321 papers:
 ECSA-2015-LewisL ECSA-2015-LewisL
- Characterization of Cyber-Foraging Usage Contexts (GAL, PL), pp. 195–211.
 DAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management DAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management
- Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
 ICPC-2015-SaiedABS #api #library #question #source code #using ICPC-2015-SaiedABS #api #library #question #source code #using
- Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
 ICPC-2015-VendomeLBPGP #git #java #scalability ICPC-2015-VendomeLBPGP #git #java #scalability
- License usage and changes: a large-scale study of Java projects on GitHub (CV, MLV, GB, MDP, DMG, DP), pp. 218–228.
 ICSME-2015-CorleyLQ #developer #web ICSME-2015-CorleyLQ #developer #web
- Web usage patterns of developers (CSC, FL, SQ), pp. 381–390.
 ICSME-2015-GoeminneM #analysis #database #framework #java #towards ICSME-2015-GoeminneM #analysis #database #framework #java #towards
- Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
 MSR-2015-SawantB #api #dataset MSR-2015-SawantB #api #dataset
- A Dataset for API Usage (AAS, AB), pp. 506–509.
 MSR-2015-VasquezWBMP #android #execution #generative #mining MSR-2015-VasquezWBMP #android #execution #generative #mining
- Mining Android App Usages for Generating Actionable GUI-Based Execution Scenarios (MLV, MW, CBC, KM, DP), pp. 111–122.
 SANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support SANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support
- Scaling up evaluation of code search tools through developer usage metrics (KD, DCS, LLP), pp. 181–190.
 SANER-2015-SaiedBAS #api #mining #multi SANER-2015-SaiedBAS #api #mining #multi
- Mining Multi-level API Usage Patterns (MAS, OB, HA, HAS), pp. 23–32.
 SANER-2015-SaiedSD #api #constraints #documentation SANER-2015-SaiedSD #api #constraints #documentation
- An observational study on API usage constraints and their documentation (MAS, HAS, BD), pp. 33–42.
 CHI-2015-SamsonovTSKH #towards CHI-2015-SamsonovTSKH #towards
- You Can’t Smoke Here: Towards Support for Space Usage Rules in Location-aware Technologies (PAS, XT, JS, WK, BH), pp. 971–974.
 DUXU-UI-2015-MedolaLBSFP #case study #experience #problem DUXU-UI-2015-MedolaLBSFP #case study #experience #problem
- Experiences, Problems and Solutions in Computer Usage by Subjects with Tetraplegia (FOM, JL, CGB, AS, AEF, LCP), pp. 131–137.
 DUXU-UI-2015-ZhuSK #case study #design #smarttech DUXU-UI-2015-ZhuSK #case study #design #smarttech
- A Field Study on Basic Usage Patterns of Traditional Watch and Smart Phone for Designing Smart Watch (ZZ, HS, SWK), pp. 597–608.
 SCSM-2015-HallC #collaboration #information management #performance #process #social SCSM-2015-HallC #collaboration #information management #performance #process #social
- Analysing Yammer Usage Pattern in the Context of Social Collaborative Activity Performance by Knowledge Workers (JH, BBC), pp. 127–137.
 CAiSE-2015-SirenSJ #lifecycle #requirements CAiSE-2015-SirenSJ #lifecycle #requirements
- The Requirements and Needs of Global Data Usage in Product Lifecycle Management (AS, KS, MJ), pp. 103–117.
 ICEIS-v2-2015-SarsharNR #case study #comparison #smarttech ICEIS-v2-2015-SarsharNR #case study #comparison #smarttech
- A Study on the Usage of Smartphone Apps in Fire Scenarios — Comparison between GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 469–474.
 SEKE-2015-ChenZWQJW #api #mining #protocol SEKE-2015-ChenZWQJW #api #mining #protocol
- Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
 SEKE-2015-GoncalvesW #bibliography #education #how #perspective #project management #tool support SEKE-2015-GoncalvesW #bibliography #education #how #perspective #project management #tool support
- How to Teach the Usage of Project Management Tools in Computer Courses: A Systematic Literature Review (RQG, CGvW), pp. 36–41.
 SAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing SAC-2015-Homm0G #concurrent #markov #modelling #statistics #testing
- Concurrent streams in Markov chain usage models for statistical testing of complex systems (DH, JE, RG), pp. 1803–1807.
 ICSE-v1-2015-AvdiienkoKGZARB #mining ICSE-v1-2015-AvdiienkoKGZARB #mining
- Mining Apps for Abnormal Usage of Sensitive Data (VA, KK, AG, AZ, SA, SR, EB), pp. 426–436.
 ICSE-v2-2015-Avdiienko #mining ICSE-v2-2015-Avdiienko #mining
- Mining Patterns of Sensitive Data Usage (VA), pp. 891–894.
 ICSE-v2-2015-Vendome #case study #git #scalability ICSE-v2-2015-Vendome #case study #git #scalability
- A Large Scale Study of License Usage on GitHub (CV), pp. 772–774.
 ICST-2015-YuC #embedded #generative #stack #testing #worst-case ICST-2015-YuC #embedded #generative #stack #testing #worst-case
- Guided Test Generation for Finding Worst-Case Stack Usage in Embedded Systems (TY, MBC), pp. 1–10.
 ISSTA-2015-DahseH #case study #empirical #experience #php #security ISSTA-2015-DahseH #case study #empirical #experience #php #security
- Experience report: an empirical study of PHP security mechanism usage (JD, TH), pp. 60–70.
 ASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics ASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
- Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
 CASE-2014-HungCYDYW #behaviour #data mining #mining CASE-2014-HungCYDYW #behaviour #data mining #mining
- Data mining for analysing kiosk usage behavior patterns (YSH, KLBC, CTY, GFD, YHY, NCW), pp. 1115–1120.
 DAC-2014-ChenCDZ #energy #smarttech DAC-2014-ChenCDZ #energy #smarttech
- Demystifying Energy Usage in Smartphones (XC, YC, MD, J(Z), p. 5.
 HT-2014-WenLTP #network #twitter HT-2014-WenLTP #network #twitter
- Twitter in academic conferences: usage, networking and participation over time (XW, YRL, CT, DP), pp. 285–290.
 ICPC-2014-PetersenHR #api #comparison #eclipse #empirical #groovy #ide #java #type system ICPC-2014-PetersenHR #api #comparison #eclipse #empirical #groovy #ide #java #type system
- An empirical comparison of static and dynamic type systems on API usage in the presence of an IDE: Java vs. groovy with eclipse (PP, SH, RR), pp. 212–222.
 ICSME-2014-SahinTMPC #energy #how #obfuscation #question ICSME-2014-SahinTMPC #energy #how #obfuscation #question
- How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
 ICSME-2014-ZhuZXJL0 #api #mining ICSME-2014-ZhuZXJL0 #api #mining
- Mining API Usage Examples from Test Code (ZZ, YZ, BX, YJ, ZL, LZ), pp. 301–310.
 MSR-2014-VasquezBBOPP #android #api #empirical #energy #mining MSR-2014-VasquezBBOPP #android #api #empirical #energy #mining
- Mining energy-greedy API usage patterns in Android apps: an empirical study (MLV, GB, CBC, RO, MDP, DP), pp. 2–11.
 MSR-2014-VasquezHBP #android #library #obfuscation #reuse MSR-2014-VasquezHBP #android #library #obfuscation #reuse
- Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
 SCAM-2014-WuAGA #api #named SCAM-2014-WuAGA #api #named
- ACUA: API Change and Usage Auditor (WW, BA, YGG, GA), pp. 89–94.
 DUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people DUXU-DP-2014-DiasPdS #communication #design #interface #multimodal #named #people
- TAC-ACCESS — Technologies to Support Communication from Interfaces Accessible and Multimodal for People with Disabilities and Diversity: Context-Centered Design of Usage (CdOD, LMP, CdCL, EGS), pp. 141–151.
 DUXU-ELAS-2014-Spinillo #how #usability DUXU-ELAS-2014-Spinillo #how #usability
- How Do Patient Information Leaflets Aid Medicine Usage? A Proposal for Assessing Usability of Medicine Inserts (CGS), pp. 115–124.
 HCI-AS-2014-StieningerN HCI-AS-2014-StieningerN
- Drivers for the Actual Usage of Cloud Services: An Examination of Influencing Factors for Digital Natives (MS, DN), pp. 69–79.
 SCSM-2014-PapachristosKKIFA #case study #deployment #enterprise #social #social media #tool support SCSM-2014-PapachristosKKIFA #case study #deployment #enterprise #social #social media #tool support
- Deployment, Usage and Impact of Social Media Tools in Small and Medium Enterprises: A Case Study (EP, CK, NK, II, CF, NMA), pp. 79–90.
 SCSM-2014-SchaarVZELJ #motivation #network #social #using SCSM-2014-SchaarVZELJ #motivation #network #social #using
- Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
 SCSM-2014-ShiLYLC #development #network #social #validation SCSM-2014-ShiLYLC #development #network #social #validation
- The Development and Validation of the Social Network Sites (SNSs) Usage Questionnaire (YS, YLLL, ZY, YL, HC), pp. 113–124.
 ICEIS-v2-2014-GarciaP #as a service #maintenance #requirements ICEIS-v2-2014-GarciaP #as a service #maintenance #requirements
- SaaS Usage Information for Requirements Maintenance (AG, ACRP), pp. 323–330.
 ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process ICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
- Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
 ICEIS-v2-2014-SamejimaMK #flexibility #resource management ICEIS-v2-2014-SamejimaMK #flexibility #resource management
- Flexible Peak Shaving in Data Center by Suppression of Application Resource Usage (MS, HTM, NK), pp. 355–360.
 SEKE-2014-LiuTA #database #detection SEKE-2014-LiuTA #database #detection
- Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
 ICMT-2014-WieberAS #automation #graph grammar #model transformation #on the #testing ICMT-2014-WieberAS #automation #graph grammar #model transformation #on the #testing
- On the Usage of TGGs for Automated Model Transformation Testing (MW, AA, AS), pp. 1–16.
 ICSE-2014-NguyenNNN #interprocedural #javascript #mining #web ICSE-2014-NguyenNNN #interprocedural #javascript #mining #web
- Mining interprocedural, data-oriented usage patterns in JavaScript web applications (HVN, HAN, ATN, TNN), pp. 791–802.
 HPCA-2014-WangDDS #concurrent #memory management #multi #named #predict #source code #thread HPCA-2014-WangDDS #concurrent #memory management #multi #named #predict #source code #thread
- DraMon: Predicting memory bandwidth usage of multi-threaded programs with high accuracy and low overhead (WW, TD, JWD, MLS), pp. 380–391.
 ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
 ICTSS-2014-SamihGBAB #approach #modelling #testing ICTSS-2014-SamihGBAB #approach #modelling #testing
- An Approach to Derive Usage Models Variants for Model-Based Testing (HS, HLG, RB, MA, BB), pp. 80–96.
 ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
- Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
 ECSA-2013-AngelovTK #architecture #design ECSA-2013-AngelovTK #architecture #design
- Software Reference Architectures — Exploring Their Usage and Design in Practice (SA, JJMT, RJK), pp. 17–24.
 ASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation ASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
- ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
 DocEng-2013-SadallahEMP #documentation #framework #re-engineering DocEng-2013-SadallahEMP #documentation #framework #re-engineering
- A framework for usage-based document reengineering (MS, BE, AeM, YP), pp. 99–102.
 CSMR-2013-BusingeSB #api #developer #eclipse CSMR-2013-BusingeSB #api #developer #eclipse
- Analyzing the Eclipse API Usage: Putting the Developer in the Loop (JB, AS, MvdB), pp. 37–46.
 ICPC-2013-RooverLP #api #multi ICPC-2013-RooverLP #api #multi
- Multi-dimensional exploration of API usage (CDR, RL, EP), pp. 152–161.
 ICSM-2013-BavotaCPOP #documentation #empirical #maintenance ICSM-2013-BavotaCPOP #documentation #empirical #maintenance
- An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks (GB, GC, MDP, RO, SP), pp. 210–219.
 ICSM-2013-XinQHXZWG #concurrent #empirical #source code ICSM-2013-XinQHXZWG #concurrent #empirical #source code
- An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs (RX, ZQ, SH, CX, YZ, YW, HG), pp. 100–109.
 MSR-2013-WangDZCXZ #api #mining #source code MSR-2013-WangDZCXZ #api #mining #source code
- Mining succinct and high-coverage API usage patterns from source code (JW, YD, HZ, KC, TX, DZ), pp. 319–328.
 MSR-2013-WangG #android #api #case study #detection #developer MSR-2013-WangG #android #api #case study #detection #developer
- Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
 SCAM-2013-MendezBM #api #empirical #object-oriented #scalability SCAM-2013-MendezBM #api #empirical #object-oriented #scalability
- Empirical evidence of large-scale diversity in API usage of object-oriented software (DM, BB, MM), pp. 43–52.
 IFM-2013-SongT #api #library #model checking IFM-2013-SongT #api #library #model checking
- Model-Checking Software Library API Usage Rules (FS, TT), pp. 192–207.
 CHI-2013-BaillyPDW #named CHI-2013-BaillyPDW #named
- Métamorphe: augmenting hotkey usage with actuated keys (GB, TP, JD, DJW), pp. 563–572.
 CHI-2013-ChilanaKWG #case study #crowdsourcing #multi CHI-2013-ChilanaKWG #case study #crowdsourcing #multi
- A multi-site field study of crowdsourced contextual help: usage and perspectives of end users and software teams (PKC, AJK, JOW, TG), pp. 217–226.
 CHI-2013-MatejkaGF13a #heatmap #named #visualisation CHI-2013-MatejkaGF13a #heatmap #named #visualisation
- Patina: dynamic heatmaps for visualizing application usage (JM, TG, GWF), pp. 3227–3236.
 CHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network #privacy CHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network #privacy
- Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
 DUXU-CXC-2013-WindlH #aspect-oriented #design DUXU-CXC-2013-WindlH #aspect-oriented #design
- Intercultural Design for Use — Extending Usage-Centered Design by Cultural Aspects (HW, RH), pp. 139–148.
 HCI-III-2013-LimD HCI-III-2013-LimD
- Evaluating Intelligibility Usage and Usefulness in a Context-Aware Application (BYL, AKD), pp. 92–101.
 HIMI-D-2013-LeeY #behaviour #comparison #information management #research HIMI-D-2013-LeeY #behaviour #comparison #information management #research
- Research on Website Usage Behavior through Information Search Perspective: A Comparison of Experiential and Goal-Directed Behaviors (JL, MY), pp. 456–464.
 ICEIS-J-2013-RothPS13a #analysis #twitter ICEIS-J-2013-RothPS13a #analysis #twitter
- Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
 ICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation ICEIS-v3-2013-LucasXB #enterprise #realtime #visualisation
- Visualizing ERP Usage Logs in Real Time (WTL, JX, TB), pp. 83–90.
 CIKM-2013-LiaoPPL #behaviour #mining #mobile #on the #predict #smarttech CIKM-2013-LiaoPPL #behaviour #mining #mobile #on the #predict #smarttech
- On mining mobile apps usage behavior for predicting apps usage in smartphones (ZXL, YCP, WCP, PRL), pp. 609–618.
 ECIR-2013-WilkieA ECIR-2013-WilkieA
- An Initial Investigation on the Relationship between Usage and Findability (CW, LA), pp. 808–811.
 KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
 REFSQ-2013-BouillonMP #bibliography #requirements #traceability REFSQ-2013-BouillonMP #bibliography #requirements #traceability
- A Survey on Usage Scenarios for Requirements Traceability in Practice (EB, PM, IP), pp. 158–173.
 SAC-2013-TangHHC #mobile #named SAC-2013-TangHHC #mobile #named
- iLauncher: an intelligent launcher for mobile apps based on individual usage patterns (LYT, PCH, JLH, MSC), pp. 505–512.
 CAV-2013-HarrisJLJ #library #validation CAV-2013-HarrisJLJ #library #validation
- Validating Library Usage Interactively (WRH, GJ, SL, SJ), pp. 796–812.
 ISSTA-2013-HillsKV #empirical #perspective #php #static analysis ISSTA-2013-HillsKV #empirical #perspective #php #static analysis
- An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
 LICS-2013-AspertiL #cost analysis #λ-calculus LICS-2013-AspertiL #cost analysis #λ-calculus
- The Cost of Usage in the λ-Calculus (AA, JJL), pp. 293–300.
 RTA-2013-AvanziniM13a #complexity RTA-2013-AvanziniM13a #complexity
- Tyrolean Complexity Tool: Features and Usage (MA, GM), pp. 71–80.
 DAC-2012-JungSB #off the shelf #using DAC-2012-JungSB #off the shelf #using
- Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
 DATE-2012-LafayePBGF #embedded #modelling #resource management #simulation DATE-2012-LafayePBGF #embedded #modelling #resource management #simulation
- Model driven resource usage simulation for critical embedded systems (ML, LP, EB, MG, DF), pp. 312–315.
 CSMR-2012-BauerH #api #comprehension #maintenance CSMR-2012-BauerH #api #comprehension #maintenance
- Understanding API Usage to Support Informed Decision Making in Software Maintenance (VB, LH), pp. 435–440.
 ICSM-2012-BauerHD #approach #library ICSM-2012-BauerHD #approach #library
- A structured approach to assess third-party library usage (VB, LH, FD), pp. 483–492.
 MSR-2012-BaysalHG #development #mining MSR-2012-BaysalHG #development #mining
- Mining usage data and development artifacts (OB, RH, MWG), pp. 98–107.
 WCRE-2012-NodaKA #abstraction #execution WCRE-2012-NodaKA #abstraction #execution
- Execution Trace Abstraction Based on Meta Patterns Usage (KN, TK, KA), pp. 167–176.
 PEPM-2012-AlbertCPR #analysis #incremental #resource management PEPM-2012-AlbertCPR #analysis #incremental #resource management
- Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
 CIAA-2012-DeganoFM #automaton #resource management CIAA-2012-DeganoFM #automaton #resource management
- Nominal Automata for Resource Usage Control (PD, GLF, GM), pp. 125–137.
 CHI-2012-FroehlichFORPWLFBPL #design #evaluation #prototype CHI-2012-FroehlichFORPWLFBPL #design #evaluation #prototype
- The design and evaluation of prototype eco-feedback displays for fixture-level water usage data (JF, LF, MO, SR, JP, IW, ECL, FF, MB, SP, JAL), pp. 2367–2376.
 CHI-2012-LeeKYYK #case study #comprehension #mobile CHI-2012-LeeKYYK #case study #comprehension #mobile
- Understanding mobile Q&A usage: an exploratory study (UL, HK, EY, MY, JK), pp. 3215–3224.
 ICEIS-J-2012-BabaianL12a #automation #interface ICEIS-J-2012-BabaianL12a #automation #interface
- Composing Interface Demonstrations Automatically from Usage Logs (TB, WTL), pp. 376–392.
 ICEIS-v3-2012-BabaianL #enterprise ICEIS-v3-2012-BabaianL #enterprise
- Leveraging Usage History to Support Enterprise System Users (TB, WTL), pp. 35–44.
 ICPR-2012-TakahashiI #predict ICPR-2012-TakahashiI #predict
- Predicting battery life from usage trajectory patterns (TT, TI), pp. 2946–2949.
 ICPR-2012-TaoKNT #process #recognition ICPR-2012-TaoKNT #process #recognition
- Camera view usage of binary infrared sensors for activity recognition (ST, MK, HN, JT), pp. 1759–1762.
 KDIR-2012-ArbelaitzGLMPP12a #adaptation #mining #web KDIR-2012-ArbelaitzGLMPP12a #adaptation #mining #web
- Enhancing a Web Usage Mining based Tourism Website Adaptation with Content Information (OA, IG, AL, JM, JMP, IP), pp. 287–292.
 KDIR-2012-IkebeKT #learning #predict #smarttech #using KDIR-2012-IkebeKT #learning #predict #smarttech #using
- Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
 MLDM-2012-JoenssenB MLDM-2012-JoenssenB
- Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
 MLDM-2012-PaliwalP #clustering #documentation #segmentation MLDM-2012-PaliwalP #clustering #documentation #segmentation
- Investigating Usage of Text Segmentation and Inter-passage Similarities to Improve Text Document Clustering (SP, VP), pp. 555–565.
 SEKE-2012-Pelto-PiriMT #evaluation #industrial SEKE-2012-Pelto-PiriMT #evaluation #industrial
- A Unified Model for Server Usage and Operational Costs Based on User Profiles: An Industrial Evaluation (JPP, PM, RT), pp. 205–210.
 SEKE-2012-WauteletHK SEKE-2012-WauteletHK
- A Usage-Based Unified Resource Model (YW, SH, MK), pp. 299–304.
 SIGIR-2012-Baeza-YatesM #web SIGIR-2012-Baeza-YatesM #web
- (Big) usage data in web search (RABY, YM), pp. 1181–1182.
 MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
 MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
 MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml MoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
- Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
 MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing MoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
- Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
 RE-2012-Knauss #ecosystem #elicitation #on the #requirements RE-2012-Knauss #ecosystem #elicitation #on the #requirements
- On the usage of context for requirements elicitation: End-user involvement in IT ecosystems (AK), pp. 345–348.
 SAC-2012-DiamantiniPS #mining #repository #workflow SAC-2012-DiamantiniPS #mining #repository #workflow
- Mining usage patterns from a repository of scientific workflows (CD, DP, ES), pp. 152–157.
 FSE-2012-KwonS #component #detection FSE-2012-KwonS #component #detection
- Detecting and analyzing insecure component usage (TK, ZS), p. 5.
 FSE-2012-MirakhorliMC #design pattern #variability FSE-2012-MirakhorliMC #design pattern #variability
- Variability points and design pattern usage in architectural tactics (MM, PM, JCH), p. 52.
 ICSE-2012-BuseW #api ICSE-2012-BuseW #api
- Synthesizing API usage examples (RPLB, WW), pp. 782–792.
 ICSE-2012-UddinDR #analysis #api #concept ICSE-2012-UddinDR #analysis #api #concept
- Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
 ICSE-2012-ZhangYZFZZO #api #automation #parametricity #recommendation ICSE-2012-ZhangYZFZZO #api #automation #parametricity #recommendation
- Automatic parameter recommendation for practical API usage (CZ, JY, YZ, JF, XZ, JZ, PO), pp. 826–836.
 HPDC-2012-ChenA #effectiveness #memory management #optimisation #pipes and filters HPDC-2012-ChenA #effectiveness #memory management #optimisation #pipes and filters
- Optimizing MapReduce for GPUs with effective shared memory usage (LC, GA), pp. 199–210.
 ICST-2012-SprenkleCP #classification #modelling #statistics #web ICST-2012-SprenkleCP #classification #modelling #statistics #web
- Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
 ASE-2011-UddinDR #api ASE-2011-UddinDR #api
- Analyzing temporal API usage patterns (GU, BD, MPR), pp. 456–459.
 ASE-2011-WangFWLXY #api #effectiveness #java #named #recommendation #web ASE-2011-WangFWLXY #api #effectiveness #java #named #recommendation #web
- APIExample: An effective web search based usage example recommendation system for java APIs (LW, LF, LW, GL, BX, FY), pp. 592–595.
 SIGMOD-2011-ElmeleegyLROE #named SIGMOD-2011-ElmeleegyLROE #named
- U-MAP: a system for usage-based schema matching and mapping (HE, JL, EKR, MO, AKE), pp. 1287–1290.
 MSR-2011-KarusG #case study #evolution #open source MSR-2011-KarusG #case study #evolution #open source
- A study of language usage evolution in open source software (SK, HCG), pp. 13–22.
 PASTE-2011-MilevaZ #composition PASTE-2011-MilevaZ #composition
- Assessing modularity via usage changes (YMM, AZ), pp. 37–40.
 CHI-2011-ChilanaGF #multi #process CHI-2011-ChilanaGF #multi #process
- Modern software product support processes and the usage of multimedia formats (PKC, TG, GWF), pp. 3093–3102.
 CHI-2011-HayashiH CHI-2011-HayashiH
- A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
 DHM-2011-SchafferSM #human-computer #interactive #multimodal DHM-2011-SchafferSM #human-computer #interactive #multimodal
- A Model of Shortcut Usage in Multimodal Human-Computer Interaction (SS, RS, SM), pp. 337–346.
 DUXU-v1-2011-ChenT #design #industrial #learning #problem #student DUXU-v1-2011-ChenT #design #industrial #learning #problem #student
- Exploring the Learning Problems and Resources Usage of Undergraduate Industrial Design Students in Design Studio (WC, HHT), pp. 43–52.
 DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface DUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
- Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
 DUXU-v2-2011-ZhangCV #case study #experience #modelling DUXU-v2-2011-ZhangCV #case study #experience #modelling
- Modeling Users’ Data Usage Experiences from Scientific Literature (JZ, CC, MSEV), pp. 337–346.
 HCD-2011-LinC #research #social #social media HCD-2011-LinC #research #social #social media
- Bridging the Social Media Usage Gap from Old to New: An Elderly Media Interpersonal and Social Research in Taiwan (SHL, WHC), pp. 547–555.
 HCI-MIIE-2011-EL-QiremC #development #experience #user interface HCI-MIIE-2011-EL-QiremC #development #experience #user interface
- Computer Usage and User Experience in Jordan: Development and Application of the Diamond Model of Territorial Factors (FAEQ, GC), pp. 490–499.
 KDIR-2011-BonninBB #mining #predict #web KDIR-2011-BonninBB #mining #predict #web
- Handling Tabbing and Backward References for Predictive Web Usage Mining (GB, AB, AB), pp. 503–509.
 RecSys-2011-Alam #clustering #recommendation #web RecSys-2011-Alam #clustering #recommendation #web
- Intelligent web usage clustering based recommender system (SA), pp. 367–370.
 ECOOP-2011-MilevaWZ #evolution #mining ECOOP-2011-MilevaWZ #evolution #mining
- Mining Evolution of Object Usage (YMM, AW, AZ), pp. 105–129.
 PLATEAU-2011-VakilianCNRMJ #refactoring PLATEAU-2011-VakilianCNRMJ #refactoring
- The need for richer refactoring usage data (MV, NC, SN, BAR, RZM, REJ), pp. 31–38.
 GPCE-2011-SteckLS #modelling #runtime GPCE-2011-SteckLS #modelling #runtime
- Model-driven engineering and run-time model-usage in service robotics (AS, AL, CS), pp. 73–82.
 SAC-2011-Gonzalez-SanchezAGG #empirical #fault #locality #testing SAC-2011-Gonzalez-SanchezAGG #empirical #fault #locality #testing
- An empirical study on the usage of testability information to fault localization in software (AGS, RA, HGG, AJCvG), pp. 1398–1403.
 SAC-2011-GuerraF #realtime #resource management SAC-2011-GuerraF #realtime #resource management
- Handling overload of target sensitive real-time applications for increased system utility and improved resource usage (RG, GF), pp. 742–747.
 SAC-2011-LammelPS #analysis #java #open source #scalability SAC-2011-LammelPS #analysis #java #open source #scalability
- Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
 ESEC-FSE-2011-BarzilayHY #developer #social #social media #using ESEC-FSE-2011-BarzilayHY #developer #social #social media #using
- Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
 ICSE-2011-McMillanGPXF #named ICSE-2011-McMillanGPXF #named
- Portfolio: finding relevant functions and their usage (CM, MG, DP, QX, CF), pp. 111–120.
 ICSE-2011-McMillanGPXF11a #named ICSE-2011-McMillanGPXF11a #named
- Portfolio: a search engine for finding functions and their usages (CM, MG, DP, QX, CF), pp. 1043–1045.
 ICSE-2011-SillittiSV #comprehension #towards ICSE-2011-SillittiSV #comprehension #towards
- Toward a better understanding of tool usage (AS, GS, JV), pp. 832–835.
 ICST-2011-FraserZ #generative #testing ICST-2011-FraserZ #generative #testing
- Exploiting Common Object Usage in Test Case Generation (GF, AZ), pp. 80–89.
 ICST-2011-Grasland #automation #resource management #testing ICST-2011-Grasland #automation #resource management #testing
- Testing Resource Usage in Home Automation Systems (YG), pp. 419–422.
 ICST-2011-SprenklePS #case study #modelling #navigation #testing #web ICST-2011-SprenklePS #case study #modelling #navigation #testing #web
- A Study of Usage-Based Navigation Models and Generated Abstract Test Cases for Web Applications (SS, LLP, LS), pp. 230–239.
 ICTSS-2011-BochmannJW #reliability #testing #web ICTSS-2011-BochmannJW #reliability #testing #web
- Improved Usage Model for Web Application Reliability Testing (GvB, GVJ, BW), pp. 15–31.
 HT-2010-PaparrizosKAV #automation #statistics #web HT-2010-PaparrizosKAV #automation #statistics #web
- Automatic extraction of structure, content and usage data statistics of web sites (IKP, VAK, LA, AV), pp. 301–302.
 ICPC-2010-LammelP #comprehension #domain-specific language ICPC-2010-LammelP #comprehension #domain-specific language
- Vivisection of a Non-Executable, Domain-Specific Language — Understanding (the Usage of) the P3P Language (RL, EP), pp. 104–113.
 ICPC-2010-Mihancea #named #polymorphism #visualisation ICPC-2010-Mihancea #named #polymorphism #visualisation
- Patrools: Visualizing the Polymorphic Usage of Class Hierarchies (PFM), pp. 36–37.
 ICPC-2010-SuttonHM #c++ #identification #library ICPC-2010-SuttonHM #c++ #identification #library
- Identification of Idiom Usage in C++ Generic Libraries (AS, RH, JIM), pp. 160–169.
 ICSM-2010-NasehiM #api #testing ICSM-2010-NasehiM #api #testing
- Unit tests as API usage examples (SMN, FM), pp. 1–10.
 CHI-2010-KarlsonIMRLT #mobile #smarttech CHI-2010-KarlsonIMRLT #mobile #smarttech
- Mobile taskflow in context: a screenshot study of smartphone usage (AKK, STI, BM, GR, KL, JCT), pp. 2009–2018.
 CHI-2010-KellyCDNG #information management #quality #query CHI-2010-KellyCDNG #information management #quality #query
- Effects of popularity and quality on the usage of query suggestions during information search (DK, AC, MD, XN, KG), pp. 45–54.
 CHI-2010-MullerMF #enterprise CHI-2010-MullerMF #enterprise
- Patterns of usage in an enterprise file-sharing service: publicizing, discovering, and telling the news (MJM, DRM, JF), pp. 763–766.
 CSCW-2010-IqbalH #case study CSCW-2010-IqbalH #case study
- Notifications and awareness: a field study of alert usage and preferences (STI, EH), pp. 27–30.
 RecSys-2010-CastagnosJP #recommendation RecSys-2010-CastagnosJP #recommendation
- Eye-tracking product recommenders’ usage (SC, NJ, PP), pp. 29–36.
 SEKE-2010-SieglGH #modelling #testing #variability SEKE-2010-SieglGH #modelling #testing #variability
- Introduction of Time and Timing Variability in Usage Model based Testing (SS, RG, KSJH), pp. 61–66.
 SEKE-2010-Spector #logic SEKE-2010-Spector #logic
- Prodigious Data, Logic, Processing, and Usage (AZS), p. 1.
 SIGIR-2010-KaleBSVVGD #enterprise #named #web SIGIR-2010-KaleBSVVGD #enterprise #named #web
- iCollaborate: harvesting value from enterprise web usage (AK, TB, BS, TLPV, LV, MG, MD), p. 699.
 OOPSLA-2010-NguyenNWNKN #adaptation #api #approach #graph OOPSLA-2010-NguyenNWNKN #adaptation #api #approach #graph
- A graph-based approach to API usage adaptation (HAN, TTN, GWJ, ATN, MK, TNN), pp. 302–321.
 TOOLS-EUROPE-2010-ChristBEGL #approach #framework #metamodelling #specification TOOLS-EUROPE-2010-ChristBEGL #approach #framework #metamodelling #specification
- A Generic Meta-model-Based Approach for Specifying Framework Functionality and Usage (FC, JCB, GE, CG, ML), pp. 21–40.
 POPL-2010-JostHLH #higher-order #resource management #source code POPL-2010-JostHLH #higher-order #resource management #source code
- Static determination of quantitative resource usage for higher-order programs (SJ, KH, HWL, MH), pp. 223–236.
 RE-2010-SieglHG #analysis #modelling #requirements #testing RE-2010-SieglHG #analysis #modelling #requirements #testing
- Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
 SAC-2010-SantanaB #web SAC-2010-SantanaB #web
- Summarizing observational client-side data to reveal web usage patterns (VFdS, MCCB), pp. 1219–1223.
 FSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity FSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity
- Leveraging usage similarity for effective retrieval of examples in code repositories (SKB, JO, CVL), pp. 157–166.
 SLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling SLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
- Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
 SPLC-2010-LeeK #feature model SPLC-2010-LeeK #feature model
- Usage Context as Key Driver for Feature Selection (KL, KCK), pp. 32–46.
 CGO-2010-Srisa-anCSS #memory management #self CGO-2010-Srisa-anCSS #memory management #self
- A self-adjusting code cache manager to balance start-up time and memory usage (WSa, MBC, YS, MS), pp. 82–91.
 ICLP-2010-Lopez-GarciaDB10 #debugging #framework #resource management #verification ICLP-2010-Lopez-GarciaDB10 #debugging #framework #resource management #verification
- A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification (PLG, LD, FB), pp. 104–113.
 ASE-2009-KawrykowR #api #automation #detection ASE-2009-KawrykowR #api #automation #detection
- Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
 ASE-2009-PradelG #automation #generative #scalability #specification ASE-2009-PradelG #automation #generative #scalability #specification
- Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
 ASE-2009-WasylkowskiZ #mining #specification ASE-2009-WasylkowskiZ #mining #specification
- Mining Temporal Specifications from Object Usage (AW, AZ), pp. 295–306.
 HT-2009-Baeza-Yates #web HT-2009-Baeza-Yates #web
- Relating content through web usage (RABY), pp. 3–4.
 SIGMOD-2009-CormodeS #generative #modelling SIGMOD-2009-CormodeS #generative #modelling
- Anonymized data: generation, models, usage (GC, DS), pp. 1015–1018.
 ICSM-2009-MaSZS #recommendation ICSM-2009-MaSZS #recommendation
- Expert recommendation with usage expertise (DM, DS, TZ, JS), pp. 535–538.
 ICSM-2009-MunozBDT #aspect-oriented #empirical #programming ICSM-2009-MunozBDT #aspect-oriented #empirical #programming
- Inquiring the usage of aspect-oriented programming: An empirical study (FM, BB, RD, YLT), pp. 137–146.
 MSR-2009-BajracharyaL #code search #mining #topic MSR-2009-BajracharyaL #code search #mining #topic
- Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
 WCRE-1999-AriasAA99a #resource management #scalability WCRE-1999-AriasAA99a #resource management #scalability
- Constructing a Resource Usage View of a Large and Complex Software-Intensive System (TBCA, PA, PA), pp. 247–255.
 CHI-2009-Beauvisage CHI-2009-Beauvisage
- Computer usage in daily life (TB), pp. 575–584.
 CHI-2009-BiB #scalability CHI-2009-BiB #scalability
- Comparing usage of a large high-resolution display to single or dual desktop displays for daily work (XB, RB), pp. 1005–1014.
 CHI-2009-NewtonKM #comparison #online #word CHI-2009-NewtonKM #comparison #online #word
- Autism online: a comparison of word usage in bloggers with and without autism spectrum disorders (ATN, ADIK, DNM), pp. 463–466.
 HCD-2009-Stiso HCD-2009-Stiso
- Frequency of Usage and Feelings of Connectedness in Instant Messaging by Age, Sex, and Civil Status (MES), pp. 562–569.
 HCI-VAD-2009-AliSLB #student HCI-VAD-2009-AliSLB #student
- Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies (NMA, AFS, HL, PB), pp. 567–576.
 HIMI-II-2009-FujitaS #case study #process #safety HIMI-II-2009-FujitaS #case study #process #safety
- The Importance of Information in the Process of Acquisition and Usage of a Medicine for Patient Safety: A Study of the Brazilian Context (PLF, CGS), pp. 489–496.
 HIMI-II-2009-SpinilloPL #analysis #safety HIMI-II-2009-SpinilloPL #analysis #safety
- Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
 IDGD-2009-MedhiRT IDGD-2009-MedhiRT
- Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World (IM, AR, KT), pp. 485–494.
 IDGD-2009-Morawczynski IDGD-2009-Morawczynski
- Examining the Usage and Impact of Transformational M-Banking in Kenya (OM), pp. 495–504.
 ICEIS-J-2009-CabralRLSCF #agile #case study #information management ICEIS-J-2009-CabralRLSCF #agile #case study #information management
- A Case Study of Knowledge Management Usage in Agile Software Projects (AYC, MBR, APL, MTS, MC, CF), pp. 627–638.
 CIKM-2009-Azzopardi #effectiveness #information retrieval #metric #monitoring #performance CIKM-2009-Azzopardi #effectiveness #information retrieval #metric #monitoring #performance
- Usage based effectiveness measures: monitoring application performance in information retrieval (LA), pp. 631–640.
 CIKM-2009-MabroukehE #mining #ontology #predict #semantics #using #web CIKM-2009-MabroukehE #mining #ontology #predict #semantics #using #web
- Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
 CIKM-2009-ParekhHRWW #challenge #experience #resource management CIKM-2009-ParekhHRWW #challenge #experience #resource management
- Characterizing, constructing and managing resource usage profiles of system S applications: challenges and experience (SP, KH, DR, JLW, KLW), pp. 1177–1186.
 KMIS-2009-OsisG #information management KMIS-2009-OsisG #information management
- Perspectives on Usage of Agents in Personal Knowledge Management (KO, JG), pp. 332–337.
 ECOOP-2009-ZhongXZPM #api #mining #named #recommendation ECOOP-2009-ZhongXZPM #api #mining #named #recommendation
- MAPO: Mining and Recommending API Usage Patterns (HZ, TX, LZ, JP, HM), pp. 318–343.
 SAC-2009-DjalalievB #documentation #retrieval SAC-2009-DjalalievB #documentation #retrieval
- Secure web-based retrieval of documents with usage controls (PD, JCB), pp. 2062–2069.
 ESEC-FSE-2009-NguyenNPAN #graph #mining #multi ESEC-FSE-2009-NguyenNPAN #graph #mining #multi
- Graph-based mining of multiple object usage patterns (TTN, HAN, NHP, JMAK, TNN), pp. 383–392.
 CC-2009-Abu-MahmeedMBKRHARK #scheduling CC-2009-Abu-MahmeedMBKRHARK #scheduling
- Scheduling Tasks to Maximize Usage of Aggregate Variables in Place (SAM, CM, ZB, KK, KR, KH, PA, SR, JK), pp. 204–219.
 ISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code ISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code
- Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
 WICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy WICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy
- Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
 DAC-2008-Mitra #verification DAC-2008-Mitra #verification
- Strategies for mainstream usage of formal verification (RSM), pp. 800–805.
 DAC-2008-PaulB #configuration management #memory management #performance #resource management #using DAC-2008-PaulB #configuration management #memory management #performance #resource management #using
- Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
 ICPC-2008-FeilkasR #api #constraints ICPC-2008-FeilkasR #api #constraints
- Ensuring Well-Behaved Usage of APIs through Syntactic Constraints (MF, DR), pp. 248–253.
 MSR-2008-SchulerZ #mining MSR-2008-SchulerZ #mining
- Mining usage expertise from version archives (DS, TZ), pp. 121–124.
 SCAM-2008-StoneSB #analysis #automation #data flow #set SCAM-2008-StoneSB #analysis #automation #data flow #set
- Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
 CHI-2008-KamvarB #comprehension #mobile #query CHI-2008-KamvarB #comprehension #mobile #query
- Query suggestions for mobile search: understanding usage patterns (MK, SB), pp. 1013–1016.
 CHI-2008-KramerR #behaviour #modelling #word CHI-2008-KramerR #behaviour #modelling #word
- Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
 ICEIS-AIDSS-2008-EsminLYC #information management #interactive #named #web ICEIS-AIDSS-2008-EsminLYC #information management #interactive #named #web
- ArchCollect — A Tool for WEB Usage Knowledge Acquisition from User’s Interactions (AAAE, JdCL, ETY, TGdSC), pp. 375–380.
 ICPR-2008-IiyamaHKM #re-engineering ICPR-2008-IiyamaHKM #re-engineering
- Usage of needle maps and shadows to overcome depth edges in depth map reconstruction (MI, KH, KK, MM), pp. 1–4.
 SEKE-2008-YangE #multi #trust SEKE-2008-YangE #multi #trust
- Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
 OOPSLA-2008-BeckmanBA #type system #verification OOPSLA-2008-BeckmanBA #type system #verification
- Verifying correct usage of atomic blocks and typestate (NEB, KB, JA), pp. 227–244.
 SAC-2008-ConstantinA #distributed #ranking #xml SAC-2008-ConstantinA #distributed #ranking #xml
- Usage-based ranking of distributed XML data (CC, BA), pp. 1008–1012.
 FSE-2008-DufourRS #java #scalability FSE-2008-DufourRS #java #scalability
- A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications (BD, BGR, GS), pp. 59–70.
 ICSE-2008-SchaferJM #framework #mining ICSE-2008-SchaferJM #framework #mining
- Mining framework usage changes from instantiation code (TS, JJ, MM), pp. 471–480.
 SLE-2008-FritzscheJAMGSBK #automation #embedded #model transformation #modelling SLE-2008-FritzscheJAMGSBK #automation #embedded #model transformation #modelling
- Systematic Usage of Embedded Modelling Languages in Automated Model Transformation Chains (MF, JJ, UA, SM, WG, ITAS, TJB, PK), pp. 134–150.
 SLE-2008-HageK #analysis #library #named SLE-2008-HageK #analysis #library #named
- Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
 QoSA-2007-KoziolekBH #architecture #component #performance #predict QoSA-2007-KoziolekBH #architecture #component #performance #predict
- Predicting the Performance of Component-Based Software Architectures with Different Usage Profiles (HK, SB, JH), pp. 145–163.
 ASE-2007-BrooksM #automation #testing #user interface ASE-2007-BrooksM #automation #testing #user interface
- Automated gui testing guided by usage profiles (PAB, AMM), pp. 333–342.
 ASE-2007-KagdiCM #approach #mining ASE-2007-KagdiCM #approach #mining
- An approach to mining call-usage patternswith syntactic context (HHK, MLC, JIM), pp. 457–460.
 DocEng-2007-ConcolatoFM #documentation #memory management DocEng-2007-ConcolatoFM #documentation #memory management
- Timed-fragmentation of SVG documents to control the playback memory usage (CC, JLF, JCM), pp. 121–124.
 ICDAR-2007-MaWXD #algorithm #evaluation #locality #performance ICDAR-2007-MaWXD #algorithm #evaluation #locality #performance
- Usage-Oriented Performance Evaluation for Text Localization Algorithms (YM, CW, BX, RD), pp. 1033–1037.
 FoSSaCS-2007-BartolettiDFZ #analysis #resource management FoSSaCS-2007-BartolettiDFZ #analysis #resource management
- Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
 ICPC-2007-JiangKRS #api #documentation ICPC-2007-JiangKRS #api #documentation
- Constructing Usage Scenarios for API Redocumentation (JJ, JK, AR, TS), pp. 259–264.
 ICSM-2007-DongG #analysis #dependence #object-oriented ICSM-2007-DongG #analysis #dependence #object-oriented
- System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
 MSR-2007-KagdiCM #mining #source code MSR-2007-KagdiCM #mining #source code
- Comparing Approaches to Mining Source Code for Call-Usage Patterns (HHK, MLC, JIM), p. 20.
 WCRE-2007-SelbyRGG #maintenance WCRE-2007-SelbyRGG #maintenance
- Examining the Effects of Global Data Usage on Software Maintainability (JWAS, FPR, MG, MWG), pp. 60–69.
 ICFP-2007-HageHM #analysis ICFP-2007-HageHM #analysis
- A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
 CHI-2007-CutrellG #web #what CHI-2007-CutrellG #web #what
- What are you looking for?: an eye-tracking study of information usage in web search (EC, ZG), pp. 407–416.
 CHI-2007-ObendorfWHM #web CHI-2007-ObendorfWHM #web
- Web page revisitation revisited: implications of a long-term click-stream study of browser usage (HO, HW, EH, MM), pp. 597–606.
 CHI-2007-ZiefleSSM #how CHI-2007-ZiefleSSM #how
- How younger and older adults master the usage of hyperlinks in small screen devices (MZ, US, JS, TM), pp. 307–316.
 HCI-IDU-2007-WideroosP #empirical #research HCI-IDU-2007-WideroosP #empirical #research
- Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research (KW, SP), pp. 976–984.
 HCI-IPT-2007-WangLSBH HCI-IPT-2007-WangLSBH
- Enhancing the Map Usage for Indoor Location-Aware Systems (HW, HL, AS, JB, UDH), pp. 151–160.
 ICEIS-HCI-2007-GiraldoS #communication ICEIS-HCI-2007-GiraldoS #communication
- Inhibiting Factors for Communication and Information Technologies Usage — Five Colombian SMEs Study (OLG, EAS), pp. 111–116.
 CIKM-2007-DonZGTACSP #mining #visualisation CIKM-2007-DonZGTACSP #mining #visualisation
- Discovering interesting usage patterns in text collections: integrating text mining with visualization (AD, EZ, MG, ST, LA, TC, BS, CP), pp. 213–222.
 ECIR-2007-BoyerB #natural language #web ECIR-2007-BoyerB #natural language #web
- Natural Language Processing for Usage Based Indexing of Web Resources (AB, AB), pp. 517–524.
 RecSys-2007-TaghipourKG #approach #learning #recommendation #web RecSys-2007-TaghipourKG #approach #learning #recommendation #web
- Usage-based web recommendations: a reinforcement learning approach (NT, AAK, SSG), pp. 113–120.
 RE-2007-Rashid #collaboration #named #requirements #specification #towards #visual notation RE-2007-Rashid #collaboration #named #requirements #specification #towards #visual notation
- OpenProposal: Towards Collaborative End-User Participation in Requirements Management By Usage of Visual Requirement Specifications (AR), pp. 371–374.
 SAC-2007-BraynerM #energy #memory management SAC-2007-BraynerM #energy #memory management
- Balancing energy consumption and memory usage in sensor data processing (AB, RM), pp. 935–939.
 SAC-2007-WeynsR #reliability SAC-2007-WeynsR #reliability
- Sensitivity of software system reliability to usage profile changes (KW, PR), pp. 1440–1444.
 ESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification ESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification
- Mining API patterns as partial orders from source code: from usage scenarios to specifications (MA, TX, JP, JX), pp. 25–34.
 ESEC-FSE-2007-WasylkowskiZL #detection ESEC-FSE-2007-WasylkowskiZL #detection
- Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
 ASE-2006-LiuYR #library #model checking #using ASE-2006-LiuYR #library #model checking #using
- Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
 HT-2006-KazienkoP #assessment #mining #web HT-2006-KazienkoP #assessment #mining #web
- Hyperlink assessment based on web usage mining (PK, MP), pp. 85–88.
 ICPC-2006-ParninG #comprehension ICPC-2006-ParninG #comprehension
- Building Usage Contexts During Program Comprehension (CP, CG), pp. 13–22.
 MSR-2006-XieP #api #mining #named #open source #repository MSR-2006-XieP #api #mining #named #open source #repository
- MAPO: mining API usages from open source repositories (TX, JP), pp. 54–57.
 PEPM-2006-IwamaIK #analysis #exception #functional #resource management PEPM-2006-IwamaIK #analysis #exception #functional #resource management
- Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
 CIKM-2006-NasraouiCRG #collaboration CIKM-2006-NasraouiCRG #collaboration
- Collaborative filtering in dynamic usage environments (ON, JC, CR, FAG), pp. 794–795.
 ICSE-2006-LiuYR #automation #library #named ICSE-2006-LiuYR #automation #library #named
- LtRules: an automated software library usage rule extraction tool (CL, EY, DJR), pp. 823–826.
 SPLC-2006-BragancaM #case study #metamodelling #specification #uml #variability SPLC-2006-BragancaM #case study #metamodelling #specification #uml #variability
- Extending UML 2.0 Metamodel for Complementary Usages of the «extend» Relationship within Use Case Variability Specification (AB, RJM), pp. 123–130.
 HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
 VMCAI-2006-KobayashiSW #analysis #resource management #π-calculus VMCAI-2006-KobayashiSW #analysis #resource management #π-calculus
- Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
 CBSE-2005-FredrikssonSA #component #optimisation #realtime #resource management CBSE-2005-FredrikssonSA #component #optimisation #realtime #resource management
- Optimizing Resource Usage in Component-Based Real-Time Systems (JF, KS, MÅ), pp. 49–65.
 CASE-2005-ZhangZNZ CASE-2005-ZhangZNZ
- Production planning with joint resources usage semiconductor test manufacturing (ZZ, MTZ, SN, LZ), pp. 49–54.
 DATE-2005-HeckmannF #abstract interpretation #embedded #safety DATE-2005-HeckmannF #abstract interpretation #embedded #safety
- erifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation (RH, CF), pp. 618–619.
 ICSM-2005-SalahDMSV #named #reverse engineering #sequence ICSM-2005-SalahDMSV #named #reverse engineering #sequence
- Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
 IWPC-2005-OSheaE #abstraction #java IWPC-2005-OSheaE #abstraction #java
- An Investigation of Java Abstraction Usage for Program Modifications (PO, CE), pp. 65–74.
 SAS-2005-ChinNQR #memory management #object-oriented #source code #verification SAS-2005-ChinNQR #memory management #object-oriented #source code #verification
- Memory Usage Verification for OO Programs (WNC, HHN, SQ, MCR), pp. 70–86.
 FM-2005-CacheraJPS #analysis #memory management FM-2005-CacheraJPS #analysis #memory management
- Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
 CHI-2005-BrushWTS #difference #metadata #social CHI-2005-BrushWTS #difference #metadata #social
- Assessing differential usage of usenet social accounting meta-data (AJBB, XW, TCT, MAS), pp. 889–898.
 ICEIS-v2-2005-KumarKDB #clustering #mining #using #web ICEIS-v2-2005-KumarKDB #clustering #mining #using #web
- Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
 PPDP-2005-JagadeesanM #approach #constraints #declarative #programming PPDP-2005-JagadeesanM #approach #constraints #declarative #programming
- Timed constraint programming: a declarative approach to usage control (RJ, WM, CP, VAS), pp. 164–175.
 PADL-2005-LopesC #memory management PADL-2005-LopesC #memory management
- Improving Memory Usage in the BEAM (RL, VSC), pp. 143–157.
 RE-2005-Simmons #design #development RE-2005-Simmons #design #development
- The Usage Model: A Structure for Richly Describing Product Usage during Design and Development (ES), pp. 403–410.
 SAC-2005-Casale #analysis #mining #network #performance #web SAC-2005-Casale #analysis #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
 AMOST-2005-Sayre #automation #c++ #modelling #testing AMOST-2005-Sayre #automation #c++ #modelling #testing
- Usage model-based automated testing of C++ templates (KS).
 ICEIS-v2-2004-HuysmansMVB #mining #web ICEIS-v2-2004-HuysmansMVB #mining #web
- Web Usage Mining with Time Constrained Association Rules (JH, CM, JV, BB), pp. 343–348.
 ICEIS-v4-2004-LimaEMFC #data mining #information management #mining #web ICEIS-v4-2004-LimaEMFC #data mining #information management #mining #web
- Archcollect Front-End: A Web Usage Data Mining Knowledge Acquisition Mechanism Focused on Static or Dynamic Contenting Applications (JdCL, AAAE, JGdM, BF, TGdSC), pp. 258–262.
 ICEIS-v5-2004-SalcedoY #learning #library #metadata ICEIS-v5-2004-SalcedoY #learning #library #metadata
- Supporting Course Sequencing in a Digital Library: Usage of Dynamic Metadata for Learning Objects (RMS, YY), pp. 319–324.
 KDD-2004-JinZM #analysis #mining #probability #semantics #web KDD-2004-JinZM #analysis #mining #probability #semantics #web
- Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
 KDD-2004-ShavlikS #detection #effectiveness #evaluation KDD-2004-ShavlikS #detection #effectiveness #evaluation
- Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage (JWS, MS), pp. 276–285.
 SIGIR-2004-AzmanO #clustering SIGIR-2004-AzmanO #clustering
- Discovery of aggregate usage profiles based on clustering information needs (AA, IO), pp. 470–471.
 SAC-2004-SheldonJ #embedded #reliability SAC-2004-SheldonJ #embedded #reliability
- Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems (FTS, KJ), pp. 826–833.
 LCTES-2004-ScholzHK #optimisation LCTES-2004-ScholzHK #optimisation
- Optimizing for space and time usage with speculative partial redundancy elimination (BS, RNH, JK), pp. 221–230.
 HT-2003-KarousosTP #approach #developer #hypermedia HT-2003-KarousosTP #approach #developer #hypermedia
- Increasing the usage of open hypermedia systems: a developer-side approach (NK, MT, IP), pp. 148–149.
 ICSM-2003-ObbinkA #architecture #towards ICSM-2003-ObbinkA #architecture #towards
- Towards Evergreen Architectures: On the usage of scenarios in system architecting (JHO, PA), p. 298–?.
 ICEIS-v2-2003-WangRLC #mining #online #realtime #recommendation #web ICEIS-v2-2003-WangRLC #mining #online #realtime #recommendation #web
- Mining Web Usage Data for Real-Time Online Recommendation (MW, SJR, SYL, JKYC), pp. 575–578.
 POPL-2003-HofmannJ #first-order #functional #predict #source code POPL-2003-HofmannJ #first-order #functional #predict #source code
- Static prediction of heap space usage for first-order functional programs (MH, SJ), pp. 185–197.
 ICSE-2003-ConstantineL #agile #approach #re-engineering #usability #user interface ICSE-2003-ConstantineL #agile #approach #re-engineering #usability #user interface
- Usage-Centered Software Engineering: An Agile Approach to Integrating Users, User Interfaces, and Usability into Software Engineering Practice (LLC, LADL), pp. 746–747.
 ASE-2002-MaccariRM #automation #on the ASE-2002-MaccariRM #automation #on the
- On CASE Tool Usage at Nokia (AM, CR, FM), pp. 59–68.
 CAiSE-2002-PaikBH #adaptation CAiSE-2002-PaikBH #adaptation
- Usage-Centric Adaptation of Dynamic E-Catalogs (HYP, BB, RH), pp. 344–360.
 CIKM-2002-HuangCA #comparison #learning #web CIKM-2002-HuangCA #comparison #learning #web
- Comparison of interestingness functions for learning web usage patterns (XH, NC, AA), pp. 617–620.
 KDD-2002-El-RamlySS #approach #behaviour #mining #runtime KDD-2002-El-RamlySS #approach #behaviour #mining #runtime
- From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
 SEKE-2002-FarinaFO #automaton #modelling #network #probability #representation SEKE-2002-FarinaFO #automaton #modelling #network #probability #representation
- Representing software usage models with stochastic automata networks (AGF, PF, FMO), pp. 401–407.
 POPL-2002-Boehm #bound #garbage collection POPL-2002-Boehm #bound #garbage collection
- Bounding space usage of conservative garbage collectors (HJB), pp. 93–100.
 POPL-2002-IgarashiK #analysis #resource management POPL-2002-IgarashiK #analysis #resource management
- Resource usage analysis (AI, NK), pp. 331–342.
 SAC-2001-ChenLCC #multi #parametricity #performance SAC-2001-ChenLCC #multi #parametricity #performance
- The sustainable-cell-rate usage parameter control with adjustable window for high-speed multimedia communications (SyC, LFL, CSC, CJC), pp. 467–471.
 HPCA-2001-GoemanVB #difference #performance #predict HPCA-2001-GoemanVB #difference #performance #predict
- Differential FCM: Increasing Value Prediction Accuracy by Improving Table Usage Efficiency (BG, HV, KDB), pp. 207–216.
 HPDC-2001-HumphreyT #grid #security HPDC-2001-HumphreyT #grid #security
- Security Implications of Typical Grid Computing Usage Scenarios (MH, MRT), pp. 95–103.
 DAC-2000-GebotysGW #architecture #power management DAC-2000-GebotysGW #architecture #power management
- Power minimization derived from architectural-usage of VLIW processors (CHG, RJG, SW), pp. 308–311.
 IFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system IFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system
- A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
 CHI-2000-ChiPP #predict #usability #web CHI-2000-ChiPP #predict #usability #web
- The scent of a site: a system for analyzing and predicting information scent, usage, and usability of a Web site (EHhC, PP, JEP), pp. 161–168.
 AdaEurope-2000-Pflug #ada #question AdaEurope-2000-Pflug #ada #question
- Ada after 10 Years of Usage — Is There a Commercial Future? (BP), p. 4.
 ICEIS-2000-KalininNSP #network #process ICEIS-2000-KalininNSP #network #process
- Usage of Instrument of Neural Networks in Control of Complex Chemical-Technological Processes (AK, LN, ES, SP), pp. 521–524.
 ICEIS-2000-ThomasASC #enterprise ICEIS-2000-ThomasASC #enterprise
- Evaluatin IT Usage in Small and Medium Sized Enterprises (DTT, AA, HS, DJC), pp. 355–362.
 PPDP-2000-BakewellR #lazy evaluation PPDP-2000-BakewellR #lazy evaluation
- A model for comparing the space usage of lazy evaluators (AB, CR), pp. 151–162.
 SAC-2000-NeumannZ #composition #towards SAC-2000-NeumannZ #composition #towards
- Towards the Usage of Dynamic Object Aggregations as a Foundation for Composition (GN, UZ), pp. 818–820.
 ASE-1999-LiuR #component #specification #towards #verification ASE-1999-LiuR #component #specification #towards #verification
- Towards Discovery, Specification, and Verification of Component Usage (CL, DJR), pp. 331–334.
 CSMR-1999-JonesHKA #modelling #quality CSMR-1999-JonesHKA #modelling #quality
- Application of a Usage Profile in Software Quality Models (WDJ, JPH, TMK, EBA), pp. 148–159.
 CSMR-1999-KrikhaarPZ #resource management CSMR-1999-KrikhaarPZ #resource management
- Employing Use-cases and Domain Knowledge for Comprehending Resource Usage (RLK, MP, JZ), pp. 14–21.
 CHI-1999-OmoiguiHGGS #named CHI-1999-OmoiguiHGGS #named
- Time-Compression: Systems Concerns, Usage, and Benefits (NO, LH, AG, JG, ES), pp. 136–143.
 HCI-EI-1999-ColtekinVK HCI-EI-1999-ColtekinVK
- Consequences of Computer Breakdowns on Time Usage (AÇ, MV, IMK), pp. 1078–1082.
 HCI-EI-1999-NikovP #adaptation #modelling HCI-EI-1999-NikovP #adaptation #modelling
- Combining User and Usage Modelling for User-Adaptivity Systems (AN, WP), pp. 336–340.
 CAiSE-1999-VassiliadisBQ #evolution #towards CAiSE-1999-VassiliadisBQ #evolution #towards
- Towards Quality-Oriented Data Warehouse Usage and Evolution (PV, MB, CQ), pp. 164–179.
 TOOLS-EUROPE-1999-Waldron #bytecode #java #object-oriented #source code TOOLS-EUROPE-1999-Waldron #bytecode #java #object-oriented #source code
- Dynamic Bytecode Usage by Object Oriented Java Programs (JW), pp. 384–395.
 SOSP-1999-Vogels #file system SOSP-1999-Vogels #file system
- File system usage in Windows NT 4.0 (WV), pp. 93–109.
 SIGMOD-1998-Whelan #database #documentation SIGMOD-1998-Whelan #database #documentation
- FileNet Integrated Document Management Database Usage and Issues (DSW), p. 533.
 SIGAda-1998-Frisberg #ada SIGAda-1998-Frisberg #ada
- Usage of Ada in the Gripen Flight Control System (BF), pp. 140–141.
 ICRE-1998-WeidenhauptPJH #development ICRE-1998-WeidenhauptPJH #development
- Scenario Usage in System Development: A Report on Current Practice (KW, KP, MJ, PH), p. 222–?.
 ICSE-1998-HilbertR #approach #internet #scalability ICSE-1998-HilbertR #approach #internet #scalability
- An Approach to Large-Scale Collection of Application Usage Data Over the Internet (DMH, DFR), pp. 136–145.
 ICSM-1997-HeSRC #black box #maintenance #testing ICSM-1997-HeSRC #black box #maintenance #testing
- Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing (ZH, GS, MR, IC), pp. 142–149.
 CHI-1997-BhavnaniJ #analysis #performance CHI-1997-BhavnaniJ #analysis #performance
- From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
 CHI-1997-KieslerKLSM #internet #usability CHI-1997-KieslerKLSM #internet #usability
- Usability, Help Desk Calls, and Residential Internet Usage (SBK, REK, VL, WLS, TM), pp. 536–537.
 HCI-CC-1997-Seppala #case study #experience #information management HCI-CC-1997-Seppala #case study #experience #information management
- Usage of an Integrated Office Information System: Experiences from a Municipal Organization (PKS), pp. 801–804.
 TRI-Ada-1997-Celier #ada TRI-Ada-1997-Celier #ada
- Managing Usage of Dynamic Structures with Ada Controlled Objects (VC), pp. 165–170.
 CAV-1997-KamhiWF #automation #performance CAV-1997-KamhiWF #automation #performance
- Automatic Datapath Extraction for Efficient Usage of HDD (GK, OW, LF), pp. 95–106.
 CHI-1996-HarrisonV #evaluation CHI-1996-HarrisonV #evaluation
- An Experimental Evaluation of Transparent Menu Usage (BLH, KJV), pp. 391–398.
 SEKE-1996-LiaoCSC #object-oriented #source code #specification #testing SEKE-1996-LiaoCSC #object-oriented #source code #specification #testing
- Testing Object-Oriented Programs Based on Usage Profiles and Formal Specifications (SSL, KHC, SBS, CYC), pp. 9–16.
 WSA-1993-WrightB #analysis #reduction WSA-1993-WrightB #analysis #reduction
- Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
 FME-1993-CraigenGR #formal method #industrial FME-1993-CraigenGR #formal method #industrial
- Formal Methods Reality Check: Industrial Usage (DC, SLG, TR), pp. 250–267.
 HCI-SHI-1993-Caldwell93a #feedback #social HCI-SHI-1993-Caldwell93a #feedback #social
- Social Implications of Feedback and Delay Characteristics in Electronic Communications Usage (BSC), pp. 843–848.
 ICRE-1993-GornyVQD #prototype #user interface ICRE-1993-GornyVQD #prototype #user interface
- Slow and Principled Prototyping of Usage Surfaces: A Mehtd For User Interface Engineering (PG, AV, LQ, UD), pp. 125–133.
 CHI-1990-YoungW #analysis #concept #fault #predict #using CHI-1990-YoungW #analysis #concept #fault #predict #using
- Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
 ASPLOS-1989-AdamsZ #analysis #set #source code ASPLOS-1989-AdamsZ #analysis #set #source code
- An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
 PLDI-1988-Chow PLDI-1988-Chow
- Minimizing Register Usage Penalty at Procedure Calls (FCC), pp. 85–94.
 ASPLOS-1982-Wiecek #case study #compilation #execution #set ASPLOS-1982-Wiecek #case study #compilation #execution #set
- A Case Study of VAX-11 Instruction Set Usage for Compiler Execution (CAW), pp. 177–184.
 VLDB-1979-OrenA #concept #database #design #logic #statistics VLDB-1979-OrenA #concept #database #design #logic #statistics
- Statistice for the Usage of a Conceptual Data Model as a Basis for Logical Data Base Design (OO, FA), pp. 140–145.