12257 papers:
CBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented #using- Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSA-2015-AgrawalP #adaptation #framework #towards #using #web- Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSA-2015-GalsterA #agile #architecture #comprehension #development- Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSA-2015-HansenM #automation #community #composition #detection #using- (Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech #using- Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
ECSA-2015-WangC #architecture #network #performance #social- A Specialised Social Network Software Architecture for Efficient Household Water Use Management (ZW, AC), pp. 146–153.
QoSA-2015-HofigZS #automation #dependence #using- Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
CASE-2015-AmriBARF #multi #robust #using- Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASE-2015-ArdakaniORJ #generative #predict #realtime #using- Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASE-2015-BergagardF #automation #on the #using- On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASE-2015-CarliDEAV #automation #evaluation #using- Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASE-2015-CarliDPR #energy #multi #optimisation #performance #using- Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASE-2015-ChengHL #automation #petri net #robust #synthesis #using- Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASE-2015-ChenH #assembly #automation #distributed #petri net #using- Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASE-2015-DobslawGZ #challenge #industrial #network- Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASE-2015-FarhanPWL #algorithm #machine learning #predict #using- Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
CASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism #using- A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASE-2015-FerreiraBGV #framework #using- Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASE-2015-ForstnerM #optimisation #safety #using- Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASE-2015-GiulianiC #optimisation #problem- Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASE-2015-JiaJCS #locality #named #using- SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASE-2015-KaipaTSKLG #automation #using- Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASE-2015-KeroglouH #communication #constraints #distributed #using- Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASE-2015-KimCLJ #design #estimation #using- Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASE-2015-KreutzerRREL #automation #detection #metric #using- Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASE-2015-LeeKK #online #parametricity #using- Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASE-2015-LiangSQLY #agile #assessment #development #using- Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASE-2015-LinZW #predict #realtime #using- Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASE-2015-LiuC #algorithm #evaluation #performance #quality #using- A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASE-2015-McKinleyGSKMNLP #single use- A single-use haptic palpation probe for locating subcutaneous blood vessels in robot-assisted minimally invasive surgery (SM, AG, SS, RK, AM, KAN, SL, SP, PA, AMO, KG), pp. 1151–1158.
CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASE-2015-MillerM #locality #using- Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASE-2015-ParisACAR #behaviour #learning #markov #smarttech #using- Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming #using- Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASE-2015-QuangTH #adaptation #using- FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASE-2015-RoyelYLLH #identification #optimisation #parametricity #using- A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASE-2015-SaksenaNKK #2d #assembly #automation #parametricity #using- Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling #using- Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network #using- Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASE-2015-TorresP #multi #using- Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASE-2015-WahrburgMCMD #estimation #using- Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASE-2015-WareS #synthesis #using- Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASE-2015-Yen #realtime #using- Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASE-2015-ZafarKSMJA #health #monitoring #process #using- Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASE-2015-ZhangTYL #assessment #markov #reliability #using- CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASE-2015-ZhuCS #energy #linear #process #recognition #using- Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASE-2015-ZonEHJVSB #detection #multi #realtime #using- Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
DAC-2015-AsadJ #programming #using #verification- Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #using #validation- Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DAC-2015-Engblom #integration #using- Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DAC-2015-HanKL #design #evaluation #using- Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DAC-2015-HelalBH #parallel #simulation #using- Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DAC-2015-HerdtLD #simulation #using #verification- Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DAC-2015-LahiouelZT #smt #towards #using- Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based #using- Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis #using- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DAC-2015-TashjianD #identification #on the #using- On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DAC-2015-TsaiYPLTCC #design #energy #in memory #memory management #using- Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DAC-2015-XuLP #adaptation #modelling #physics #statistics #using- Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation #using- An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATE-2015-AhsanK #architecture #optimisation #quantum #using- Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability- Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATE-2015-BaldwinBRPB #analysis #array #predict #using- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATE-2015-BarraganL #case study #feature model #using- Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATE-2015-BillointSRVBFRC #2d #3d #design #using- A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATE-2015-CakirM #clustering #correlation #detection #hardware #using- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
DATE-2015-ChangD #analysis #model checking #modelling #using- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics #using- Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATE-2015-CuiZSW #towards #using- Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATE-2015-DarkeCVSM #approximate #bound #model checking #using- Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATE-2015-ErolOSPB #metric #using- On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATE-2015-FernandoWNKC #agile #algorithm #design #synthesis #using- (AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATE-2015-HashemianSWWCP #array #authentication #robust #using- A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATE-2015-HerberRWH #realtime #scheduling #using- Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATE-2015-JiRML #hardware #implementation #logic #network #probability #using- A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATE-2015-KauerNLSC #geometry #optimisation #programming #using- Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATE-2015-LiaperdosSATAL #deployment #performance #using- Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATE-2015-LiJHWCGLKW #design #optimisation #using- Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATE-2015-LiXWNP #fine-grained #multi #power management #reduction #using- Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATE-2015-LourencoMH #using- Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATE-2015-MadhukarSWKM #abstraction #lazy evaluation #using #verification- Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability #using- MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATE-2015-PaulinoFBC #configuration management #execution #hardware #using- Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATE-2015-RanjanRVPRR #configuration management #memory management #named #using- DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATE-2015-SaifhashemiHBB #equivalence #logic #tool support #using- Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATE-2015-SalfelderH #adaptation #evaluation #simulation #using- Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATE-2015-ShutoYS #architecture #case study #comparative #using- Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATE-2015-StrobelBOSP #named #using- Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATE-2015-SunKPE #algebra #geometry #using #verification- Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATE-2015-TangXLLCWY #network #question- Spiking neural network with RRAM: can we use it for real-world application? (TT, LX, BL, RL, YC, YW, HY), pp. 860–865.
DATE-2015-TanLF #memory management #reliability #using- Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATE-2015-TeysseyreNOCCG #performance #set #simulation #using- Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATE-2015-TouatiBDGVBR #functional #power management #source code #testing- Exploring the impact of functional test programs re-used for power-aware testing (AT, AB, LD, PG, AV, PB, MSR), pp. 1277–1280.
DATE-2015-VenkataramanKSE #design #heuristic #using- Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATE-2015-WengCCHW #using- Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATE-2015-YuSHEAB #library #multi #statistics #using- Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATE-2015-ZhuM #linear #machine learning #optimisation #programming #using- Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
DocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary #using- Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEng-2015-LesnikovaDE #rdf #using- Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRR-2015-BideaultMCP #architecture #regular expression #using #word- Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRR-2015-MehriSHGAM #documentation #image #segmentation- Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRR-2015-PengCN #approach #using- Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRR-2015-RabaevCEK #documentation #programming #using- Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRR-2015-SitaramHPSK #recognition #using #word- Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRR-2015-StalnakerZ #retrieval #using- Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HT-2015-BlountMW #logic #social #web- An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
PODS-2015-CateCST #ontology #using- High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMOD-2015-BarthelsLAK #in memory #using- Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media #using- DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability #using- Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMOD-2015-TuR #named #query #using- DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMOD-2015-UpadhyayaBS #automation #policy- Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
SIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel #using- Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMOD-2015-XiaoBME #metadata #summary #using- Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMOD-2015-YanZHSMZM #detection #distributed #using- Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMOD-2015-ZhangCPSX #graph #statistics #using- Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDB-2015-DeutchGM #datalog #query #source code #using- Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDB-2015-HeCMPS #named #synthesis #using- DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDB-2015-HeGC #corpus #named #semantics #using- SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDB-2015-LazersonSKSGS #distributed #monitoring #using- Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDB-2015-ParkMS #pipes and filters #probability #query #using- Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDB-2015-ShinWWSZR #incremental #knowledge base #using- Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEET-2015-SedanoP #experience #student #using- Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
ITiCSE-2015-Dickson #development #education #game studies #using- Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSE-2015-Harms15a #java #using- Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSE-2015-KirkpatrickP #assurance #operating system #process #using- Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSE-2015-MishraI #data type #student- Question-Posing strategies used by students for exploring Data Structures (SM, SI), pp. 171–176.
ITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSE-2015-TarmazdiVSFF #learning #using #visualisation- Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSE-2015-WangMSLCW #data access #education #named #using #visualisation- RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
FASE-2015-AndriescuMI #automaton #data type #using- Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
TACAS-2015-BransenBCD #attribute grammar #order #scheduling #using- Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACAS-2015-KriouileS #formal method #using #verification- Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACAS-2015-Thierry-Mieg #model checking #using- Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
ICPC-2015-CosmaM #component #comprehension #using #visual notation #web- Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPC-2015-Escobar-AvilaVH #bytecode #categorisation #using- Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPC-2015-HillSP #evaluation #feature model- Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPC-2015-JbaraF #empirical #eye tracking #how #using- How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPC-2015-LafetaMR #dynamic analysis #framework #using- Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPC-2015-MacLeodSB #developer #documentation #how #using- Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPC-2015-MartinCAA #analysis #empirical #open source- Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPC-2015-SaiedABS #api #library #question #source code #using- Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using- Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSME-2015-CorleyDK #feature model #learning- Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSME-2015-DongAS #fault #static analysis #using- Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSME-2015-DorningerPK #industrial #static analysis #user interface #using- Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSME-2015-HardtM #empirical #evaluation #maintenance #using- An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSME-2015-MedicherlaKN #specification #using #verification- Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSR-2015-BlincoeHD #ecosystem #git #identification #using- Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSR-2015-BosuGB #code review #empirical- Characteristics of Useful Code Reviews: An Empirical Study at Microsoft (AB, MG, CB), pp. 146–156.
MSR-2015-DonadelliZR #case study #fault #replication #using- Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSR-2015-WangPWG #comprehension #git #what- What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSR-2015-ZanjaniKB #developer #using- Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANER-2015-BezemerPG #comprehension #difference #graph #performance #using- Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANER-2015-CabotICR #open source- Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANER-2015-HuSLL #development #evolution #modelling #topic #using- Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANER-2015-LaverdiereBM #analysis #composition #graph #using- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANER-2015-NayrollesHTL #approach #debugging #model checking #named #using- JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANER-2015-QiuSM #graph #identification #library #morphism #using- Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAM-2015-BonifacioCRKC #c++ #exception- The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAM-2015-ChochlovEB #data flow #feature model #using- Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAM-2015-LemosPSL #code search #query #question #scalability- Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAM-2015-PanditaJSW #api #mining #using- Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using- Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAM-2015-RenatusBE #modelling #security #using- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation- On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
PLDI-2015-BarowyGHZ #named #relational #spreadsheet #using- FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDI-2015-CraryS #peer-to-peer #using- Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDI-2015-GonnordMR #ranking #synthesis #using- Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
SAS-2015-AdjeGM #generative #invariant #optimisation #polynomial #using- Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
STOC-2015-AggarwalDRS #problem #using- Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOC-2015-Czumaj #network #permutation #random #using- Random Permutations using Switching Networks (AC), pp. 703–712.
ICALP-v1-2015-KhotS #approximate #using- Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FM-2015-0001K #bound #model checking #using- Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FM-2015-AlTurkiA #distributed #framework #towards #using #verification #𝕂- Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FM-2015-MirandaMR #automation #design #generative #testing #using #verification- Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FM-2015-Nakajima #behaviour #energy #maude #realtime #using- Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
SEFM-2015-JonesY #abstraction #reasoning #using- Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing #using- Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFM-2015-SavaryFLL #modelling #robust #testing #using- Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFP-2015-Russo #functional #haskell- Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
ICFP-2015-SteuwerFLD #functional #generative #performance #using- Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
GCM-2015-BottoniNP #constraints #contract #modelling #policy- Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination #using- Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGT-2015-WeberDP #formal method #graph transformation #monitoring #using- Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHI-2015-AsenieroWLRTC #named #release planning #using #visualisation- STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation #using- Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer #using- A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHI-2015-BentleyC #composition #mobile- The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHI-2015-DaltonCM #using- Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social #using- Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHI-2015-FleckCR #bound #multi #using- Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHI-2015-GaoYHF #automation #collaboration #game studies #how #multi- Improving Multilingual Collaboration by Displaying How Non-native Speakers Use Automated Transcripts and Bilingual Dictionaries (GG, NY, AMJH, SRF), pp. 3463–3472.
CHI-2015-GerlingML #game studies #video- Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHI-2015-Gilbert #abstraction- Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages (EG), pp. 477–486.
CHI-2015-GoelZVP #detection #flexibility #gesture #named #using- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHI-2015-GrevetG #prototype #scalability #social #using- Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHI-2015-GunaratneN #behaviour #performance #user interface #using- Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHI-2015-HaqueNV #named #using- Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHI-2015-HiguchiCCZL #experience #named #using- ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHI-2015-HillmanW #approach #social #social media- Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHI-2015-HinikerSSSLK #how #mobile- Texting while Parenting: How Adults Use Mobile Phones while Caring for Children at the Playground (AH, KS, HS, YCS, CPL, JAK), pp. 727–736.
CHI-2015-HolzBK #identification #mobile #named #using- Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHI-2015-HourcadeMWP #analysis #exclamation #using- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHI-2015-HydeCKH #interactive #persuasion #using- Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHI-2015-JonesCDTPDH #delphi #information management #using- “For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHI-2015-KatanGF #development #interactive #interface #machine learning #people #using- Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHI-2015-KjeldskovSPLMN- Eco-Forecasting for Domestic Electricity Use (JK, MBS, JP, DL, TM, MN), pp. 1985–1988.
CHI-2015-KosmallaDK #automation #metric #named #recognition #using- ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHI-2015-LeeLCWSK #education #interactive #online #social #using- Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHI-2015-LopesJB #communication- Affordance++: Allowing Objects to Communicate Dynamic Use (PL, PJ, PB), pp. 2515–2524.
CHI-2015-LugerURG #design #game studies #process #using- Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHI-2015-MaiorPSW #human-computer #reliability #using- Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHI-2015-MariakakisGAPW #mobile #named #using- SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHI-2015-ParkPN- The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHI-2015-PatelO- Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHI-2015-PfeifferDSAR #using- Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHI-2015-PierceP #design #multi- Making Multiple Uses of the Obscura 1C Digital Camera: Reflecting on the Design, Production, Packaging and Distribution of a Counterfunctional Device (JP, EP), pp. 2103–2112.
CHI-2015-PreistJ #education #game studies #motivation- The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHI-2015-RobbPKC #crowdsourcing #design #feedback #question- Crowdsourced Feedback With Imagery Rather Than Text: Would Designers Use It? (DAR, SP, BK, MJC), pp. 1355–1364.
CHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics #using- Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHI-2015-SlegersRVD #elicitation #game studies #research #user interface #using- Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHI-2015-TholanderN #experience #performance- Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHI-2015-VertanenMERK #mobile #named #performance #using- VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHI-2015-WangGXZYB #interactive #named #privacy #using #visualisation- VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHI-2015-ZugerF #developer #predict #using- Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCW-2015-BakhshiKS #comprehension #online #question- Understanding Online Reviews: Funny, Cool or Useful? (SB, PK, DAS), pp. 1270–1276.
CSCW-2015-BossenG #collaboration #design #flexibility- Collaboration in-between: The Care Hotel and Designing for Flexible Use (CB, EG), pp. 1289–1301.
CSCW-2015-ChangHT #recommendation #using- Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCW-2015-FreitasD15a #detection #multi #using- Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCW-2015-KaziunasBJCHA #health- Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCW-2015-KoYLHJLSYSC #named #self #smarttech- NUGU: A Group-based Intervention App for Improving Self-Regulation of Limiting Smartphone Use (MK, SY, JL, CH, JJ, UL, DS, KY, JS, KMC), pp. 1235–1245.
CSCW-2015-LiuIP #comprehension #how #maintenance #quote- “I’m Not Like My Friends”: Understanding How Children with a Chronic Illness Use Technology to Maintain Normalcy (LSL, KMI, WP), pp. 1527–1539.
CSCW-2015-MaddockSASOM #behaviour #multi #online #using- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCW-2015-MatthewsMCMHB #community #what- They Said What?: Exploring the Relationship Between Language Use and Member Satisfaction in Communities (TM, JUM, JC, MM, EMH, HB), pp. 819–825.
CSCW-2015-ProstMT #design #energy #towards #using- From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCW-2015-WangNMRW #social #social media #student- Coming of Age (Digitally): An Ecological View of Social Media Use among College Students (YW, MN, GM, SMR, MW), pp. 571–582.
CSCW-2015-XuRDB #design #feedback #process #using- A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
DHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition #using- Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
DHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition #using- Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
DHM-EH-2015-IkenoboMK- Usefulness of Ikebana a Nursing Care Environment (YI, YM, AK), pp. 441–447.
DHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process #using- Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
DHM-EH-2015-MeryS #modelling #requirements #using- Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
DHM-EH-2015-NakamuraKKMK #development #self #student #using- Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
DHM-EH-2015-UchidaHKEMOUG #analysis #process #using- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
DHM-EH-2015-ZhengBISEL #behaviour #monitoring #using- Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
DHM-HM-2015-FurukawaTKG #evaluation #image #using- Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
DHM-HM-2015-IkenoboWSG #difference #how- Differences in How Long an Ikebana Work Lasts Depending on the Skill Used in Cutting Floral Materials (YI, ZW, YS, AG), pp. 74–82.
DUXU-DD-2015-AsthanaS #modelling #named #testing #usability #using #xml- Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
DUXU-DD-2015-MichailidouHL #how- How to Evaluate Use Scenarios and Stories (IM, CH, UL), pp. 609–620.
DUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media- Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
DUXU-IXD-2015-DasBRD #co-evolution #design #generative- The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
DUXU-IXD-2015-HalbeyKZ- Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
DUXU-IXD-2015-IwamotoKM #analysis #case study #using- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
DUXU-IXD-2015-SchwartzK #challenge #design- The Challenges and Opportunities of Designing National Digital Services for Cross-Border Use (MS, HK), pp. 104–115.
DUXU-UI-2015-AyanogluBTD #artificial reality #case study #using- Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
DUXU-UI-2015-DuWDXJ #case study #metric #using- Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
DUXU-UI-2015-EshetB #design #development #mobile- Approaching Users and Context of Use in the Design and Development of Mobile Systems (EE, HB), pp. 508–519.
DUXU-UI-2015-LiHF #quality #requirements #scalability #user interface #using- Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCI-DE-2015-Hensely-Schinkinger #design- The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCI-DE-2015-Kurosu #quality #usability- Usability, Quality in Use and the Model of Quality Characteristics (MK), pp. 227–237.
HCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #using #visualisation- Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCI-DE-2015-SantosST #interactive #open source #using #visualisation- Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCI-DE-2015-SchutzSO #using- Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCI-DE-2015-SugiuraSO #implementation #metric #security #using- Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCI-DE-2015-WatsonS #assessment #using- Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCI-IT-2015-BandeiraCXK #gesture #interface #using- Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCI-IT-2015-FukumotoTE #detection #using- Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCI-IT-2015-GuXCZ #using- To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCI-IT-2015-HakodaKSST #bound #gesture #mobile #named #using- AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCI-IT-2015-KondoTT #communication #smarttech #using- Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCI-IT-2015-KuribaraST #using- Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCI-IT-2015-MullerLBSKSW #bibliography #data-driven #network #predict #using- Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCI-IT-2015-MurataM #analysis #eye tracking #using- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCI-IT-2015-Nagaraju #framework #gesture #using- Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCI-UC-2015-AzhariF #approach #experience #social #social media #user interface #using- Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCI-UC-2015-ClarkeBK #experience #question #using #what- What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCI-UC-2015-OhJK #approach #human-computer #simulation #using- Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCI-UC-2015-SpeiginerMBRLLB #artificial reality #evolution #framework #web- The Evolution of the Argon Web Framework Through Its Use Creating Cultural Heritage and Community-Based Augmented Reality Applications (GS, BM, JDB, HR, AJL, LML, LDB, MG, MS, BD, ME, RJC, EDM), pp. 112–124.
HCI-UC-2015-Ujita #analysis #reliability #using- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HIMI-IKC-2015-FilhoHTJM #smarttech #using- Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using- A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HIMI-IKC-2015-ItaiM #development #interactive #using- Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HIMI-IKC-2015-KajitaTMI #3d #design #using- Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HIMI-IKC-2015-MayerBPGV #automation #generative #process #using #visualisation- Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation #using- A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HIMI-IKC-2015-SturreCVS #assessment #eye tracking #using- Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HIMI-IKC-2015-TogawaK #collaboration #framework #using- Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HIMI-IKC-2015-UeokaK #interactive #using- Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HIMI-IKC-2015-UjitokoH #interface #using- Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HIMI-IKD-2015-AraiOM #using #web- A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HIMI-IKD-2015-ChouSW #case study #quality #using- Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HIMI-IKD-2015-ItouNM #information management #twitter #using- Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HIMI-IKD-2015-IwamotoH #induction #using- Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HIMI-IKD-2015-JungLB #multi #question- Voice Control System and Multiplatform Use: Specialist Vs. Generalist? (SJ, KML, FB), pp. 607–616.
HIMI-IKD-2015-KalkattawiN #ubiquitous #using- Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HIMI-IKD-2015-KastratiIY #classification #documentation #framework #using- A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HIMI-IKD-2015-KotaniIAS #interface #using #variability- Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HIMI-IKD-2015-MatsunoAIMM #using- Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HIMI-IKD-2015-MorizumiA #analysis #using- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation- Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour #using- Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HIMI-IKD-2015-WinterSTMCSVS #learning #question #student- Learning to Manage NextGen Environments: Do Student Controllers Prefer to Use Datalink or Voice? (AW, JS, YT, AM, SC, KS, KPLV, TZS), pp. 661–667.
HIMI-IKD-2015-YoshinoO #using- Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
LCT-2015-BoonbrahmKB #artificial reality #learning #student #using- Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
LCT-2015-DalipiYK #analysis #performance #semantics #using- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
LCT-2015-HiramatsuIISS #case study #communication #mobile #using- A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
LCT-2015-IbanezN #design #implementation #multi #using- Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
LCT-2015-PyperLWJ #mobile #personalisation- The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
LCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous #using- Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
LCT-2015-SebilloTVPG #artificial reality #interface- The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
LCT-2015-Sein-EchaluceBG #education #information management #social #using- A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
SCSM-2015-BeldadK #facebook #risk management- It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
SCSM-2015-HongK #interactive #online #social #social media- Are Social Media Useful for Managing Reputation Online?: Comparing User Interactions Online with Reputation Indicators (JYJH, JHK), pp. 207–215.
SCSM-2015-KastratiIYD #analysis #network #online #social #using- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
SCSM-2015-ManssourSSFS #image #network #social #using #visualisation- Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
AdaEurope-2015-JaradatBP #analysis #maintenance #safety #using- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
CAiSE-2015-Francescomarino #using #workflow- Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using- Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEIS-v1-2015-BorgesDRAS #approach #generative #using- An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEIS-v1-2015-BouakkazLO #distance #named #similarity #using- GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using- Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEIS-v1-2015-Marques-LucenaA #framework #information management #using- Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEIS-v1-2015-MpindaMSR #database #graph #simulation #using- Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEIS-v1-2015-RezendeJ #concurrent #process #using #workflow- Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation #using- Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEIS-v1-2015-SarmentoCG #network #streaming #using- Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEIS-v1-2015-VaroneA #multi #using- Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEIS-v2-2015-AizebojeP #approach #pointer #using- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process #using- On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #using #web- Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEIS-v2-2015-KamalKVB #performance- Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEIS-v2-2015-MagnavitaNM #evolution #using- Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #using #visualisation- VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml #using- Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing #using- Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEIS-v3-2015-NyameB #information management- The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using- Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process #using- BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling #using- An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
ICEIS-v3-2015-ValentimCM #analysis #case study #specification- Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIR-2015-ChongDL #modelling #predict #topic #using- Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIR-2015-Dutta #approximate #mining #named #statistics #string #using- MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIR-2015-GogMP #identification #on the #statistics #using- On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIR-2015-HagenPBS #classification #detection #sentiment #twitter #using- Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIR-2015-JameelLB #modelling #parametricity #topic #using- Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIR-2015-LiC #effectiveness #using- Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIR-2015-LimCLK #community #constraints #detection #using- Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIR-2015-LuoZDY #design #using- Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIR-2015-MaddalenaMST #estimation #using- Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICML-2015-AvronH #community #detection #personalisation #rank #using- Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICML-2015-ChangYXY #detection #semantics #using- Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICML-2015-LeC #learning #metric #using- Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICML-2015-SnoekRSKSSPPA #network #optimisation #scalability #using- Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICML-2015-Sohl-DicksteinW #learning #using- Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICML-2015-SrivastavaMS #learning #using #video- Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICML-2015-SunQW #optimisation #taxonomy #using- Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICML-2015-UbaruMS #approximate #fault #matrix #rank #using- Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICML-2015-ZhuE #approach #hybrid #probability #random #using- A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDD-2015-AhnKLRW #distributed #matrix #probability #scalability #using- Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDD-2015-FuLPXGZZ #modelling #ranking- Real Estate Ranking via Mixed Land-use Latent Models (YF, GL, SP, HX, YG, HZ, CZ), pp. 299–308.
KDD-2015-GleichM #algorithm #graph #learning #using- Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDD-2015-IkonomovskaJD #predict #realtime #using- Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDD-2015-JohanssonD #geometry #graph #learning #similarity #using- Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDD-2015-KotziasDFS #using- From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDD-2015-MayaMMAY #clustering #using- Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDD-2015-MomtazpourZRSR #cyber-physical #invariant #using- Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDD-2015-Ojjeh #open source #realtime #using- Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDD-2015-PengKLC #approximate #clustering #rank #using- Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDD-2015-SethiYRVR #classification #machine learning #scalability #using- Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDD-2015-ShanahanD #distributed #scalability #using- Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDD-2015-SomanchiALEG #predict #using- Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDD-2015-WangYLXXCR #predict #using- Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDD-2015-WeiLMCRS #predict #using- Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDD-2015-YuanBM #process #re-engineering #using- Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDD-2015-ZhengYX #composition #linear #modelling #topic #using- Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDM-2015-Babu #classification #identification #using- Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDM-2015-CostaFK #multi #using- Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDM-2015-GovadaJMS #approach #hybrid #induction #learning #using- Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDM-2015-MoldovanM #data mining #learning #mining #performance #using- Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDM-2015-PatchalaBG #email #using- Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDM-2015-TreechalongRW #clustering #using- Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation #using- Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSys-2015-AharonAADGS #named #recommendation- ExcUseMe: Asking Users to Help in Item Cold-Start Recommendations (MA, OA, NAE, DDC, SG, OS), pp. 83–90.
RecSys-2015-BanksRS #game studies #recommendation #using- The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social #using- A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSys-2015-MagnusonDM #process #recommendation #twitter #using- Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
RecSys-2015-MarinhoTP #algorithm #question #recommendation- Are Real-World Place Recommender Algorithms Useful in Virtual World Environments? (LBM, CT, DP), pp. 245–248.
SEKE-2015-CaoHH #design #evaluation #quality #using- Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKE-2015-CavalcanteRC #experience #named #user interface- MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
SEKE-2015-ChavezM #information retrieval #ontology #query #using- An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKE-2015-DingZ #modelling #petri net #using- Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKE-2015-GoswamiWS #learning #performance #using- Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKE-2015-ManiPW #co-evolution #modelling #performance #using- Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based #using- A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKE-2015-NetoSZD #network #using- Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards #using- Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKE-2015-Tasse #analysis #identification #metric #using- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKE-2015-TrinkenreichSCS #metric #process #towards #using- Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKE-2015-TunnellA #fault #modelling #predict #release planning #using- Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKE-2015-WuCZX #c++ #developer #empirical #how #library- How do developers use C++ libraries? An empirical study (DW, LC, YZ, BX), pp. 260–265.
SEKE-2015-XuB #multi #reliability #using- A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIR-2015-AlbakourMO #data type #identification #metadata #topic #using- Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial #using- Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIR-2015-CapraACV #complexity #difference- Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIR-2015-Kiseleva #behaviour #information management #using- Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIR-2015-LiLZS #matrix #modelling #multi #retrieval #using- Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIR-2015-LiuAH #information retrieval #probability #using- Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIR-2015-Lu #statistics #using- Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIR-2015-MehrotraY #learning #query #rank #using- Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIR-2015-Mitra #distributed #query #using- Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIR-2015-NovakBZ #image #retrieval #scalability #using- Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIR-2015-ParkC #concept #retrieval #using- Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIR-2015-WeiG #summary #twitter #using- Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIR-2015-YaoSQWSH #recommendation #social #using- Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
ECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism #using- Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMT-2015-HilkenBGV #development #modelling #using- Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
MoDELS-2015-Fernandez-SaezC #bibliography #documentation #industrial #maintenance #on the #uml- On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELS-2015-HajriGBS #approach #case study #embedded #industrial #lessons learnt #modelling #product line- Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELS-2015-LuddeckeSSS #modelling #network #using- Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELS-2015-NguyenGA #case study #requirements- Integrating goal-oriented and use case-based requirements engineering: The missing link (THN, JCG, MA), pp. 328–337.
MoDELS-2015-RagoMD #case study #identification #semantics- Identifying duplicate functionality in textual use cases by aligning semantic actions (SoSyM abstract) (AR, CM, JADP), p. 446.
MoDELS-2015-SongLASDC #architecture #formal method #probability #using #verification- Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract) (SS, YL, MA, JS, JSD, TC), p. 449.
MoDELS-2015-StephanC #clone detection #detection #identification #using- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
MoDELS-2015-ValentimROCM #case study #empirical #specification #usability- A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques (NMCV, JR, ACO, TC, SM), pp. 206–215.
Onward-2015-CitoLGDKR #developer #feedback #metric #runtime #using- Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLA-2015-MastrangeloPMLH #api #java- Use at your own risk: the Java unsafe API in the wild (LM, LP, AM, ML, MH, NN), pp. 695–710.
OOPSLA-2015-VoelterDKE #c #case study #embedded #using- Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
GPCE-2015-InostrozaS #algebra #composition #using- Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCE-2015-SeidlSS #design pattern #development #generative #product line #using #variability- Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
PPDP-2015-RondogiannisT #logic programming #using- Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
PADL-2015-BassedaK #logic #transaction #using- State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
POPL-2015-BastaniAA #context-free grammar #reachability #specification #using- Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
SAC-2015-BolockA #automation #constraints #generative #towards #using- Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SAC-2015-ByunC #automation #constraints #operating system #safety #testing #using- Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social #using- Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SAC-2015-ChaudhuriMG #network #predict #using- QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SAC-2015-CorcoglionitiRM #rdf #sorting #streaming #using- Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SAC-2015-DabainMT #design pattern #detection #using- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SAC-2015-DarabiG #personalisation #summary #using #video- Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SAC-2015-DasK #using- Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring #using- A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SAC-2015-GouthamLY #authentication #protocol #smarttech #using- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SAC-2015-HamataniUH #smarttech #using- Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SAC-2015-HozanoFSFC #detection #developer #feedback #smell #using- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SAC-2015-HublerRFS #data flow #named #using- P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SAC-2015-JeongYAYP #algorithm #interactive #network #search-based #using- Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SAC-2015-Jo #algorithm #image #interactive #search-based #using- Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SAC-2015-JuniorL #case study #named #reuse #specification- M-4REuse: reusing use cases specifications (MMCJ, ML), pp. 1390–1396.
SAC-2015-KaplanisKSMT- HB+tree: use hadoop and HBase even your data isn’t that big (AK, MK, SS, CM, GT), pp. 973–980.
SAC-2015-KimK #scalability #using- Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SAC-2015-KimL #diagrams #qvt #sequence chart #using- Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SAC-2015-KrutzMS #analysis #detection #effectiveness #using- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SAC-2015-LeTN #requirements #using #verification- Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SAC-2015-LiuI #clustering #framework #optimisation #parallel #using- An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SAC-2015-MainiS #communication #distributed #multi #using- Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml- Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SAC-2015-MottaMSMPC #3d #image #re-engineering- All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
SAC-2015-OliveiraQMM #community #complexity #detection #using- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SAC-2015-PintoMCS #process #using- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SAC-2015-Rekha #big data #detection #performance #using- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance #using- G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SAC-2015-RodriguesJD #recommendation #using- Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SAC-2015-SilvaBAR #clustering #multi #prototype #using- Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SAC-2015-SilvaMR #algorithm #approach #problem #using- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SAC-2015-SilvaSBVS #assessment #framework #process #using- Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SAC-2015-SioutisSC #composition #graph #on the #reasoning- On the use and effect of graph decomposition in qualitative spatial and temporal reasoning (MS, YS, JFC), pp. 1874–1879.
SAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability #using- pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SAC-2015-TizzeiABC #architecture #case study #product line #tool support #using- Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SAC-2015-XuanLXT #empirical #fault #metric #predict #set #using- Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SAC-2015-XuYYHHK #multi #predict #using- Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
ESEC-FSE-2015-HammoudiBBR #debugging #on the #web- On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSE-2015-KargenS #slicing #source code #using- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSE-2015-NguyenGA #case study #modelling #rule-based- Rule-based extraction of goal-use case models from text (THN, JCG, MA), pp. 591–601.
ESEC-FSE-2015-NorthBSC #developer #named #using- GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation #using- MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSE-2015-WangPGBI #automation #case study #named #specification #testing #tool support- UMTG: a toolset to automatically generate system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 942–945.
ESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing #using- Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSE-2015-XuKB #ubiquitous #using- Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using- Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSE-v1-2015-CasalnuovoDOFR #git- Assert Use in GitHub Projects (CC, PTD, AO, VF, BR), pp. 755–766.
ICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing #using- Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source #using- Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSE-v1-2015-MorenoBPOM #how #question- How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSE-v1-2015-PetrosyanRM #api #classification #information management #using- Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSE-v1-2015-YangXALXE #behaviour #mobile #named #using- AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named #using- ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval- The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #using #video- scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSE-v2-2015-CamilloniVA #evaluation #re-engineering #using- Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSE-v2-2015-Cornu #debugging #named #null #using- Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library #using- Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSE-v2-2015-GveroK #interactive #query #synthesis #using- Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSE-v2-2015-HerzigN #detection #empirical #using- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSE-v2-2015-LutellierCGTRMK #architecture #dependence #using- Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering #using- Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSE-v2-2015-SadeghiBM #analysis #android #security #using- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SLE-2015-GammaitoniKG #design #using- Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLE-2015-OchoaRT #feature model #modelling #using- Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
SPLC-2015-BeekFGM #analysis #product line #using- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLC-2015-BeucheH #lifecycle #product line #using- Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi #using- Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLC-2015-DimovskiABW #model checking #off the shelf #using- Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLC-2015-DudderRH #composition #design #staged #type safety #using- Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLC-2015-PatelS #as a service #automation #testing #using #variability- Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
ASPLOS-2015-OrrCYBHW #using- Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using- Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOS-2015-TanQCAP #named #network #using- DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CGO-2015-NagarajG #analysis #approximate #mining #pointer #using- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGO-2015-StepanovS #c++ #detection #memory management #named #performance- MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
HPCA-2015-HungerKRDVT #comprehension #using- Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCA-2015-LoCIS #monitoring #runtime #using- Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCA-2015-WuGLJC #estimation #machine learning #performance #using- GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDC-2015-HeSSI #cost analysis #online #using- Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMM-2015-OsterlundL #concurrent #protocol #using- Concurrent compaction using a field pinning protocol (EÖ, WL), pp. 56–69.
LCTES-2015-BardizbanyanSWL #data access #performance #using- Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PPoPP-2015-RamachandranM #concurrent #named #performance #using- CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSP-2015-ChenZCCKZ #file system #hoare #logic #using- Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSP-2015-RaychevMM #execution #symbolic computation #using- Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSP-2015-WeiSCCC #in memory #performance #transaction #using- Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
CADE-2015-GransdenWR #automaton #named #proving #using- SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADE-2015-MaricJM #correctness #higher-order #proving #using- Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADE-2015-Paulson #automaton #finite #formal method #set #using- A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADE-2015-TiwariGD #synthesis #using- Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAV-2015-BacchusK #satisfiability #set #using- Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAV-2015-CernyCHRRST #scheduling #synthesis #using- From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAV-2015-DeshmukhMP #consistency #metric #using- Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAV-2015-ErezN #automation #bound #graph #smt #using- Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLP-2015-Charwat #diagrams #programming #research #summary #using- Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC).
ICLP-2015-LeeWZ #automation #programming #reasoning #set #using- Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ).
ICLP-2015-LiVPSB #debugging #using- Debugging ASP using ILP (TL, MDV, JP, KS, TB).
ICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code #using- Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLP-J-2015-KoponenOJS #optimisation #programming #set #using- Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICST-2015-0001YPGS #analysis #generative #testing #using- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICST-2015-BaiSP #fault #named #using- NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICST-2015-Felbinger #assessment #model inference #quality #testing #using- Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICST-2015-LeottaSRT #multi #robust #testing #using #web- Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICST-2015-MahajanH #detection #html #locality #using- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICST-2015-NoguchiWFSO #black box #optimisation #testing #using- History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICST-2015-PouldingF #generative #testing- Re-Using Generators of Complex Test Data (SMP, RF), pp. 1–10.
ICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml #using- Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICST-2015-SantosC #agile #challenge #industrial #mobile #testing #using- Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICST-2015-ZhangAC #exclamation #model checking #verification- Yes! You Can Use Your Model Checker to Verify OSEK/VDX Applications (HZ, TA, YC), pp. 1–10.
ISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based #using- Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTA-2015-WangPGBI #automation #case study #generative #specification #testing- Automatic generation of system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 385–396.
ISSTA-2015-WangPO #fault #locality- Evaluating the usefulness of IR-based fault localization techniques (QW, CP, AO), pp. 1–11.
LICS-2015-AccattoliC #on the- On the Relative Usefulness of Fireballs (BA, CSC), pp. 141–155.
RTA-2015-AvanziniST #certification #complexity #proving #using- Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
SAT-2015-AnsoteguiGLS #community #detection #using- Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAP-2015-AthanasiouLS #concurrent #generative #testing #using- Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification- Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing #using- Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAI-2015-NagarS #analysis #using- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSE-2014-BenedittoW #configuration management #runtime #using- Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSE-2014-MateescuSY #model checking #parallel #process #using- Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSA-2014-FreudenreichAFB #architecture #complexity #policy #using- Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance #using- Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution #using- Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
ASE-2014-Borg #debugging #re-engineering #using- Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASE-2014-CaiS #dependence #impact analysis #named #precise #using- Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASE-2014-DeweyRH #constraints #fuzzing #logic programming #using- Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASE-2014-DingesA #execution #generative #using- Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASE-2014-HamidiAL #adaptation #using- Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASE-2014-LiuSLZWDW #automation #case study #detection #documentation #fault- Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASE-2014-LutzD #comparison #data flow #difference #interactive #programming #using #visual notation- Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASE-2014-MaezawaNWH #ajax #using #validation- Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASE-2014-MahajanH #comparison #html #image #using- Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing #using- MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring #using- Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASE-2014-OsterlundL #component #concurrent #using- Concurrent transformation components using contention context sensors (EÖ, WL), pp. 223–234.
ASE-2014-RajanSSK #execution #using- Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASE-2014-RanganathVG #comparison #testing #using- Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management #using- Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
CASE-2014-ChenLL #adaptation #design #predict #using- Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASE-2014-ChenS #approach #markov #modelling #novel #using- Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASE-2014-FeyzabadiC #markov #process #using- Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using- A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASE-2014-GlorieuxDSL #approach #optimisation #using- Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASE-2014-HsiehHP #generative #predict #using- Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASE-2014-HuCLY #approach #automation #comparative #petri net #using- A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASE-2014-KernWGBM #estimation #machine learning #using- COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASE-2014-LeePP #locality #using- Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASE-2014-LinHC #gesture #network #recognition #using- Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASE-2014-LinWF #using- Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASE-2014-LiWC #using- Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASE-2014-MahlerKLSMKPWFAG #learning #process #using- Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASE-2014-MalinowskiCZ #estimation- Shapelet-based remaining useful life estimation (SM, BCM, NZ), pp. 794–799.
CASE-2014-NagataO #approach #multi #using- Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASE-2014-ParkLH #generative #performance #using- Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASE-2014-WahrburgZMD #assembly #estimation #using- Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
DAC-2014-AdirGGS #generative #network #testing #using- Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DAC-2014-AthavaleMHV #analysis #source code #test coverage #using- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DAC-2014-ChangJC #configuration management #functional #using- Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DAC-2014-GebalaMMRT #on the #using- On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DAC-2014-KhosraviRGT #multi #optimisation #reliability #using- Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DAC-2014-LiuCTKD #component #realtime #using- Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DAC-2014-LiuFC #process #self #using- Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DAC-2014-LuCCSHTC #named #using- ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DAC-2014-MaoWZCL #architecture #memory management #using- Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art #using- Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DAC-2014-PrussKE #abstraction #equivalence #scalability #using #verification- Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DAC-2014-QuintonBHNNE #analysis #design #network- Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DAC-2014-RaoEST #multi #using- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DAC-2014-RenMRZ #fault tolerance #network #using- Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DAC-2014-RoyKCBC #streaming #using- Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DAC-2014-StoermerT #functional #interface #mockup #standard #using- Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DAC-2014-TsaiCYYHCCC #energy #using- Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DAC-2014-VaidyanathanDP #detection #reliability #stack #using- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DAC-2014-WeiWNP #physics #reverse engineering #using- Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DAC-2014-YuSHEAB #metric #parametricity #using- Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATE-2014-AhariAKT #architecture #configuration management #power management #using- A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATE-2014-AlaghiH #performance #probability #using- Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATE-2014-BalckGP #generative #modelling #protocol #testing #using- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATE-2014-Braak #adaptation #embedded #scalability #using- Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATE-2014-CannellaBS #approach #realtime #scheduling #streaming #using- System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATE-2014-CasparLH #automation #strict #testing #using- Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATE-2014-ConosMDP #coordination #energy #power management #using- Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATE-2014-DoanJP #flexibility #implementation #multi #scalability #using- Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATE-2014-FerentD #comparison #mining #novel #synthesis #using- Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATE-2014-FriedlerKMNS #effectiveness #locality #slicing #using- Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATE-2014-KamalGAP #approximate #performance #using- Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATE-2014-LagraaTP #data mining #mining #scalability #simulation #using- Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATE-2014-LeeA #architecture #hybrid #novel #power management #using- A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATE-2014-MahmoodPM #performance #reduction #using- Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATE-2014-MarianiPZS #design #named #predict #scheduling #simulation #using- DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATE-2014-MoralesHBHV #energy #implementation #using- Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATE-2014-NarayananDCCLW #using #video- Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATE-2014-ReimerSSB #using- Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATE-2014-Sadri0WWB #3d #energy #optimisation #using- Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATE-2014-SarafBLR #probability #using- IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATE-2014-ShinPM #architecture #hybrid #using- Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATE-2014-TurkyilmazCRBC #3d #integration #using- 3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATE-2014-VartziotisKCPJ #multi #optimisation #using- Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATE-2014-VijaykumarV #analysis #canonical #statistics #using- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATE-2014-YangMPOP #logic #using- Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATE-2014-ZangenehJ #design #feedback #logic #using- Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
DocEng-2014-Fan0N #using- Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEng-2014-Lynch #evolution- The evolving scholarly record: new uses and new forms (CAL), pp. 1–2.
DocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #using #wiki- An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEng-2014-SouzaMH #metadata #named #using- ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRR-2014-BanerjeeC #locality #using #video- Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRR-2014-JainOD #documentation #image #retrieval #scalability #using- Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRR-2014-KleberDS #classification #retrieval #using #word- Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRR-2014-LemaitreCC #image #segmentation #using- Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRR-2014-ParkerFF #documentation #heuristic #image #robust #using- Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRR-2014-TaoTX #documentation #learning #random #using- Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HT-2014-AbbasiTL #learning #scalability #using- Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HT-2014-NoorianMV #adaptation #feedback #self #using- Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
SIGMOD-2014-DyresonBG #query #using- Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters #using- SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMOD-2014-HeMD #policy #privacy #trade-off #using- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMOD-2014-KalininCZ #data analysis #interactive #semantics #using- Interactive data exploration using semantic windows (AK, UÇ, SBZ), pp. 505–516.
SIGMOD-2014-LevinK #network #pipes and filters #social #using- Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation #using- Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDB-2014-FuOPZ #component #declarative #javascript #named #using- FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDB-2014-SarmaHC #clustering #framework #named #similarity #using- ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability #using- Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDB-2014-YangDCC #keyword #knowledge base #using- Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDB-2014-YuMS #random #using- Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDB-2014-ZhangJSR #big data #recommendation #using- Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDB-2015-Li0QYZ014 #query #set #using- Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDB-2015-WangZZLW14 #correlation #estimation #streaming #using- Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability #using- MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEET-2014-AkpolatS #gamification #programming #re-engineering #student #using- Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEET-2014-Lethbridge #development #education #effectiveness #modelling #using- Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEET-2014-SedelmaierL #modelling #process #requirements #using- Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEET-2014-ShankararamanD #challenge #design #education #re-engineering #using- Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEET-2014-Steppe #analysis #dependence #design #education #graph #using- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSE-2014-BenottiMS #student #using- Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSE-2014-GibsonM #collaboration #tool support- A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSE-2014-Kann #using- Using reflections in a program integrating course (VK), p. 350.
ITiCSE-2014-MedinaSGG #learning #student #using- Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSE-2014-MI14a #principle #problem #using- Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSE-2014-StrieweG14a #runtime #using- Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ESOP-2014-MatosGR #fault #named #using- REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOP-2014-PercontiA #compilation #multi #semantics #using #verification- Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASE-2014-AnjorinSLS #graph grammar #refinement #using- Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASE-2014-MasciZJCT #user interface #using #verification- Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using- Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASE-2014-StruberRTC #crawling #information retrieval #modelling #using- Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
TACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic #using- Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACAS-2014-SalemDKT #automaton #invariant #model checking #testing #using- Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACAS-2014-WijsB #manycore #named #on the fly #using- GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLA-2014-BaeM #infinity #model checking #using- Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using- Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
CSMR-WCRE-2014-Grosjean #biology #maintenance #using- Using biology and ecology as inspiration for software maintenance? (Keynote abstract) (PG), p. 1.
CSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using- Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
CSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support #using- Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
CSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPC-2014-KulkarniM #framework #obfuscation #using- A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPC-2014-SuzukiSIH #approach #modelling #n-gram #using- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPC-2014-ThungLOC #classification #design #diagrams #metric #network #using- Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSME-2014-EddyK #code search #query #source code #using- Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSME-2014-EderFHJ #question- Which Features Do My Users (Not) Use? (SE, HF, BH, MJ), pp. 446–450.
ICSME-2014-MorenoTMS #debugging #locality #on the #stack- On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSME-2014-Reiss #code search #testing #towards #using- Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based #using- Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSME-2014-ShangNHJ #comprehension #development #using- Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSME-2014-StevensR #query #using- Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSME-2014-VieiraFC #embedded #maintenance #metric #performance #using- Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSME-2014-WangG #design #recommendation #refactoring #using- Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #using #visualisation- Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSR-2014-FukushimaKMYU #empirical #fault #modelling #predict #using- An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSR-2014-LazarRS #debugging #detection #metric #similarity #using- Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using- Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAM-2014-KallenHH #object-oriented #refactoring #using- Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using- Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAM-2014-RahmanR14a #exception #on the #recommendation- On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
PEPM-J-2013-Simon14 #type inference #using- Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PLDI-2014-DeVitoRFAH #generative #runtime #using- First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDI-2014-PekQM #c #data type #logic #proving #using- Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
SAS-2014-ChenHTWW #recursion #source code #using #verification- Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
STOC-2014-MillerS #protocol #quantum #robust #using- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
STOC-2014-SahaiW #encryption #how #obfuscation- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
FLOPS-2014-Bahr #compilation #correctness #graph #proving #using- Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPS-2014-Riesco #debugging #declarative #maude #semantics #using- Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
CIAA-2014-AmorimMR #canonical #finite #linear #transducer #using- Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
DLT-2014-ReinhardtY- The Minimum Amount of Useful Space: New Results and New Directions (KR, AY), pp. 315–326.
ICALP-v1-2014-Lampis #approximate #graph #using- Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALP-v1-2014-PrabhakaranSW #using- Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FM-2014-LakshmiAK #analysis #liveness #reachability #using- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FM-2014-SanatiMM #decidability #guidelines #logic #metric #using- Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FM-2014-ShanWFZZWQC #using #verification- Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
IFM-2014-BrideKP #constraints #specification #theorem proving #using #verification #workflow- Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFM-2014-BianculliGK #logic #metric #pipes and filters #using- Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction #using- Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFM-2014-DuboisR #functional #using- Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFM-2014-HajisheykhiEK #fault #modelling #using- Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFM-2014-ReicherdtG #matlab #modelling #using #verification- Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
ICFP-2014-Fisher #formal method #using- Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
GT-VMT-2014-WangBL #alloy #graph #model transformation #using #verification- Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHI-2014-AferganPSJHBCJ #metric #using- Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHI-2014-BalataCM #2d #on the #using- On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHI-2014-BurkeK #facebook #network #social- Growing closer on facebook: changes in tie strength through social network site use (MB, REK), pp. 4187–4196.
CHI-2014-ChiravirakulP #question- Choice overload in search engine use? (PC, SJP), pp. 1285–1294.
CHI-2014-DancuFF #navigation #using- Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHI-2014-FeinbergCB #database #design #interactive #using- Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHI-2014-FritzHMZ #case study #persuasion #process- Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHI-2014-GerlingMBMO #game studies #people #persuasion #towards #using- The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHI-2014-GoelLAPBHB #interactive #multi #named #using- SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHI-2014-GronvallKPR #interface- Causing commotion with a shape-changing bench: experiencing shape-changing interfaces in use (EG, SK, MGP, MKR), pp. 2559–2568.
CHI-2014-HachisuF #feedback #interactive #interface #named #using- VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHI-2014-HarbachHWS #communication #privacy #security #using- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHI-2014-HarpsteadMAM #design #education #game studies #using- Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHI-2014-HayashiMH #gesture #identification #using- Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHI-2014-HeoGL #using- Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHI-2014-HongA #modelling #performance #predict #recommendation #user interface- Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHI-2014-HuangTTTYCHC #named #using- TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHI-2014-HuangYWZLMLZS #named #using- FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHI-2014-JuhlinEO #video- Long tail TV revisited: from ordinary camera phone use to pro-am video production (OJ, AE, EÖ), pp. 1325–1334.
CHI-2014-KihmGKM #interactive #power management #symmetry #using- Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHI-2014-KulshreshthL #3d #gesture- Exploring the usefulness of finger-based 3D gesture menu selection (AK, JJLJ), pp. 1093–1102.
CHI-2014-LaseckiWFB #dependence #using- Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHI-2014-LiR #online #using- Using annotations in online group chats (NL, MBR), pp. 863–866.
CHI-2014-LuFL #gesture #using- Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHI-2014-MarananASPSB #design #modelling #using- Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHI-2014-MasseyLW #repository- Cloudy forecast: an exploration of the factors underlying shared repository use (CM, TL, SW), pp. 2461–2470.
CHI-2014-MorrisSGK #named #smarttech #using- RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHI-2014-MottW #lens #using- Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHI-2014-NielsenH #case study- Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHI-2014-OKaneRB #mobile- Gaining empathy for non-routine mobile device use through autoethnography (AAO, YR, AEB), pp. 987–990.
CHI-2014-PasqualW #predict #using- Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHI-2014-PedersenSH #scalability #using- Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHI-2014-PikeMPSW #protocol #using- Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #using #video- Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHI-2014-PuciharCA #visual notation- The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHI-2014-SchildLM #3d #behaviour #design #game studies #using #video- Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHI-2014-SchwarzXMHH #classification #probability #using- Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHI-2014-SerranoEI- Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHI-2014-ShklovskiMSB #mobile #privacy- Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.
CHI-2014-Smith-ClarkeMC #communication #mobile #network #using- Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHI-2014-SoloveyZPRM #performance #using- Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHI-2014-SuhPHK #design #evaluation #twitter #using- @BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHI-2014-SunDLLG #case study #using- Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHI-2014-TanSLC #collaboration #using #visual notation- Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHI-2014-TsandilasABB #coordination- Coordination of tilt and touch in one- and two-handed use (TT, CA, AB, DB), pp. 2001–2004.
CHI-2014-UzorB #game studies- Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHI-2014-WangL #communication #gesture #similarity #using- Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHI-2014-WeigelMS #comprehension #how #mobile #people- More than touch: understanding how people use skin as an input surface for mobile computing (MW, VM, JS), pp. 179–188.
CHI-2014-WeiMZ #social #using- Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CHI-2014-YeMOF #mobile #people #smarttech #visual notation- Current and future mobile and wearable device use by people with visual impairments (HY, MM, UO, LF), pp. 3123–3132.
CHI-2014-ZhaoL #comprehension #social #social media- Curation through use: understanding the personal value of social media (XZ, SEL), pp. 2431–2440.
CSCW-2014-CastilloEPS #lifecycle #online #social #social media #using- Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCW-2014-ChenHMN #comprehension #social #social media #word- Understanding individuals’ personal values from social media word use (JC, GH, JM, JN), pp. 405–414.
CSCW-2014-CoetzeeFHH #question- Should your MOOC forum use a reputation system? (DC, AF, MAH, BH), pp. 1176–1187.
CSCW-2014-DesjardinsNGW #collaboration- Collaboration surrounding beacon use during companion avalanche rescue (AD, CN, SG, RW), pp. 877–887.
CSCW-2014-FieslerB #online- Remixers’ understandings of fair use online (CF, AB), pp. 1023–1032.
CSCW-2014-KellyP #case study #collaboration #web- Collaborative web search in context: a study of tool use in everyday tasks (RK, SJP), pp. 807–819.
CSCW-2014-LiuBRW #social #social media- Enriching the distressing reality: social media use by chinese migrant workers (JL, AB, DWR, VW), pp. 710–721.
CSCW-2014-LiuJPP #feedback #using #visual notation- Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCW-2014-MarkGKJ #enterprise #social #social media- Most liked, fewest friends: patterns of enterprise social media use (GM, IG, SKD, MJ), pp. 393–404.
CSCW-2014-MassimiBWA #community #health #online- Life transitions and online health communities: reflecting on adoption, use, and disengagement (MM, JLB, HOW, OHA), pp. 1491–1501.
CSCW-2014-Morris #network #social #women- Social networking site use by mothers of young children (MRM), pp. 1272–1282.
CSCW-2014-NakazatoYSNTH #realtime #using #video- Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCW-2014-Quinones- Cultivating practice & shepherding technology use: supporting appropriation among unanticipated users (PAQ), pp. 305–318.
CSCW-2014-XuHB #design #feedback #generative #named #using #visual notation- Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCW-2014-YueHH #collaboration #modelling #process #using #web- Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
DHM-2014-DuWZHM #evolution #image #using- Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
DHM-2014-HamamuraFYE- Evacuation Support System for Everyday Use in the Aftermath of a Natural Disaster (AH, TF, TY, NE), pp. 600–611.
DHM-2014-Kull #using- Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
DHM-2014-Luo #artificial reality #case study #metric #re-engineering #using- Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
DHM-2014-MamessierDO #artificial reality #assessment #online #using- Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
DHM-2014-OkaGTNH #analysis- Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
DHM-2014-RasoolSPK #image #using- Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
DHM-2014-SantosST #information management #ontology #semantics #using #web- Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
DHM-2014-YoganathanK #using- ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
DUXU-DI-2014-BarrosSF- Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
DUXU-DI-2014-EschrichKKHG #mobile #using- Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
DUXU-DI-2014-SchusterHBRJ #experience #how #using- Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
DUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
DUXU-DP-2014-ItoHN #design #interface #social #using- Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
DUXU-DP-2014-SilvaPS #analysis #concept #using- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
DUXU-ELAS-2014-Chunpir0B #comprehension #using- Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
DUXU-ELAS-2014-GeabelJHABA #identification #using- Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
DUXU-ELAS-2014-KamiyaKASNMF #design #using- Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
DUXU-ELAS-2014-MontAlvao #bibliography #health #using- Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
DUXU-ELAS-2014-VilarDRNV #artificial reality #case study #using- A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
DUXU-TMT-2014-AvilaL #usability- Relationship between Elements of the Usability and Emotions Reported after Use: A Mexican Case (ICLÁ, LRPL), pp. 285–295.
DUXU-TMT-2014-Bergamo #experience #prototype #user interface- User Experience Technique in Computer Digital Arts Production: Paper Prototyping Used as Material to Define Intentionality (MLB), pp. 613–621.
DUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using- Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
DUXU-TMT-2014-HeimgartnerSH #agile #usability #using- Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
DUXU-TMT-2014-JoyceK #development #internet #self- Measuring Confidence in Internet Use: The Development of an Internet Self-efficacy Scale (MJ, JK), pp. 250–260.
DUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface #using- Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition #using- The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCI-AIMT-2014-ChakravartyC #artificial reality #identification #using- Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCI-AIMT-2014-KuribaraMOST #named #using- HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCI-AIMT-2014-Man #hardware #using #video- Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCI-AIMT-2014-NiLF #interactive #using- Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCI-AIMT-2014-ReddyC #artificial reality #process #recognition #using- Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov #using- View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCI-AIMT-2014-TsurudaHYI #mobile #using- Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive #using- “Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality #using- Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCI-AS-2014-DotencoGG #smarttech #using- Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCI-AS-2014-KadomuraITRS #named #using #visualisation- AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCI-AS-2014-LeeYJ #predict #using- Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCI-AS-2014-MaguireT #comparison #mobile- Comparison Test of Website Use with Mobile Phone and Laptop Computer (MM, MT), pp. 146–154.
HCI-AS-2014-OgataII #smarttech #using- Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCI-AS-2014-ParkKL #case study #smarttech- A Study of Emoticon Use in Instant Messaging from Smartphone (TWP, SJK, GL), pp. 155–165.
HCI-AS-2014-SatoIN- Tourist Evacuation Guidance Support System for Use in Disasters (TS, TI, YN), pp. 494–501.
HCI-TMT-2014-BrownTBKLMCEGA #design #using- Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability #using- ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCI-TMT-2014-HankiewiczB #performance #quality #source code #using #word- Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface #using- Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net #using- PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface #using- Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HIMI-AS-2014-AlkhateebHH #comprehension #using- The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HIMI-AS-2014-IizukaG #mobile #using- Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HIMI-AS-2014-KangSCL #case study #eye tracking- A Study of Drivers’ Blind Spot in Used of Eye Tracking (YYK, YCS, CCC, CLL), pp. 253–260.
HIMI-AS-2014-MakiY #3d #image #multi #using- 3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HIMI-AS-2014-MoorthyV- Voice Activated Personal Assistant: Acceptability of Use in the Public Space (AEM, KPLV), pp. 324–334.
HIMI-AS-2014-TanakaTH #development #education #using- Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HIMI-AS-2014-TogawaK #collaboration #framework #smarttech #using- Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards #using- Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HIMI-DE-2014-ChangT #case study- A Study of the Factors Affecting Product Values and Preferences-Using Vacuum Cleaner as an Example (WcC, HyT), pp. 561–571.
HIMI-DE-2014-HottaOM #user interface #using- Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HIMI-DE-2014-JungAK #interface #using #web- A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HIMI-DE-2014-KatoM #deployment #modelling #quality #using- Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HIMI-DE-2014-KhodaskarL #image #retrieval #semantics #using- Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HIMI-DE-2014-SakaguchiIH #development #performance #using- Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HIMI-DE-2014-SakuraiKNTH #pseudo #using- Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HIMI-DE-2014-SugayaNT #clustering #recognition #using- Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining #using- User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support #using- Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
HIMI-DE-2014-ValdezSZH #clustering #network #research #scalability #social #visualisation- Enhancing Interdisciplinary Cooperation by Social Platforms — Assessing the Usefulness of Bibliometric Social Network Visualization in Large-Scale Research Clusters (ACV, AKS, MZ, AH), pp. 298–309.
LCT-NLE-2014-NicolaouC- Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
LCT-NLE-2014-OrehovackiBJ #education #quality #web- Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
LCT-TRE-2014-GoodeC #collaboration #online #performance #predict- Online Collaboration: Individual Involvement Used to Predict Team Performance (AWG, GC), pp. 408–416.
LCT-TRE-2014-HafnerHO #artificial reality #physics #using- Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
LCT-TRE-2014-HiramatsuIFS #development #learning #using- Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
LCT-TRE-2014-SofticVMWE #research #using- Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
LCT-TRE-2014-Timotheou- Reflective Thinking: Exploring Blog Use by Adult Learners (MMT), pp. 460–466.
LCT-TRE-2014-TzanavariMCP #experience #performance #user interface #using- User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
SCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named #using- Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
SCSM-2014-AbdallaY #bibliography #network #online #process #social #using- A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
SCSM-2014-Ahangama #detection #realtime #social #social media #twitter- Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
SCSM-2014-FardounAG #community #education- Useful Educational Exercises for the Community (HMF, DMA, LCG), pp. 314–321.
SCSM-2014-HuangG #empirical #health #network #social #using- Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
SCSM-2014-MendesFFC #analysis #classification #how #social #using- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
SCSM-2014-OtakeSOSUS #gamification #motivation #using- A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
SCSM-2014-PensasVGKKCV #communication #network #social #using- Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
SCSM-2014-RayaRRP #adaptation #game studies #using- Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
SCSM-2014-SchaarVZELJ #motivation #network #social #using- Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFT-2014-SchotsW #framework #using #visualisation- Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics #using- Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSE-2014-PikaWFHLA #behaviour #framework #using- An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval #using- Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #using #variability- Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSE-2014-VergneS #community #markov #network #open source #using- Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEIS-v1-2014-CoelhoAABB #network #using- Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap #using- Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEIS-v1-2014-KleinSRF #formal method #integration #on the #using- On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based- The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEIS-v1-2014-MamcenkoG #mobile #predict #using- Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel #using- An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring #using- Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters #using- Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEIS-v2-2014-BarretoFSJ #formal method #petri net #using- A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation #using- Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEIS-v2-2014-GippMBPN #detection #semantics #similarity #using #visualisation- Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using- Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEIS-v2-2014-KaramtiTG #image #network #process #retrieval #using- Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEIS-v2-2014-MeloS #design #modelling #uml #using- Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEIS-v2-2014-OtonBGGB #learning #metadata #using- Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEIS-v2-2014-SilvaMS #aspect-oriented #bibliography #evaluation #performance #programming- A Systematic Review on Performance Evaluation of Aspect-Oriented Programming Techniques used to Implement Crosscutting Concerns (RFGdS, MdAM, MSS), pp. 5–13.
ICEIS-v2-2014-ThommazoRROHWF #traceability #using- Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy #using- Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process #using- Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEIS-v3-2014-NunoG #in the cloud #outsourcing #using- Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process #using- A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEIS-v3-2014-RibeiroS #case study #evaluation #usability- A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEIS-v3-2014-ZacepinsBA #using- Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKM-2014-AgrawalGKK #concept #graph #similarity #using- Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKM-2014-CarmelMPS #analysis #community #using- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKM-2014-DavletovAC #predict #using- High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKM-2014-FangQHZ #bibliography #composition #ranking #sentiment #summary #using- Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKM-2014-HanWP #classification #using- Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKM-2014-HustonC #comparison #dependence #modelling #retrieval #using- A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKM-2014-LiuLK #classification #information management #performance #using- Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKM-2014-NguyenTT #crowdsourcing #similarity #using- Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKM-2014-PfeifferNB #learning #network #probability #using- Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKM-2014-RahmanH #network #strict #using- Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKM-2014-RenTOS #how #people #scalability #web- How People Use the Web in Large Indoor Spaces (YR, MT, KO, MS), pp. 1879–1882.
CIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using- Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKM-2014-YangLLLH #automation #clustering #detection #multi #social #using- Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKM-2014-ZhuMHZC #social #social media #topic #using- Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIR-2014-Aly #normalisation #parametricity #using- Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIR-2014-GaoWO #comparison #using- Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #using #video- Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIR-2014-KapteinKVB #semantics #using #web- Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIR-2014-LefortierSRR #case study #using #video #web- Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIR-2014-Lommatzsch #realtime #recommendation #using- Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIR-2014-PanemBGV #detection #realtime #topic #twitter #using- Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIR-2014-SchuthSWR #case study #optimisation #using- Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIR-2014-YangPSS #case study #e-commerce #query #scalability #using- A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICML-c1-2014-LiuJL #approximate #kernel #performance #using- Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics #using- Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICML-c2-2014-ChagantyL #modelling #using #visual notation- Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICML-c2-2014-Chen0 #big data #learning #modelling #topic #using- Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICML-c2-2014-Cherian #nearest neighbour #using- Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICML-c2-2014-GalG #parallel #process- Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICML-c2-2014-JohanssonJDB #geometry #graph #kernel #using- Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random #using- A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICML-c2-2014-SchwingHPU #algorithm #convergence #parallel #using- Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using- Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICML-c2-2014-TamarMX #approximate #robust #scalability #using- Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPR-2014-AlathariNB #segmentation #using- Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPR-2014-AlemdarKNME #behaviour #modelling #using- A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPR-2014-AlmogahedK #game studies #named #using- NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPR-2014-AzizWH #graph #kernel #using- Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPR-2014-BashbaghiGSB #multi #using- Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPR-2014-BekhetA #using #video- Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPR-2014-BeraM #multi #realtime #using- Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPR-2014-BicegoRFRG #behaviour #using- Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPR-2014-BiswasZLMV #analysis #detection #image #using- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPR-2014-BogunKCR #interactive #recognition #using- Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPR-2014-BorgiLEA14a #multi #recognition #using- Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPR-2014-BrownFP #detection #self #using- Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPR-2014-BuiNK #graph #music #using- Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPR-2014-BuiNLYK #detection #order #statistics #using- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPR-2014-ByeonLB #2d #classification #network #using- Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPR-2014-CaliskanA #using- Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPR-2014-ChanK #geometry #identification #image #using- Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry #using- Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPR-2014-ChenK #gesture #recognition #using- Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPR-2014-ChenLHLLH #detection #using- Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPR-2014-ChenWLHI #image #robust #segmentation #using- Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPR-2014-ChevallierCA #estimation #image #metric #orthogonal #using- Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPR-2014-ChironGM #behaviour #parametricity #using- Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPR-2014-Climent-PerezMR #detection #multi #using- Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPR-2014-DahlCB #image #multi #segmentation #using- Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPR-2014-DominguesMMSR #information management #recommendation #topic #using- Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPR-2014-DongPHLDJ #classification #network #using- Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPR-2014-DuanHZCZ #image #segmentation #using- A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPR-2014-DuCZ #aspect-oriented #identification #using- A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPR-2014-DuDA #modelling #topic #using- Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPR-2014-DuHZWD #case study #classification #design #network #online #recognition #using- A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPR-2014-ElmikatyS #detection #image #multi #using- Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPR-2014-EvangelidisSH #recognition #using- Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech #using- Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPR-2014-ForsbergM #image #segmentation- Evaluating Cell Nuclei Segmentation for Use on Whole-Slide Images in Lung Cytology (DF, NM), pp. 3380–3385.
ICPR-2014-GavriilidisT #classification #kernel #random #using- Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPR-2014-GeXYS #image #synthesis #using- Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPR-2014-GhoraiC #algorithm #composition #higher-order #image #using- An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPR-2014-GiordanoPS #estimation #kernel #modelling #using- Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPR-2014-GognaSM #matrix #using- Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPR-2014-Gonzalez-CastroDC #adaptation #classification #using- Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition #using- Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPR-2014-GuptaBVS #on the #using- On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPR-2014-HafemannOC #network #recognition #using- Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPR-2014-HaoXPSK #automation #semantics #topic #using- Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPR-2014-HaqBBA #modelling #segmentation #using- Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPR-2014-HasnatAT #clustering #image #using- Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPR-2014-HeDY0PJ #multi #random #using #visual notation- Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPR-2014-HuangZPZ #canonical #correlation #recognition #robust #using- Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPR-2014-HusainDT #random #using- Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPR-2014-HuWSC #detection #framework #robust #using- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPR-2014-HuynhCM #3d #constraints #geometry #using #video- Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPR-2014-IoannidisCL #clustering #modelling #multi #using- Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPR-2014-ItohIS #2d #image #linear #using- Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPR-2014-JangLSK #automation #classification #multi #using #video- Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPR-2014-JinIHS #approach #using- A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPR-2014-JoshiGG #automation #predict #using #visual notation- Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPR-2014-JudV #using- Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPR-2014-KacheleZMS #feature model #quality #recognition #using- Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPR-2014-KapsourasN #approach #recognition #using- Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPR-2014-KarM #fuzzy #using- Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPR-2014-KeceliC #approach #multimodal #using- A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPR-2014-KimP14a #3d #interactive #physics #using- Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPR-2014-KramarevZWL #categorisation #composition #image #representation #using- Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPR-2014-KuangOA #estimation #using- Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, KÅ), pp. 2419–2423.
ICPR-2014-KumarA2 #stack #using- Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using- Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPR-2014-KurtekS #analysis #segmentation #using- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPR-2014-LaiSTH #3d #using- 3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPR-2014-LandgrenOH #image #segmentation #using- A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPR-2014-LeeSL #3d #invariant #recognition #self #using- View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPR-2014-LeNVOT #documentation #retrieval #using- Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPR-2014-LiCGW #hybrid #interactive #recognition #using- A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPR-2014-LinH #analysis #using- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPR-2014-LiRPV #modelling #topic #using- Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPR-2014-LuoZW #image #segmentation #using- Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPR-2014-LuYXYWP #recognition #using- Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPR-2014-MaHXP #3d #approach #robust #using- A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPR-2014-MatsuoSY #detection #image #using- Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPR-2014-MittalKKK #recognition #using- Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPR-2014-MiyanS #consistency #image #using- Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition #using- Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPR-2014-MoilanenZP #agile #analysis #difference #using- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPR-2014-MolderCCH #automation #detection #reduction #using- Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPR-2014-MollerPB #analysis #quantifier #using- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPR-2014-MoriKNK #detection #using #video- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPR-2014-MoyouIP #3d #estimation #performance #retrieval #using- LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPR-2014-MuddamsettySTM #detection #using- Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPR-2014-NakashikaHTA #3d #recognition #using- 3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval #using- Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPR-2014-NguyenGVP #framework #parametricity #process #recognition #using- A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPR-2014-NguyenP #linear #multi #using- Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPR-2014-NieJ #learning #linear #using- Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPR-2014-NieKZ #learning #recognition #using- Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPR-2014-Nilsson #polynomial #using- Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPR-2014-NilssonAGF #detection #using- Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPR-2014-NishimuraOAN #image #modelling #speech #using #web- Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPR-2014-OhyamaYWK #recognition #using- Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPR-2014-OtteSZ #algorithm #named #using- ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPR-2014-PandaKC #graph #random #scalability #summary #using #video- Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPR-2014-PaudelDHV #2d #3d #locality #using- Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPR-2014-PerinaKB #array #classification #kernel #using- Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPR-2014-QureshiHA #probability #using- A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #using #video- Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance #using- Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPR-2014-RazavianASC #smarttech #using- Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPR-2014-RenL #gender #recognition #using- Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPR-2014-RingLRE #assessment #using- A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPR-2014-RosaCJPFT #clustering #network #on the #using- On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPR-2014-SaitoAFRSGC #learning #using- Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPR-2014-SamantaC #classification #using- Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPR-2014-SariE #analysis #detection #fault #independence #using- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPR-2014-SavakisRP #difference #gesture #learning #using- Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPR-2014-SaygiliMH #metric #similarity #using- Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPR-2014-SeckDT #3d #analysis #geometry #using- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPR-2014-Shirakawa #multi #performance #similarity #using- Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPR-2014-SlitiHBA #analysis #robust #using- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPR-2014-SongLZC #adaptation #performance #using- Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPR-2014-SuLTLT #recognition #using- Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPR-2014-SunTL #online #using- Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPR-2014-TabiaV #3d #classification #using- 3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPR-2014-TaniH #detection #robust #using- Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPR-2014-TaxSRM #performance #type system- The Effect of Aggregating Subtype Performances Depends Strongly on the Performance Measure Used (DMJT, HMJS, MJTR, PDM), pp. 3720–3725.
ICPR-2014-TegenWHOJMNA #image #segmentation #semantics #using- Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, KÅ), pp. 2281–2286.
ICPR-2014-TerissiPG #classification #random #using- Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPR-2014-VuEIYY #image #using- Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPR-2014-WangCH #hybrid #markov #multi #random #using #video- Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPR-2014-WangGJ #learning #using- Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPR-2014-WangS #automation #dataset #multi #segmentation #using- Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPR-2014-WangWJ14a #markov #modelling #recognition #using- Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPR-2014-WangYLZF #independence #recognition #using- Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition #using- View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPR-2014-XiaoCJF #recognition #using- Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPR-2014-XuS #learning #network #using- Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPR-2014-YamadaM #approach #behaviour #using- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPR-2014-YamashitaW #classification #using- k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPR-2014-YangD #identification #novel #using- Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPR-2014-YangTL #energy #image #recognition #using- Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPR-2014-YingWMYZ #problem #using- The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPR-2014-YuCK #distance #recognition #set #using- Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPR-2014-YuGZ #3d #recognition #using- Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPR-2014-YuncuHB #automation #modelling #recognition #speech #using- Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using- Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPR-2014-ZhangT #recognition #using #word- Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPR-2014-ZhangWGZZ #analysis #using #verification- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPR-2014-ZhangWL #using #video- Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDD-2014-GaddeAO #graph #learning #using- Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDD-2014-JinKSDGCPR #community #geometry #modelling #network #social #using- Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDD-2014-QianHJPZ #approach #distance #learning #metric #using- Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source #using- “Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDD-2014-SintosT #network #social #using- Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDD-2014-SrikantA #machine learning #programming #using- A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDD-2014-TayebiEGB #embedded #learning #predict #using- Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDD-2014-WangZQZ #using- Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDD-2014-WangZX #estimation #using- Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #using #video- Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDD-2014-Yoshida #adaptation #algorithm #linear #sketching #using- Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIR-2014-AbdallahI #classification #modelling #n-gram #using #web- URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIR-2014-AlahmadiJM #classification #concept #representation #using- Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIR-2014-BarcanteJDCCS #identification #mining #using- Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIR-2014-BatistaCRF #ambiguity #using #wiki- Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIR-2014-Bleiweiss #execution #machine learning #using- SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIR-2014-KudamaL #random #semantics #using- Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIR-2014-MorenoGV #data mining #mining #recognition #using #word- Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIR-2014-NagwanshiM #detection #semantics #sentiment #using- Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIR-2014-SatoNS #classification #kernel #using- A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEOD-2014-DogduKG #information management #ontology #using- Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEOD-2014-OlszewskaSM #design #ontology #owl #uml #using- Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEOD-2014-TarakciC #recommendation #using- Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMIS-2014-FrancoisMA #communication #design #email #problem #traceability #using- Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMIS-2014-Grim-Yefsah #case study #information management #process #requirements #using- A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KR-2014-ClercqBSCN #game studies #programming #set #using- Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KR-2014-Dyrkolbotn #how #set #using- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDM-2014-AbdullahiCM #approach #identification #novel #using- A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition #using- Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDM-2014-JavedA #classification #dataset #network #social #using- Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDM-2014-LarinSKKHC #classification #parametricity #representation #using- Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDM-2014-SandovalH #learning #network #using- Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDM-2014-SchraagenK #consistency #graph #using- Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSys-2014-BachrachFGKKNP #recommendation #using- Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSys-2014-BhagatWIT #learning #matrix #recommendation #using- Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSys-2014-KellerR #e-commerce #framework #named #recommendation- Cosibon: an E-commerce like platform enabling bricks-and-mortar stores to use sophisticated product recommender systems (TK, MR), pp. 367–368.
RecSys-2014-LercheJ #feedback #personalisation #ranking #using- Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSys-2014-LiuGWB #power of #using- Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKE-2014-ChenHQJ #performance #static analysis #using- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKE-2014-GuimaraesSALC #alloy #consistency #using #verification- A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKE-2014-GuptaAWD #empirical #modelling #verification- Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKE-2014-JaliGH #behaviour #case study #generative #ontology- Behavioral Model Generation from Use Cases Based on Ontology Mapping and GRASP Patterns (NJ, DG, PH), pp. 324–329.
SEKE-2014-JiangCKZD #model transformation #source code #testing #using- Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKE-2014-KaurKF #low cost #mining #using #web- Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named #using- CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKE-2014-ParkSHSHB #algorithm #resource management #search-based #using- Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKE-2014-SalmanSD14a #concept analysis #impact analysis #using- Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKE-2014-SinghS #machine learning #requirements #using- Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKE-2014-SouzaRS #empirical #predict #using- A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKE-2014-TianWHZG #feedback #recommendation #using #web #web service- Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKE-2014-Wang #composition #using #web #web service- QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKE-2014-WangGZ #network #predict #using- Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKE-2014-XuL #approach #architecture #automation #synthesis #using- Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKE-2014-XuL14a #ontology #reasoning #semantics #using- Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIR-2014-AnilSS #evolution #kernel #modelling #network #social #using- Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIR-2014-CeroniTKN #using- Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIR-2014-DaltonDA #knowledge base #query #using- Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation #using- Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIR-2014-Ifada #modelling #personalisation #recommendation #topic #using- A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIR-2014-KeikhaPC #metric #summary #using- Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIR-2014-KharazmiSSV #difference #using- Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIR-2014-KumarJF #detection #twitter #using- Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIR-2014-LeeTC #behaviour #multi #risk management- Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
SIGIR-2014-LivneGTDA #difference #named #recommendation #using- CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIR-2014-RoitmanHK #using- Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIR-2014-RoyVGC #query #segmentation #sequence #using- Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIR-2014-Sebastian #clustering #predict #semantics #using- Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIR-2014-WangariZA #case study #interface #multimodal- Discovering real-world use cases for a multimodal math search interface (KDVW, RZ, AA), pp. 947–950.
SIGIR-2014-WuKS #behaviour #online #using- Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKY-2014-Ben-Av #algebra #generative #multi #ontology #using- Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy #using- Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards #using- Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MoDELS-2014-ReggioLR #bibliography #uml #what- Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MoDELS-2014-ReggioLR #bibliography #uml #what- Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
ECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #using #virtual machine- Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
ECOOP-2014-MayerS #automation #domain-specific language #framework #java #multi #refactoring- Automated Multi-Language Artifact Binding and Rename Refactoring between Java and DSLs Used by Java Frameworks (PM, AS), pp. 437–462.
ECOOP-2014-NittaKT #framework #identification- Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
Onward-2014-TaeumelPSLH #data-driven #development- Interleaving of Modification and Use in Data-driven Tool Development (MT, MP, BS, JL, RH), pp. 185–200.
OOPSLA-2014-Desai0M #proving #reduction #source code #using- Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using- Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web- Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLA-2014-VoraKG #algorithm #consistency #named #parallel #using- ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PLATEAU-2014-SadowskiY #concurrent #detection #developer #how #tool support- How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
GPCE-2014-Asai #compilation #using- Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
PPDP-2014-Schopp #low level #source code #using- Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPL-2014-Feng #distributed #hybrid #modelling #probability #using- Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
PADL-2014-CampeottoPDFP #constraints #theorem proving- Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADL-2014-LakinP #compilation #functional #programming language #using- Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
POPL-2014-ChaudhuriCS #proving #synthesis #using- Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
RE-2014-AntonelliRLO #using- Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RE-2014-PorterLS #case study #experience #feedback #framework #requirements #using- Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RE-2014-SlavinLNB #diagrams #feature model #requirements #security #using- Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQ-2014-OjameruayeB #requirements #using- Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
SAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech #using- A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SAC-2014-Al-RefaiCF #modelling #runtime #using- Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SAC-2014-AnderssonDA #artificial reality #identification #using- Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SAC-2014-BergamascoN #3d #approach #feature model #retrieval #using- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming #using- Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SAC-2014-BoghratiHK #framework #process #using- Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SAC-2014-ChangHL #adaptation #clustering #optimisation #using- Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SAC-2014-ChoiKK #modelling #ontology #using- Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SAC-2014-Daniel #communication #protocol #using- Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SAC-2014-EngielCL #approach #concept #elicitation #using- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SAC-2014-GomesACHS #agile #development #framework #game studies #using- Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SAC-2014-HoritaHSNTO #approach #modelling #refinement #using- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SAC-2014-HuergoPD #approach #identification #modelling #using- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SAC-2014-JunAK #detection #using- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SAC-2014-KawsarAL #detection #multimodal #process #smarttech #using- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SAC-2014-KrikavaCF14a #domain-specific language #modelling #using- Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SAC-2014-LiMZ #using #visualisation- Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SAC-2014-ManhaesCZ #architecture #named #predict #using- WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SAC-2014-MehdiIHKDS #keyword- Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
SAC-2014-OmatuY #classification #smell #using- Smell classification using weakly responding data (SO, MY), pp. 213–214.
SAC-2014-PalVCS #detection #smarttech #using- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SAC-2014-ParkKC #framework #kernel #memory management #online #using- Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SAC-2014-PedrosaP #using- Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SAC-2014-PengYYHKH #3d #detection #multi #using- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SAC-2014-RossiLR #algorithm #classification #network #using- A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SAC-2014-SaarsenD #assessment #process #towards- Towards an assessment model for balancing process model production and use (TS, MD), pp. 1386–1392.
SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SAC-2014-SypeS #case study #online #requirements #social- Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SAC-2014-TragatschnigTZ #impact analysis #using- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SAC-2014-WijenayakeP #estimation #using #visual notation- Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SAC-2014-YokoyamaKM #using- Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SAC-2014-YoonY #authentication #network #using- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SAC-2014-ZardariBE #using- Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SAC-2014-Zheng #matrix #using- Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
FSE-2014-LalQ #using #verification- Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSE-2014-VakiliD #infinity #modelling #smt #using #verification- Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSE-2014-YeBL #debugging #learning #rank #using- Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSE-2014-ChenSJHNF #anti #detection #performance #using- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSE-2014-FritzBMYZ #development #metric #using- Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSE-2014-JungLRP #automation #detection #memory management- Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSE-2014-MinkuY #estimation #how #question- How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSE-2014-MiyashitaTA #modelling #spreadsheet #using- Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSE-2014-NguyenKWF #dynamic analysis #invariant #using- Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSE-2014-SingerFS #developer #how #re-engineering #twitter #using- Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSE-2014-YaoHJ #analysis #case study #equivalence #using- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSE-2014-ZayanAC #comprehension #empirical #using- Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SLE-J-2012-GuizzardiZ #concept #modelling #ontology #using- Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
SLE-2014-Ridge #combinator #context-free grammar #parsing #performance #using- Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
SPLC-2014-KnappRS #development #modelling #on the #product line #testing- On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLC-2014-Lantz #agile #case study #development #modelling #using- Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
SPLC-2014-YuZZJ #automation #case study #feature model #named- TDL: a transformation description language from feature model to use case for automated use case derivation (WY, WZ, HZ, ZJ), pp. 187–196.
ASPLOS-2014-RuanVLS #case study #experience #legacy #transaction #using- Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOS-2014-SantosRSW #mobile #runtime #using- Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CC-2014-Dinechin #code generation #using- Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CC-2014-SurendranBZS #array #using- Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
CGO-2014-YeSX #analysis #detection- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPCA-2014-KhanAWMJ #clustering #performance #using- Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCA-2014-KimLJK #architecture #gpu #memory management #named #using- GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDC-2014-XiangMA #matrix #pipes and filters #scalability #using- Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMM-2014-LiDL #liveness #modelling #using- Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMM-2014-Printezis #perspective #twitter #virtual machine- Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence #using- Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PPoPP-2014-AgrawalFSSU #data type #parallel #scheduling #source code- Provably good scheduling for parallel programs that use data structures through implicit batching (KA, JTF, BS, JS, RU), pp. 389–390.
PPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing #using- Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management #using- Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
CAV-2014-0001A #invariant #random #using- From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAV-2014-BinghamL #bound #fault #simulation #using #verification- Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAV-2014-LarrazNORR #proving #using- Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLP-J-2014-BartakZ #logic programming #problem #using- Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation #using- Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLP-J-2014-CominiTV #linear #logic #using- Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing #using- Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCAR-2014-GoreOT #calculus #implementation #using- Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCAR-2014-GoreTW #logic #proving #theorem proving #using- A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread #using- Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using- Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTA-2014-YandrapallyTSC #automation #robust #testing #using- Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing #using- Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
SAT-2014-BelovHM #proving #using- MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
SAT-2014-HeymanSMLA #using- Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
SAT-2014-WetzlerHH #named #performance #proving #using- DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml #using- Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAI-2014-GustavssonGL #analysis #execution #parallel #using- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis #using- Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSE-2013-BurtonS #correctness #data type #mixin #using- Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSE-2013-GortonLLED #case study #component #experience #using- Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSA-2013-DurdikR #design pattern #documentation #on the #using- On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
ASE-2013-AvazpourGG #automation #model transformation #specification #tool support #using #visualisation- Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASE-2013-Fard #behaviour #detection #distributed #independence #using- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASE-2013-GhaisasMA #case study #detection #documentation- Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASE-2013-HuangMM #proving #smt #using- Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing #using- Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASE-2013-KukrejaHT #game studies #testing #using- Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASE-2013-PalombaBPOLP #detection #smell #source code #using- Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASE-2013-SaadaHNS #model transformation #multi #optimisation #using- Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing #using- Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASE-2013-SahaLKP #debugging #information retrieval #locality #using- Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASE-2013-ScannielloGMM #clustering #fault #predict #using- Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASE-2013-Servant #analysis #debugging #using- Supporting bug investigation using history analysis (FS), pp. 754–757.
ASE-2013-VanciuA #architecture #constraints #using- Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASE-2013-Wu0LD #analysis #automation #component #dependence #using- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASE-2013-BagchiBNVSS #using- Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #using #visualisation- Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASE-2013-BjorkenstamGBCL #energy #industrial #performance #using- Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASE-2013-ChenZS #metric #using- A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASE-2013-FerreiraL #generative #multi #tool support #using- A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASE-2013-FerreiraR #comparison #design #layout #performance #simulation #using- Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASE-2013-Fries #agile #automation #fault #fuzzy #multi #using- Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASE-2013-Geldmann #image #monte carlo #simulation #using- Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASE-2013-GrosbardKTR #composition #network #using- A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASE-2013-HuZL #automation #performance #petri net #synthesis #using- Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASE-2013-IsmailH #3d #anti #higher-order #using- Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning #using- Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASE-2013-LanzaKPSS #analysis #automation #detection #fault #using- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASE-2013-LingoR #design #using- A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASE-2013-LuSXPO #automation #graph #multi #using- Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASE-2013-MarturiDP #image #performance #using- Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASE-2013-MohajeraniMF #automaton #composition #finite #using #verification- Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASE-2013-NammotoKH #assembly #modelling #using- Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation #using- Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASE-2013-ShisheieJBC #design #string #using- Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASE-2013-SoviziK #matrix #nondeterminism #parallel #random #using- Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASE-2013-WangBR #modelling #monitoring #using- Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASE-2013-XuJLYL #energy #optimisation #using- Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASE-2013-YueH #concurrent #robust #using- Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASE-2013-ZhangPJST #energy #interface #monitoring #scalability #using- A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASE-2013-ZhangYZH #design #using- Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
DAC-2013-BanerjeeDSC #adaptation #constraints #energy #performance #realtime- Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints (DB, SKD, SS, AC), p. 7.
DAC-2013-DevWR #3d #integration #testing #using- High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DAC-2013-GaillardonMABSLM #towards #using- Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DAC-2013-KarthikR #approximate #linear #modelling #named #using- ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DAC-2013-LeGHD #simulation #using #verification- Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DAC-2013-LiuYLC #named #using- DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DAC-2013-MillerVG #modelling #physics #statistics #using- Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DAC-2013-SchurmansZALACW #architecture #automation #communication #modelling #using- Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DAC-2013-SekitaniYTSS #using- Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics #using- Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DAC-2013-WangK #control flow #detection #hardware #kernel #named #performance #using- NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DAC-2013-YuLJC #classification #detection #feature model #using- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATE-2013-AhmadyanKV #algorithm #incremental #runtime #using #verification- Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATE-2013-AnanthanarayananGP #detection #fault #low cost #set #using- Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATE-2013-BackesR #reachability #using- Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATE-2013-BakshiH #reduction #smt #using- LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATE-2013-BernasconiCTV #using- Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATE-2013-BertaccoCBFVKP #on the- On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATE-2013-BrandonW #using- Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATE-2013-BraojosAA #classification #embedded #random #using- A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATE-2013-ChenD #parallel #predict #simulation #using- Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis #using- On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATE-2013-DeutschC #multi #using- Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATE-2013-EbrahimiDP #3d #algorithm #fault tolerance #using- Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATE-2013-GaoGB #fault tolerance #scheduling #using- Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATE-2013-Gomez-PradoCT #latency #optimisation #using- FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATE-2013-HasanA #analysis #fault #feedback #formal method #using- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATE-2013-HellwegeHPP #analysis #metric #reliability- Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATE-2013-HelmstetterCGMV #performance #simulation #using- Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATE-2013-HuNRK #detection #hardware #multimodal #using- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATE-2013-JooyaB #power management #using- Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATE-2013-LotfianJ #architecture #hardware #power management #smarttech #using- An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATE-2013-LukasiewyczSC #programming #using- Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATE-2013-MaricAV #architecture #hybrid #performance #reliability #using- Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATE-2013-PaternaR #problem #using- Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATE-2013-PontarelliOEW #detection #fault #using- Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATE-2013-QianJBTMM #analysis #named #performance #using- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATE-2013-RaminiGBB #3d #analysis #manycore #power management #using- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy #using- Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATE-2013-RustLP #architecture #complexity #using- Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATE-2013-ShreejithVFL #approach #configuration management #network #using- An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATE-2013-TzouBHC #bound #composition #using- Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATE-2013-UnutulmazDF #optimisation #using- Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATE-2013-VenkatesanSRR #energy #named #performance #using- DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATE-2013-WangXZWYWNW #using- Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction #using- FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATE-2013-YetimMM #streaming- Extracting useful computation from error-prone processors for streaming applications (YY, MM, SM), pp. 202–207.
DATE-2013-ZakharenkoAM #cpu #gpu #performance #using- Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATE-2013-ZhouZY #design #energy #memory management #network #using- The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
DocEng-2013-DoTT #documentation #taxonomy #using- Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEng-2013-NourashrafeddinMA #clustering #documentation #interactive #using- Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEng-2013-SatkhozhinaAA #random #recognition #using- Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEng-2013-TorabiDT #using- Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEng-2013-Vion-Dury #documentation #integration #owl #semantics #using- Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRR-2013-AriesON #algorithm #automation #classification #clustering #summary #using- Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRR-2013-KumarPR13a #composition #documentation #evaluation #using- Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRR-2013-KumarWGS #framework #keyword #using- Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRR-2013-MedjkouneMPV #approach #online #recognition #using- Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRR-2013-SrihariKTB #using #verification- Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRR-2013-ZhuHZ #image #recognition #retrieval #using- Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HT-2013-BellFFNHF #social #social media- Examining social media use among older adults (CB, CBF, SF, JN, LH, WBF), pp. 158–163.
HT-2013-WolffMC #data flow #named #using- Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HT-2013-WuCH #recommendation #using- Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval #using- Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDAR-2013-AhmedSLD #segmentation #using- A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDAR-2013-AlaeiDG #detection #probability #representation #using- Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDAR-2013-BaechlerLI #classification #using- Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDAR-2013-BaiYL #correlation #locality #using- Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDAR-2013-BaroniaN #reduction #using- Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDAR-2013-BouillonLAR #gesture #learning #using- Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDAR-2013-BreuelUAS #network #using- High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDAR-2013-ChengSAT #classification #data fusion #image #using #visual notation- Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDAR-2013-ChowdhuryBP #distance #metric #online #recognition #using- Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDAR-2013-DuAD #multi #scalability #using- Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDAR-2013-FeildLS #probability #recognition #using- Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDAR-2013-FielS #identification #retrieval #using #visual notation- Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDAR-2013-Furukawa #composition #using- A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDAR-2013-GebhardtGSD #authentication #detection #documentation #using- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDAR-2013-GotoIFU #graph #scalability #set #using- Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDAR-2013-HamdaniMN #composition #recognition #using- Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDAR-2013-HerzogSN #graph #retrieval #using- Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDAR-2013-HuC #classification #pseudo #using