (OB, RH, MWG), pp. 98–107.
- WCRE-2012-NodaKA #abstraction #execution
- Execution Trace Abstraction Based on Meta Patterns Usage (KN, TK, KA), pp. 167–176.
- PEPM-2012-AlbertCPR #analysis #incremental #resource management
- Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
- CIAA-2012-DeganoFM #automaton #resource management
- Nominal Automata for Resource Usage Control (PD, GLF, GM), pp. 125–137.
- CHI-2012-FroehlichFORPWLFBPL #design #evaluation #prototype
- The design and evaluation of prototype eco-feedback displays for fixture-level water usage data (JF, LF, MO, SR, JP, IW, ECL, FF, MB, SP, JAL), pp. 2367–2376.
- CHI-2012-LeeKYYK #case study #comprehension #mobile
- Understanding mobile Q&A usage: an exploratory study (UL, HK, EY, MY, JK), pp. 3215–3224.
- ICEIS-J-2012-BabaianL12a #automation #interface
- Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
- ICEIS-v3-2012-BabaianL #enterprise
- Leveraging Usage History to Support Enterprise System Users (TB, WTL), pp. 35–44.
- ICPR-2012-TakahashiI #predict
- Predicting battery life from usage trajectory patterns (TT, TI), pp. 2946–2949.
- ICPR-2012-TaoKNT #process #recognition
- Camera view usage of binary infrared sensors for activity recognition (ST, MK, HN, JT), pp. 1759–1762.
- KDIR-2012-ArbelaitzGLMPP12a #adaptation #mining #web
- Enhancing a Web Usage Mining based Tourism Website Adaptation with Content Information (OA, IG, AL, JM, JMP, IP), pp. 287–292.
- KDIR-2012-IkebeKT #learning #predict #smarttech #using
- Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
- MLDM-2012-JoenssenB
- Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
- MLDM-2012-PaliwalP #clustering #documentation #segmentation
- Investigating Usage of Text Segmentation and Inter-passage Similarities to Improve Text Document Clustering (SP, VP), pp. 555–565.
- SEKE-2012-Pelto-PiriMT #evaluation #industrial
- A Unified Model for Server Usage and Operational Costs Based on User Profiles: An Industrial Evaluation (JPP, PM, RT), pp. 205–210.
- SEKE-2012-WauteletHK
- A Usage-Based Unified Resource Model (YW, SH, MK), pp. 299–304.
- SIGIR-2012-Baeza-YatesM #web
- (Big) usage data in web search (RABY, YM), pp. 1181–1182.
- MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
- MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
- RE-2012-Knauss #ecosystem #elicitation #on the #requirements
- On the usage of context for requirements elicitation: End-user involvement in IT ecosystems (AK), pp. 345–348.
- SAC-2012-DiamantiniPS #mining #repository #workflow
- Mining usage patterns from a repository of scientific workflows (CD, DP, ES), pp. 152–157.
- FSE-2012-KwonS #component #detection
- Detecting and analyzing insecure component usage (TK, ZS), p. 5.
- FSE-2012-MirakhorliMC #design pattern #variability
- Variability points and design pattern usage in architectural tactics (MM, PM, JCH), p. 52.
- ICSE-2012-BuseW #api
- Synthesizing API usage examples (RPLB, WW), pp. 782–792.
- ICSE-2012-UddinDR #analysis #api #concept
- Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
- ICSE-2012-ZhangYZFZZO #api #automation #parametricity #recommendation
- Automatic parameter recommendation for practical API usage (CZ, JY, YZ, JF, XZ, JZ, PO), pp. 826–836.
- HPDC-2012-ChenA #effectiveness #memory management #optimisation #pipes and filters
- Optimizing MapReduce for GPUs with effective shared memory usage (LC, GA), pp. 199–210.
- ICST-2012-SprenkleCP #classification #modelling #statistics #web
- Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
- ASE-2011-UddinDR #api
- Analyzing temporal API usage patterns (GU, BD, MPR), pp. 456–459.
- ASE-2011-WangFWLXY #api #effectiveness #java #named #recommendation #web
- APIExample: An effective web search based usage example recommendation system for java APIs (LW, LF, LW, GL, BX, FY), pp. 592–595.
- SIGMOD-2011-ElmeleegyLROE #named
- U-MAP: a system for usage-based schema matching and mapping (HE, JL, EKR, MO, AKE), pp. 1287–1290.
- MSR-2011-KarusG #case study #evolution #open source
- A study of language usage evolution in open source software (SK, HCG), pp. 13–22.
- PASTE-2011-MilevaZ #composition
- Assessing modularity via usage changes (YMM, AZ), pp. 37–40.
- CHI-2011-ChilanaGF #multi #process
- Modern software product support processes and the usage of multimedia formats (PKC, TG, GWF), pp. 3093–3102.
- CHI-2011-HayashiH
- A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
- DHM-2011-SchafferSM #human-computer #interactive #multimodal
- A Model of Shortcut Usage in Multimodal Human-Computer Interaction (SS, RS, SM), pp. 337–346.
- DUXU-v1-2011-ChenT #design #industrial #learning #problem #student
- Exploring the Learning Problems and Resources Usage of Undergraduate Industrial Design Students in Design Studio (WC, HHT), pp. 43–52.
- DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
- DUXU-v2-2011-ZhangCV #case study #experience #modelling
- Modeling Users’ Data Usage Experiences from Scientific Literature (JZ, CC, MSEV), pp. 337–346.
- HCD-2011-LinC #research #social #social media
- Bridging the Social Media Usage Gap from Old to New: An Elderly Media Interpersonal and Social Research in Taiwan (SHL, WHC), pp. 547–555.
- HCI-MIIE-2011-EL-QiremC #development #experience #user interface
- Computer Usage and User Experience in Jordan: Development and Application of the Diamond Model of Territorial Factors (FAEQ, GC), pp. 490–499.
- KDIR-2011-BonninBB #mining #predict #web
- Handling Tabbing and Backward References for Predictive Web Usage Mining (GB, AB, AB), pp. 503–509.
- RecSys-2011-Alam #clustering #recommendation #web
- Intelligent web usage clustering based recommender system (SA), pp. 367–370.
- ECOOP-2011-MilevaWZ #evolution #mining
- Mining Evolution of Object Usage (YMM, AW, AZ), pp. 105–129.
- PLATEAU-2011-VakilianCNRMJ #refactoring
- The need for richer refactoring usage data (MV, NC, SN, BAR, RZM, REJ), pp. 31–38.
- GPCE-2011-SteckLS #modelling #runtime
- Model-driven engineering and run-time model-usage in service robotics (AS, AL, CS), pp. 73–82.
- SAC-2011-Gonzalez-SanchezAGG #empirical #fault #locality #testing
- An empirical study on the usage of testability information to fault localization in software (AGS, RA, HGG, AJCvG), pp. 1398–1403.
- SAC-2011-GuerraF #realtime #resource management
- Handling overload of target sensitive real-time applications for increased system utility and improved resource usage (RG, GF), pp. 742–747.
- SAC-2011-LammelPS #analysis #java #open source #scalability
- Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
- ESEC-FSE-2011-BarzilayHY #developer #social #social media #using
- Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
- ICSE-2011-McMillanGPXF #named
- Portfolio: finding relevant functions and their usage (CM, MG, DP, QX, CF), pp. 111–120.
- ICSE-2011-McMillanGPXF11a #named
- Portfolio: a search engine for finding functions and their usages (CM, MG, DP, QX, CF), pp. 1043–1045.
- ICSE-2011-SillittiSV #comprehension #towards
- Toward a better understanding of tool usage (AS, GS, JV), pp. 832–835.
- ICST-2011-FraserZ #generative #testing
- Exploiting Common Object Usage in Test Case Generation (GF, AZ), pp. 80–89.
- ICST-2011-Grasland #automation #resource management #testing
- Testing Resource Usage in Home Automation Systems (YG), pp. 419–422.
- ICST-2011-SprenklePS #case study #modelling #navigation #testing #web
- A Study of Usage-Based Navigation Models and Generated Abstract Test Cases for Web Applications (SS, LLP, LS), pp. 230–239.
- ICTSS-2011-BochmannJW #reliability #testing #web
- Improved Usage Model for Web Application Reliability Testing (GvB, GVJ, BW), pp. 15–31.
- HT-2010-PaparrizosKAV #automation #statistics #web
- Automatic extraction of structure, content and usage data statistics of web sites (IKP, VAK, LA, AV), pp. 301–302.
- ICPC-2010-LammelP #comprehension #domain-specific language
- Vivisection of a Non-Executable, Domain-Specific Language — Understanding (the Usage of) the P3P Language (RL, EP), pp. 104–113.
- ICPC-2010-Mihancea #named #polymorphism #visualisation
- Patrools: Visualizing the Polymorphic Usage of Class Hierarchies (PFM), pp. 36–37.
- ICPC-2010-SuttonHM #c++ #identification #library
- Identification of Idiom Usage in C++ Generic Libraries (AS, RH, JIM), pp. 160–169.
- ICSM-2010-NasehiM #api #testing
- Unit tests as API usage examples (SMN, FM), pp. 1–10.
- CHI-2010-KarlsonIMRLT #mobile #smarttech
- Mobile taskflow in context: a screenshot study of smartphone usage (AKK, STI, BM, GR, KL, JCT), pp. 2009–2018.
- CHI-2010-KellyCDNG #information management #quality #query
- Effects of popularity and quality on the usage of query suggestions during information search (DK, AC, MD, XN, KG), pp. 45–54.
- CHI-2010-MullerMF #enterprise
- Patterns of usage in an enterprise file-sharing service: publicizing, discovering, and telling the news (MJM, DRM, JF), pp. 763–766.
- CSCW-2010-IqbalH #case study
- Notifications and awareness: a field study of alert usage and preferences (STI, EH), pp. 27–30.
- RecSys-2010-CastagnosJP #recommendation
- Eye-tracking product recommenders’ usage (SC, NJ, PP), pp. 29–36.
- SEKE-2010-SieglGH #modelling #testing #variability
- Introduction of Time and Timing Variability in Usage Model based Testing (SS, RG, KSJH), pp. 61–66.
- SEKE-2010-Spector #logic
- Prodigious Data, Logic, Processing, and Usage (AZS), p. 1.
- SIGIR-2010-KaleBSVVGD #enterprise #named #web
- iCollaborate: harvesting value from enterprise web usage (AK, TB, BS, TLPV, LV, MG, MD), p. 699.
- OOPSLA-2010-NguyenNWNKN #adaptation #api #approach #graph
- A graph-based approach to API usage adaptation (HAN, TTN, GWJ, ATN, MK, TNN), pp. 302–321.
- TOOLS-EUROPE-2010-ChristBEGL #approach #framework #metamodelling #specification
- A Generic Meta-model-Based Approach for Specifying Framework Functionality and Usage (FC, JCB, GE, CG, ML), pp. 21–40.
- POPL-2010-JostHLH #higher-order #resource management #source code
- Static determination of quantitative resource usage for higher-order programs (SJ, KH, HWL, MH), pp. 223–236.
- RE-2010-SieglHG #analysis #modelling #requirements #testing
- Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
- SAC-2010-SantanaB #web
- Summarizing observational client-side data to reveal web usage patterns (VFdS, MCCB), pp. 1219–1223.
- FSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity
- Leveraging usage similarity for effective retrieval of examples in code repositories (SKB, JO, CVL), pp. 157–166.
- SLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
- Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
- SPLC-2010-LeeK #feature model
- Usage Context as Key Driver for Feature Selection (KL, KCK), pp. 32–46.
- CGO-2010-Srisa-anCSS #memory management #self
- A self-adjusting code cache manager to balance start-up time and memory usage (WSa, MBC, YS, MS), pp. 82–91.
- ICLP-2010-Lopez-GarciaDB10 #debugging #framework #resource management #verification
- A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification (PLG, LD, FB), pp. 104–113.
- ASE-2009-KawrykowR #api #automation #detection
- Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
- ASE-2009-PradelG #automation #generative #scalability #specification
- Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
- ASE-2009-WasylkowskiZ #mining #specification
- Mining Temporal Specifications from Object Usage (AW, AZ), pp. 295–306.
- HT-2009-Baeza-Yates #web
- Relating content through web usage (RABY), pp. 3–4.
- SIGMOD-2009-CormodeS #generative #modelling
- Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
- ICSM-2009-MaSZS #recommendation
- Expert recommendation with usage expertise (DM, DS, TZ, JS), pp. 535–538.
- ICSM-2009-MunozBDT #aspect-oriented #empirical #programming
- Inquiring the usage of aspect-oriented programming: An empirical study (FM, BB, RD, YLT), pp. 137–146.
- MSR-2009-BajracharyaL #code search #mining #topic
- Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
- WCRE-1999-AriasAA99a #resource management #scalability
- Constructing a Resource Usage View of a Large and Complex Software-Intensive System (TBCA, PA, PA), pp. 247–255.
- CHI-2009-Beauvisage
- Computer usage in daily life (TB), pp. 575–584.
- CHI-2009-BiB #scalability
- Comparing usage of a large high-resolution display to single or dual desktop displays for daily work (XB, RB), pp. 1005–1014.
- CHI-2009-NewtonKM #comparison #online #word
- Autism online: a comparison of word usage in bloggers with and without autism spectrum disorders (ATN, ADIK, DNM), pp. 463–466.
- HCD-2009-Stiso
- Frequency of Usage and Feelings of Connectedness in Instant Messaging by Age, Sex, and Civil Status (MES), pp. 562–569.
- HCI-VAD-2009-AliSLB #student
- Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies (NMA, AFS, HL, PB), pp. 567–576.
- HIMI-II-2009-FujitaS #case study #process #safety
- The Importance of Information in the Process of Acquisition and Usage of a Medicine for Patient Safety: A Study of the Brazilian Context (PLF, CGS), pp. 489–496.
- HIMI-II-2009-SpinilloPL #analysis #safety
- Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
- IDGD-2009-MedhiRT
- Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World (IM, AR, KT), pp. 485–494.
- IDGD-2009-Morawczynski
- Examining the Usage and Impact of Transformational M-Banking in Kenya (OM), pp. 495–504.
- ICEIS-J-2009-CabralRLSCF #agile #case study #information management
- A Case Study of Knowledge Management Usage in Agile Software Projects (AYC, MBR, APL, MTS, MC, CF), pp. 627–638.
- CIKM-2009-Azzopardi #effectiveness #information retrieval #metric #monitoring #performance
- Usage based effectiveness measures: monitoring application performance in information retrieval (LA), pp. 631–640.
- CIKM-2009-MabroukehE #mining #ontology #predict #semantics #using #web
- Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
- CIKM-2009-ParekhHRWW #challenge #experience #resource management
- Characterizing, constructing and managing resource usage profiles of system S applications: challenges and experience (SP, KH, DR, JLW, KLW), pp. 1177–1186.
- KMIS-2009-OsisG #information management
- Perspectives on Usage of Agents in Personal Knowledge Management (KO, JG), pp. 332–337.
- ECOOP-2009-ZhongXZPM #api #mining #named #recommendation
- MAPO: Mining and Recommending API Usage Patterns (HZ, TX, LZ, JP, HM), pp. 318–343.
- SAC-2009-DjalalievB #documentation #retrieval
- Secure web-based retrieval of documents with usage controls (PD, JCB), pp. 2062–2069.
- ESEC-FSE-2009-NguyenNPAN #graph #mining #multi
- Graph-based mining of multiple object usage patterns (TTN, HAN, NHP, JMAK, TNN), pp. 383–392.
- CC-2009-Abu-MahmeedMBKRHARK #scheduling
- Scheduling Tasks to Maximize Usage of Aggregate Variables in Place (SAM, CM, ZB, KK, KR, KH, PA, SR, JK), pp. 204–219.
- ISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code
- Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
- WICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy
- Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
- DAC-2008-Mitra #verification
- Strategies for mainstream usage of formal verification (RSM), pp. 800–805.
- DAC-2008-PaulB #configuration management #memory management #performance #resource management #using
- Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
- ICPC-2008-FeilkasR #api #constraints
- Ensuring Well-Behaved Usage of APIs through Syntactic Constraints (MF, DR), pp. 248–253.
- MSR-2008-SchulerZ #mining
- Mining usage expertise from version archives (DS, TZ), pp. 121–124.
- SCAM-2008-StoneSB #analysis #automation #data flow #set
- Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
- CHI-2008-KamvarB #comprehension #mobile #query
- Query suggestions for mobile search: understanding usage patterns (MK, SB), pp. 1013–1016.
- CHI-2008-KramerR #behaviour #modelling #word
- Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
- ICEIS-AIDSS-2008-EsminLYC #information management #interactive #named #web
- ArchCollect — A Tool for WEB Usage Knowledge Acquisition from User’s Interactions (AAAE, JdCL, ETY, TGdSC), pp. 375–380.
- ICPR-2008-IiyamaHKM #re-engineering
- Usage of needle maps and shadows to overcome depth edges in depth map reconstruction (MI, KH, KK, MM), pp. 1–4.
- SEKE-2008-YangE #multi #trust
- Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
- OOPSLA-2008-BeckmanBA #type system #verification
- Verifying correct usage of atomic blocks and typestate (NEB, KB, JA), pp. 227–244.
- SAC-2008-ConstantinA #distributed #ranking #xml
- Usage-based ranking of distributed XML data (CC, BA), pp. 1008–1012.
- FSE-2008-DufourRS #java #scalability
- A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications (BD, BGR, GS), pp. 59–70.
- ICSE-2008-SchaferJM #framework #mining
- Mining framework usage changes from instantiation code (TS, JJ, MM), pp. 471–480.
- SLE-2008-FritzscheJAMGSBK #automation #embedded #model transformation #modelling
- Systematic Usage of Embedded Modelling Languages in Automated Model Transformation Chains (MF, JJ, UA, SM, WG, ITAS, TJB, PK), pp. 134–150.
- SLE-2008-HageK #analysis #library #named
- Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
- QoSA-2007-KoziolekBH #architecture #component #performance #predict
- Predicting the Performance of Component-Based Software Architectures with Different Usage Profiles (HK, SB, JH), pp. 145–163.
- ASE-2007-BrooksM #automation #testing #user interface
- Automated gui testing guided by usage profiles (PAB, AMM), pp. 333–342.
- ASE-2007-KagdiCM #approach #mining
- An approach to mining call-usage patternswith syntactic context (HHK, MLC, JIM), pp. 457–460.
- DocEng-2007-ConcolatoFM #documentation #memory management
- Timed-fragmentation of SVG documents to control the playback memory usage (CC, JLF, JCM), pp. 121–124.
- ICDAR-2007-MaWXD #algorithm #evaluation #locality #performance
- Usage-Oriented Performance Evaluation for Text Localization Algorithms (YM, CW, BX, RD), pp. 1033–1037.
- FoSSaCS-2007-BartolettiDFZ #analysis #resource management
- Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
- ICPC-2007-JiangKRS #api #documentation
- Constructing Usage Scenarios for API Redocumentation (JJ, JK, AR, TS), pp. 259–264.
- ICSM-2007-DongG #analysis #dependence #object-oriented
- System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
- MSR-2007-KagdiCM #mining #source code
- Comparing Approaches to Mining Source Code for Call-Usage Patterns (HHK, MLC, JIM), p. 20.
- WCRE-2007-SelbyRGG #maintenance
- Examining the Effects of Global Data Usage on Software Maintainability (JWAS, FPR, MG, MWG), pp. 60–69.
- ICFP-2007-HageHM #analysis
- A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
- CHI-2007-CutrellG #web #what
- What are you looking for?: an eye-tracking study of information usage in web search (EC, ZG), pp. 407–416.
- CHI-2007-ObendorfWHM #web
- Web page revisitation revisited: implications of a long-term click-stream study of browser usage (HO, HW, EH, MM), pp. 597–606.
- CHI-2007-ZiefleSSM #how
- How younger and older adults master the usage of hyperlinks in small screen devices (MZ, US, JS, TM), pp. 307–316.
- HCI-IDU-2007-WideroosP #empirical #research
- Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research (KW, SP), pp. 976–984.
- HCI-IPT-2007-WangLSBH
- Enhancing the Map Usage for Indoor Location-Aware Systems (HW, HL, AS, JB, UDH), pp. 151–160.
- ICEIS-HCI-2007-GiraldoS #communication
- Inhibiting Factors for Communication and Information Technologies Usage — Five Colombian SMEs Study (OLG, EAS), pp. 111–116.
- CIKM-2007-DonZGTACSP #mining #visualisation
- Discovering interesting usage patterns in text collections: integrating text mining with visualization (AD, EZ, MG, ST, LA, TC, BS, CP), pp. 213–222.
- ECIR-2007-BoyerB #natural language #web
- Natural Language Processing for Usage Based Indexing of Web Resources (AB, AB), pp. 517–524.
- RecSys-2007-TaghipourKG #approach #learning #recommendation #web
- Usage-based web recommendations: a reinforcement learning approach (NT, AAK, SSG), pp. 113–120.
- RE-2007-Rashid #collaboration #named #requirements #specification #towards #visual notation
- OpenProposal: Towards Collaborative End-User Participation in Requirements Management By Usage of Visual Requirement Specifications (AR), pp. 371–374.
- SAC-2007-BraynerM #energy #memory management
- Balancing energy consumption and memory usage in sensor data processing (AB, RM), pp. 935–939.
- SAC-2007-WeynsR #reliability
- Sensitivity of software system reliability to usage profile changes (KW, PR), pp. 1440–1444.
- ESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification
- Mining API patterns as partial orders from source code: from usage scenarios to specifications (MA, TX, JP, JX), pp. 25–34.
- ESEC-FSE-2007-WasylkowskiZL #detection
- Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
- ASE-2006-LiuYR #library #model checking #using
- Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
- HT-2006-KazienkoP #assessment #mining #web
- Hyperlink assessment based on web usage mining (PK, MP), pp. 85–88.
- ICPC-2006-ParninG #comprehension
- Building Usage Contexts During Program Comprehension (CP, CG), pp. 13–22.
- MSR-2006-XieP #api #mining #named #open source #repository
- MAPO: mining API usages from open source repositories (TX, JP), pp. 54–57.
- PEPM-2006-IwamaIK #analysis #exception #functional #resource management
- Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
- CIKM-2006-NasraouiCRG #collaboration
- Collaborative filtering in dynamic usage environments (ON, JC, CR, FAG), pp. 794–795.
- ICSE-2006-LiuYR #automation #library #named
- LtRules: an automated software library usage rule extraction tool (CL, EY, DJR), pp. 823–826.
- SPLC-2006-BragancaM #case study #metamodelling #specification #uml #variability
- Extending UML 2.0 Metamodel for Complementary Usages of the «extend» Relationship within Use Case Variability Specification (AB, RJM), pp. 123–130.
- HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
- VMCAI-2006-KobayashiSW #analysis #resource management #π-calculus
- Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
- CBSE-2005-FredrikssonSA #component #optimisation #realtime #resource management
- Optimizing Resource Usage in Component-Based Real-Time Systems (JF, KS, MÅ), pp. 49–65.
- CASE-2005-ZhangZNZ
- Production planning with joint resources usage semiconductor test manufacturing (ZZ, MTZ, SN, LZ), pp. 49–54.
- DATE-2005-HeckmannF #abstract interpretation #embedded #safety
- erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
- ICSM-2005-SalahDMSV #named #reverse engineering #sequence
- Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
- IWPC-2005-OSheaE #abstraction #java
- An Investigation of Java Abstraction Usage for Program Modifications (PO, CE), pp. 65–74.
- SAS-2005-ChinNQR #memory management #object-oriented #source code #verification
- Memory Usage Verification for OO Programs (WNC, HHN, SQ, MCR), pp. 70–86.
- FM-2005-CacheraJPS #analysis #memory management
- Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
- CHI-2005-BrushWTS #difference #metadata #social
- Assessing differential usage of usenet social accounting meta-data (AJBB, XW, TCT, MAS), pp. 889–898.
- ICEIS-v2-2005-KumarKDB #clustering #mining #using #web
- Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
- PPDP-2005-JagadeesanM #approach #constraints #declarative #programming
- Timed constraint programming: a declarative approach to usage control (RJ, WM, CP, VAS), pp. 164–175.
- PADL-2005-LopesC #memory management
- Improving Memory Usage in the BEAM (RL, VSC), pp. 143–157.
- RE-2005-Simmons #design #development
- The Usage Model: A Structure for Richly Describing Product Usage during Design and Development (ES), pp. 403–410.
- SAC-2005-Casale #analysis #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
- AMOST-2005-Sayre #automation #c++ #modelling #testing
- Usage model-based automated testing of C++ templates (KS).
- ICEIS-v2-2004-HuysmansMVB #mining #web
- Web Usage Mining with Time Constrained Association Rules (JH, CM, JV, BB), pp. 343–348.
- ICEIS-v4-2004-LimaEMFC #data mining #information management #mining #web
- Archcollect Front-End: A Web Usage Data Mining Knowledge Acquisition Mechanism Focused on Static or Dynamic Contenting Applications (JdCL, AAAE, JGdM, BF, TGdSC), pp. 258–262.
- ICEIS-v5-2004-SalcedoY #learning #library #metadata
- Supporting Course Sequencing in a Digital Library: Usage of Dynamic Metadata for Learning Objects (RMS, YY), pp. 319–324.
- KDD-2004-JinZM #analysis #mining #probability #semantics #web
- Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
- KDD-2004-ShavlikS #detection #effectiveness #evaluation
- Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage (JWS, MS), pp. 276–285.
- SIGIR-2004-AzmanO #clustering
- Discovery of aggregate usage profiles based on clustering information needs (AA, IO), pp. 470–471.
- SAC-2004-SheldonJ #embedded #reliability
- Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems (FTS, KJ), pp. 826–833.
- LCTES-2004-ScholzHK #optimisation
- Optimizing for space and time usage with speculative partial redundancy elimination (BS, RNH, JK), pp. 221–230.
- HT-2003-KarousosTP #approach #developer #hypermedia
- Increasing the usage of open hypermedia systems: a developer-side approach (NK, MT, IP), pp. 148–149.
- ICSM-2003-ObbinkA #architecture #towards
- Towards Evergreen Architectures: On the usage of scenarios in system architecting (JHO, PA), p. 298–?.
- ICEIS-v2-2003-WangRLC #mining #online #realtime #recommendation #web
- Mining Web Usage Data for Real-Time Online Recommendation (MW, SJR, SYL, JKYC), pp. 575–578.
- POPL-2003-HofmannJ #first-order #functional #predict #source code
- Static prediction of heap space usage for first-order functional programs (MH, SJ), pp. 185–197.
- ICSE-2003-ConstantineL #agile #approach #re-engineering #usability #user interface
- Usage-Centered Software Engineering: An Agile Approach to Integrating Users, User Interfaces, and Usability into Software Engineering Practice (LLC, LADL), pp. 746–747.
- ASE-2002-MaccariRM #automation #on the
- On CASE Tool Usage at Nokia (AM, CR, FM), pp. 59–68.
- CAiSE-2002-PaikBH #adaptation
- Usage-Centric Adaptation of Dynamic E-Catalogs (HYP, BB, RH), pp. 344–360.
- CIKM-2002-HuangCA #comparison #learning #web
- Comparison of interestingness functions for learning web usage patterns (XH, NC, AA), pp. 617–620.
- KDD-2002-El-RamlySS #approach #behaviour #mining #runtime
- From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
- SEKE-2002-FarinaFO #automaton #modelling #network #probability #representation
- Representing software usage models with stochastic automata networks (AGF, PF, FMO), pp. 401–407.
- POPL-2002-Boehm #bound #garbage collection
- Bounding space usage of conservative garbage collectors (HJB), pp. 93–100.
- POPL-2002-IgarashiK #analysis #resource management
- Resource usage analysis (AI, NK), pp. 331–342.
- SAC-2001-ChenLCC #multi #parametricity #performance
- The sustainable-cell-rate usage parameter control with adjustable window for high-speed multimedia communications (SyC, LFL, CSC, CJC), pp. 467–471.
- HPCA-2001-GoemanVB #difference #performance #predict
- Differential FCM: Increasing Value Prediction Accuracy by Improving Table Usage Efficiency (BG, HV, KDB), pp. 207–216.
- HPDC-2001-HumphreyT #grid #security
- Security Implications of Typical Grid Computing Usage Scenarios (MH, MRT), pp. 95–103.
- DAC-2000-GebotysGW #architecture #power management
- Power minimization derived from architectural-usage of VLIW processors (CHG, RJG, SW), pp. 308–311.
- IFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system
- A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
- CHI-2000-ChiPP #predict #usability #web
- The scent of a site: a system for analyzing and predicting information scent, usage, and usability of a Web site (EHhC, PP, JEP), pp. 161–168.
- AdaEurope-2000-Pflug #ada #question
- Ada after 10 Years of Usage — Is There a Commercial Future? (BP), p. 4.
- ICEIS-2000-KalininNSP #network #process
- Usage of Instrument of Neural Networks in Control of Complex Chemical-Technological Processes (AK, LN, ES, SP), pp. 521–524.
- ICEIS-2000-ThomasASC #enterprise
- Evaluatin IT Usage in Small and Medium Sized Enterprises (DTT, AA, HS, DJC), pp. 355–362.
- PPDP-2000-BakewellR #lazy evaluation
- A model for comparing the space usage of lazy evaluators (AB, CR), pp. 151–162.
- SAC-2000-NeumannZ #composition #towards
- Towards the Usage of Dynamic Object Aggregations as a Foundation for Composition (GN, UZ), pp. 818–820.
- ASE-1999-LiuR #component #specification #towards #verification
- Towards Discovery, Specification, and Verification of Component Usage (CL, DJR), pp. 331–334.
- CSMR-1999-JonesHKA #modelling #quality
- Application of a Usage Profile in Software Quality Models (WDJ, JPH, TMK, EBA), pp. 148–159.
- CSMR-1999-KrikhaarPZ #resource management
- Employing Use-cases and Domain Knowledge for Comprehending Resource Usage (RLK, MP, JZ), pp. 14–21.
- CHI-1999-OmoiguiHGGS #named
- Time-Compression: Systems Concerns, Usage, and Benefits (NO, LH, AG, JG, ES), pp. 136–143.
- HCI-EI-1999-ColtekinVK
- Consequences of Computer Breakdowns on Time Usage (AÇ, MV, IMK), pp. 1078–1082.
- HCI-EI-1999-NikovP #adaptation #modelling
- Combining User and Usage Modelling for User-Adaptivity Systems (AN, WP), pp. 336–340.
- CAiSE-1999-VassiliadisBQ #evolution #towards
- Towards Quality-Oriented Data Warehouse Usage and Evolution (PV, MB, CQ), pp. 164–179.
- TOOLS-EUROPE-1999-Waldron #bytecode #java #object-oriented #source code
- Dynamic Bytecode Usage by Object Oriented Java Programs (JW), pp. 384–395.
- SOSP-1999-Vogels #file system
- File system usage in Windows NT 4.0 (WV), pp. 93–109.
- SIGMOD-1998-Whelan #database #documentation
- FileNet Integrated Document Management Database Usage and Issues (DSW), p. 533.
- SIGAda-1998-Frisberg #ada
- Usage of Ada in the Gripen Flight Control System (BF), pp. 140–141.
- ICRE-1998-WeidenhauptPJH #development
- Scenario Usage in System Development: A Report on Current Practice (KW, KP, MJ, PH), p. 222–?.
- ICSE-1998-HilbertR #approach #internet #scalability
- An Approach to Large-Scale Collection of Application Usage Data Over the Internet (DMH, DFR), pp. 136–145.
- ICSM-1997-HeSRC #black box #maintenance #testing
- Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing (ZH, GS, MR, IC), pp. 142–149.
- CHI-1997-BhavnaniJ #analysis #performance
- From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
- CHI-1997-KieslerKLSM #internet #usability
- Usability, Help Desk Calls, and Residential Internet Usage (SBK, REK, VL, WLS, TM), pp. 536–537.
- HCI-CC-1997-Seppala #case study #experience #information management
- Usage of an Integrated Office Information System: Experiences from a Municipal Organization (PKS), pp. 801–804.
- TRI-Ada-1997-Celier #ada
- Managing Usage of Dynamic Structures with Ada Controlled Objects (VC), pp. 165–170.
- CAV-1997-KamhiWF #automation #performance
- Automatic Datapath Extraction for Efficient Usage of HDD (GK, OW, LF), pp. 95–106.
- CHI-1996-HarrisonV #evaluation
- An Experimental Evaluation of Transparent Menu Usage (BLH, KJV), pp. 391–398.
- SEKE-1996-LiaoCSC #object-oriented #source code #specification #testing
- Testing Object-Oriented Programs Based on Usage Profiles and Formal Specifications (SSL, KHC, SBS, CYC), pp. 9–16.
- WSA-1993-WrightB #analysis #reduction
- Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
- FME-1993-CraigenGR #formal method #industrial
- Formal Methods Reality Check: Industrial Usage (DC, SLG, TR), pp. 250–267.
- HCI-SHI-1993-Caldwell93a #feedback #social
- Social Implications of Feedback and Delay Characteristics in Electronic Communications Usage (BSC), pp. 843–848.
- ICRE-1993-GornyVQD #prototype #user interface
- Slow and Principled Prototyping of Usage Surfaces: A Mehtd For User Interface Engineering (PG, AV, LQ, UD), pp. 125–133.
- CHI-1990-YoungW #analysis #concept #fault #predict #using
- Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
- ASPLOS-1989-AdamsZ #analysis #set #source code
- An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
- PLDI-1988-Chow
- Minimizing Register Usage Penalty at Procedure Calls (FCC), pp. 85–94.
- ASPLOS-1982-Wiecek #case study #compilation #execution #set
- A Case Study of VAX-11 Instruction Set Usage for Compiler Execution (CAW), pp. 177–184.
- VLDB-1979-OrenA #concept #database #design #logic #statistics
- Statistice for the Usage of a Conceptual Data Model as a Basis for Logical Data Base Design (OO, FA), pp. 140–145.