BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
model (1528)
system (1181)
base (1142)
analysi (842)
softwar (669)

Stem use$ (all stems)

12257 papers:

CBSECBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented #using
Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSAECSA-2015-AgrawalP #adaptation #framework #towards #using #web
Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSAECSA-2015-GalsterA #agile #architecture #comprehension #development
Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSAECSA-2015-HansenM #automation #community #composition #detection #using
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSAECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech #using
Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
ECSAECSA-2015-WangC #architecture #network #performance #social
A Specialised Social Network Software Architecture for Efficient Household Water Use Management (ZW, AC), pp. 146–153.
QoSAQoSA-2015-HofigZS #automation #dependence #using
Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
CASECASE-2015-AmriBARF #multi #robust #using
Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASECASE-2015-ArdakaniORJ #generative #predict #realtime #using
Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASECASE-2015-BergagardF #automation #on the #using
On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASECASE-2015-CarliDEAV #automation #evaluation #using
Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASECASE-2015-CarliDPR #energy #multi #optimisation #performance #using
Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChengHL #automation #petri net #robust #synthesis #using
Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASECASE-2015-ChenH #assembly #automation #distributed #petri net #using
Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASECASE-2015-DobslawGZ #challenge #industrial #network
Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASECASE-2015-FarhanPWL #algorithm #machine learning #predict #using
Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism #using
A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASECASE-2015-FerreiraBGV #framework #using
Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASECASE-2015-ForstnerM #optimisation #safety #using
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASECASE-2015-GiulianiC #optimisation #problem
Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASECASE-2015-JiaJCS #locality #named #using
SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASECASE-2015-KaipaTSKLG #automation #using
Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASECASE-2015-KeroglouH #communication #constraints #distributed #using
Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASECASE-2015-KimCLJ #design #estimation #using
Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASECASE-2015-KreutzerRREL #automation #detection #metric #using
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-LeeKK #online #parametricity #using
Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASECASE-2015-LiangSQLY #agile #assessment #development #using
Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASECASE-2015-LinZW #predict #realtime #using
Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASECASE-2015-LiuC #algorithm #evaluation #performance #quality #using
A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASECASE-2015-McKinleyGSKMNLP #single use
A single-use haptic palpation probe for locating subcutaneous blood vessels in robot-assisted minimally invasive surgery (SM, AG, SS, RK, AM, KAN, SL, SP, PA, AMO, KG), pp. 1151–1158.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-MillerM #locality #using
Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASECASE-2015-ParisACAR #behaviour #learning #markov #smarttech #using
Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASECASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming #using
Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASECASE-2015-QuangTH #adaptation #using
FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASECASE-2015-RoyelYLLH #identification #optimisation #parametricity #using
A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASECASE-2015-SaksenaNKK #2d #assembly #automation #parametricity #using
Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASECASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling #using
Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASECASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network #using
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASECASE-2015-TorresP #multi #using
Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASECASE-2015-WahrburgMCMD #estimation #using
Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASECASE-2015-WareS #synthesis #using
Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASECASE-2015-Yen #realtime #using
Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASECASE-2015-ZafarKSMJA #health #monitoring #process #using
Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASECASE-2015-ZhangTYL #assessment #markov #reliability #using
CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASECASE-2015-ZhuCS #energy #linear #process #recognition #using
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASECASE-2015-ZonEHJVSB #detection #multi #realtime #using
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
DACDAC-2015-AsadJ #programming #using #verification
Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DACDAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #using #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-Engblom #integration #using
Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DACDAC-2015-HanKL #design #evaluation #using
Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DACDAC-2015-HelalBH #parallel #simulation #using
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-HerdtLD #simulation #using #verification
Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DACDAC-2015-LahiouelZT #smt #towards #using
Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based #using
Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DACDAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis #using
Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DACDAC-2015-TashjianD #identification #on the #using
On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DACDAC-2015-TsaiYPLTCC #design #energy #in memory #memory management #using
Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DACDAC-2015-XuLP #adaptation #modelling #physics #statistics #using
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DACDAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation #using
An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATEDATE-2015-AhsanK #architecture #optimisation #quantum #using
Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATEDATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BarraganL #case study #feature model #using
Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATEDATE-2015-BillointSRVBFRC #2d #3d #design #using
A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATEDATE-2015-CakirM #clustering #correlation #detection #hardware #using
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-ChangD #analysis #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics #using
Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATEDATE-2015-CuiZSW #towards #using
Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATEDATE-2015-DarkeCVSM #approximate #bound #model checking #using
Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATEDATE-2015-ErolOSPB #metric #using
On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATEDATE-2015-FernandoWNKC #agile #algorithm #design #synthesis #using
(AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATEDATE-2015-HashemianSWWCP #array #authentication #robust #using
A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATEDATE-2015-HerberRWH #realtime #scheduling #using
Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATEDATE-2015-JiRML #hardware #implementation #logic #network #probability #using
A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATEDATE-2015-KauerNLSC #geometry #optimisation #programming #using
Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATEDATE-2015-LiaperdosSATAL #deployment #performance #using
Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATEDATE-2015-LiJHWCGLKW #design #optimisation #using
Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATEDATE-2015-LiXWNP #fine-grained #multi #power management #reduction #using
Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATEDATE-2015-LourencoMH #using
Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATEDATE-2015-MadhukarSWKM #abstraction #lazy evaluation #using #verification
Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATEDATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability #using
MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATEDATE-2015-PaulinoFBC #configuration management #execution #hardware #using
Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATEDATE-2015-RanjanRVPRR #configuration management #memory management #named #using
DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATEDATE-2015-SaifhashemiHBB #equivalence #logic #tool support #using
Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATEDATE-2015-SalfelderH #adaptation #evaluation #simulation #using
Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATEDATE-2015-ShutoYS #architecture #case study #comparative #using
Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATEDATE-2015-StrobelBOSP #named #using
Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATEDATE-2015-SunKPE #algebra #geometry #using #verification
Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATEDATE-2015-TangXLLCWY #network #question
Spiking neural network with RRAM: can we use it for real-world application? (TT, LX, BL, RL, YC, YW, HY), pp. 860–865.
DATEDATE-2015-TanLF #memory management #reliability #using
Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATEDATE-2015-TeysseyreNOCCG #performance #set #simulation #using
Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATEDATE-2015-TouatiBDGVBR #functional #power management #source code #testing
Exploring the impact of functional test programs re-used for power-aware testing (AT, AB, LD, PG, AV, PB, MSR), pp. 1277–1280.
DATEDATE-2015-VenkataramanKSE #design #heuristic #using
Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATEDATE-2015-WengCCHW #using
Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATEDATE-2015-YuSHEAB #library #multi #statistics #using
Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATEDATE-2015-ZhuM #linear #machine learning #optimisation #programming #using
Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
DocEngDocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary #using
Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEngDocEng-2015-LesnikovaDE #rdf #using
Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRRDRR-2015-BideaultMCP #architecture #regular expression #using #word
Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRRDRR-2015-MehriSHGAM #documentation #image #segmentation
Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRRDRR-2015-PengCN #approach #using
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRRDRR-2015-RabaevCEK #documentation #programming #using
Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRRDRR-2015-SitaramHPSK #recognition #using #word
Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRRDRR-2015-StalnakerZ #retrieval #using
Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HTHT-2015-BlountMW #logic #social #web
An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
PODSPODS-2015-CateCST #ontology #using
High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMODSIGMOD-2015-BarthelsLAK #in memory #using
Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMODSIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media #using
DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMODSIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability #using
Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMODSIGMOD-2015-TuR #named #query #using
DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMODSIGMOD-2015-UpadhyayaBS #automation #policy
Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
SIGMODSIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel #using
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-XiaoBME #metadata #summary #using
Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMODSIGMOD-2015-YanZHSMZM #detection #distributed #using
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMODSIGMOD-2015-ZhangCPSX #graph #statistics #using
Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDBVLDB-2015-DeutchGM #datalog #query #source code #using
Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDBVLDB-2015-HeCMPS #named #synthesis #using
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDBVLDB-2015-HeGC #corpus #named #semantics #using
SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDBVLDB-2015-LazersonSKSGS #distributed #monitoring #using
Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDBVLDB-2015-ParkMS #pipes and filters #probability #query #using
Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDBVLDB-2015-ShinWWSZR #incremental #knowledge base #using
Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEETCSEET-2015-SedanoP #experience #student #using
Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
ITiCSEITiCSE-2015-Dickson #development #education #game studies #using
Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSEITiCSE-2015-Harms15a #java #using
Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSEITiCSE-2015-KirkpatrickP #assurance #operating system #process #using
Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSEITiCSE-2015-MishraI #data type #student
Question-Posing strategies used by students for exploring Data Structures (SM, SI), pp. 171–176.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-TarmazdiVSFF #learning #using #visualisation
Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSEITiCSE-2015-WangMSLCW #data access #education #named #using #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
FASEFASE-2015-AndriescuMI #automaton #data type #using
Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
TACASTACAS-2015-BransenBCD #attribute grammar #order #scheduling #using
Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-KriouileS #formal method #using #verification
Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACASTACAS-2015-Thierry-Mieg #model checking #using
Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
ICPCICPC-2015-CosmaM #component #comprehension #using #visual notation #web
Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPCICPC-2015-Escobar-AvilaVH #bytecode #categorisation #using
Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPCICPC-2015-HillSP #evaluation #feature model
Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how #using
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework #using
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MacLeodSB #developer #documentation #how #using
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-MartinCAA #analysis #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaiedABS #api #library #question #source code #using
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-CorleyDK #feature model #learning
Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSMEICSME-2015-DongAS #fault #static analysis #using
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface #using
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-HardtM #empirical #evaluation #maintenance #using
An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSMEICSME-2015-MedicherlaKN #specification #using #verification
Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification #using
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-BosuGB #code review #empirical
Characteristics of Useful Code Reviews: An Empirical Study at Microsoft (AB, MG, CB), pp. 146–156.
MSRMSR-2015-DonadelliZR #case study #fault #replication #using
Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSRMSR-2015-WangPWG #comprehension #git #what
What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSRMSR-2015-ZanjaniKB #developer #using
Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-BezemerPG #comprehension #difference #graph #performance #using
Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANERSANER-2015-CabotICR #open source
Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANERSANER-2015-HuSLL #development #evolution #modelling #topic #using
Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-NayrollesHTL #approach #debugging #model checking #named #using
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-QiuSM #graph #identification #library #morphism #using
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAMSCAM-2015-BonifacioCRKC #c++ #exception
The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAMSCAM-2015-ChochlovEB #data flow #feature model #using
Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-PanditaJSW #api #mining #using
Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-RenatusBE #modelling #security #using
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
PLDIPLDI-2015-BarowyGHZ #named #relational #spreadsheet #using
FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDIPLDI-2015-CraryS #peer-to-peer #using
Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDIPLDI-2015-GonnordMR #ranking #synthesis #using
Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
SASSAS-2015-AdjeGM #generative #invariant #optimisation #polynomial #using
Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
STOCSTOC-2015-AggarwalDRS #problem #using
Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOCSTOC-2015-Czumaj #network #permutation #random #using
Random Permutations using Switching Networks (AC), pp. 703–712.
ICALPICALP-v1-2015-KhotS #approximate #using
Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FMFM-2015-0001K #bound #model checking #using
Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FMFM-2015-AlTurkiA #distributed #framework #towards #using #verification #𝕂
Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-MirandaMR #automation #design #generative #testing #using #verification
Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FMFM-2015-Nakajima #behaviour #energy #maude #realtime #using
Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
SEFMSEFM-2015-JonesY #abstraction #reasoning #using
Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFMSEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing #using
Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFMSEFM-2015-SavaryFLL #modelling #robust #testing #using
Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFPICFP-2015-Russo #functional #haskell
Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance #using
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #policy
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGTICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination #using
Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-WeberDP #formal method #graph transformation #monitoring #using
Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHICHI-2015-AsenieroWLRTC #named #release planning #using #visualisation
STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHICHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation #using
Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHICHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer #using
A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHICHI-2015-BentleyC #composition #mobile
The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHICHI-2015-DaltonCM #using
Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHICHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social #using
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-FleckCR #bound #multi #using
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-GaoYHF #automation #collaboration #game studies #how #multi
Improving Multilingual Collaboration by Displaying How Non-native Speakers Use Automated Transcripts and Bilingual Dictionaries (GG, NY, AMJH, SRF), pp. 3463–3472.
CHICHI-2015-GerlingML #game studies #video
Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHICHI-2015-Gilbert #abstraction
Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages (EG), pp. 477–486.
CHICHI-2015-GoelZVP #detection #flexibility #gesture #named #using
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-GrevetG #prototype #scalability #social #using
Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHICHI-2015-GunaratneN #behaviour #performance #user interface #using
Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHICHI-2015-HaqueNV #named #using
Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHICHI-2015-HiguchiCCZL #experience #named #using
ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHICHI-2015-HillmanW #approach #social #social media
Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHICHI-2015-HinikerSSSLK #how #mobile
Texting while Parenting: How Adults Use Mobile Phones while Caring for Children at the Playground (AH, KS, HS, YCS, CPL, JAK), pp. 727–736.
CHICHI-2015-HolzBK #identification #mobile #named #using
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHICHI-2015-HourcadeMWP #analysis #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HydeCKH #interactive #persuasion #using
Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHICHI-2015-JonesCDTPDH #delphi #information management #using
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-KatanGF #development #interactive #interface #machine learning #people #using
Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHICHI-2015-KjeldskovSPLMN
Eco-Forecasting for Domestic Electricity Use (JK, MBS, JP, DL, TM, MN), pp. 1985–1988.
CHICHI-2015-KosmallaDK #automation #metric #named #recognition #using
ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHICHI-2015-LeeLCWSK #education #interactive #online #social #using
Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHICHI-2015-LopesJB #communication
Affordance++: Allowing Objects to Communicate Dynamic Use (PL, PJ, PB), pp. 2515–2524.
CHICHI-2015-LugerURG #design #game studies #process #using
Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHICHI-2015-MaiorPSW #human-computer #reliability #using
Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHICHI-2015-MariakakisGAPW #mobile #named #using
SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHICHI-2015-ParkPN
The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHICHI-2015-PatelO
Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHICHI-2015-PfeifferDSAR #using
Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHICHI-2015-PierceP #design #multi
Making Multiple Uses of the Obscura 1C Digital Camera: Reflecting on the Design, Production, Packaging and Distribution of a Counterfunctional Device (JP, EP), pp. 2103–2112.
CHICHI-2015-PreistJ #education #game studies #motivation
The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHICHI-2015-RobbPKC #crowdsourcing #design #feedback #question
Crowdsourced Feedback With Imagery Rather Than Text: Would Designers Use It? (DAR, SP, BK, MJC), pp. 1355–1364.
CHICHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics #using
Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHICHI-2015-SlegersRVD #elicitation #game studies #research #user interface #using
Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHICHI-2015-TholanderN #experience #performance
Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHICHI-2015-VertanenMERK #mobile #named #performance #using
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHICHI-2015-WangGXZYB #interactive #named #privacy #using #visualisation
VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHICHI-2015-ZugerF #developer #predict #using
Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCWCSCW-2015-BakhshiKS #comprehension #online #question
Understanding Online Reviews: Funny, Cool or Useful? (SB, PK, DAS), pp. 1270–1276.
CSCWCSCW-2015-BossenG #collaboration #design #flexibility
Collaboration in-between: The Care Hotel and Designing for Flexible Use (CB, EG), pp. 1289–1301.
CSCWCSCW-2015-ChangHT #recommendation #using
Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCWCSCW-2015-FreitasD15a #detection #multi #using
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCWCSCW-2015-KaziunasBJCHA #health
Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCWCSCW-2015-KoYLHJLSYSC #named #self #smarttech
NUGU: A Group-based Intervention App for Improving Self-Regulation of Limiting Smartphone Use (MK, SY, JL, CH, JJ, UL, DS, KY, JS, KMC), pp. 1235–1245.
CSCWCSCW-2015-LiuIP #comprehension #how #maintenance #quote
“I’m Not Like My Friends”: Understanding How Children with a Chronic Illness Use Technology to Maintain Normalcy (LSL, KMI, WP), pp. 1527–1539.
CSCWCSCW-2015-MaddockSASOM #behaviour #multi #online #using
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCWCSCW-2015-MatthewsMCMHB #community #what
They Said What?: Exploring the Relationship Between Language Use and Member Satisfaction in Communities (TM, JUM, JC, MM, EMH, HB), pp. 819–825.
CSCWCSCW-2015-ProstMT #design #energy #towards #using
From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCWCSCW-2015-WangNMRW #social #social media #student
Coming of Age (Digitally): An Ecological View of Social Media Use among College Students (YW, MN, GM, SMR, MW), pp. 571–582.
CSCWCSCW-2015-XuRDB #design #feedback #process #using
A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
HCIDHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition #using
Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
HCIDHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition #using
Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
HCIDHM-EH-2015-IkenoboMK
Usefulness of Ikebana a Nursing Care Environment (YI, YM, AK), pp. 441–447.
HCIDHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process #using
Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
HCIDHM-EH-2015-MeryS #modelling #requirements #using
Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
HCIDHM-EH-2015-NakamuraKKMK #development #self #student #using
Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhengBISEL #behaviour #monitoring #using
Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
HCIDHM-HM-2015-FurukawaTKG #evaluation #image #using
Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
HCIDHM-HM-2015-IkenoboWSG #difference #how
Differences in How Long an Ikebana Work Lasts Depending on the Skill Used in Cutting Floral Materials (YI, ZW, YS, AG), pp. 74–82.
HCIDUXU-DD-2015-AsthanaS #modelling #named #testing #usability #using #xml
Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
HCIDUXU-DD-2015-MichailidouHL #how
How to Evaluate Use Scenarios and Stories (IM, CH, UL), pp. 609–620.
HCIDUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media
Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
HCIDUXU-IXD-2015-DasBRD #co-evolution #design #generative
The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
HCIDUXU-IXD-2015-HalbeyKZ
Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-SchwartzK #challenge #design
The Challenges and Opportunities of Designing National Digital Services for Cross-Border Use (MS, HK), pp. 104–115.
HCIDUXU-UI-2015-AyanogluBTD #artificial reality #case study #using
Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
HCIDUXU-UI-2015-DuWDXJ #case study #metric #using
Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
HCIDUXU-UI-2015-EshetB #design #development #mobile
Approaching Users and Context of Use in the Design and Development of Mobile Systems (EE, HB), pp. 508–519.
HCIDUXU-UI-2015-LiHF #quality #requirements #scalability #user interface #using
Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCIHCI-DE-2015-Hensely-Schinkinger #design
The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCIHCI-DE-2015-Kurosu #quality #usability
Usability, Quality in Use and the Model of Quality Characteristics (MK), pp. 227–237.
HCIHCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #using #visualisation
Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCIHCI-DE-2015-SantosST #interactive #open source #using #visualisation
Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCIHCI-DE-2015-SchutzSO #using
Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCIHCI-DE-2015-SugiuraSO #implementation #metric #security #using
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCIHCI-DE-2015-WatsonS #assessment #using
Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCIHCI-IT-2015-BandeiraCXK #gesture #interface #using
Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCIHCI-IT-2015-FukumotoTE #detection #using
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-IT-2015-GuXCZ #using
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HakodaKSST #bound #gesture #mobile #named #using
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCIHCI-IT-2015-KondoTT #communication #smarttech #using
Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCIHCI-IT-2015-KuribaraST #using
Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCIHCI-IT-2015-MullerLBSKSW #bibliography #data-driven #network #predict #using
Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCIHCI-IT-2015-MurataM #analysis #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-Nagaraju #framework #gesture #using
Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCIHCI-UC-2015-AzhariF #approach #experience #social #social media #user interface #using
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-ClarkeBK #experience #question #using #what
What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCIHCI-UC-2015-OhJK #approach #human-computer #simulation #using
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHCI-UC-2015-SpeiginerMBRLLB #artificial reality #evolution #framework #web
The Evolution of the Argon Web Framework Through Its Use Creating Cultural Heritage and Community-Based Augmented Reality Applications (GS, BM, JDB, HR, AJL, LML, LDB, MG, MS, BD, ME, RJC, EDM), pp. 112–124.
HCIHCI-UC-2015-Ujita #analysis #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-FilhoHTJM #smarttech #using
Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-ItaiM #development #interactive #using
Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HCIHIMI-IKC-2015-KajitaTMI #3d #design #using
Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-MayerBPGV #automation #generative #process #using #visualisation
Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HCIHIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation #using
A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking #using
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-TogawaK #collaboration #framework #using
Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HCIHIMI-IKC-2015-UeokaK #interactive #using
Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HCIHIMI-IKC-2015-UjitokoH #interface #using
Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HCIHIMI-IKD-2015-AraiOM #using #web
A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HCIHIMI-IKD-2015-ChouSW #case study #quality #using
Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HCIHIMI-IKD-2015-ItouNM #information management #twitter #using
Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HCIHIMI-IKD-2015-IwamotoH #induction #using
Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HCIHIMI-IKD-2015-JungLB #multi #question
Voice Control System and Multiplatform Use: Specialist Vs. Generalist? (SJ, KML, FB), pp. 607–616.
HCIHIMI-IKD-2015-KalkattawiN #ubiquitous #using
Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HCIHIMI-IKD-2015-KastratiIY #classification #documentation #framework #using
A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HCIHIMI-IKD-2015-KotaniIAS #interface #using #variability
Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HCIHIMI-IKD-2015-MatsunoAIMM #using
Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HCIHIMI-IKD-2015-MorizumiA #analysis #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HCIHIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour #using
Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HCIHIMI-IKD-2015-WinterSTMCSVS #learning #question #student
Learning to Manage NextGen Environments: Do Student Controllers Prefer to Use Datalink or Voice? (AW, JS, YT, AM, SC, KS, KPLV, TZS), pp. 661–667.
HCIHIMI-IKD-2015-YoshinoO #using
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
HCILCT-2015-BoonbrahmKB #artificial reality #learning #student #using
Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
HCILCT-2015-DalipiYK #analysis #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCILCT-2015-HiramatsuIISS #case study #communication #mobile #using
A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
HCILCT-2015-IbanezN #design #implementation #multi #using
Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
HCILCT-2015-PyperLWJ #mobile #personalisation
The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
HCILCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous #using
Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
HCILCT-2015-SebilloTVPG #artificial reality #interface
The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
HCILCT-2015-Sein-EchaluceBG #education #information management #social #using
A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
HCISCSM-2015-BeldadK #facebook #risk management
It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
HCISCSM-2015-HongK #interactive #online #social #social media
Are Social Media Useful for Managing Reputation Online?: Comparing User Interactions Online with Reputation Indicators (JYJH, JHK), pp. 207–215.
HCISCSM-2015-KastratiIYD #analysis #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-ManssourSSFS #image #network #social #using #visualisation
Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
CAiSECAiSE-2015-Francescomarino #using #workflow
Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSECAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEISICEIS-v1-2015-BorgesDRAS #approach #generative #using
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-BouakkazLO #distance #named #similarity #using
GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-Marques-LucenaA #framework #information management #using
Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEISICEIS-v1-2015-MpindaMSR #database #graph #simulation #using
Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEISICEIS-v1-2015-RezendeJ #concurrent #process #using #workflow
Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEISICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation #using
Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEISICEIS-v1-2015-SarmentoCG #network #streaming #using
Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEISICEIS-v1-2015-VaroneA #multi #using
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v2-2015-AizebojeP #approach #pointer #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process #using
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEISICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #using #web
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEISICEIS-v2-2015-KamalKVB #performance
Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEISICEIS-v2-2015-MagnavitaNM #evolution #using
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEISICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEISICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #using #visualisation
VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEISICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml #using
Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing #using
Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-NyameB #information management
The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEISICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process #using
BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEISICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling #using
An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
ICEISICEIS-v3-2015-ValentimCM #analysis #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-ChongDL #modelling #predict #topic #using
Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIRECIR-2015-Dutta #approximate #mining #named #statistics #string #using
MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIRECIR-2015-GogMP #identification #on the #statistics #using
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIRECIR-2015-HagenPBS #classification #detection #sentiment #twitter #using
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-JameelLB #modelling #parametricity #topic #using
Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIRECIR-2015-LiC #effectiveness #using
Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIRECIR-2015-LimCLK #community #constraints #detection #using
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-LuoZDY #design #using
Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIRECIR-2015-MaddalenaMST #estimation #using
Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICMLICML-2015-AvronH #community #detection #personalisation #rank #using
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #detection #semantics #using
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-LeC #learning #metric #using
Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICMLICML-2015-SnoekRSKSSPPA #network #optimisation #scalability #using
Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICMLICML-2015-Sohl-DicksteinW #learning #using
Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICMLICML-2015-SrivastavaMS #learning #using #video
Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICMLICML-2015-SunQW #optimisation #taxonomy #using
Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank #using
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-ZhuE #approach #hybrid #probability #random #using
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-AhnKLRW #distributed #matrix #probability #scalability #using
Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDDKDD-2015-FuLPXGZZ #modelling #ranking
Real Estate Ranking via Mixed Land-use Latent Models (YF, GL, SP, HX, YG, HZ, CZ), pp. 299–308.
KDDKDD-2015-GleichM #algorithm #graph #learning #using
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-IkonomovskaJD #predict #realtime #using
Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDDKDD-2015-JohanssonD #geometry #graph #learning #similarity #using
Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDDKDD-2015-KotziasDFS #using
From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDDKDD-2015-MayaMMAY #clustering #using
Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDDKDD-2015-MomtazpourZRSR #cyber-physical #invariant #using
Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDDKDD-2015-Ojjeh #open source #realtime #using
Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDDKDD-2015-PengKLC #approximate #clustering #rank #using
Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDDKDD-2015-SethiYRVR #classification #machine learning #scalability #using
Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDDKDD-2015-ShanahanD #distributed #scalability #using
Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDDKDD-2015-SomanchiALEG #predict #using
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDDKDD-2015-WangYLXXCR #predict #using
Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDDKDD-2015-WeiLMCRS #predict #using
Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDDKDD-2015-YuanBM #process #re-engineering #using
Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDDKDD-2015-ZhengYX #composition #linear #modelling #topic #using
Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDMMLDM-2015-Babu #classification #identification #using
Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDMMLDM-2015-CostaFK #multi #using
Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDMMLDM-2015-GovadaJMS #approach #hybrid #induction #learning #using
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-MoldovanM #data mining #learning #mining #performance #using
Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDMMLDM-2015-PatchalaBG #email #using
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDMMLDM-2015-TreechalongRW #clustering #using
Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSysRecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation #using
Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSysRecSys-2015-AharonAADGS #named #recommendation
ExcUseMe: Asking Users to Help in Item Cold-Start Recommendations (MA, OA, NAE, DDC, SG, OS), pp. 83–90.
RecSysRecSys-2015-BanksRS #game studies #recommendation #using
The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSysRecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social #using
A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSysRecSys-2015-MagnusonDM #process #recommendation #twitter #using
Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
RecSysRecSys-2015-MarinhoTP #algorithm #question #recommendation
Are Real-World Place Recommender Algorithms Useful in Virtual World Environments? (LBM, CT, DP), pp. 245–248.
SEKESEKE-2015-CaoHH #design #evaluation #quality #using
Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKESEKE-2015-CavalcanteRC #experience #named #user interface
MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
SEKESEKE-2015-ChavezM #information retrieval #ontology #query #using
An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKESEKE-2015-DingZ #modelling #petri net #using
Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKESEKE-2015-GoswamiWS #learning #performance #using
Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKESEKE-2015-ManiPW #co-evolution #modelling #performance #using
Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based #using
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NetoSZD #network #using
Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards #using
Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKESEKE-2015-Tasse #analysis #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TrinkenreichSCS #metric #process #towards #using
Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKESEKE-2015-TunnellA #fault #modelling #predict #release planning #using
Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKESEKE-2015-WuCZX #c++ #developer #empirical #how #library
How do developers use C++ libraries? An empirical study (DW, LC, YZ, BX), pp. 260–265.
SEKESEKE-2015-XuB #multi #reliability #using
A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIRSIGIR-2015-AlbakourMO #data type #identification #metadata #topic #using
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial #using
Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIRSIGIR-2015-CapraACV #complexity #difference
Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIRSIGIR-2015-Kiseleva #behaviour #information management #using
Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIRSIGIR-2015-LiLZS #matrix #modelling #multi #retrieval #using
Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIRSIGIR-2015-LiuAH #information retrieval #probability #using
Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIRSIGIR-2015-Lu #statistics #using
Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIRSIGIR-2015-MehrotraY #learning #query #rank #using
Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIRSIGIR-2015-Mitra #distributed #query #using
Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIRSIGIR-2015-NovakBZ #image #retrieval #scalability #using
Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIRSIGIR-2015-ParkC #concept #retrieval #using
Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIRSIGIR-2015-WeiG #summary #twitter #using
Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIRSIGIR-2015-YaoSQWSH #recommendation #social #using
Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
ECMFAECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism #using
Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMTAMT-2015-HilkenBGV #development #modelling #using
Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
MoDELSMoDELS-2015-Fernandez-SaezC #bibliography #documentation #industrial #maintenance #on the #uml
On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELSMoDELS-2015-HajriGBS #approach #case study #embedded #industrial #lessons learnt #modelling #product line
Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELSMoDELS-2015-LuddeckeSSS #modelling #network #using
Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELSMoDELS-2015-NguyenGA #case study #requirements
Integrating goal-oriented and use case-based requirements engineering: The missing link (THN, JCG, MA), pp. 328–337.
MoDELSMoDELS-2015-RagoMD #case study #identification #semantics
Identifying duplicate functionality in textual use cases by aligning semantic actions (SoSyM abstract) (AR, CM, JADP), p. 446.
MoDELSMoDELS-2015-SongLASDC #architecture #formal method #probability #using #verification
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract) (SS, YL, MA, JS, JSD, TC), p. 449.
MoDELSMoDELS-2015-StephanC #clone detection #detection #identification #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
MoDELSMoDELS-2015-ValentimROCM #case study #empirical #specification #usability
A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques (NMCV, JR, ACO, TC, SM), pp. 206–215.
OnwardOnward-2015-CitoLGDKR #developer #feedback #metric #runtime #using
Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLAOOPSLA-2015-MastrangeloPMLH #api #java
Use at your own risk: the Java unsafe API in the wild (LM, LP, AM, ML, MH, NN), pp. 695–710.
OOPSLAOOPSLA-2015-VoelterDKE #c #case study #embedded #using
Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
GPCEGPCE-2015-InostrozaS #algebra #composition #using
Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCEGPCE-2015-SeidlSS #design pattern #development #generative #product line #using #variability
Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
PPDPPPDP-2015-RondogiannisT #logic programming #using
Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
PADLPADL-2015-BassedaK #logic #transaction #using
State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
POPLPOPL-2015-BastaniAA #context-free grammar #reachability #specification #using
Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
SACSAC-2015-BolockA #automation #constraints #generative #towards #using
Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SACSAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-ByunC #automation #constraints #operating system #safety #testing #using
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SACSAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social #using
Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SACSAC-2015-ChaudhuriMG #network #predict #using
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SACSAC-2015-CorcoglionitiRM #rdf #sorting #streaming #using
Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SACSAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SACSAC-2015-DabainMT #design pattern #detection #using
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-DarabiG #personalisation #summary #using #video
Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SACSAC-2015-DasK #using
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SACSAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring #using
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-HamataniUH #smarttech #using
Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-HublerRFS #data flow #named #using
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SACSAC-2015-JeongYAYP #algorithm #interactive #network #search-based #using
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SACSAC-2015-Jo #algorithm #image #interactive #search-based #using
Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SACSAC-2015-JuniorL #case study #named #reuse #specification
M-4REuse: reusing use cases specifications (MMCJ, ML), pp. 1390–1396.
SACSAC-2015-KaplanisKSMT
HB+tree: use hadoop and HBase even your data isn’t that big (AK, MK, SS, CM, GT), pp. 973–980.
SACSAC-2015-KimK #scalability #using
Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SACSAC-2015-KimL #diagrams #qvt #sequence chart #using
Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LeTN #requirements #using #verification
Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SACSAC-2015-LiuI #clustering #framework #optimisation #parallel #using
An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SACSAC-2015-MainiS #communication #distributed #multi #using
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SACSAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SACSAC-2015-MottaMSMPC #3d #image #re-engineering
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
SACSAC-2015-OliveiraQMM #community #complexity #detection #using
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-PintoMCS #process #using
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SACSAC-2015-Rekha #big data #detection #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance #using
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SACSAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-RodriguesJD #recommendation #using
Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SACSAC-2015-SilvaBAR #clustering #multi #prototype #using
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SACSAC-2015-SilvaMR #algorithm #approach #problem #using
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-SilvaSBVS #assessment #framework #process #using
Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SACSAC-2015-SioutisSC #composition #graph #on the #reasoning
On the use and effect of graph decomposition in qualitative spatial and temporal reasoning (MS, YS, JFC), pp. 1874–1879.
SACSAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability #using
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SACSAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SACSAC-2015-XuanLXT #empirical #fault #metric #predict #set #using
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SACSAC-2015-XuYYHHK #multi #predict #using
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
ESEC-FSEESEC-FSE-2015-HammoudiBBR #debugging #on the #web
On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code #using
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-NguyenGA #case study #modelling #rule-based
Rule-based extraction of goal-use case models from text (THN, JCG, MA), pp. 591–601.
ESEC-FSEESEC-FSE-2015-NorthBSC #developer #named #using
GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSEESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation #using
MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSEESEC-FSE-2015-WangPGBI #automation #case study #named #specification #testing #tool support
UMTG: a toolset to automatically generate system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 942–945.
ESEC-FSEESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing #using
Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSEESEC-FSE-2015-XuKB #ubiquitous #using
Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-CasalnuovoDOFR #git
Assert Use in GitHub Projects (CC, PTD, AO, VF, BR), pp. 755–766.
ICSEICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing #using
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSEICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source #using
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSEICSE-v1-2015-MorenoBPOM #how #question
How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSEICSE-v1-2015-PetrosyanRM #api #classification #information management #using
Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSEICSE-v1-2015-YangXALXE #behaviour #mobile #named #using
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSEICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named #using
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSEICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval
The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSEICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #using #video
scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSEICSE-v2-2015-CamilloniVA #evaluation #re-engineering #using
Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSEICSE-v2-2015-Cornu #debugging #named #null #using
Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSEICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library #using
Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSEICSE-v2-2015-GveroK #interactive #query #synthesis #using
Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSEICSE-v2-2015-HerzigN #detection #empirical #using
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-LutellierCGTRMK #architecture #dependence #using
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering #using
Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SLESLE-2015-GammaitoniKG #design #using
Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLESLE-2015-OchoaRT #feature model #modelling #using
Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
SPLCSPLC-2015-BeekFGM #analysis #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeucheH #lifecycle #product line #using
Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLCSPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi #using
Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLCSPLC-2015-DimovskiABW #model checking #off the shelf #using
Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-DudderRH #composition #design #staged #type safety #using
Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLCSPLC-2015-PatelS #as a service #automation #testing #using #variability
Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
ASPLOSASPLOS-2015-OrrCYBHW #using
Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOSASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOSASPLOS-2015-TanQCAP #named #network #using
DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-StepanovS #c++ #detection #memory management #named #performance
MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
HPCAHPCA-2015-HungerKRDVT #comprehension #using
Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCAHPCA-2015-LoCIS #monitoring #runtime #using
Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCAHPCA-2015-WuGLJC #estimation #machine learning #performance #using
GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDCHPDC-2015-HeSSI #cost analysis #online #using
Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMMISMM-2015-OsterlundL #concurrent #protocol #using
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
LCTESLCTES-2015-BardizbanyanSWL #data access #performance #using
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PPoPPPPoPP-2015-RamachandranM #concurrent #named #performance #using
CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSPSOSP-2015-ChenZCCKZ #file system #hoare #logic #using
Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSPSOSP-2015-RaychevMM #execution #symbolic computation #using
Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSPSOSP-2015-WeiSCCC #in memory #performance #transaction #using
Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
CADECADE-2015-GransdenWR #automaton #named #proving #using
SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADECADE-2015-MaricJM #correctness #higher-order #proving #using
Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADECADE-2015-Paulson #automaton #finite #formal method #set #using
A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADECADE-2015-TiwariGD #synthesis #using
Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAVCAV-2015-BacchusK #satisfiability #set #using
Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAVCAV-2015-CernyCHRRST #scheduling #synthesis #using
From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAVCAV-2015-DeshmukhMP #consistency #metric #using
Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAVCAV-2015-ErezN #automation #bound #graph #smt #using
Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLPICLP-2015-Charwat #diagrams #programming #research #summary #using
Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC).
ICLPICLP-2015-LeeWZ #automation #programming #reasoning #set #using
Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ).
ICLPICLP-2015-LiVPSB #debugging #using
Debugging ASP using ILP (TL, MDV, JP, KS, TB).
ICLPICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code #using
Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLPICLP-J-2015-KoponenOJS #optimisation #programming #set #using
Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICSTICST-2015-0001YPGS #analysis #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-BaiSP #fault #named #using
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICSTICST-2015-Felbinger #assessment #model inference #quality #testing #using
Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICSTICST-2015-LeottaSRT #multi #robust #testing #using #web
Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICSTICST-2015-MahajanH #detection #html #locality #using
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-NoguchiWFSO #black box #optimisation #testing #using
History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICSTICST-2015-PouldingF #generative #testing
Re-Using Generators of Complex Test Data (SMP, RF), pp. 1–10.
ICSTICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml #using
Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICSTICST-2015-SantosC #agile #challenge #industrial #mobile #testing #using
Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICSTICST-2015-ZhangAC #exclamation #model checking #verification
Yes! You Can Use Your Model Checker to Verify OSEK/VDX Applications (HZ, TA, YC), pp. 1–10.
ISSTAISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based #using
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTAISSTA-2015-WangPGBI #automation #case study #generative #specification #testing
Automatic generation of system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 385–396.
ISSTAISSTA-2015-WangPO #fault #locality
Evaluating the usefulness of IR-based fault localization techniques (QW, CP, AO), pp. 1–11.
LICSLICS-2015-AccattoliC #on the
On the Relative Usefulness of Fireballs (BA, CSC), pp. 141–155.
RTARTA-2015-AvanziniST #certification #complexity #proving #using
Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
ICSTSAT-2015-AnsoteguiGLS #community #detection #using
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAPTAP-2015-AthanasiouLS #concurrent #generative #testing #using
Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAIVMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing #using
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAIVMCAI-2015-NagarS #analysis #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSECBSE-2014-BenedittoW #configuration management #runtime #using
Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSECBSE-2014-MateescuSY #model checking #parallel #process #using
Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #policy #using
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSAQoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance #using
Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSAQoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution #using
Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
ASEASE-2014-Borg #debugging #re-engineering #using
Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise #using
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-DeweyRH #constraints #fuzzing #logic programming #using
Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASEASE-2014-DingesA #execution #generative #using
Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASEASE-2014-HamidiAL #adaptation #using
Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASEASE-2014-LiuSLZWDW #automation #case study #detection #documentation #fault
Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASEASE-2014-LutzD #comparison #data flow #difference #interactive #programming #using #visual notation
Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASEASE-2014-MaezawaNWH #ajax #using #validation
Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASEASE-2014-MahajanH #comparison #html #image #using
Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASEASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing #using
MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASEASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring #using
Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASEASE-2014-OsterlundL #component #concurrent #using
Concurrent transformation components using contention context sensors (, WL), pp. 223–234.
ASEASE-2014-RajanSSK #execution #using
Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASEASE-2014-RanganathVG #comparison #testing #using
Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASEASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management #using
Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
CASECASE-2014-ChenLL #adaptation #design #predict #using
Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASECASE-2014-ChenS #approach #markov #modelling #novel #using
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-FeyzabadiC #markov #process #using
Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASECASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using
A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASECASE-2014-GlorieuxDSL #approach #optimisation #using
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HsiehHP #generative #predict #using
Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASECASE-2014-HuCLY #approach #automation #comparative #petri net #using
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-KernWGBM #estimation #machine learning #using
COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASECASE-2014-LeePP #locality #using
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LinHC #gesture #network #recognition #using
Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASECASE-2014-LinWF #using
Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASECASE-2014-LiWC #using
Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASECASE-2014-MahlerKLSMKPWFAG #learning #process #using
Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASECASE-2014-MalinowskiCZ #estimation
Shapelet-based remaining useful life estimation (SM, BCM, NZ), pp. 794–799.
CASECASE-2014-NagataO #approach #multi #using
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-ParkLH #generative #performance #using
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-WahrburgZMD #assembly #estimation #using
Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
DACDAC-2014-AdirGGS #generative #network #testing #using
Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-ChangJC #configuration management #functional #using
Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DACDAC-2014-GebalaMMRT #on the #using
On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DACDAC-2014-KhosraviRGT #multi #optimisation #reliability #using
Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DACDAC-2014-LiuCTKD #component #realtime #using
Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DACDAC-2014-LiuFC #process #self #using
Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DACDAC-2014-LuCCSHTC #named #using
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-MaoWZCL #architecture #memory management #using
Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DACDAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art #using
Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DACDAC-2014-PrussKE #abstraction #equivalence #scalability #using #verification
Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DACDAC-2014-QuintonBHNNE #analysis #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RenMRZ #fault tolerance #network #using
Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DACDAC-2014-RoyKCBC #streaming #using
Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DACDAC-2014-StoermerT #functional #interface #mockup #standard #using
Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DACDAC-2014-TsaiCYYHCCC #energy #using
Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DACDAC-2014-VaidyanathanDP #detection #reliability #stack #using
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-WeiWNP #physics #reverse engineering #using
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DACDAC-2014-YuSHEAB #metric #parametricity #using
Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATEDATE-2014-AhariAKT #architecture #configuration management #power management #using
A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATEDATE-2014-AlaghiH #performance #probability #using
Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing #using
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-Braak #adaptation #embedded #scalability #using
Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATEDATE-2014-CannellaBS #approach #realtime #scheduling #streaming #using
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-CasparLH #automation #strict #testing #using
Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATEDATE-2014-ConosMDP #coordination #energy #power management #using
Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATEDATE-2014-DoanJP #flexibility #implementation #multi #scalability #using
Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis #using
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-FriedlerKMNS #effectiveness #locality #slicing #using
Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATEDATE-2014-KamalGAP #approximate #performance #using
Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATEDATE-2014-LagraaTP #data mining #mining #scalability #simulation #using
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATEDATE-2014-LeeA #architecture #hybrid #novel #power management #using
A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATEDATE-2014-MahmoodPM #performance #reduction #using
Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATEDATE-2014-MarianiPZS #design #named #predict #scheduling #simulation #using
DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATEDATE-2014-MoralesHBHV #energy #implementation #using
Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATEDATE-2014-NarayananDCCLW #using #video
Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATEDATE-2014-ReimerSSB #using
Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATEDATE-2014-Sadri0WWB #3d #energy #optimisation #using
Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATEDATE-2014-SarafBLR #probability #using
IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATEDATE-2014-ShinPM #architecture #hybrid #using
Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATEDATE-2014-TurkyilmazCRBC #3d #integration #using
3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATEDATE-2014-VartziotisKCPJ #multi #optimisation #using
Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-YangMPOP #logic #using
Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATEDATE-2014-ZangenehJ #design #feedback #logic #using
Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
DocEngDocEng-2014-Fan0N #using
Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEngDocEng-2014-Lynch #evolution
The evolving scholarly record: new uses and new forms (CAL), pp. 1–2.
DocEngDocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #using #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEngDocEng-2014-SouzaMH #metadata #named #using
ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRRDRR-2014-BanerjeeC #locality #using #video
Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRRDRR-2014-JainOD #documentation #image #retrieval #scalability #using
Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRRDRR-2014-KleberDS #classification #retrieval #using #word
Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRRDRR-2014-LemaitreCC #image #segmentation #using
Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRRDRR-2014-ParkerFF #documentation #heuristic #image #robust #using
Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRRDRR-2014-TaoTX #documentation #learning #random #using
Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HTHT-2014-AbbasiTL #learning #scalability #using
Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HTHT-2014-NoorianMV #adaptation #feedback #self #using
Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
SIGMODSIGMOD-2014-DyresonBG #query #using
Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMODSIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters #using
SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off #using
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMODSIGMOD-2014-KalininCZ #data analysis #interactive #semantics #using
Interactive data exploration using semantic windows (AK, , SBZ), pp. 505–516.
SIGMODSIGMOD-2014-LevinK #network #pipes and filters #social #using
Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMODSIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation #using
Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDBVLDB-2014-FuOPZ #component #declarative #javascript #named #using
FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDBVLDB-2014-SarmaHC #clustering #framework #named #similarity #using
ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDBVLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability #using
Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDBVLDB-2014-YangDCC #keyword #knowledge base #using
Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDBVLDB-2014-YuMS #random #using
Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDBVLDB-2014-ZhangJSR #big data #recommendation #using
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDBVLDB-2015-Li0QYZ014 #query #set #using
Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDBVLDB-2015-WangZZLW14 #correlation #estimation #streaming #using
Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDBVLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability #using
MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEETCSEET-2014-AkpolatS #gamification #programming #re-engineering #student #using
Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEETCSEET-2014-Lethbridge #development #education #effectiveness #modelling #using
Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEETCSEET-2014-SedelmaierL #modelling #process #requirements #using
Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEETCSEET-2014-ShankararamanD #challenge #design #education #re-engineering #using
Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSEITiCSE-2014-BenottiMS #student #using
Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-GibsonM #collaboration #tool support
A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSEITiCSE-2014-Kann #using
Using reflections in a program integrating course (VK), p. 350.
ITiCSEITiCSE-2014-MedinaSGG #learning #student #using
Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSEITiCSE-2014-MI14a #principle #problem #using
Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSEITiCSE-2014-StrieweG14a #runtime #using
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ESOPESOP-2014-MatosGR #fault #named #using
REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOPESOP-2014-PercontiA #compilation #multi #semantics #using #verification
Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASEFASE-2014-AnjorinSLS #graph grammar #refinement #using
Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASEFASE-2014-MasciZJCT #user interface #using #verification
Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-StruberRTC #crawling #information retrieval #modelling #using
Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic #using
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-SalemDKT #automaton #invariant #model checking #testing #using
Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACASTACAS-2014-WijsB #manycore #named #on the fly #using
GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLAWRLA-2014-BaeM #infinity #model checking #using
Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
SANERCSMR-WCRE-2014-Grosjean #biology #maintenance #using
Using biology and ecology as inspiration for software maintenance? (Keynote abstract) (PG), p. 1.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
SANERCSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support #using
Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-KulkarniM #framework #obfuscation #using
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPCICPC-2014-ThungLOC #classification #design #diagrams #metric #network #using
Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSMEICSME-2014-EddyK #code search #query #source code #using
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-EderFHJ #question
Which Features Do My Users (Not) Use? (SE, HF, BH, MJ), pp. 446–450.
ICSMEICSME-2014-MorenoTMS #debugging #locality #on the #stack
On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSMEICSME-2014-Reiss #code search #testing #towards #using
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based #using
Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSMEICSME-2014-ShangNHJ #comprehension #development #using
Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-StevensR #query #using
Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSMEICSME-2014-VieiraFC #embedded #maintenance #metric #performance #using
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSMEICSME-2014-WangG #design #recommendation #refactoring #using
Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSMEICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #using #visualisation
Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSRMSR-2014-FukushimaKMYU #empirical #fault #modelling #predict #using
An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSRMSR-2014-LazarRS #debugging #detection #metric #similarity #using
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring #using
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
PEPMPEPM-J-2013-Simon14 #type inference #using
Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PLDIPLDI-2014-DeVitoRFAH #generative #runtime #using
First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDIPLDI-2014-PekQM #c #data type #logic #proving #using
Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
SASSAS-2014-ChenHTWW #recursion #source code #using #verification
Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
STOCSTOC-2014-SahaiW #encryption #how #obfuscation
How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
FLOPSFLOPS-2014-Bahr #compilation #correctness #graph #proving #using
Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPSFLOPS-2014-Riesco #debugging #declarative #maude #semantics #using
Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
CIAACIAA-2014-AmorimMR #canonical #finite #linear #transducer #using
Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
DLTDLT-2014-ReinhardtY
The Minimum Amount of Useful Space: New Results and New Directions (KR, AY), pp. 315–326.
ICALPICALP-v1-2014-Lampis #approximate #graph #using
Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALPICALP-v1-2014-PrabhakaranSW #using
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FMFM-2014-LakshmiAK #analysis #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-SanatiMM #decidability #guidelines #logic #metric #using
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FMFM-2014-ShanWFZZWQC #using #verification
Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
IFMIFM-2014-BrideKP #constraints #specification #theorem proving #using #verification #workflow
Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFMSEFM-2014-BianculliGK #logic #metric #pipes and filters #using
Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFMSEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction #using
Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFMSEFM-2014-DuboisR #functional #using
Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFMSEFM-2014-HajisheykhiEK #fault #modelling #using
Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFMSEFM-2014-ReicherdtG #matlab #modelling #using #verification
Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
ICFPICFP-2014-Fisher #formal method #using
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
GT-VMTGT-VMT-2014-WangBL #alloy #graph #model transformation #using #verification
Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHICHI-2014-AferganPSJHBCJ #metric #using
Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHICHI-2014-BalataCM #2d #on the #using
On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHICHI-2014-BurkeK #facebook #network #social
Growing closer on facebook: changes in tie strength through social network site use (MB, REK), pp. 4187–4196.
CHICHI-2014-ChiravirakulP #question
Choice overload in search engine use? (PC, SJP), pp. 1285–1294.
CHICHI-2014-DancuFF #navigation #using
Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHICHI-2014-FeinbergCB #database #design #interactive #using
Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHICHI-2014-FritzHMZ #case study #persuasion #process
Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHICHI-2014-GerlingMBMO #game studies #people #persuasion #towards #using
The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHICHI-2014-GoelLAPBHB #interactive #multi #named #using
SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHICHI-2014-GronvallKPR #interface
Causing commotion with a shape-changing bench: experiencing shape-changing interfaces in use (EG, SK, MGP, MKR), pp. 2559–2568.
CHICHI-2014-HachisuF #feedback #interactive #interface #named #using
VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHICHI-2014-HarbachHWS #communication #privacy #security #using
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHICHI-2014-HarpsteadMAM #design #education #game studies #using
Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHICHI-2014-HayashiMH #gesture #identification #using
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHICHI-2014-HeoGL #using
Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHICHI-2014-HongA #modelling #performance #predict #recommendation #user interface
Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHICHI-2014-HuangTTTYCHC #named #using
TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHICHI-2014-HuangYWZLMLZS #named #using
FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHICHI-2014-JuhlinEO #video
Long tail TV revisited: from ordinary camera phone use to pro-am video production (OJ, AE, ), pp. 1325–1334.
CHICHI-2014-KihmGKM #interactive #power management #symmetry #using
Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHICHI-2014-KulshreshthL #3d #gesture
Exploring the usefulness of finger-based 3D gesture menu selection (AK, JJLJ), pp. 1093–1102.
CHICHI-2014-LaseckiWFB #dependence #using
Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHICHI-2014-LiR #online #using
Using annotations in online group chats (NL, MBR), pp. 863–866.
CHICHI-2014-LuFL #gesture #using
Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHICHI-2014-MarananASPSB #design #modelling #using
Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHICHI-2014-MasseyLW #repository
Cloudy forecast: an exploration of the factors underlying shared repository use (CM, TL, SW), pp. 2461–2470.
CHICHI-2014-MorrisSGK #named #smarttech #using
RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHICHI-2014-MottW #lens #using
Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHICHI-2014-NielsenH #case study
Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHICHI-2014-OKaneRB #mobile
Gaining empathy for non-routine mobile device use through autoethnography (AAO, YR, AEB), pp. 987–990.
CHICHI-2014-PasqualW #predict #using
Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHICHI-2014-PedersenSH #scalability #using
Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHICHI-2014-PikeMPSW #protocol #using
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHICHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #using #video
Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHICHI-2014-PuciharCA #visual notation
The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHICHI-2014-SchildLM #3d #behaviour #design #game studies #using #video
Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHICHI-2014-SchwarzXMHH #classification #probability #using
Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHICHI-2014-SerranoEI
Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHICHI-2014-ShklovskiMSB #mobile #privacy
Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.
CHICHI-2014-Smith-ClarkeMC #communication #mobile #network #using
Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHICHI-2014-SoloveyZPRM #performance #using
Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHICHI-2014-SuhPHK #design #evaluation #twitter #using
@BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHICHI-2014-SunDLLG #case study #using
Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHICHI-2014-TanSLC #collaboration #using #visual notation
Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHICHI-2014-TsandilasABB #coordination
Coordination of tilt and touch in one- and two-handed use (TT, CA, AB, DB), pp. 2001–2004.
CHICHI-2014-UzorB #game studies
Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHICHI-2014-WangL #communication #gesture #similarity #using
Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHICHI-2014-WeigelMS #comprehension #how #mobile #people
More than touch: understanding how people use skin as an input surface for mobile computing (MW, VM, JS), pp. 179–188.
CHICHI-2014-WeiMZ #social #using
Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CHICHI-2014-YeMOF #mobile #people #smarttech #visual notation
Current and future mobile and wearable device use by people with visual impairments (HY, MM, UO, LF), pp. 3123–3132.
CHICHI-2014-ZhaoL #comprehension #social #social media
Curation through use: understanding the personal value of social media (XZ, SEL), pp. 2431–2440.
CSCWCSCW-2014-CastilloEPS #lifecycle #online #social #social media #using
Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCWCSCW-2014-ChenHMN #comprehension #social #social media #word
Understanding individuals’ personal values from social media word use (JC, GH, JM, JN), pp. 405–414.
CSCWCSCW-2014-CoetzeeFHH #question
Should your MOOC forum use a reputation system? (DC, AF, MAH, BH), pp. 1176–1187.
CSCWCSCW-2014-DesjardinsNGW #collaboration
Collaboration surrounding beacon use during companion avalanche rescue (AD, CN, SG, RW), pp. 877–887.
CSCWCSCW-2014-FieslerB #online
Remixers’ understandings of fair use online (CF, AB), pp. 1023–1032.
CSCWCSCW-2014-KellyP #case study #collaboration #web
Collaborative web search in context: a study of tool use in everyday tasks (RK, SJP), pp. 807–819.
CSCWCSCW-2014-LiuBRW #social #social media
Enriching the distressing reality: social media use by chinese migrant workers (JL, AB, DWR, VW), pp. 710–721.
CSCWCSCW-2014-LiuJPP #feedback #using #visual notation
Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCWCSCW-2014-MarkGKJ #enterprise #social #social media
Most liked, fewest friends: patterns of enterprise social media use (GM, IG, SKD, MJ), pp. 393–404.
CSCWCSCW-2014-MassimiBWA #community #health #online
Life transitions and online health communities: reflecting on adoption, use, and disengagement (MM, JLB, HOW, OHA), pp. 1491–1501.
CSCWCSCW-2014-Morris #network #social #women
Social networking site use by mothers of young children (MRM), pp. 1272–1282.
CSCWCSCW-2014-NakazatoYSNTH #realtime #using #video
Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCWCSCW-2014-Quinones
Cultivating practice & shepherding technology use: supporting appropriation among unanticipated users (PAQ), pp. 305–318.
CSCWCSCW-2014-XuHB #design #feedback #generative #named #using #visual notation
Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCWCSCW-2014-YueHH #collaboration #modelling #process #using #web
Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
HCIDHM-2014-DuWZHM #evolution #image #using
Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
HCIDHM-2014-HamamuraFYE
Evacuation Support System for Everyday Use in the Aftermath of a Natural Disaster (AH, TF, TY, NE), pp. 600–611.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-Luo #artificial reality #case study #metric #re-engineering #using
Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
HCIDHM-2014-MamessierDO #artificial reality #assessment #online #using
Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
HCIDHM-2014-OkaGTNH #analysis
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-RasoolSPK #image #using
Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
HCIDHM-2014-SantosST #information management #ontology #semantics #using #web
Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
HCIDHM-2014-YoganathanK #using
ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
HCIDUXU-DI-2014-BarrosSF
Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
HCIDUXU-DI-2014-EschrichKKHG #mobile #using
Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
HCIDUXU-DI-2014-SchusterHBRJ #experience #how #using
Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-ItoHN #design #interface #social #using
Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
HCIDUXU-DP-2014-SilvaPS #analysis #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-ELAS-2014-Chunpir0B #comprehension #using
Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
HCIDUXU-ELAS-2014-GeabelJHABA #identification #using
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-ELAS-2014-KamiyaKASNMF #design #using
Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
HCIDUXU-ELAS-2014-MontAlvao #bibliography #health #using
Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
HCIDUXU-ELAS-2014-VilarDRNV #artificial reality #case study #using
A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
HCIDUXU-TMT-2014-AvilaL #usability
Relationship between Elements of the Usability and Emotions Reported after Use: A Mexican Case (ICLÁ, LRPL), pp. 285–295.
HCIDUXU-TMT-2014-Bergamo #experience #prototype #user interface
User Experience Technique in Computer Digital Arts Production: Paper Prototyping Used as Material to Define Intentionality (MLB), pp. 613–621.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability #using
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-JoyceK #development #internet #self
Measuring Confidence in Internet Use: The Development of an Internet Self-efficacy Scale (MJ, JK), pp. 250–260.
HCIDUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface #using
Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCIHCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition #using
The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCIHCI-AIMT-2014-ChakravartyC #artificial reality #identification #using
Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCIHCI-AIMT-2014-KuribaraMOST #named #using
HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCIHCI-AIMT-2014-Man #hardware #using #video
Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCIHCI-AIMT-2014-NiLF #interactive #using
Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCIHCI-AIMT-2014-ReddyC #artificial reality #process #recognition #using
Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCIHCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov #using
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TsurudaHYI #mobile #using
Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCIHCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive #using
“Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCIHCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality #using
Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCIHCI-AS-2014-DotencoGG #smarttech #using
Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCIHCI-AS-2014-KadomuraITRS #named #using #visualisation
AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCIHCI-AS-2014-LeeYJ #predict #using
Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCIHCI-AS-2014-MaguireT #comparison #mobile
Comparison Test of Website Use with Mobile Phone and Laptop Computer (MM, MT), pp. 146–154.
HCIHCI-AS-2014-OgataII #smarttech #using
Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCIHCI-AS-2014-ParkKL #case study #smarttech
A Study of Emoticon Use in Instant Messaging from Smartphone (TWP, SJK, GL), pp. 155–165.
HCIHCI-AS-2014-SatoIN
Tourist Evacuation Guidance Support System for Use in Disasters (TS, TI, YN), pp. 494–501.
HCIHCI-TMT-2014-BrownTBKLMCEGA #design #using
Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCIHCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability #using
ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCIHCI-TMT-2014-HankiewiczB #performance #quality #source code #using #word
Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCIHCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface #using
Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCIHCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net #using
PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCIHCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface #using
Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HCIHIMI-AS-2014-AlkhateebHH #comprehension #using
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-IizukaG #mobile #using
Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HCIHIMI-AS-2014-KangSCL #case study #eye tracking
A Study of Drivers’ Blind Spot in Used of Eye Tracking (YYK, YCS, CCC, CLL), pp. 253–260.
HCIHIMI-AS-2014-MakiY #3d #image #multi #using
3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HCIHIMI-AS-2014-MoorthyV
Voice Activated Personal Assistant: Acceptability of Use in the Public Space (AEM, KPLV), pp. 324–334.
HCIHIMI-AS-2014-TanakaTH #development #education #using
Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HCIHIMI-AS-2014-TogawaK #collaboration #framework #smarttech #using
Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HCIHIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards #using
Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HCIHIMI-DE-2014-ChangT #case study
A Study of the Factors Affecting Product Values and Preferences-Using Vacuum Cleaner as an Example (WcC, HyT), pp. 561–571.
HCIHIMI-DE-2014-HottaOM #user interface #using
Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HCIHIMI-DE-2014-JungAK #interface #using #web
A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HCIHIMI-DE-2014-KatoM #deployment #modelling #quality #using
Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HCIHIMI-DE-2014-KhodaskarL #image #retrieval #semantics #using
Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HCIHIMI-DE-2014-SakaguchiIH #development #performance #using
Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HCIHIMI-DE-2014-SakuraiKNTH #pseudo #using
Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition #using
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining #using
User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HCIHIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support #using
Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
HCIHIMI-DE-2014-ValdezSZH #clustering #network #research #scalability #social #visualisation
Enhancing Interdisciplinary Cooperation by Social Platforms — Assessing the Usefulness of Bibliometric Social Network Visualization in Large-Scale Research Clusters (ACV, AKS, MZ, AH), pp. 298–309.
HCILCT-NLE-2014-NicolaouC
Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
HCILCT-NLE-2014-OrehovackiBJ #education #quality #web
Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
HCILCT-TRE-2014-GoodeC #collaboration #online #performance #predict
Online Collaboration: Individual Involvement Used to Predict Team Performance (AWG, GC), pp. 408–416.
HCILCT-TRE-2014-HafnerHO #artificial reality #physics #using
Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
HCILCT-TRE-2014-HiramatsuIFS #development #learning #using
Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
HCILCT-TRE-2014-SofticVMWE #research #using
Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
HCILCT-TRE-2014-Timotheou
Reflective Thinking: Exploring Blog Use by Adult Learners (MMT), pp. 460–466.
HCILCT-TRE-2014-TzanavariMCP #experience #performance #user interface #using
User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
HCISCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named #using
Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
HCISCSM-2014-AbdallaY #bibliography #network #online #process #social #using
A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
HCISCSM-2014-Ahangama #detection #realtime #social #social media #twitter
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-FardounAG #community #education
Useful Educational Exercises for the Community (HMF, DMA, LCG), pp. 314–321.
HCISCSM-2014-HuangG #empirical #health #network #social #using
Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
HCISCSM-2014-MendesFFC #analysis #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
HCISCSM-2014-OtakeSOSUS #gamification #motivation #using
A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
HCISCSM-2014-PensasVGKKCV #communication #network #social #using
Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
HCISCSM-2014-RayaRRP #adaptation #game studies #using
Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
HCISCSM-2014-SchaarVZELJ #motivation #network #social #using
Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFTVISSOFT-2014-SchotsW #framework #using #visualisation
Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSECAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics #using
Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSECAiSE-2014-PikaWFHLA #behaviour #framework #using
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSECAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval #using
Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSECAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #using #variability
Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSECAiSE-2014-VergneS #community #markov #network #open source #using
Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEISICEIS-v1-2014-CoelhoAABB #network #using
Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEISICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap #using
Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEISICEIS-v1-2014-KleinSRF #formal method #integration #on the #using
On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEISICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based
The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEISICEIS-v1-2014-MamcenkoG #mobile #predict #using
Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEISICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel #using
An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEISICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring #using
Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters #using
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net #using
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation #using
Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEISICEIS-v2-2014-GippMBPN #detection #semantics #similarity #using #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-KaramtiTG #image #network #process #retrieval #using
Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEISICEIS-v2-2014-MeloS #design #modelling #uml #using
Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEISICEIS-v2-2014-OtonBGGB #learning #metadata #using
Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEISICEIS-v2-2014-SilvaMS #aspect-oriented #bibliography #evaluation #performance #programming
A Systematic Review on Performance Evaluation of Aspect-Oriented Programming Techniques used to Implement Crosscutting Concerns (RFGdS, MdAM, MSS), pp. 5–13.
ICEISICEIS-v2-2014-ThommazoRROHWF #traceability #using
Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEISICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy #using
Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEISICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process #using
Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEISICEIS-v3-2014-NunoG #in the cloud #outsourcing #using
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEISICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process #using
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEISICEIS-v3-2014-ZacepinsBA #using
Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKMCIKM-2014-AgrawalGKK #concept #graph #similarity #using
Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKMCIKM-2014-CarmelMPS #analysis #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-DavletovAC #predict #using
High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKMCIKM-2014-FangQHZ #bibliography #composition #ranking #sentiment #summary #using
Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKMCIKM-2014-HanWP #classification #using
Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKMCIKM-2014-HustonC #comparison #dependence #modelling #retrieval #using
A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKMCIKM-2014-LiuLK #classification #information management #performance #using
Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKMCIKM-2014-NguyenTT #crowdsourcing #similarity #using
Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKMCIKM-2014-PfeifferNB #learning #network #probability #using
Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKMCIKM-2014-RahmanH #network #strict #using
Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKMCIKM-2014-RenTOS #how #people #scalability #web
How People Use the Web in Large Indoor Spaces (YR, MT, KO, MS), pp. 1879–1882.
CIKMCIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using
Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKMCIKM-2014-YangLLLH #automation #clustering #detection #multi #social #using
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKMCIKM-2014-ZhuMHZC #social #social media #topic #using
Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIRECIR-2014-Aly #normalisation #parametricity #using
Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIRECIR-2014-GaoWO #comparison #using
Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIRECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #using #video
Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIRECIR-2014-KapteinKVB #semantics #using #web
Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIRECIR-2014-LefortierSRR #case study #using #video #web
Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIRECIR-2014-Lommatzsch #realtime #recommendation #using
Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIRECIR-2014-PanemBGV #detection #realtime #topic #twitter #using
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchuthSWR #case study #optimisation #using
Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIRECIR-2014-YangPSS #case study #e-commerce #query #scalability #using
A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance #using
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics #using
Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICMLICML-c2-2014-ChagantyL #modelling #using #visual notation
Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICMLICML-c2-2014-Chen0 #big data #learning #modelling #topic #using
Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICMLICML-c2-2014-Cherian #nearest neighbour #using
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-GalG #parallel #process
Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICMLICML-c2-2014-JohanssonJDB #geometry #graph #kernel #using
Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICMLICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random #using
A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SchwingHPU #algorithm #convergence #parallel #using
Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-TamarMX #approximate #robust #scalability #using
Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPRICPR-2014-AlathariNB #segmentation #using
Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPRICPR-2014-AlemdarKNME #behaviour #modelling #using
A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPRICPR-2014-AlmogahedK #game studies #named #using
NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPRICPR-2014-AzizWH #graph #kernel #using
Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPRICPR-2014-BashbaghiGSB #multi #using
Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BekhetA #using #video
Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPRICPR-2014-BeraM #multi #realtime #using
Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPRICPR-2014-BicegoRFRG #behaviour #using
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BogunKCR #interactive #recognition #using
Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPRICPR-2014-BorgiLEA14a #multi #recognition #using
Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPRICPR-2014-BrownFP #detection #self #using
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNK #graph #music #using
Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPRICPR-2014-BuiNLYK #detection #order #statistics #using
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-ByeonLB #2d #classification #network #using
Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPRICPR-2014-CaliskanA #using
Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPRICPR-2014-ChanK #geometry #identification #image #using
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPRICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry #using
Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPRICPR-2014-ChenK #gesture #recognition #using
Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPRICPR-2014-ChenLHLLH #detection #using
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenWLHI #image #robust #segmentation #using
Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPRICPR-2014-ChevallierCA #estimation #image #metric #orthogonal #using
Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPRICPR-2014-ChironGM #behaviour #parametricity #using
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-Climent-PerezMR #detection #multi #using
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-DahlCB #image #multi #segmentation #using
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DominguesMMSR #information management #recommendation #topic #using
Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPRICPR-2014-DongPHLDJ #classification #network #using
Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPRICPR-2014-DuanHZCZ #image #segmentation #using
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification #using
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-DuDA #modelling #topic #using
Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPRICPR-2014-DuHZWD #case study #classification #design #network #online #recognition #using
A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPRICPR-2014-ElmikatyS #detection #image #multi #using
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-EvangelidisSH #recognition #using
Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPRICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech #using
Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPRICPR-2014-ForsbergM #image #segmentation
Evaluating Cell Nuclei Segmentation for Use on Whole-Slide Images in Lung Cytology (DF, NM), pp. 3380–3385.
ICPRICPR-2014-GavriilidisT #classification #kernel #random #using
Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPRICPR-2014-GeXYS #image #synthesis #using
Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPRICPR-2014-GhoraiC #algorithm #composition #higher-order #image #using
An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPRICPR-2014-GiordanoPS #estimation #kernel #modelling #using
Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPRICPR-2014-GognaSM #matrix #using
Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPRICPR-2014-Gonzalez-CastroDC #adaptation #classification #using
Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPRICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition #using
Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPRICPR-2014-GuptaBVS #on the #using
On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPRICPR-2014-HafemannOC #network #recognition #using
Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPRICPR-2014-HaoXPSK #automation #semantics #topic #using
Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPRICPR-2014-HaqBBA #modelling #segmentation #using
Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPRICPR-2014-HasnatAT #clustering #image #using
Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPRICPR-2014-HeDY0PJ #multi #random #using #visual notation
Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPRICPR-2014-HuangZPZ #canonical #correlation #recognition #robust #using
Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPRICPR-2014-HusainDT #random #using
Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPRICPR-2014-HuWSC #detection #framework #robust #using
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-HuynhCM #3d #constraints #geometry #using #video
Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPRICPR-2014-IoannidisCL #clustering #modelling #multi #using
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPRICPR-2014-ItohIS #2d #image #linear #using
Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPRICPR-2014-JangLSK #automation #classification #multi #using #video
Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPRICPR-2014-JinIHS #approach #using
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-JoshiGG #automation #predict #using #visual notation
Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPRICPR-2014-JudV #using
Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPRICPR-2014-KacheleZMS #feature model #quality #recognition #using
Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPRICPR-2014-KapsourasN #approach #recognition #using
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KarM #fuzzy #using
Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPRICPR-2014-KeceliC #approach #multimodal #using
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-KimP14a #3d #interactive #physics #using
Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPRICPR-2014-KramarevZWL #categorisation #composition #image #representation #using
Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPRICPR-2014-KuangOA #estimation #using
Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, ), pp. 2419–2423.
ICPRICPR-2014-KumarA2 #stack #using
Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-KurtekS #analysis #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LaiSTH #3d #using
3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPRICPR-2014-LandgrenOH #image #segmentation #using
A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPRICPR-2014-LeeSL #3d #invariant #recognition #self #using
View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPRICPR-2014-LeNVOT #documentation #retrieval #using
Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition #using
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LinH #analysis #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiRPV #modelling #topic #using
Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPRICPR-2014-LuoZW #image #segmentation #using
Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPRICPR-2014-LuYXYWP #recognition #using
Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPRICPR-2014-MaHXP #3d #approach #robust #using
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MatsuoSY #detection #image #using
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MittalKKK #recognition #using
Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPRICPR-2014-MiyanS #consistency #image #using
Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPRICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition #using
Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MolderCCH #automation #detection #reduction #using
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MollerPB #analysis #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKNK #detection #using #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MoyouIP #3d #estimation #performance #retrieval #using
LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPRICPR-2014-MuddamsettySTM #detection #using
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NakashikaHTA #3d #recognition #using
3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPRICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval #using
Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPRICPR-2014-NguyenGVP #framework #parametricity #process #recognition #using
A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPRICPR-2014-NguyenP #linear #multi #using
Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPRICPR-2014-NieJ #learning #linear #using
Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPRICPR-2014-NieKZ #learning #recognition #using
Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPRICPR-2014-Nilsson #polynomial #using
Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPRICPR-2014-NilssonAGF #detection #using
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NishimuraOAN #image #modelling #speech #using #web
Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPRICPR-2014-OhyamaYWK #recognition #using
Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPRICPR-2014-OtteSZ #algorithm #named #using
ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPRICPR-2014-PandaKC #graph #random #scalability #summary #using #video
Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPRICPR-2014-PaudelDHV #2d #3d #locality #using
Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPRICPR-2014-PerinaKB #array #classification #kernel #using
Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPRICPR-2014-QureshiHA #probability #using
A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPRICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #using #video
Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPRICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance #using
Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPRICPR-2014-RazavianASC #smarttech #using
Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPRICPR-2014-RenL #gender #recognition #using
Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPRICPR-2014-RingLRE #assessment #using
A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPRICPR-2014-RosaCJPFT #clustering #network #on the #using
On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPRICPR-2014-SaitoAFRSGC #learning #using
Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPRICPR-2014-SamantaC #classification #using
Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPRICPR-2014-SariE #analysis #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SavakisRP #difference #gesture #learning #using
Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPRICPR-2014-SaygiliMH #metric #similarity #using
Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPRICPR-2014-SeckDT #3d #analysis #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-Shirakawa #multi #performance #similarity #using
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-SlitiHBA #analysis #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-SongLZC #adaptation #performance #using
Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPRICPR-2014-SuLTLT #recognition #using
Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPRICPR-2014-SunTL #online #using
Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPRICPR-2014-TabiaV #3d #classification #using
3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPRICPR-2014-TaniH #detection #robust #using
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TaxSRM #performance #type system
The Effect of Aggregating Subtype Performances Depends Strongly on the Performance Measure Used (DMJT, HMJS, MJTR, PDM), pp. 3720–3725.
ICPRICPR-2014-TegenWHOJMNA #image #segmentation #semantics #using
Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, ), pp. 2281–2286.
ICPRICPR-2014-TerissiPG #classification #random #using
Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPRICPR-2014-VuEIYY #image #using
Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPRICPR-2014-WangCH #hybrid #markov #multi #random #using #video
Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPRICPR-2014-WangGJ #learning #using
Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPRICPR-2014-WangS #automation #dataset #multi #segmentation #using
Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPRICPR-2014-WangWJ14a #markov #modelling #recognition #using
Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPRICPR-2014-WangYLZF #independence #recognition #using
Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPRICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition #using
View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPRICPR-2014-XiaoCJF #recognition #using
Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPRICPR-2014-XuS #learning #network #using
Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPRICPR-2014-YamadaM #approach #behaviour #using
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-YamashitaW #classification #using
k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPRICPR-2014-YangD #identification #novel #using
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPRICPR-2014-YangTL #energy #image #recognition #using
Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPRICPR-2014-YingWMYZ #problem #using
The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPRICPR-2014-YuCK #distance #recognition #set #using
Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPRICPR-2014-YuGZ #3d #recognition #using
Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPRICPR-2014-YuncuHB #automation #modelling #recognition #speech #using
Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhangT #recognition #using #word
Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPRICPR-2014-ZhangWGZZ #analysis #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPRICPR-2014-ZhangWL #using #video
Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDDKDD-2014-GaddeAO #graph #learning #using
Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDDKDD-2014-JinKSDGCPR #community #geometry #modelling #network #social #using
Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDDKDD-2014-QianHJPZ #approach #distance #learning #metric #using
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source #using
“Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDDKDD-2014-SintosT #network #social #using
Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDDKDD-2014-SrikantA #machine learning #programming #using
A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDDKDD-2014-TayebiEGB #embedded #learning #predict #using
Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDDKDD-2014-WangZQZ #using
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-WangZX #estimation #using
Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDDKDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #using #video
Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDDKDD-2014-Yoshida #adaptation #algorithm #linear #sketching #using
Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #using #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-AlahmadiJM #classification #concept #representation #using
Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIRKDIR-2014-BarcanteJDCCS #identification #mining #using
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-BatistaCRF #ambiguity #using #wiki
Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIRKDIR-2014-Bleiweiss #execution #machine learning #using
SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIRKDIR-2014-KudamaL #random #semantics #using
Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIRKDIR-2014-MorenoGV #data mining #mining #recognition #using #word
Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIRKDIR-2014-NagwanshiM #detection #semantics #sentiment #using
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-SatoNS #classification #kernel #using
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEODKEOD-2014-DogduKG #information management #ontology #using
Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEODKEOD-2014-OlszewskaSM #design #ontology #owl #uml #using
Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEODKEOD-2014-TarakciC #recommendation #using
Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMISKMIS-2014-FrancoisMA #communication #design #email #problem #traceability #using
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMISKMIS-2014-Grim-Yefsah #case study #information management #process #requirements #using
A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KRKR-2014-ClercqBSCN #game studies #programming #set #using
Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KRKR-2014-Dyrkolbotn #how #set #using
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition #using
Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDMMLDM-2014-JavedA #classification #dataset #network #social #using
Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-LarinSKKHC #classification #parametricity #representation #using
Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDMMLDM-2014-SandovalH #learning #network #using
Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDMMLDM-2014-SchraagenK #consistency #graph #using
Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSysRecSys-2014-BachrachFGKKNP #recommendation #using
Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSysRecSys-2014-BhagatWIT #learning #matrix #recommendation #using
Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSysRecSys-2014-KellerR #e-commerce #framework #named #recommendation
Cosibon: an E-commerce like platform enabling bricks-and-mortar stores to use sophisticated product recommender systems (TK, MR), pp. 367–368.
RecSysRecSys-2014-LercheJ #feedback #personalisation #ranking #using
Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSysRecSys-2014-LiuGWB #power of #using
Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKESEKE-2014-ChenHQJ #performance #static analysis #using
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #using #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-JaliGH #behaviour #case study #generative #ontology
Behavioral Model Generation from Use Cases Based on Ontology Mapping and GRASP Patterns (NJ, DG, PH), pp. 324–329.
SEKESEKE-2014-JiangCKZD #model transformation #source code #testing #using
Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKESEKE-2014-KaurKF #low cost #mining #using #web
Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKESEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named #using
CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKESEKE-2014-ParkSHSHB #algorithm #resource management #search-based #using
Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis #using
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-SinghS #machine learning #requirements #using
Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKESEKE-2014-SouzaRS #empirical #predict #using
A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKESEKE-2014-TianWHZG #feedback #recommendation #using #web #web service
Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKESEKE-2014-Wang #composition #using #web #web service
QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKESEKE-2014-WangGZ #network #predict #using
Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKESEKE-2014-XuL #approach #architecture #automation #synthesis #using
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKESEKE-2014-XuL14a #ontology #reasoning #semantics #using
Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIRSIGIR-2014-AnilSS #evolution #kernel #modelling #network #social #using
Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIRSIGIR-2014-CeroniTKN #using
Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIRSIGIR-2014-DaltonDA #knowledge base #query #using
Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIRSIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation #using
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIRSIGIR-2014-Ifada #modelling #personalisation #recommendation #topic #using
A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIRSIGIR-2014-KeikhaPC #metric #summary #using
Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIRSIGIR-2014-KharazmiSSV #difference #using
Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIRSIGIR-2014-KumarJF #detection #twitter #using
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-LeeTC #behaviour #multi #risk management
Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
SIGIRSIGIR-2014-LivneGTDA #difference #named #recommendation #using
CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIRSIGIR-2014-RoitmanHK #using
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIRSIGIR-2014-RoyVGC #query #segmentation #sequence #using
Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIRSIGIR-2014-Sebastian #clustering #predict #semantics #using
Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIRSIGIR-2014-WangariZA #case study #interface #multimodal
Discovering real-world use cases for a multimodal math search interface (KDVW, RZ, AA), pp. 947–950.
SIGIRSIGIR-2014-WuKS #behaviour #online #using
Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKYSKY-2014-Ben-Av #algebra #generative #multi #ontology #using
Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy #using
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards #using
Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-ReggioLR #bibliography #uml #what
Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-ReggioLR #bibliography #uml #what
Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
ECOOPECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #using #virtual machine
Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
ECOOPECOOP-2014-MayerS #automation #domain-specific language #framework #java #multi #refactoring
Automated Multi-Language Artifact Binding and Rename Refactoring between Java and DSLs Used by Java Frameworks (PM, AS), pp. 437–462.
ECOOPECOOP-2014-NittaKT #framework #identification
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
OnwardOnward-2014-TaeumelPSLH #data-driven #development
Interleaving of Modification and Use in Data-driven Tool Development (MT, MP, BS, JL, RH), pp. 185–200.
OOPSLAOOPSLA-2014-Desai0M #proving #reduction #source code #using
Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-VoraKG #algorithm #consistency #named #parallel #using
ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PLATEAUPLATEAU-2014-SadowskiY #concurrent #detection #developer #how #tool support
How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
GPCEGPCE-2014-Asai #compilation #using
Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
PPDPPPDP-2014-Schopp #low level #source code #using
Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPLQAPL-2014-Feng #distributed #hybrid #modelling #probability #using
Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
PADLPADL-2014-CampeottoPDFP #constraints #theorem proving
Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADLPADL-2014-LakinP #compilation #functional #programming language #using
Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
POPLPOPL-2014-ChaudhuriCS #proving #synthesis #using
Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
RERE-2014-AntonelliRLO #using
Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-PorterLS #case study #experience #feedback #framework #requirements #using
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RERE-2014-SlavinLNB #diagrams #feature model #requirements #security #using
Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQREFSQ-2014-OjameruayeB #requirements #using
Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
SACSAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech #using
A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SACSAC-2014-Al-RefaiCF #modelling #runtime #using
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-AnderssonDA #artificial reality #identification #using
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SACSAC-2014-BergamascoN #3d #approach #feature model #retrieval #using
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming #using
Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SACSAC-2014-BoghratiHK #framework #process #using
Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SACSAC-2014-ChangHL #adaptation #clustering #optimisation #using
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SACSAC-2014-ChoiKK #modelling #ontology #using
Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SACSAC-2014-Daniel #communication #protocol #using
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-EngielCL #approach #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-GomesACHS #agile #development #framework #game studies #using
Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SACSAC-2014-HoritaHSNTO #approach #modelling #refinement #using
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JunAK #detection #using
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KrikavaCF14a #domain-specific language #modelling #using
Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SACSAC-2014-LiMZ #using #visualisation
Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SACSAC-2014-ManhaesCZ #architecture #named #predict #using
WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SACSAC-2014-MehdiIHKDS #keyword
Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
SACSAC-2014-OmatuY #classification #smell #using
Smell classification using weakly responding data (SO, MY), pp. 213–214.
SACSAC-2014-PalVCS #detection #smarttech #using
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-ParkKC #framework #kernel #memory management #online #using
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SACSAC-2014-PedrosaP #using
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SACSAC-2014-PengYYHKH #3d #detection #multi #using
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-RossiLR #algorithm #classification #network #using
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SACSAC-2014-SaarsenD #assessment #process #towards
Towards an assessment model for balancing process model production and use (TS, MD), pp. 1386–1392.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-SypeS #case study #online #requirements #social
Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SACSAC-2014-TragatschnigTZ #impact analysis #using
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-WijenayakeP #estimation #using #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SACSAC-2014-YokoyamaKM #using
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SACSAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SACSAC-2014-ZardariBE #using
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SACSAC-2014-Zheng #matrix #using
Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
FSEFSE-2014-LalQ #using #verification
Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSEFSE-2014-VakiliD #infinity #modelling #smt #using #verification
Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSEFSE-2014-YeBL #debugging #learning #rank #using
Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSEICSE-2014-ChenSJHNF #anti #detection #performance #using
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-FritzBMYZ #development #metric #using
Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSEICSE-2014-JungLRP #automation #detection #memory management
Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-MinkuY #estimation #how #question
How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSEICSE-2014-MiyashitaTA #modelling #spreadsheet #using
Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant #using
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SingerFS #developer #how #re-engineering #twitter #using
Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSEICSE-2014-ZayanAC #comprehension #empirical #using
Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SLESLE-J-2012-GuizzardiZ #concept #modelling #ontology #using
Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
SLESLE-2014-Ridge #combinator #context-free grammar #parsing #performance #using
Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
SPLCSPLC-2014-KnappRS #development #modelling #on the #product line #testing
On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLCSPLC-2014-Lantz #agile #case study #development #modelling #using
Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
SPLCSPLC-2014-YuZZJ #automation #case study #feature model #named
TDL: a transformation description language from feature model to use case for automated use case derivation (WY, WZ, HZ, ZJ), pp. 187–196.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction #using
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOSASPLOS-2014-SantosRSW #mobile #runtime #using
Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CCCC-2014-Dinechin #code generation #using
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SurendranBZS #array #using
Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPCAHPCA-2014-KhanAWMJ #clustering #performance #using
Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCAHPCA-2014-KimLJK #architecture #gpu #memory management #named #using
GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDCHPDC-2014-XiangMA #matrix #pipes and filters #scalability #using
Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMMISMM-2014-LiDL #liveness #modelling #using
Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMMISMM-2014-Printezis #perspective #twitter #virtual machine
Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTESLCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence #using
Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PPoPPPPoPP-2014-AgrawalFSSU #data type #parallel #scheduling #source code
Provably good scheduling for parallel programs that use data structures through implicit batching (KA, JTF, BS, JS, RU), pp. 389–390.
PPoPPPPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing #using
Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPPPPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management #using
Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
CAVCAV-2014-0001A #invariant #random #using
From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAVCAV-2014-BinghamL #bound #fault #simulation #using #verification
Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-LarrazNORR #proving #using
Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLPICLP-J-2014-BartakZ #logic programming #problem #using
Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLPICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation #using
Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLPICLP-J-2014-CominiTV #linear #logic #using
Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSSICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing #using
Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCARIJCAR-2014-GoreOT #calculus #implementation #using
Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCARIJCAR-2014-GoreTW #logic #proving #theorem proving #using
A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTAISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread #using
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTAISSTA-2014-YandrapallyTSC #automation #robust #testing #using
Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTAISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing #using
Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
ICSTSAT-2014-BelovHM #proving #using
MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
ICSTSAT-2014-HeymanSMLA #using
Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
ICSTSAT-2014-WetzlerHH #named #performance #proving #using
DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAPTAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml #using
Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis #using
Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSECBSE-2013-BurtonS #correctness #data type #mixin #using
Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSECBSE-2013-GortonLLED #case study #component #experience #using
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSAQoSA-2013-DurdikR #design pattern #documentation #on the #using
On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
ASEASE-2013-AvazpourGG #automation #model transformation #specification #tool support #using #visualisation
Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASEASE-2013-Fard #behaviour #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-GhaisasMA #case study #detection #documentation
Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASEASE-2013-HuangMM #proving #smt #using
Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASEASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing #using
Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASEASE-2013-KukrejaHT #game studies #testing #using
Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASEASE-2013-PalombaBPOLP #detection #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-SaadaHNS #model transformation #multi #optimisation #using
Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASEASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing #using
Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASEASE-2013-SahaLKP #debugging #information retrieval #locality #using
Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASEASE-2013-ScannielloGMM #clustering #fault #predict #using
Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASEASE-2013-Servant #analysis #debugging #using
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-VanciuA #architecture #constraints #using
Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASECASE-2013-BagchiBNVSS #using
Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASECASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #using #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-BjorkenstamGBCL #energy #industrial #performance #using
Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASECASE-2013-ChenZS #metric #using
A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASECASE-2013-FerreiraL #generative #multi #tool support #using
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-FerreiraR #comparison #design #layout #performance #simulation #using
Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASECASE-2013-Fries #agile #automation #fault #fuzzy #multi #using
Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASECASE-2013-Geldmann #image #monte carlo #simulation #using
Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASECASE-2013-GrosbardKTR #composition #network #using
A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASECASE-2013-HuZL #automation #performance #petri net #synthesis #using
Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASECASE-2013-IsmailH #3d #anti #higher-order #using
Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASECASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning #using
Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LingoR #design #using
A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASECASE-2013-LuSXPO #automation #graph #multi #using
Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASECASE-2013-MarturiDP #image #performance #using
Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASECASE-2013-MohajeraniMF #automaton #composition #finite #using #verification
Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASECASE-2013-NammotoKH #assembly #modelling #using
Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation #using
Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASECASE-2013-ShisheieJBC #design #string #using
Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASECASE-2013-SoviziK #matrix #nondeterminism #parallel #random #using
Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASECASE-2013-WangBR #modelling #monitoring #using
Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASECASE-2013-XuJLYL #energy #optimisation #using
Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASECASE-2013-YueH #concurrent #robust #using
Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASECASE-2013-ZhangPJST #energy #interface #monitoring #scalability #using
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASECASE-2013-ZhangYZH #design #using
Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
DACDAC-2013-BanerjeeDSC #adaptation #constraints #energy #performance #realtime
Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints (DB, SKD, SS, AC), p. 7.
DACDAC-2013-DevWR #3d #integration #testing #using
High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DACDAC-2013-GaillardonMABSLM #towards #using
Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DACDAC-2013-KarthikR #approximate #linear #modelling #named #using
ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DACDAC-2013-LeGHD #simulation #using #verification
Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DACDAC-2013-LiuYLC #named #using
DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DACDAC-2013-MillerVG #modelling #physics #statistics #using
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DACDAC-2013-SchurmansZALACW #architecture #automation #communication #modelling #using
Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DACDAC-2013-SekitaniYTSS #using
Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DACDAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics #using
Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DACDAC-2013-WangK #control flow #detection #hardware #kernel #named #performance #using
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-YuLJC #classification #detection #feature model #using
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AhmadyanKV #algorithm #incremental #runtime #using #verification
Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATEDATE-2013-AnanthanarayananGP #detection #fault #low cost #set #using
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-BackesR #reachability #using
Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATEDATE-2013-BakshiH #reduction #smt #using
LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATEDATE-2013-BernasconiCTV #using
Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATEDATE-2013-BertaccoCBFVKP #on the
On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATEDATE-2013-BrandonW #using
Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATEDATE-2013-BraojosAA #classification #embedded #random #using
A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATEDATE-2013-ChenD #parallel #predict #simulation #using
Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATEDATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis #using
On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATEDATE-2013-DeutschC #multi #using
Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATEDATE-2013-EbrahimiDP #3d #algorithm #fault tolerance #using
Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-GaoGB #fault tolerance #scheduling #using
Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATEDATE-2013-Gomez-PradoCT #latency #optimisation #using
FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method #using
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HellwegeHPP #analysis #metric #reliability
Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATEDATE-2013-HelmstetterCGMV #performance #simulation #using
Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATEDATE-2013-HuNRK #detection #hardware #multimodal #using
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-JooyaB #power management #using
Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATEDATE-2013-LotfianJ #architecture #hardware #power management #smarttech #using
An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATEDATE-2013-LukasiewyczSC #programming #using
Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability #using
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-PaternaR #problem #using
Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATEDATE-2013-PontarelliOEW #detection #fault #using
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-QianJBTMM #analysis #named #performance #using
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management #using
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy #using
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-RustLP #architecture #complexity #using
Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATEDATE-2013-ShreejithVFL #approach #configuration management #network #using
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TzouBHC #bound #composition #using
Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATEDATE-2013-UnutulmazDF #optimisation #using
Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATEDATE-2013-VenkatesanSRR #energy #named #performance #using
DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATEDATE-2013-WangXZWYWNW #using
Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATEDATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction #using
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-YetimMM #streaming
Extracting useful computation from error-prone processors for streaming applications (YY, MM, SM), pp. 202–207.
DATEDATE-2013-ZakharenkoAM #cpu #gpu #performance #using
Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATEDATE-2013-ZhouZY #design #energy #memory management #network #using
The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
DocEngDocEng-2013-DoTT #documentation #taxonomy #using
Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEngDocEng-2013-NourashrafeddinMA #clustering #documentation #interactive #using
Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEngDocEng-2013-SatkhozhinaAA #random #recognition #using
Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEngDocEng-2013-TorabiDT #using
Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEngDocEng-2013-Vion-Dury #documentation #integration #owl #semantics #using
Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRRDRR-2013-AriesON #algorithm #automation #classification #clustering #summary #using
Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRRDRR-2013-KumarPR13a #composition #documentation #evaluation #using
Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRRDRR-2013-KumarWGS #framework #keyword #using
Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRRDRR-2013-MedjkouneMPV #approach #online #recognition #using
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SrihariKTB #using #verification
Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRRDRR-2013-ZhuHZ #image #recognition #retrieval #using
Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HTHT-2013-BellFFNHF #social #social media
Examining social media use among older adults (CB, CBF, SF, JN, LH, WBF), pp. 158–163.
HTHT-2013-WolffMC #data flow #named #using
Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HTHT-2013-WuCH #recommendation #using
Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDARICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval #using
Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDARICDAR-2013-AhmedSLD #segmentation #using
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-AlaeiDG #detection #probability #representation #using
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BaechlerLI #classification #using
Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDARICDAR-2013-BaiYL #correlation #locality #using
Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDARICDAR-2013-BaroniaN #reduction #using
Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDARICDAR-2013-BouillonLAR #gesture #learning #using
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDARICDAR-2013-BreuelUAS #network #using
High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDARICDAR-2013-ChengSAT #classification #data fusion #image #using #visual notation
Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDARICDAR-2013-ChowdhuryBP #distance #metric #online #recognition #using
Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDARICDAR-2013-DuAD #multi #scalability #using
Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDARICDAR-2013-FeildLS #probability #recognition #using
Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDARICDAR-2013-FielS #identification #retrieval #using #visual notation
Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDARICDAR-2013-Furukawa #composition #using
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-GotoIFU #graph #scalability #set #using
Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDARICDAR-2013-HamdaniMN #composition #recognition #using
Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDARICDAR-2013-HerzogSN #graph #retrieval #using
Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDARICDAR-2013-HuC #classification #pseudo #using