BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
analysis
Google analysis

Tag #analysis

7357 papers:

CCCC-2020-FegadeW #data type #modelling #pointer #scalability #semantics #using
Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
CCCC-2020-PuriniBCB #image #pipes and filters #smt #using
Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
CGOCGO-2020-TanejaLR #precise #testing
Testing static analyses for precision and soundness (JT, ZL, JR), pp. 81–93.
CSLCSL-2020-Miquey #algebra #modelling
Revisiting the Duality of Computation: An Algebraic Analysis of Classical Realizability Models (ÉM), p. 18.
ICSAICSA-2019-DajsurenL #safety
Safety Analysis Method for Cooperative Driving Systems (YD, GL), pp. 181–190.
ICSAICSA-2019-TumaSB #data flow #design
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis (KT, RS, MB), pp. 191–200.
EDMEDM-2019-CaoPB #learning #performance
Incorporating Prior Practice Difficulty into Performance Factor Analysis to Model Mandarin Tone Learning (MC, PIPJ, GMB).
EDMEDM-2019-GitinabardBHL #online #platform #sequence #student #what
What will you do next? A sequence analysis on the student transitions between online platforms in blended courses (NG, TB, SH, CFL).
EDMEDM-2019-GuoB #collaboration #detection #using
Collaboration Analysis Using Object Detection (ZG, RB).
EDMEDM-2019-HicksCL #process #student #using
Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
EDMEDM-2019-Ikeda #education #learning #quality #using
Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
EDMEDM-2019-JoYKL #comparative #education #effectiveness #learning #online #word
A Comparative Analysis of Emotional Words for Learning Effectiveness in Online Education (JJ, YY, GK, HL).
EDMEDM-2019-MalekianBKBN #process #student #using
Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
EDMEDM-2019-MbouzaoDS #classification #interactive #student #video
A Methodology for Student Video Interaction Patterns Analysis and Classification (BM, MCD, IS).
EDMEDM-2019-ReillyS #collaboration #predict #problem #quality
Predicting the Quality of Collaborative Problem Solving Through Linguistic Analysis of Discourse (JMR, BS).
ICPCICPC-2019-KuangG0M0ME #feedback #traceability #using
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
ICPCICPC-2019-ZhouW0C0FHC #co-evolution #comprehension #fine-grained
Understanding evolutionary coupling by fine-grained co-change relationship analysis (DZ, YW, LX0, YC, XP0, JF, LH, HC), pp. 271–282.
ICPCICPC-2019-ZyrianovNGCM #framework #implementation #named #pointer
srcPtr: a framework for implementing static pointer analysis approaches (VZ, CDN, DTG, MLC, JIM), pp. 144–147.
ICSMEICSME-2019-DurieuxAMB0
An Analysis of 35+ Million Jobs of Travis CI (TD, RA, MM, TFB, LC0), pp. 291–295.
ICSMEICSME-2019-Imran #design #detection #java #open source #smell
Design Smell Detection and Analysis for Open Source Java Software (AI), pp. 644–648.
ICSMEICSME-2019-KhalilCMDQ #debugging #eclipse
A Longitudinal Analysis of Bug Handling Across Eclipse Releases (ZAK, EC, TM, LD, CQ), pp. 1–12.
ICSMEICSME-2019-Shah #data type #framework #performance
Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive Applications (MDS), pp. 379–381.
MSRMSR-2019-BandeiraMPM #stack overflow
We need to talk about microservices: an analysis from the discussions on StackOverflow (AB, CAM, MP, PHMM), pp. 255–259.
MSRMSR-2019-BiswasVP #re-engineering #sentiment #word
Exploring word embedding techniques to improve sentiment analysis of software engineering texts (EB, KVS, LLP), pp. 68–78.
MSRMSR-2019-ChrenMB0 #automation #named #reliability
STRAIT: a tool for automated software reliability growth analysis (SC, RM, BB, BR0), pp. 105–110.
SANERSANER-2019-MuscedereHAADG #detection #lightweight #using
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SCAMSCAM-2019-0006LBR #android #privacy
Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.
SCAMSCAM-2019-MarcilioFB0 #automation #generative
Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings (DM, CAF, RB, GP0), pp. 34–44.
SCAMSCAM-2019-MondalRS #architecture #automation #case study #natural language #using
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAMSCAM-2019-TiwariPG0 #android #named #scalability #web
LUDroid: A Large Scale Analysis of Android - Web Hybridization (AT, JP, SG, CH0), pp. 256–267.
DLTDLT-2019-GoldwurmLV #component #modelling #statistics
Analysis of Symbol Statistics in Bicomponent Rational Models (MG, JL, MV), pp. 306–318.
FMFM-2019-ComptierDFP
Property-Driven Software Analysis - (Extended Abstract) (MC, DD, PF, JMP), pp. 746–750.
FMFM-2019-TranLMYNXJ #network #reachability
Star-Based Reachability Analysis of Deep Neural Networks (HDT, DML, PM, XY, LVN, WX, TTJ), pp. 670–686.
FSCDFSCD-2019-Bendkowski #towards #λ-calculus
Towards the Average-Case Analysis of Substitution Resolution in Lambda-Calculus (MB), p. 21.
IFM-2019-BeekLLV #configuration management #framework #modelling #summary
Summary of: A Framework for Quantitative Modeling and Analysis of Highly (re)configurable Systems (MHtB, AL, ALL, AV), pp. 547–551.
IFM-2019-BubelHT #dependence #logic
A Program Logic for Dependence Analysis (RB, RH, AHT), pp. 83–100.
IFM-2019-LoharPD #fault #probability
Sound Probabilistic Numerical Error Analysis (DL, MP, ED), pp. 322–340.
SEFMSEFM-2019-FarrellBFDDYM #case study #using #verification
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
SEFMSEFM-2019-PrasetyaK #nondeterminism
Test Model Coverage Analysis Under Uncertainty (ISWBP, RK), pp. 222–239.
AIIDEAIIDE-2019-DemediukYDWB #identification
Role Identification for Accurate Analysis in Dota 2 (SD, PY, AD, JAW, FB), pp. 130–138.
AIIDEAIIDE-2019-LiebanaGDIBL #statistics
Analysis of Statistical Forward Planning Methods in Pommerman (DPL, RDG, OD, EI, MB, SML), pp. 66–72.
AIIDEAIIDE-2019-MoriTS #experience
A Structured Analysis of Experience Management Techniques (GM, DT, SS), pp. 174–180.
CHI-PLAYCHI-PLAY-2019-AhmadBKTNE #behaviour #modelling
Modeling Individual and Team Behavior through Spatio-temporal Analysis (SA, AB, EK, ZT, THDN, MSEN), pp. 601–612.
CHI-PLAYCHI-PLAY-2019-PorterR #game studies #roadmap
An Analysis of Longitudinal Trends in Consumer Thoughts on Presence and Simulator Sickness in VR Games (JPI, AR), pp. 277–285.
CHI-PLAYCHI-PLAY-2019-SchertlerKW #game studies #semantics #using
User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
CoGCoG-2019-CookR #automation #game studies #graph
Hyperstate Space Graphs for Automated Game Analysis (MC0, AR), pp. 1–8.
CoGCoG-2019-KhalifaGT #design
ELIMINATION from Design to Analysis (AK, DG, JT), pp. 1–4.
CoGCoG-2019-MillerPCE #game studies #multi #social
An Analysis of Peer Presence Social Group Dynamics to Enhance Player Engagement in Multiplayer Games (MM, NP, GC, CE), pp. 1–8.
CoGCoG-2019-NumminenVP #game studies #predict
Predicting the monetization percentage with survival analysis in free-to-play games (RN, MV, TP), pp. 1–8.
CoGCoG-2019-ScholtenCHW #statistics
Unconventional Exchange: Methods for Statistical Analysis of Virtual Goods (OJS, PC, KAH, JAW), pp. 1–7.
CoGCoG-2019-SykownikBM #automation #pipes and filters #sentiment #speech
Can You Hear the Player Experienceƒ A Pipeline for Automated Sentiment Analysis of Player Speech (PS, FB, MM), pp. 1–4.
CoGCoG-2019-VolzN #game studies #on the #simulation
On the Effects of Simulating Human Decisions in Game Analysis (VV, BN), pp. 1–8.
CoGCoG-2019-YuS #game studies
Application of Retrograde Analysis on Fighting Games (KY, NRS), pp. 1–8.
DiGRADiGRA-2019-Burkholder
Co-Constructing Virtual Identities: Insights from Linguistic Analysis (RB).
DiGRADiGRA-2019-FromeM #game studies
Describing the Game Studies Canon: A Game Citation Analysis (JF, PM).
DiGRADiGRA-2019-Tavinor #towards
Towards an analysis of virtual realism (GT).
FDGFDG-2019-KaltmanOA #game studies #named #visualisation
S4LVE: shareable videogame analysis and visualization (EK, JCO, JA), p. 5.
FDGFDG-2019-LuPN #communication #developer #game studies
Game postmortems vs. developer Reddit AMAs: computational analysis of developer communication (CL, JP, TN), p. 7.
FDGFDG-2019-OuelletteBC #comprehension #design #education #game studies #using
Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
FDGFDG-2019-TreanorN #game studies
Order-fulfillment games: an analysis of games about serving customers (MT, MJN), p. 7.
CIKMCIKM-2019-AkenWLG #how
How Does BERT Answer Questions?: A Layer-Wise Analysis of Transformer Representations (BvA, BW, AL, FAG), pp. 1823–1832.
CIKMCIKM-2019-GuHDM #learning #named
LinkRadar: Assisting the Analysis of Inter-app Page Links via Transfer Learning (DG, ZH, SD, YM0), pp. 2077–2080.
CIKMCIKM-2019-Jatowt0BD #documentation
Document in Context of its Time (DICT): Providing Temporal Context to Support Analysis of Past Documents (AJ, RC0, SSB, AD), pp. 2869–2872.
CIKMCIKM-2019-KuziLSJZ #adaptation #information retrieval #learning #rank
Analysis of Adaptive Training for Learning to Rank in Information Retrieval (SK, SL, SKKS, PPJ, CZ), pp. 2325–2328.
CIKMCIKM-2019-MiloMY #datalog #named #probability
PODIUM: Probabilistic Datalog Analysis via Contribution Maximization (TM, YM, BY), pp. 2865–2868.
CIKMCIKM-2019-ShiY #network
Recent Developments of Deep Heterogeneous Information Network Analysis (CS, PSY), pp. 2973–2974.
CIKMCIKM-2019-ShiYZ #network
HENA 2019: The 3rd Workshop of Heterogeneous Information Network Analysis and Applications (CS, YY, JZ), pp. 2991–2992.
CIKMCIKM-2019-WuWS #collaboration
Collaborative Analysis for Computational Risk in Urban Water Supply Systems (DW, HW, RS), pp. 2297–2300.
CIKMCIKM-2019-YinLW #interactive #multi #sentiment
Interactive Multi-Grained Joint Model for Targeted Sentiment Analysis (DY, XL, XW0), pp. 1031–1040.
ECIRECIR-p1-2019-DonnellyR #on the #sentiment
On Interpretability and Feature Representations: An Analysis of the Sentiment Neuron (JD, AR), pp. 795–802.
ECIRECIR-p1-2019-WangOM #comparison #recommendation #sentiment
Comparison of Sentiment Analysis and User Ratings in Venue Recommendation (XW, IO, CM), pp. 215–228.
ICMLICML-2019-AntelmiARL #multi #semistructured data
Sparse Multi-Channel Variational Autoencoder for the Joint Analysis of Heterogeneous Data (LA, NA, PR, ML), pp. 302–311.
ICMLICML-2019-AroraDHLW #fine-grained #network #optimisation
Fine-Grained Analysis of Optimization and Generalization for Overparameterized Two-Layer Neural Networks (SA, SSD, WH, ZL0, RW), pp. 322–332.
ICMLICML-2019-CaiLS #normalisation
A Quantitative Analysis of the Effect of Batch Normalization on Gradient Descent (YC, QL, ZS), pp. 882–890.
ICMLICML-2019-Chen #bound #consistency #fault #kernel #nearest neighbour
Nearest Neighbor and Kernel Survival Analysis: Nonasymptotic Error Bounds and Strong Consistency Rates (GHC), pp. 1001–1010.
ICMLICML-2019-CinelliKCPB #linear #modelling
Sensitivity Analysis of Linear Structural Causal Models (CC, DK, BC, JP, EB), pp. 1252–1261.
ICMLICML-2019-CohenB #empirical #modelling #performance #sequence
Empirical Analysis of Beam Search Performance Degradation in Neural Sequence Models (EC, JCB), pp. 1290–1299.
ICMLICML-2019-DereliOG #algorithm #biology #kernel #learning #multi
A Multitask Multiple Kernel Learning Algorithm for Survival Analysis with Application to Cancer Biology (OD, CO, MG), pp. 1576–1585.
ICMLICML-2019-DoanMR #approximate #distributed #finite #learning #linear #multi
Finite-Time Analysis of Distributed TD(0) with Linear Function Approximation on Multi-Agent Reinforcement Learning (TTD, STM, JR), pp. 1626–1635.
ICMLICML-2019-JiWZL #algorithm #optimisation
Improved Zeroth-Order Variance Reduced Algorithms and Analysis for Nonconvex Optimization (KJ, ZW, YZ, YL), pp. 3100–3109.
ICMLICML-2019-LinHJ #algorithm #on the #performance
On Efficient Optimal Transport: An Analysis of Greedy and Accelerated Mirror Descent Algorithms (TL, NH, MIJ), pp. 3982–3991.
ICMLICML-2019-LiTOS #fourier #random #towards
Towards a Unified Analysis of Random Fourier Features (ZL, JFT, DO, DS), pp. 3905–3914.
ICMLICML-2019-NguyenSR #monte carlo #optimisation
Non-Asymptotic Analysis of Fractional Langevin Monte Carlo for Non-Convex Optimization (THN, US, GR), pp. 4810–4819.
ICMLICML-2019-QianRGSLS
SGD with Arbitrary Sampling: General Analysis and Improved Rates (XQ, PR, RMG, AS, NL, ES), pp. 5200–5209.
ICMLICML-2019-SaunshiPAKK #learning #representation
A Theoretical Analysis of Contrastive Unsupervised Representation Learning (NS, OP, SA, MK, HK), pp. 5628–5637.
ICMLICML-2019-SimsekliSG #network #probability
A Tail-Index Analysis of Stochastic Gradient Noise in Deep Neural Networks (US, LS, MG), pp. 5827–5837.
ICMLICML-2019-TianMGSCPZ
ELF OpenGo: an analysis and open reimplementation of AlphaZero (YT, JM, QG, SS, ZC, JP, LZ), pp. 6244–6253.
ICMLICML-2019-UurtioBR #canonical #correlation #kernel #scalability
Large-Scale Sparse Kernel Canonical Correlation Analysis (VU, SB, JR), pp. 6383–6391.
ICMLICML-2019-WilkinsonARSS #probability
End-to-End Probabilistic Inference for Nonstationary Audio Analysis (WJW, MRA, JDR, DS, AS), pp. 6776–6785.
ICMLICML-2019-YuanL #adaptation #component #online
Online Adaptive Principal Component Analysis and Its extensions (JY, AGL), pp. 7213–7221.
ICMLICML-2019-YuJY #communication #distributed #linear #on the #optimisation #performance
On the Linear Speedup Analysis of Communication Efficient Momentum SGD for Distributed Non-Convex Optimization (HY, RJ, SY), pp. 7184–7193.
ICMLICML-2019-YunZYLA #learning #optimisation #statistics
Trimming the l₁ Regularizer: Statistical Analysis, Optimization, and Applications to Deep Learning (JY, PZ, EY, ACL, AYA), pp. 7242–7251.
KDDKDD-2019-ChengSHZ #modelling #performance
Incorporating Interpretability into Latent Factor Models via Fast Influence Analysis (WC, YS, LH, YZ), pp. 885–893.
KDDKDD-2019-WuZ #ambiguity #linear #reduction
Disambiguation Enabled Linear Discriminant Analysis for Partial Label Dimensionality Reduction (JHW, MLZ), pp. 416–424.
KDDKDD-2019-Xia #graph #platform
Roll of Unified Graph Analysis Platforms (YX), p. 3179.
KDDKDD-2019-YinH #estimation #identification #testing
The Identification and Estimation of Direct and Indirect Effects in A/B Tests through Causal Mediation Analysis (XY, LH), pp. 2989–2999.
MoDELSMoDELS-2019-DeVriesC #modelling #non-functional #requirements
Goal-Based Modeling and Analysis of Non-Functional Requirements (BD, BHCC), pp. 261–271.
MoDELSMoDELS-2019-PhilippSE #architecture #modelling #synthesis
Model-Based Resource Analysis and Synthesis of Service-Oriented Automotive Software Architectures (PO, SK, ES), pp. 128–138.
ECOOPECOOP-2019-Bastani0CAA #points-to #specification
Eventually Sound Points-To Analysis with Specifications (OB, RS0, LC, SA, AA), p. 28.
ECOOPECOOP-2019-LuoDB #approach #editing #ide #named
MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
OOPSLAOOPSLA-2019-LuX #context-sensitive grammar #performance #pointer
Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity (JL, JX), p. 29.
OOPSLAOOPSLA-2019-ZhangYTWK0 #abstract interpretation #bytecode #dependence #named
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation (ZZ0, WY, GT, GW, YK, XZ0), p. 31.
PLDIPLDI-2019-FuS #effectiveness #float
Effective floating-point analysis via weak-distance minimization (ZF, ZS), pp. 439–452.
PLDIPLDI-2019-YogaN #difference
Parallelism-centric what-if and differential analyses (AY, SN), pp. 485–501.
POPLPOPL-2019-AndreescuJLM #correlation
Inferring frame conditions with static correlation analysis (OFA, TPJ, SL, BM), p. 29.
POPLPOPL-2019-HoushmandL #coordination #named #replication #synthesis
Hamsaz: replication coordination analysis and synthesis (FH, ML), p. 32.
POPLPOPL-2019-HungHZYHW #quantum #robust #source code
Quantitative robustness analysis of quantum programs (SHH, KH, SZ, MY, MH0, XW), p. 29.
POPLPOPL-2019-SpathAB #automaton #data flow #using
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
POPLPOPL-2019-TouzeauMMR #performance
Fast and exact analysis for LRU caches (VT, CM, DM, JR), p. 29.
QAPLQAPL-2019-Kirkeby #probability #reuse #source code
Probabilistic Output Analyses for Deterministic Programs - Reusing Existing Non-probabilistic Analyses (MHK), pp. 43–57.
SASSAS-2019-BecchiZ #hybrid
Revisiting Polyhedral Analysis for Hybrid Systems (AB, EZ), pp. 183–202.
SASSAS-2019-Cousot #data flow #semantics
Syntactic and Semantic Soundness of Structural Dataflow Analysis (PC), pp. 96–117.
SASSAS-2019-DelmasM #abstract interpretation #using
Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
SASSAS-2019-DengC #abstract interpretation
Responsibility Analysis by Abstract Interpretation (CD, PC), pp. 368–388.
SASSAS-2019-LeiS #performance #pointer #precise
Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis (YL, YS), pp. 27–47.
SASSAS-2019-YanCSZZX #adaptation #safety #verification
Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis (HY, SC0, YS, YZ, CZ, JX), pp. 48–72.
ASEASE-2019-CelikPPAG #coq #mutation testing
Mutation Analysis for Coq (, KP, MP, EJGA, MG), pp. 539–551.
ASEASE-2019-DuX000Z #framework #network
A Quantitative Analysis Framework for Recurrent Neural Network (XD, XX, YL0, LM0, YL0, JZ), pp. 1062–1065.
ASEASE-2019-HeLWMZLHLX #algorithm
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis (DH, HL, LW, HM, HZ, JL0, SH, LL, JX), pp. 267–279.
ASEASE-2019-HuangFZZWJMP #editing #modelling #named #precise #requirements
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis (YH, JF, HZ, JZ, SW, SJ, WM, GP), pp. 1166–1169.
ASEASE-2019-Jiang #commit #generative #semantics
Boosting Neural Commit Message Generation with Code Semantic Analysis (SJ), pp. 1280–1282.
ASEASE-2019-LuoBS #android
A Qualitative Analysis of Android Taint-Analysis Results (LL, EB, JS), pp. 102–114.
ASEASE-2019-MuGCCGXMS #alias #execution #named #performance
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis (DM, WG, AC, YC, JG, XX, BM, CS), pp. 924–935.
ASEASE-2019-RenLXJX #locality
Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing (ZR, CL, XX, HJ, TX), pp. 527–538.
ASEASE-2019-ReulingKRL #configuration management
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich Software (DR, UK, SR, ML), pp. 1134–1137.
ASEASE-2019-VeduradaN #alias
Batch Alias Analysis (JV, VKN), pp. 936–948.
ASEASE-2019-WangC00S #fault #memory management #named #pointer
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis (YW, GC, MZ0, MG0, JS), pp. 1170–1173.
ASEASE-2019-WuLZYZ0 #mobile #named #performance
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis (YW, XL, DZ, WY0, XZ, HJ0), pp. 139–150.
ESEC-FSEESEC-FSE-2019-ChenCLML #approach #learning #named #re-engineering #sentiment
SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
ESEC-FSEESEC-FSE-2019-CotroneoSLNB #debugging #empirical #framework #how #in the cloud #platform
How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform (DC, LDS, PL, RN, NB), pp. 200–211.
ESEC-FSEESEC-FSE-2019-DuXLM0Z #learning #modelling #named
DeepStellar: model-based quantitative analysis of stateful deep learning systems (XD, XX, YL0, LM0, YL0, JZ), pp. 477–487.
ESEC-FSEESEC-FSE-2019-Fu #distributed #on the #scalability
On the scalable dynamic taint analysis for distributed systems (XF), pp. 1247–1249.
ESEC-FSEESEC-FSE-2019-Pan #network #robust
Static deep neural network analysis for robustness (RP), pp. 1238–1240.
ESEC-FSEESEC-FSE-2019-PauckW #android
Together strong: cooperative Android app analysis (FP, HW), pp. 374–384.
ESEC-FSEESEC-FSE-2019-ShahinCS #product line
Lifting Datalog-based analyses to software product lines (RS, MC, RS), pp. 39–49.
ESEC-FSEESEC-FSE-2019-SuiZZZX #android #debugging #difference #effectiveness #reduction #user interface
Event trace reduction for effective bug replay of Android apps via differential GUI state analysis (YS, YZ0, WZ, MZ, JX), pp. 1095–1099.
ICSE-2019-AryaWGC #detection #open source
Analysis and detection of information types of open source software issue discussions (DA, WW, JLCG, JC), pp. 454–464.
ICSE-2019-FanLLWNZL #android #graph #learning #using
Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
ICSE-2019-HeradioFME #modelling #statistics #variability
Supporting the statistical analysis of variability models (RH, DFA, CMD, AE), pp. 843–853.
ICSE-2019-KristensenM #javascript #library
Reasonably-most-general clients for JavaScript library analysis (EKK, AM), pp. 83–93.
ICSE-2019-LazregCCH0 #automation #embedded #multi #variability
Multifaceted automated analyses for variability-intensive embedded systems (SL, MC, PC, PH, SM0), pp. 854–865.
ICSE-2019-NilizadehNP #difference #fuzzing #named
DifFuzz: differential fuzzing for side-channel analysis (SN, YN, CSP), pp. 176–187.
ICSE-2019-WenLWXCS #api #library #mutation testing
Exposing library API misuses via mutation analysis (MW, YL, RW, XX, SCC, ZS), pp. 866–877.
GPCEGPCE-2019-FeichtingerHLPG #constraints #dependence #evolution #feature model
Supporting feature model evolution by suggesting constraints from code-level dependency analyses (KF, DH, LL, HP, PG), pp. 129–142.
SLESLE-2019-IzquierdoC #modelling #programming language
Analysis and modeling of the governance in general programming languages (JLCI, JC), pp. 179–183.
ASPLOSASPLOS-2019-LustigSG #consistency #formal method #memory management
A Formal Analysis of the NVIDIA PTX Memory Consistency Model (DL, SS, OG), pp. 257–270.
CASECASE-2019-ChenJD #flexibility #geometry #performance #realtime
Real-Time Performance Analysis of Batch-Based Serial Flexible Production Lines With Geometric Machines (JC, ZJ, YD), pp. 97–102.
CASECASE-2019-ImaniCT0 #modelling #random
Random Forest Modeling for Survival Analysis of Cancer Recurrences (FI, RC, CT, HY0), pp. 399–404.
CASECASE-2019-KomasDKT0
Data-and Expert-Driven Analysis of Cause-Effect Relationships in the Production of Lithium-Ion Batteries (TK, RD, MZK, ST, CH0), pp. 380–385.
CASECASE-2019-PengZZZ #component #detection #fault #kernel #markov #multi #process
Hidden Markov Model Combined with Kernel Principal Component Analysis for Nonlinear Multimode Process Fault Detection (PP, JZ, YZ, HZ), pp. 1586–1591.
CASECASE-2019-PirehgalinTOV #automation #image #using #video #visual notation
Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
CASECASE-2019-RoselliBA #flexibility #problem #scheduling #smt
SMT Solvers for Flexible Job-Shop Scheduling Problems: A Computational Analysis (SFR, KB, ), pp. 673–678.
CASECASE-2019-SchulerS #automation #modelling #process #towards #using
Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
CASECASE-2019-XieX0C #semantics
The Analysis of Haze Effect on Dense Semantic Mapping (HX, QX, DZ0, ZC), pp. 1118–1123.
CCCC-2019-BlassP #algorithm #compilation #fixpoint #performance
GPU-accelerated fixpoint algorithms for faster compiler analyses (TB, MP), pp. 122–134.
CCCC-2019-ThakurN #scalability
Compare less, defer more: scaling value-contexts based whole-program heap analyses (MT, VKN), pp. 135–146.
CGOCGO-2019-ZhouM #performance
A Tool for Performance Analysis of GPU-Accelerated Applications (KZ, JMMC), p. 282.
FASEFASE-2019-TootsTYDGLMPPPT #privacy #process
Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.
FASEFASE-2019-ZhangSMC #bound #constraints #scheduling #smt #specification
SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language (MZ0, FS, FM, XC0), pp. 61–78.
CADECADE-2019-HirokawaNOO #confluence #revisited
Confluence by Critical Pair Analysis Revisited (NH, JN, VvO, MO), pp. 319–336.
CAVCAV-2019-CeskaK #abstraction #network
Semi-quantitative Abstraction and Analysis of Chemical Reaction Networks (MC0, JK), pp. 475–496.
CAVCAV-2019-DreossiFGKRVS #design #named #tool support
VerifAI: A Toolkit for the Formal Design and Analysis of Artificial Intelligence-Based Systems (TD, DJF, SG, EK, HR, MVC, SAS), pp. 432–442.
CAVCAV-2019-GavrilenkoLFHM #encoding #memory management #modelling #smt
BMC for Weak Memory Models: Relation Analysis for Compact SMT Encodings (NG, HPdL, FF, KH, RM0), pp. 355–365.
CAVCAV-2019-KatzHIJLLSTWZDK #framework #network #verification
The Marabou Framework for Verification and Analysis of Deep Neural Networks (GK, DAH, DI, KJ, CL, RL, PS, ST, HW0, AZ, DLD, MJK, CWB), pp. 443–452.
CAVCAV-2019-NeupaneMM00 #approximate #infinity #model checking #named #probability
STAMINA: STochastic Approximate Model-Checker for INfinite-State Analysis (TN, CJM, CM, HZ0, ZZ0), pp. 540–549.
CAVCAV-2019-BackesBCDGHKKKK #network #reachability
Reachability Analysis for AWS-Based Networks (JB, SB, BC, CD, AG, AJH, TK, BK, EK, JK, SM, JR0, NR, JS, MAS, PS, PS, CV, BW), pp. 231–241.
CAVCAV-2019-GuoLLRS #kernel #scheduling
Integrating Formal Schedulability Analysis into a Verified OS Kernel (XG, ML, ML0, LR, ZS), pp. 496–514.
ICSTICST-2019-KahlesTHJ #agile #automation #machine learning #testing
Automating Root Cause Analysis via Machine Learning in Agile Software Testing Environments (JK, JT, TH, AJ), pp. 379–390.
ICSTICST-2019-Wei #safety
AADL-Based Safety Analysis Approaches for Safety-Critical Systems (XW), pp. 481–482.
ICSTICST-2019-WuLSCX #android #detection #order #precise
Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android (DW, JL0, YS, SC0, JX), pp. 276–287.
VMCAIVMCAI-2019-BouillaguetBSY #deduction #in memory #memory management #modelling #pointer #verification
Exploiting Pointer Analysis in Memory Models for Deductive Verification (QB, FB, MS, BY), pp. 160–182.
VMCAIVMCAI-2019-GermaneM #automaton #continuation
Relatively Complete Pushdown Analysis of Escape Continuations (KG, MM), pp. 205–225.
VMCAIVMCAI-2019-GermaneM0M #control flow
Demand Control-Flow Analysis (KG, JM, MDA0, MM), pp. 226–246.
VMCAIVMCAI-2019-NicolaySMR
Effect-Driven Flow Analysis (JN, QS, WDM, CDR), pp. 247–274.
ECSAECSA-2018-TumaS #architecture
Two Architectural Threat Analysis Techniques Compared (KT, RS), pp. 347–363.
ICSAICSA-2018-SzvetitsZ #architecture #design #modelling #multi #runtime
Architectural Design Decisions for Systems Supporting Model-Based Analysis of Runtime Events: A Qualitative Multi-method Study (MS, UZ), pp. 115–124.
JCDLJCDL-2018-TayehS
An Analysis of Cross-Document Linking Mechanisms (AAOT, BS), pp. 69–78.
EDMEDM-2018-AungRW #automation #video
Who are they looking at? Automatic Eye Gaze Following for Classroom Observation Video Analysis (AMA, AR, JW).
EDMEDM-2018-ChenLCBC #behaviour #learning #scalability
Behavioral Analysis at Scale: Learning Course Prerequisite Structures from Learner Clickstreams (WC, ASL, DC, CGB, MC).
EDMEDM-2018-CrossleyOLBDB #modelling #sentiment
Modeling Math Identity and Math Success through Sentiment Analysis and Linguistic Features (SAC, JO, MJL, FB, MD, RSB).
EDMEDM-2018-DuDP #behaviour #learning #named
ELBA: Exceptional Learning Behavior Analysis (XD, WD, MP).
EDMEDM-2018-SawyerRAL #behaviour #game studies #learning #problem #student
Filtered Time Series Analyses of Student Problem-Solving Behaviors in Game-based Learning (RS, JPR, RA, JCL).
ICPCICPC-2018-CastroS #interactive #visualisation
Analysis of test log information through interactive visualizations (DC, MS), pp. 156–166.
ICSMEICSME-2018-0008ZOPLB #dataset #re-engineering #sentiment
Two Datasets for Sentiment Analysis in Software Engineering (BL0, FZ, RO, MDP, ML, GB), p. 712.
ICSMEICSME-2018-BagheriWAM #android #performance #security
Efficient, Evolutionary Security Analysis of Interacting Android Apps (HB, JW, JA, SM), pp. 357–368.
ICSMEICSME-2018-HuZLWLG #approach #hybrid #named #semantics
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
ICSMEICSME-2018-JimenezCTP #n-gram #on the #parametricity
On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis (MJ, MC, YLT, MP), pp. 437–448.
ICSMEICSME-2018-JimenezCTP18a #named
TUNA: TUning Naturalness-Based Analysis (MJ, MC, YLT, MP), p. 715.
ICSMEICSME-2018-LeemansABSL #legacy #lessons learnt #process
Software Process Analysis Methodology - A Methodology Based on Lessons Learned in Embracing Legacy Software (ML, WMPvdA, MGJvdB, RRHS, LL), pp. 665–674.
ICSMEICSME-2018-PontaPS #metadata #open source
Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software (SEP, HP, AS), pp. 449–460.
ICSMEICSME-2018-SchlieSS #matlab #matrix #modelling #multi #using
Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
MSRMSR-2018-BellmanSB #debugging #developer #ide #timeline #visual notation
Studying developer build issues and debugger usage via timeline analysis in visual studio IDE (CB, AS, OB), pp. 106–109.
MSRMSR-2018-CaiJ #android #performance #precise
Leveraging historical versions of Android apps for efficient and precise taint analysis (HC, JJ), pp. 265–269.
MSRMSR-2018-CohenC08 #developer #git #repository #scalability
Large-scale analysis of the co-commit patterns of the active developers in github's top repositories (EC, MPC), pp. 426–436.
MSRMSR-2018-MantylaCC08 #natural language #pipes and filters #re-engineering
Natural language or not (NLON): a package for software engineering text analysis pipeline (MVM, FC, MC), pp. 387–391.
MSRMSR-2018-NovielliGL08 #benchmark #metric #re-engineering #research #sentiment
A benchmark study on sentiment analysis for software engineering research (NN, DG, FL), pp. 364–375.
MSRMSR-2018-Soto-ValeroBB #behaviour #debugging #detection #process
Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
SANERSANER-2018-IslamZ #comparison #re-engineering #sentiment #tool support
A comparison of software engineering domain specific sentiment analysis tools (MRI, MFZ), pp. 487–491.
SANERSANER-2018-Jurgens #lessons learnt #quality
A decade of software quality analysis in practice: Surprises, anecdotes, and lessons learned (keynote) (EJ), p. 1.
SANERSANER-2018-LeemansAB #modelling #recursion
Recursion aware modeling and discovery for hierarchical software event log analysis (ML, WMPvdA, MGJvdB), pp. 185–196.
SANERSANER-2018-LeemansAB18a #mining #process #scalability #statechart #using
The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
SANERSANER-2018-Vogel-HeuserFFU #architecture #automation #composition #industrial
Modularity and architecture of PLC-based software for automated production systems: An analysis in industrial companies (journal-first abstract) (BVH, JF, SF, SU, SR), p. 473.
SANERSANER-2018-XuLLZ #component #fault #hybrid #kernel #learning #predict
Cross-version defect prediction via hybrid active learning with kernel principal component analysis (ZX, JL0, XL, TZ0), pp. 209–220.
SCAMSCAM-2018-HorvathSGKP #challenge #implementation
[Engineering Paper] Challenges of Implementing Cross Translation Unit Analysis in Clang Static Analyzer (GH, PS, ZG, DK, NP), pp. 171–176.
SCAMSCAM-2018-JimenezTP #security
[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7 (MJ, YLT, MP), pp. 56–61.
CIAACIAA-2018-Condon #algorithm #design #network #on the
On Design and Analysis of Chemical Reaction Network Algorithms (AC), pp. 1–3.
FMFM-2018-AvgustinovBM
Variant Analysis with QL (PA, KB, MYM), pp. 666–670.
FMFM-2018-BeckerPDT #float #optimisation #tool support
Combining Tools for Optimization and Analysis of Floating-Point Computations (HB, PP, ED, ZT), pp. 355–363.
FMFM-2018-Laneve #concurrent #lightweight #source code #thread
A Lightweight Deadlock Analysis for Programs with Threads and Reentrant Locks (CL), pp. 608–624.
FMFM-2018-PutterW #composition #generative
To Compose, or Not to Compose, That Is the Question: An Analysis of Compositional State Space Generation (SdP, AW), pp. 485–504.
FMFM-2018-VandinBLL #configuration management #named
QFLan: A Tool for the Quantitative Analysis of Highly Reconfigurable Systems (AV, MHtB, AL, ALL), pp. 329–337.
IFM-2018-DoughertyGR #protocol #security #smt #using
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
SEFMSEFM-2018-ArndtJMN #graph
Graph-Based Shape Analysis Beyond Context-Freeness (HA, CJ, CM, TN0), pp. 271–286.
SEFMSEFM-2018-SchulzeCL #automation #specification
Automated Specification Extraction and Analysis with Specstractor (CS0, RC, ML), pp. 37–53.
SEFMSEFM-2018-SchuppA #concurrent #hybrid #multi #safety #thread
Spread the Work: Multi-threaded Safety Analysis for Hybrid Systems (SS, ), pp. 89–104.
ICFP-2018-Das0P #complexity #parallel
Parallel complexity analysis with temporal session types (AD, JH0, FP), p. 30.
AIIDEAIIDE-2018-PartlanCSKSHE #automation #interactive
Exploratory Automated Analysis of Structural Features of Interactive Narrative (NP, EC, SS, EK, GS, CH, MSEN), pp. 88–94.
AIIDEAIIDE-2018-SummervilleMSOW #bidirectional #game studies #generative #named
Gemini: Bidirectional Generation and Analysis of Games via ASP (AS, CM, BS, JCO, NWF, MM), pp. 123–129.
CHI-PLAYCHI-PLAY-2018-RoohiTKH #network
Neural Network Based Facial Expression Analysis of GameEvents: A Cautionary Tale (SR, JT, JMK, PH), pp. 429–437.
CoGCIG-2018-BraviLL0 #game studies #video
Shallow Decision-Making Analysis in General Video Game Playing (IB, DPL, SML, JL0), pp. 1–8.
CoGCIG-2018-CookCR #constraints #design #game studies
Inferring Design Constraints From Game Ruleset Analysis (MC0, SC, AR), pp. 1–8.
CoGCIG-2018-GreenwoodAP #game studies
A Critical Analysis of Punishment in Public Goods Games (GWG, HAA, EP), pp. 1–5.
CoGCIG-2018-SironiW #adaptation #game studies #monte carlo #self #video
Analysis of Self-Adaptive Monte Carlo Tree Search in General Video Game Playing (CFS, MHMW), pp. 1–4.
CoGCIG-2018-VariaTKK #3d #dataset #game studies
A Refined 3D Dataset for the Analysis of Player Actions in Exertion Games (CV, GT, KK, SDK), pp. 1–4.
DiGRADiGRA-2018-GaoS #design #framework #game studies #matter #platform
Does Platform Matter? A Game Design Analysis of Female Engagement in MOBA Games (GG, PCS).
FDGFDG-2018-BothenFN #artificial reality #case study #comparative #game studies #interactive #mobile #user study
An analysis and comparative user study on interactions in mobile virtual reality games (SB, JAF, PN), p. 8.
FDGFDG-2018-KosaS #game studies #what
What tabletop players think about augmented tabletop games: a content analysis (MK, PS), p. 8.
FDGFDG-2018-ZhuWZ #game studies #generative #similarity
Exploring the similarity between game events for game level analysis and generation (TZ0, BW, MZ), p. 7.
CoGVS-Games-2018-RallisLGVDD #artificial reality #game studies #learning #using #visualisation
An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
CIKMCIKM-2018-BaiCLKX #modelling #relational #topic
Neural Relational Topic Models for Scientific Article Analysis (HB, ZC, MRL, IK, ZX), pp. 27–36.
CIKMCIKM-2018-BonchiGMR #probability #social
Probabilistic Causal Analysis of Social Influence (FB, FG, BM, DR), pp. 1003–1012.
CIKMCIKM-2018-ChenKBRKKB #behaviour #predict
Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings (CC, SK, HB, RAR, EK, BK, RCB), pp. 2175–2182.
ECIRECIR-2018-ZangerleTWS #multimodal #music #named #towards
ALF-200k: Towards Extensive Multimodal Analyses of Music Tracks and Playlists (EZ, MT, SW, GS), pp. 584–590.
ECIRECIR-2018-Zhang0LZ #matrix #representation #sentiment #twitter #using
Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
ICMLICML-2018-AinsworthFLF #named
oi-VAE: Output Interpretable VAEs for Nonlinear Group Factor Analysis (SKA, NJF, AKCL, EBF), pp. 119–128.
ICMLICML-2018-HuWL #probability #reduction #source code #using
Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
ICMLICML-2018-ImamuraSS #clustering #crowdsourcing #fault
Analysis of Minimax Error Rate for Crowdsourcing and Its Application to Worker Clustering Model (HI, IS, MS), pp. 2152–2161.
ICMLICML-2018-KasaiSM #algorithm #convergence #probability #recursion
Riemannian Stochastic Recursive Gradient Algorithm with Retraction and Vector Transport and Its Convergence Analysis (HK, HS, BM), pp. 2521–2529.
ICMLICML-2018-LanCS #estimation #framework
An Estimation and Analysis Framework for the Rasch Model (ASL, MC, CS), pp. 2889–2897.
ICMLICML-2018-MarinovMA #component #streaming
Streaming Principal Component Analysis in Noisy Settings (TVM, PM, RA), pp. 3410–3419.
ICMLICML-2018-PangDZ #linear #network
Max-Mahalanobis Linear Discriminant Analysis Networks (TP, CD, JZ0), pp. 4013–4022.
ICMLICML-2018-PanZD #learning
Theoretical Analysis of Image-to-Image Translation with Adversarial Learning (XP, MZ, DD), pp. 4003–4012.
ICMLICML-2018-TsakirisV #clustering
Theoretical Analysis of Sparse Subspace Clustering with Missing Entries (MCT, RV), pp. 4982–4991.
ICMLICML-2018-XieWZX #distance #learning #metric
Orthogonality-Promoting Distance Metric Learning: Convex Relaxation and Theoretical Analysis (PX, WW, YZ, EPX), pp. 5399–5408.
ICMLICML-2018-ZhangWYG #matrix #rank
A Primal-Dual Analysis of Global Optimality in Nonconvex Low-Rank Matrix Recovery (XZ, LW, YY, QG), pp. 5857–5866.
ICPRICPR-2018-0001ZZWL
Convolutional Discriminant Analysis (GZ0, YZ, XYZ, HW, XL), pp. 1456–1461.
ICPRICPR-2018-BaiHA #correlation #kernel #recognition
Kernel Discriminant Correlation Analysis: Feature Level Fusion for Nonlinear Biometric Recognition (YB, MH, MAM), pp. 3198–3203.
ICPRICPR-2018-Chen18a #feature model #robust
Improved Robust Discriminant Analysis for Feature Extraction (XC), pp. 1444–1449.
ICPRICPR-2018-ChenHZLQ #detection #multi #video
Video Salient Object Detection via Multiple Time-scale Analysis (YC, LH, WZ, XL, GQ), pp. 2184–2189.
ICPRICPR-2018-DehzangiS #process #recognition #reduction #robust #using
IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
ICPRICPR-2018-EladawiEFPGARKS #image
Early Diagnosis of Diabetic Retinopathy in OCTA Images Based on Local Analysis of Retinal Blood Vessels and Foveal Avascular Zone (NE, ME, LF, FP, MG, AA, AEMR, RK, SS, AEB), pp. 3886–3891.
ICPRICPR-2018-FariaS #approach #graph #image
A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
ICPRICPR-2018-FaulaBE #image #performance
A Fast Local Analysis by Thresholding applied to image matching (YF, SB, VE), pp. 3055–3060.
ICPRICPR-2018-JiangL18a #reduction
Generalized Fisher Discriminant Analysis as A Dimensionality Reduction Technique (YJ, FHFL), pp. 994–999.
ICPRICPR-2018-KurzendorferBSB #classification #random #segmentation #using
Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
ICPRICPR-2018-ShiL #segmentation #video
A New Foreground Segmentation Method for Video Analysis in Different Color Spaces (HS, CL), pp. 2899–2904.
ICPRICPR-2018-SinhaNGG #hybrid #navigation #network #performance
Hybrid Path Planner for Efficient Navigation in Urban Road Networks through Analysis of Trajectory Traces (SS, MKN, SG, SKG), pp. 3250–3255.
ICPRICPR-2018-SuHK #classification #component #multi #performance #using
Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
ICPRICPR-2018-SuJ #image #multi #using
Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
ICPRICPR-2018-TranLPHKTNP #dataset #multi
A multi-modal multi-view dataset for human fall analysis and preliminary investigation on modality (THT, TLL, DTP, VNH, VMK, QTT, TSN, CP), pp. 1947–1952.
ICPRICPR-2018-Windeatt #classification #optimisation #using
Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
ICPRICPR-2018-Yang0CF #canonical #correlation #detection #image #using
Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPRICPR-2018-YangZWQ #classification #detection #image #quality #recognition
Quality Classified Image Analysis with Application to Face Detection and Recognition (FY, QZ0, MW, GQ), pp. 2863–2868.
ICPRICPR-2018-ZhangZDD #network #online #recognition
Trajectory-based Radical Analysis Network for Online Handwritten Chinese Character Recognition (JZ, YZ, JD, LD), pp. 3681–3686.
ICPRICPR-2018-ZhaoLZTNM #automation #component #image #multi #robust #segmentation #using
Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
ICPRICPR-2018-ZhongD #difference #recognition
Deep Difference Analysis in Similar-looking Face recognition (YZ, WD), pp. 3353–3358.
ICPRICPR-2018-ZuninoMCAPBVBM #detection #gesture #video
Video Gesture Analysis for Autism Spectrum Disorder Detection (AZ, PM, AC, CA, JP, FB, EV, CB, VM), pp. 3421–3426.
KDDKDD-2018-GongW #behaviour #modelling #network #sentiment #social
When Sentiment Analysis Meets Social Network: A Holistic User Behavior Modeling in Opinionated Data (LG, HW), pp. 1455–1464.
KDDKDD-2018-HuDZ0X #e-commerce #formal method #learning #rank
Reinforcement Learning to Rank in E-Commerce Search Engine: Formalization, Analysis, and Application (YH, QD, AZ, YY0, YX), pp. 368–377.
KDDKDD-2018-HuF #multimodal #sentiment
Multimodal Sentiment Analysis To Explore the Structure of Emotions (AH, SRF), pp. 350–358.
KDDKDD-2018-SunZZGH #online #query
Exploring the Urban Region-of-Interest through the Analysis of Online Map Search Queries (YS, HZ, FZ, JG, QH), pp. 2269–2278.
KDDKDD-2018-WangFZWZA #behaviour #how #learning #representation
You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
KDDKDD-2018-WangWLW #composition #multi #network
Multilevel Wavelet Decomposition Network for Interpretable Time Series Analysis (JW, ZW, JL, JW), pp. 2437–2446.
ECMFAECMFA-2018-HinkelB #design #metamodelling #on the
On the Influence of Metamodel Design to Analyses and Transformations (GH, EB), pp. 63–79.
MoDELSMoDELS-2018-ShinCNSBZ #framework #named #physics #testing #uml
HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems (SYS, KC, SN, MS, LCB, FZ), pp. 357–367.
MoDELSMoDELS-2018-WeckesserLRS #modelling #programming
Mathematical Programming for Anomaly Analysis of Clafer Models (MW, ML, MR, AS), pp. 34–44.
ECOOPECOOP-2018-GrechKS #graph #performance #string
Efficient Reflection String Analysis via Graph Coloring (NG, GK, YS), p. 25.
ECOOPECOOP-2018-SmaragdakisK #effectiveness #lazy evaluation #points-to
Defensive Points-To Analysis: Effective Soundness via Laziness (YS, GK), p. 28.
ECOOPECOOP-2018-TomanG #named
Legato: An At-Most-Once Analysis with Applications to Dynamic Configuration Updates (JT, DG), p. 32.
OOPSLAOOPSLA-2018-JeonJO #data-driven #points-to #precise #scalability
Precise and scalable points-to analysis via data-driven context tunneling (MJ, SJ, HO), p. 29.
OOPSLAOOPSLA-2018-LiTMS #context-sensitive grammar #pointer
Precision-guided context sensitivity for pointer analysis (YL0, TT0, AM, YS), p. 29.
OOPSLAOOPSLA-2018-RamaKS #points-to #refinement #slicing
Refinement in object-sensitivity points-to analysis via slicing (GMR, RK, HS), p. 27.
OOPSLAOOPSLA-2018-SzaboBEV #datalog
Incrementalizing lattice-based program analyses in Datalog (TS, GB, SE, MV), p. 29.
AdaEuropeAdaEurope-2018-RoyuelaMQP #ada #compilation #parallel
Safe Parallelism: Compiler Analysis Techniques for Ada and OpenMP (SR, XM, EQ, LMP), pp. 141–157.
PLDIPLDI-2018-BrutschyD0V #consistency
Static serializability analysis for causal consistency (LB, DD, PM0, MTV), pp. 90–104.
PLDIPLDI-2018-ChenLDP #locality #parallel
Locality analysis through static parallel sampling (DC, FL, CD, SP), pp. 557–570.
PLDIPLDI-2018-HongSKRKPRS #gpu #kernel #optimisation #using
GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
PLDIPLDI-2018-LiuH #concurrent #debugging #difference #named #parallel #performance
D4: fast concurrency debugging with parallel differential analysis (BL, JH0), pp. 359–373.
PLDIPLDI-2018-LiuW #bound #concurrent #interprocedural #named #source code
CUBA: interprocedural Context-UnBounded Analysis of concurrent programs (PL, TW), pp. 105–119.
PLDIPLDI-2018-NgoC0 #bound #probability #source code
Bounded expectations: resource analysis for probabilistic programs (VCN, QC, JH0), pp. 496–512.
PLDIPLDI-2018-ShiXWZFZ #named #performance #precise
Pinpoint: fast and precise sparse value flow analysis for million lines of code (QS, XX0, RW, JZ, GF, CZ), pp. 693–706.
POPLPOPL-2018-ChatterjeeCP #alias #data flow #reachability
Optimal Dyck reachability for data-dependence and alias analysis (KC, BC, AP), p. 30.
POPLPOPL-2018-LiY #algorithm #problem #quantum #source code #termination
Algorithmic analysis of termination problems for quantum programs (YL, MY), p. 29.
SASSAS-2018-BagnaraBH #c #development #embedded #standard
The MISRA C Coding Standard and its Role in the Development and Analysis of Safety- and Security-Critical Embedded Software (RB, AB, PMH), pp. 5–23.
SASSAS-2018-JacqueminPV #bound #fault #float
A Reduced Product of Absolute and Relative Error Bounds for Floating-Point Analysis (MJ, SP, FV), pp. 223–242.
SASSAS-2018-OHearn #concurrent #experience #facebook
Experience Developing and Deploying Concurrency Analysis at Facebook (PWO), pp. 56–70.
ASEASE-2018-HassanRW #named #recommendation
RUDSEA: recommending updates of Dockerfiles via software environment analysis (FH, RR, XW), pp. 796–801.
ASEASE-2018-HelmKERM #framework
A unified lattice model and framework for purity analyses (DH, FK, ME, MR, MM), pp. 340–350.
ASEASE-2018-MoSCRKN #architecture #automation #case study #experience
Experiences applying automated architecture analysis tool suites (RM, WS, YC, SR, RK, MN), pp. 779–789.
ASEASE-2018-SungPW #framework #named
CANAL: a cache timing analysis framework via LLVM transformation (CS, BP, CW0), pp. 904–907.
ASEASE-2018-WangCYJ #approach #constraints #model checking #string
A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
ESEC-FSEESEC-FSE-2018-ChenLZZWH0 #optimisation
Optimizing test prioritization via test distribution analysis (JC0, YL, LZ, JZ, XW, DH, LZ0), pp. 656–667.
ESEC-FSEESEC-FSE-2018-HeLLZLZ #identification #problem
Identifying impactful service system problems via log analysis (SH, QL, JGL, HZ0, MRL, DZ), pp. 60–70.
ESEC-FSEESEC-FSE-2018-LiTMS #context-sensitive grammar #pointer #self
Scalability-first pointer analysis with self-tuning context-sensitivity (YL0, TT0, AM, YS), pp. 129–140.
ESEC-FSEESEC-FSE-2018-MaLLZG #automation #debugging #difference #named #network
MODE: automated neural network model debugging via state differential analysis and input selection (SM, YL, WCL, XZ, AG), pp. 175–186.
ESEC-FSEESEC-FSE-2018-PauckBW #android #question #tool support
Do Android taint analysis tools keep their promises? (FP, EB, HW), pp. 331–341.
ICSE-2018-0008ZBPLO #how #question #re-engineering #sentiment
Sentiment analysis for software engineering: how far can we go? (BL0, FZ, GB, MDP, ML, RO), pp. 94–104.
ICSE-2018-0013P0 #mobile #named
EnMobile: entity-based characterization and analysis of mobile malware (WY0, MRP, TX0), pp. 384–394.
ICSE-2018-FanSCMLXPS #android #exception #scalability
Large-scale analysis of framework-specific exceptions in Android apps (LF, TS, SC, GM, YL0, LX, GP, ZS), pp. 408–419.
ICSE-2018-GaoZLK #identification #online #overview
Online app review analysis for identifying emerging issues (CG, JZ, MRL, IK), pp. 48–58.
ICSE-2018-Lambers0TBH #dependence #graph transformation #multi #re-engineering
Multi-granular conflict and dependency analysis in software engineering based on graph transformation (LL, DS0, GT, KB, JH), pp. 716–727.
ICSE-2018-LaraG #concept #modelling #type system
A posteriori typing for model-driven engineering: concepts, analysis, and applications (JdL, EG), p. 1136.
ICSE-2018-SadeghiJGBM #android #framework
A temporal permission analysis and enforcement framework for Android (AS, RJ, NG, HB, SM), pp. 846–857.
ICSE-2018-ZhangSX #process
Launch-mode-aware context-sensitive activity transition analysis (YZ0, YS, JX), pp. 598–608.
GPCEGPCE-2018-ChristopheRBM #distributed #javascript #process #source code
Orchestrating dynamic analyses of distributed processes for full-stack JavaScript programs (LC, CDR, EGB, WDM), pp. 107–118.
GPCEGPCE-2018-NiekeMSTYF #evolution
Anomaly analyses for feature-model evolution (MN, JM, CS, TT, ICY, FF), pp. 188–201.
GPCEGPCE-2018-Peldszus0J #feature model #modelling #product line #security
Model-based security analysis of feature-oriented software product lines (SP, DS0, JJ), pp. 93–106.
CASECASE-2018-HaouasDL #parallel
Analysis of an Integrated 4-DoF Parallel Wrist for Dexterous Gripping (WH, RD, GJL), pp. 1448–1453.
CASECASE-2018-KangYJ #performance #realtime #using
Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
CASECASE-2018-MarussyM #configuration management #dependence #modelling
Constructing Dependability Analysis Models of Reconfigurable Production Systems (KM, IM), pp. 1158–1163.
CASECASE-2018-MatsubaraNOC #component #policy #simulation
Policy Transfer from Simulations to Real World by Transfer Component Analysis (TM, YN, YO, YC), pp. 264–269.
CASECASE-2018-OutafraoutAN #approach #hybrid #modelling #multi #performance #petri net
A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
CASECASE-2018-SchedlerFBJT #automation #evaluation
Evaluation of an Automated Sample Preparation System for Analysis of Methacrylates in Saliva (MS, HF, JB, SJ, KT), pp. 1101–1105.
CASECASE-2018-TanCPP #automation #design #learning #visual notation
Transfer Learning with PipNet: For Automated Visual Analysis of Piping Design (WCT, IMC, DP, SJP), pp. 1296–1301.
CASECASE-2018-TanGCC #automation #learning
Learning with Corrosion Feature: For Automated Quantitative Risk Analysis of Corrosion Mechanism (WCT, PCG, KHC, IMC), pp. 1290–1295.
CASECASE-2018-YangWSQ #clustering #constraints #scheduling #tool support
Cyclic Scheduling Analysis of Single-arm Cluster Tools with Wafer Residency Time Constraint and Chamber Cleaning Operations (FY, NW, RS, YQ), pp. 241–246.
CASECASE-2018-Zou0HAX #performance
Analysis of End-of-State Impact on Manufacturing System Production Performance (JZ, QC0, JH0, JA, GX), pp. 823–828.
CCCC-2018-GinsbachCO #compilation #domain-specific language #named
CAnDL: a domain specific language for compiler analysis (PG, LC, MFPO), pp. 151–162.
CCCC-2018-KastrinisBFPS #alias #data type #performance
An efficient data structure for must-alias analysis (GK, GB, KF, NPK, YS), pp. 48–58.
CCCC-2018-KochMVCF #algorithm #compilation #parallel #towards
Towards a compiler analysis for parallel algorithmic skeletons (TJKEvK, SM, CV, MC, BF), pp. 174–184.
CCCC-2018-PathadeK #data flow
Computing partially path-sensitive MFP solutions in data flow analyses (KP, UPK), pp. 37–47.
CCCC-2018-ZhaoBS #parallel #points-to
Parallel sparse flow-sensitive points-to analysis (JZ, MGB, VS), pp. 59–70.
CGOCGO-2018-ZhouLWX0
May-happen-in-parallel analysis with static vector clocks (QZ, LL0, LW, JX, XF0), pp. 228–240.
ESOPESOP-2018-AbdullaJT #abstraction #concurrent
Fragment Abstraction for Concurrent Shape Analysis (PAA, BJ, CQT), pp. 442–471.
ESOPESOP-2018-ChatterjeeGV #contract
Quantitative Analysis of Smart Contracts (KC, AKG, YV), pp. 739–767.
FASEFASE-2018-0012SRYHBRS #approach #effectiveness #modelling
Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
FASEFASE-2018-ChechikSDR #commutative #named #performance
FPH: Efficient Non-commutativity Analysis of Feature-Based Systems (MC, IS, CD, JR), pp. 319–336.
FASEFASE-2018-LiuOSWGM #distributed #formal method #named #protocol #transaction
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis (SL0, PCÖ, KS, QW0, IG, JM), pp. 77–93.
FASEFASE-2018-ParkSR #framework #using #web
EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
CAVCAV-2018-BlondinEJ #named #protocol
Peregrine: A Tool for the Analysis of Population Protocols (MB, JE, SJ), pp. 604–611.
CAVCAV-2018-FedyukovichZG #termination
Syntax-Guided Termination Analysis (GF, YZ, AG), pp. 124–143.
CAVCAV-2018-SchemmelBDNW #liveness
Symbolic Liveness Analysis of Real-World Software (DS, JB, OSD, TN0, KW), pp. 447–466.
ICSTICST-2018-Suarez-Otero #consistency #logic
Analysis of the Logical Consistency in Cassandra (PSO), pp. 430–431.
VMCAIVMCAI-2018-KranzS #bytecode #composition #on-demand #using
Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
VMCAIVMCAI-2018-TitoloFMM #abstract interpretation #fault #float #framework #source code
An Abstract Interpretation Framework for the Round-Off Error Analysis of Floating-Point Programs (LT, MAF, MMM, CAM), pp. 516–537.
ECSAECSA-2017-NguyenOG #design #performance #process #repository
PARAD Repository: On the Capitalization of the Performance Analysis Process for AADL Designs (TDN, YO, EG), pp. 22–39.
ECSAECSA-2017-TrubianiM #architecture #collaboration #modelling #nondeterminism #reduction
Continuous Rearchitecting of QoS Models: Collaborative Analysis for Uncertainty Reduction (CT, RM), pp. 40–48.
ICSAICSA-2017-BangBM #collaboration #design
Continuous Analysis of Collaborative Design (JYB, YB, NM), pp. 97–106.
ICSAICSA-2017-HauptLSV #api #framework #rest
A Framework for the Structural Analysis of REST APIs (FH, FL, AS, KVH), pp. 55–58.
ICSAICSA-2017-PatersonC #markov #quality #refinement
Accurate Analysis of Quality Properties of Software with Observation-Based Markov Chain Refinement (CP, RC), pp. 121–130.
ICSAICSA-2017-RoyMRSW #architecture #framework #towards
Towards a Reference Architecture for Cloud-Based Plant Genotyping and Phenotyping Analysis Frameworks (BR, AKM, CKR, KAS, KW), pp. 41–50.
JCDLJCDL-2017-MurdockJCMDP #towards
Towards Publishing Secure Capsule-Based Analysis (JM, JJ, TWC, YM, JSD, BP), pp. 261–264.
JCDLJCDL-2017-PageBFWW #library #linked data #music #open data
Realising a Layered Digital Library: Exploration and Analysis of the Live Music Archive through Linked Data (KRP, SB, GF, DMW, TW), pp. 89–98.
EDMEDM-2017-BauerFP #behaviour #challenge #game studies #problem
Analysis of problem-solving behavior in open-ended scientific-discovery game challenges (AB, JF, ZP).
EDMEDM-2017-CaiEDPGS #chat #collaboration #learning #modelling #network #topic
Epistemic Network Analysis and Topic Modeling for Chat Data from Collaborative Learning Environment (ZC, BRE, ND, JWP, ACG, DWS).
EDMEDM-2017-CaoTH #student
An Analysis of Students' Questions in MOOCs Forums (MC, YT, XH).
EDMEDM-2017-KuangCHN #framework #network #platform #social #topic
A Topic Model and Social Network Analysis of a School Blogging Platform (XK, HSC, BH, GN).
EDMEDM-2017-LiTSH
Text analysis with LIWC and Coh-Metrix: Portraying MOOCs Instructors (JL, YT, LS, XH).
EDMEDM-2017-Ortiz-VazquezLL #clustering #modelling #realtime
Cluster Analysis of Real Time Location Data - An Application of Gaussian Mixture Models (AOV, XL, CFL, HSC, GN).
EDMEDM-2017-ShiPG #learning #performance #using
Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
EDMEDM-2017-VillamorR #collaboration #debugging #empirical
Characterizing Collaboration in the Pair Program Tracing and Debugging Eye-Tracking Experiment: A Preliminary Analysis (MV, MMTR).
EDMEDM-2017-WangLGB
A Latent Factor Model For Instructor Content Preference Analysis (JZW, ASL, PG, RGB).
ICSMEICSME-2017-HigoK #metric
Flattening Code for Metrics Measurement and Analysis (YH, SK), pp. 494–498.
ICSMEICSME-2017-HuangVGSS #assembly #execution #named #scalability #visualisation
Atlantis: Improving the Analysis and Visualization of Large Assembly Execution Traces (HNH, EV0, DMG, MADS, MS), pp. 623–627.
MSRMSR-2017-AtchisonBBSL
A time series analysis of TravisTorrent builds: to everything there is a season (AA, CB, NB, ES, EL), pp. 463–466.
MSRMSR-2017-BellerGZ #git #testing
Oops, my tests broke the build: an explorative analysis of Travis CI with GitHub (MB, GG, AZ), pp. 356–367.
MSRMSR-2017-BrandauerW #interactive #named
Spencer: interactive heap analysis for the masses (SB, TW), pp. 113–123.
MSRMSR-2017-CitoSWLZG #ecosystem #empirical #git
An empirical analysis of the docker container ecosystem on GitHub (JC, GS, JEW, PL, SZ, HCG), pp. 323–333.
MSRMSR-2017-IshioSII #reuse #set
Source file set search for clone-and-own reuse analysis (TI, YS, KI, KI), pp. 257–268.
MSRMSR-2017-IslamZ #automation #re-engineering #sentiment
Leveraging automated sentiment analysis in software engineering (MRI, MFZ), pp. 203–214.
MSRMSR-2017-RauschHL0 #empirical #integration #open source #workflow
An empirical analysis of build failures in the continuous integration workflows of Java-based open-source software (TR, WH, PL, SS0), pp. 345–355.
MSRMSR-2017-SouzaS #sentiment
Sentiment analysis of Travis CI builds (RRGS, BS), pp. 459–462.
MSRMSR-2017-ZampettiSOCP #how #integration #open source #pipes and filters #tool support
How open source projects use static code analysis tools in continuous integration pipelines (FZ, SS, RO, GC, MDP), pp. 334–344.
SANERSANER-2017-AlexandruPG #multi
Reducing redundancies in multi-revision code analysis (CVA, SP, HCG), pp. 148–159.
SANERSANER-2017-KandaGHM #comprehension #open source #towards
Towards understanding an open-source bounty: Analysis of Bountysource (TK0, MG, HH, KiM), pp. 577–578.
SANERSANER-2017-MercierCJ #automation #memory management #named #reverse engineering
dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis (DM, AC, RJ), pp. 497–501.
SANERSANER-2017-MoonSLK #behaviour #generative #how #what
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
SANERSANER-2017-YounangL #array #javascript
Conventionality analysis of array objects in JavaScript (AY, LL), pp. 561–562.
SCAMSCAM-2017-0008SMOBL #consistency #identifier #using
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
SCAMSCAM-2017-Anderson0 #php #query #sql
Supporting Analysis of SQL Queries in PHP AiR (DA, MH0), pp. 153–158.
SCAMSCAM-2017-PaduaS #exception
Revisiting Exception Handling Practices with Exception Flow Analysis (GBdP, WS), pp. 11–20.
FSCDFSCD-2017-Moser
Uniform Resource Analysis by Rewriting: Strenghts and Weaknesses (Invited Talk) (GM), p. 10.
IFM-2017-FrohnG #complexity #java
Complexity Analysis for Java with AProVE (FF, JG), pp. 85–101.
IFM-2017-GilmoreRV #statistics
Transient and Steady-State Statistical Analysis for Discrete Event Simulators (SG, DR, AV), pp. 145–160.
IFM-2017-HenrioLM
Analysis of Synchronisations in Stateful Active Objects (LH, CL, VM), pp. 195–210.
IFM-2017-SteinhofelW #control flow #invariant #standard
A New Invariant Rule for the Analysis of Loops with Non-standard Control Flows (DS, NW), pp. 279–294.
SEFMSEFM-2017-Jakobs #proving
PART_PW : From Partial Analysis Results to a Proof Witness (MCJ), pp. 120–135.
SEFMSEFM-2017-MahmudSL #embedded #logic #requirements #semantics #specification
Specification and Semantic Analysis of Embedded Systems Requirements: From Description Logic to Temporal Logic (NM, CS, OL), pp. 332–348.
SEFMSEFM-2017-MasciZJC #identification #requirements #safety #user interface
A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
ICFP-2017-AvanziniL #automation #complexity #type inference
Automating sized-type inference for complexity analysis (MA, UDL), p. 29.
CHI-PLAYCHI-PLAY-2017-BarinDT #comprehension #game studies
Understanding Dangerous Play: A Grounded Theory Analysis of High-Performance Drone Racing Crashes (AB, ID, ZOT), pp. 485–496.
CHI-PLAYCHI-PLAY-2017-HornCD #adaptation #elicitation #game studies
Adapting Cognitive Task Analysis to Elicit the Skill Chain of a Game (BH, SC, SD), pp. 277–289.
DiGRADiGRA-2017-VughtG #game studies
Considering play: From method to analysis (JvV, RG).
FDGFDG-2017-AllartLPGN #game studies #motivation #using #video
Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
FDGFDG-2017-HornHFBHS #game studies
AI-assisted analysis of player strategy across level progressions in a puzzle game (BH, AKH, YF, JB, CH, GS), p. 10.
FDGFDG-2017-KaltmanOWM #game studies #tool support
Getting the GISST: a toolkit for the creation, analysis and reference of game studies resources (EK, JCO, NWF, MM), p. 10.
FDGFDG-2017-MachadoNT #design #game studies
SeekWhence a retrospective analysis tool for general game design (TM, AN, JT), p. 6.
FDGFDG-2017-Valls-VargasZO17a #generative #overview #perspective
From computational narrative analysis to generation: a preliminary review (JVV, JZ, SO), p. 4.
ICGJICGJ-2017-PirkerKG #game studies #network #social
Social network analysis of the global game jam network (JP, FK, CG), pp. 10–14.
CIKMCIKM-2017-An0WY #clustering #feature model
Unsupervised Feature Selection with Joint Clustering Analysis (SA, JW0, JW, ZY), pp. 1639–1648.
CIKMCIKM-2017-ChenAS #bias #empirical #performance
An Empirical Analysis of Pruning Techniques: Performance, Retrievability and Bias (RCC, LA, FS), pp. 2023–2026.
CIKMCIKM-2017-ChenLL #modelling #sentiment
Modeling Language Discrepancy for Cross-Lingual Sentiment Analysis (QC, CL, WL0), pp. 117–126.
CIKMCIKM-2017-CuiLZZ #network
Text Coherence Analysis Based on Deep Neural Network (BC, YL, YZ, ZZ), pp. 2027–2030.
CIKMCIKM-2017-FeigenblatBRK #named #summary
SummIt: A Tool for Extractive Summarization, Discovery and Analysis (GF, OB, HR, DK), pp. 2459–2462.
CIKMCIKM-2017-FreitasTCX #agile #network
Rapid Analysis of Network Connectivity (SF, HT, NC, YX), pp. 2463–2466.
CIKMCIKM-2017-KhoaAW #framework #incremental #maintenance #using
Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
CIKMCIKM-2017-LeL17a #interactive #named #semantics #topic #visualisation
SemVis: Semantic Visualization for Interactive Topical Analysis (TMVL, HWL), pp. 2487–2490.
CIKMCIKM-2017-MaHLSYLR #clustering #graph #multi
Multi-view Clustering with Graph Embedding for Connectome Analysis (GM, LH0, CTL, WS, PSY, ADL, ABR), pp. 127–136.
CIKMCIKM-2017-MeleBC #multi
Linking News across Multiple Streams for Timeliness Analysis (IM, SAB, FC), pp. 767–776.
CIKMCIKM-2017-NguyenH
Differentially Private Regression for Discrete-Time Survival Analysis (TTN, SCH), pp. 1199–1208.
CIKMCIKM-2017-NobariRN
Analysis of Telegram, An Instant Messaging Service (ADN, NR, MN), pp. 2035–2038.
CIKMCIKM-2017-PangCWL #recognition #robust
Robust Heterogeneous Discriminative Analysis for Single Sample Per Person Face Recognition (MP, YmC, BW, RL), pp. 2251–2254.
CIKMCIKM-2017-ShaikhK #framework #named
StreamingCube: A Unified Framework for Stream Processing and OLAP Analysis (SAS, HK), pp. 2527–2530.
CIKMCIKM-2017-TayTH #memory management #network #sentiment
Dyadic Memory Networks for Aspect-based Sentiment Analysis (YT, LAT, SCH), pp. 107–116.
CIKMCIKM-2017-XuM #multimodal #named #network #semantics #sentiment
MultiSentiNet: A Deep Semantic Network for Multimodal Sentiment Analysis (NX, WM), pp. 2399–2402.
CIKMCIKM-2017-ZhangYEALL #predict #social
Predicting Startup Crowdfunding Success through Longitudinal Social Engagement Analysis (QZ, TY, ME, SA0, VL, BTL), pp. 1937–1946.
ECIRECIR-2017-Chehreghani #feature model #problem
Feature-Oriented Analysis of User Profile Completion Problem (MHC), pp. 304–316.
ECIRECIR-2017-ChenLLLLH #sentiment
Cross-Lingual Sentiment Relation Capturing for Cross-Lingual Sentiment Analysis (QC, WL0, YL, XL, CL, YH), pp. 54–67.
ECIRECIR-2017-GarbaceaK #detection #summary
A Systematic Analysis of Sentence Update Detection for Temporal Summarization (CG, EK), pp. 424–436.
ECIRECIR-2017-NarducciBLGS #semantics
Temporal Semantic Analysis of Conference Proceedings (FN, PB, PL, MdG, GS), pp. 762–765.
ICMLICML-2017-0001JZ #geometry #problem #rank
No Spurious Local Minima in Nonconvex Low Rank Problems: A Unified Geometric Analysis (RG0, CJ, YZ), pp. 1233–1242.
ICMLICML-2017-DembczynskiKKN #classification #consistency #revisited
Consistency Analysis for Binary Classification Revisited (KD, WK, OK, NN), pp. 961–969.
ICMLICML-2017-GarberSS #algorithm #component #distributed #probability
Communication-efficient Algorithms for Distributed Stochastic Principal Component Analysis (DG, OS, NS), pp. 1203–1212.
ICMLICML-2017-HornakovaLA #graph #multi #optimisation
Analysis and Optimization of Graph Decompositions by Lifted Multicuts (AH, JHL, BA), pp. 1539–1548.
ICMLICML-2017-LiZLV #convergence #optimisation
Convergence Analysis of Proximal Gradient with Momentum for Nonconvex Optimization (QL, YZ, YL, PKV), pp. 2111–2119.
ICMLICML-2017-Tian #convergence #network
An Analytical Formula of Population Gradient for two-layered ReLU network and its Applications in Convergence and Critical Point Analysis (YT), pp. 3404–3413.
KDDKDD-2017-HuangZ #named
SPOT: Sparse Optimal Transformations for High Dimensional Variable Selection and Exploratory Regression Analysis (QH, MZ), pp. 857–865.
KDDKDD-2017-LiGZXZ #development #perspective
Prospecting the Career Development of Talents: A Survival Analysis Perspective (HL, YG, HZ, HX, HZ), pp. 917–925.
KDDKDD-2017-LiJZXLZZWZWXB #framework #named #platform
FLAP: An End-to-End Event Log Analysis Platform for System Management (TL0, YJ, CZ, BX0, ZL0, WZ, XZ, WW0, LZ, JW, LX, DB), pp. 1547–1556.
KDDKDD-2017-LiuFMRSX #effectiveness #internet #process #realtime
Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams (JL, YF, JM, YR, LS, HX), pp. 335–344.
KDDKDD-2017-PaulLTYF #exclamation #named #sentiment #twitter #what
Compass: Spatio Temporal Sentiment Analysis of US Election What Twitter Says! (DP, FL0, MKT, XY, RF), pp. 1585–1594.
KDDKDD-2017-ZhouXBWZLXLSG #named
STAR: A System for Ticket Analysis and Resolution (WZ, WX, RB, QW, CZ, TL0, JX0, ZL0, LS, GYG), pp. 2181–2190.
ECMFAECMFA-2017-AhmadianSRJ #ecosystem #industrial #modelling #privacy
Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
ECMFAECMFA-2017-Debbi #formal method #modelling #probability
Modeling and Formal Analysis of Probabilistic Complex Event Processing (CEP) Applications (HD), pp. 248–263.
ECOOPECOOP-2017-Huang0 #dependence #reduction
Speeding Up Maximal Causality Reduction with Static Dependency Analysis (SH, JH0), p. 22.
OOPSLAOOPSLA-2017-GrechS #named #points-to
P/Taint: unified points-to and taint analysis (NG, YS), p. 28.
OOPSLAOOPSLA-2017-JeongJCO #context-sensitive grammar #data-driven #points-to
Data-driven context-sensitivity for points-to analysis (SJ, MJ, SDC, HO), p. 28.
OOPSLAOOPSLA-2017-SpathAB #alias #data flow #named #performance #precise
IDEal: efficient and precise alias-aware dataflow analysis (JS, KA0, EB), p. 27.
OOPSLAOOPSLA-2017-WangWC #complexity #functional #invariant #named
TiML: a functional language for practical complexity analysis with invariants (PW0, DW, AC), p. 26.
AdaEuropeAdaEurope-2017-DiazFKMHAC #bound #manycore #named #probability
MC2: Multicore and Cache Analysis via Deterministic and Probabilistic Jitter Bounding (ED, MF, LK, EM, CH, JA, FJC), pp. 102–118.
LOPSTRLOPSTR-2017-AlbertiS #c #generative #specification #tool support
Context Generation from Formal Specifications for C Analysis Tools (MA, JS), pp. 93–111.
LOPSTRLOPSTR-2017-Lucas #first-order
Analysis of Rewriting-Based Systems as First-Order Theories (SL), pp. 180–197.
LOPSTRLOPSTR-2017-NguyenT #parallel #source code #thread
CARET Analysis of Multithreaded Programs (HVN, TT), pp. 73–90.
PLDIPLDI-2017-AbdullaACDHRR #constraints #framework #performance #string
Flatten and conquer: a framework for efficient analysis of string constraints (PAA, MFA, YFC, BPD, LH, AR, PR), pp. 602–617.
PLDIPLDI-2017-BillesMP #black box #collaboration #web
Systematic black-box analysis of collaborative web applications (MB, AM, MP), pp. 171–184.
PLDIPLDI-2017-DoychevK
Rigorous analysis of software countermeasures against cache attacks (GD, BK), pp. 406–421.
PLDIPLDI-2017-EizenbergPPMD #named #runtime #source code
BARRACUDA: binary-level analysis of runtime RAces in CUDA programs (AE, YP, TP, WM, JD), pp. 126–140.
PLDIPLDI-2017-KincaidBBR #composition #revisited
Compositional recurrence analysis revisited (ZK, JB, AFB, TWR), pp. 248–262.
PLDIPLDI-2017-TanLX #automaton #modelling #performance #points-to #precise
Efficient and precise points-to analysis: modeling the heap by merging equivalent automata (TT0, YL0, JX), pp. 278–291.
PLDIPLDI-2017-ThiessenL #pointer
Context transformations for pointer analysis (RT, OL), pp. 263–277.
POPLPOPL-2017-BrutschyD0V #consistency
Serializability for eventual consistency: criterion, analysis, and applications (LB, DD, PM0, MTV), pp. 458–472.
POPLPOPL-2017-GermaneM #automaton
A posteriori environment analysis with Pushdown Delta CFA (KG, MM), pp. 19–31.
POPLPOPL-2017-HoffmannDW #automation #bound #ml #towards
Towards automatic resource bound analysis for OCaml (JH0, AD, SCW), pp. 359–373.
POPLPOPL-2017-ZhangS #data flow #linear #reachability
Context-sensitive data-dependence analysis via linear conjunctive language reachability (QZ, ZS), pp. 344–358.
QAPLQAPL-2017-KoenigKM #named
PAWS: A Tool for the Analysis of Weighted Systems (BK, SK, CM), pp. 75–91.
QAPLQAPL-2017-SchuppNA #divide and conquer #hybrid #reachability #set
Divide and Conquer: Variable Set Separation in Hybrid Systems Reachability Analysis (SS, JN, ), pp. 1–14.
SASSAS-2017-BrockschmidtCKK #learning
Learning Shape Analysis (MB, YC, PK, SK, DT), pp. 66–87.
SASSAS-2017-Guernic #towards
Toward a Sound Analysis of Guarded LTI Loops with Inputs by Abstract Acceleration (CLG), pp. 192–211.
SASSAS-2017-HolikMVW #heuristic #summary #thread
Effect Summaries for Thread-Modular Analysis - Sound Analysis Despite an Unsound Heuristic (LH, RM0, TV, SW), pp. 169–191.
SASSAS-2017-LeonFHM #memory management #modelling
Portability Analysis for Weak Memory Models. PORTHOS: One Tool for all Models (HPdL, FF, KH, RM0), pp. 299–320.
SASSAS-2017-TrostanetskiGK #composition #difference #semantics
Modular Demand-Driven Analysis of Semantic Difference for Program Versions (AT, OG, DK), pp. 405–427.
SASSAS-2017-ZhangSX #incremental #probability #source code
Incremental Analysis for Probabilistic Programs (JZ, YS, JX), pp. 450–472.
ASEASE-2017-AhmedBIR #code review #interactive #named #overview #sentiment
SentiCR: a customized sentiment analysis tool for code review interactions (TA, AB, AI, SR), pp. 106–111.
ASEASE-2017-Busari #architecture #modelling #requirements #search-based #towards
Towards search-based modelling and analysis of requirements and architecture decisions (SAB), pp. 1026–1029.
ASEASE-2017-JamshidiSVKPA #configuration management #learning #modelling #performance
Transfer learning for performance modeling of configurable systems: an exploratory analysis (PJ, NS, MV, CK, AP, YA), pp. 497–508.
ASEASE-2017-KimFJJOLC #testing
Testing intermediate representations for binary analysis (SK0, MF, MJ, SJ, DO, JL, SKC), pp. 353–364.
ASEASE-2017-ShiCWLB #comprehension #feature model #fuzzy
Understanding feature requests by leveraging fuzzy method and linguistic analysis (LS, CC, QW0, SL, BWB), pp. 440–450.
ASEASE-2017-WangW #fuzzing #in memory #similarity
In-memory fuzzing for binary code similarity analysis (SW0, DW), pp. 319–330.
ESEC-FSEESEC-FSE-2017-AhmadianPRJ #modelling #privacy #security
Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
ESEC-FSEESEC-FSE-2017-RegisCBPRPAGF #alloy #behaviour #modelling #specification
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour (GR, CC, SGB, MP, FR, PP, NA, JPG, MFF), pp. 969–973.
ESEC-FSEESEC-FSE-2017-XieCZLLL #named #termination
Loopster: static loop termination analysis (XX, BC0, LZ, SWL, YL0, XL), pp. 84–94.
ICSE-2017-0006R #android #testing
Analysis and testing of notifications in Android wear applications (HZ0, AR), pp. 347–357.
ICSE-2017-BusariL #architecture #lightweight #named #requirements
RADAR: a lightweight tool for requirements and architecture decision analysis (SAB, EL), pp. 552–562.
ICSE-2017-JiangLYX #automation #integration #testing #what
What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing (HJ, XL, ZY, JX), pp. 712–723.
ICSE-2017-ServantJ #fine-grained #fuzzy
Fuzzy fine-grained code-history analysis (FS, JAJ), pp. 746–757.
ICSE-2017-XuCCLS #comprehension #named #security #towards
SPAIN: security patch analysis for binaries towards understanding the pain and pills (ZX, BC0, MC, YL0, FS), pp. 462–472.
SLESLE-2017-SmitsV #data flow #declarative #named #specification
FlowSpec: declarative dataflow analysis specification (JS, EV), pp. 221–231.
ASPLOSASPLOS-2017-AjaySRZX #3d #energy #named #optimisation
3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers (JA, CS0, ASR, CZ, WX), pp. 419–433.
ASPLOSASPLOS-2017-FerraiuoloXZMS #architecture #data flow #hardware #security #verification
Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis (AF, RX, DZ, ACM, GES), pp. 555–568.
ASPLOSASPLOS-2017-McMahanCNRGHS #architecture #composition
An Architecture Supporting Formal and Compositional Binary Analysis (JM, MC, LN, JR, SYG, BH, TS), pp. 177–191.
ASPLOSASPLOS-2017-NalliHHSVK #memory management #persistent
An Analysis of Persistent Memory Use with WHISPER (SN, SH, MDH, MMS, HV0, KK), pp. 135–148.
ASPLOSASPLOS-2017-WangHZXS #graph #interprocedural #named #scalability
Graspan: A Single-machine Disk-based Graph System for Interprocedural Static Analyses of Large-scale Systems Code (KW0, AH0, ZZ0, G(X, AAS), pp. 389–404.
CASECASE-2017-AziziKBK #geometry #reachability
Geometric reachability analysis for grasp planning in cluttered scenes for varying end-effectors (VA0, AK, KEB, MK), pp. 764–769.
CASECASE-2017-ChenGL #identification #markov #online #performance
Load identification based on Factorial Hidden Markov Model and online performance analysis (SC, FG, TL0), pp. 1249–1253.
CASECASE-2017-KangMPJ #modelling #multi
Multi-fidelity modeling for analysis of serial production lines (YK, LM, GP, FJ), pp. 30–35.
CASECASE-2017-LeeJFBGBL #modelling #process #simulation #using
Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
CASECASE-2017-LiLHTCLW #using
The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
CASECASE-2017-LiuH #convergence #protocol
The convergence analysis of bat-inspired consensus protocols with nonlinear dynamics (QL, QH), pp. 1560–1565.
CASECASE-2017-LiuH17a #cyber-physical #hybrid #theorem
Hybrid stability analysis via extended small-gain theorem for networked cyber-physical systems with transmission delay (QL, QH), pp. 1598–1603.
CASECASE-2017-LiuMR #cyber-physical #security
Security analysis of continuous-time cyber-physical system against sensor attacks (XL, YM, XR), pp. 1586–1591.
CASECASE-2017-LiuWQWZ #fault #geometry
A geometric errors analysis method integrated clamping error and wear out error over working space (XL, CW, LQ, YW, SZ), pp. 656–661.
CASECASE-2017-LiuZ17a #monitoring #robust
Intelligent robust milling tool wear monitoring via fractal analysis of cutting force (TL, KZ), pp. 1254–1259.
CASECASE-2017-LiXZ #complexity #learning
Complexity analysis of reinforcement learning and its application to robotics (BL, LX, QZ), pp. 1425–1426.
CASECASE-2017-SaezMBT #cyber-physical #detection
Anomaly detection and productivity analysis for cyber-physical systems in manufacturing (MS, FPM, KB, DMT), pp. 23–29.
CASECASE-2017-YangZL #reliability
Reliability analysis based on weibull distribution model for spreaders (SY, YZ, LL), pp. 531–535.
CASECASE-2017-YanZ #performance
Efficiency analysis of series machines under operation-dependent-failures (CBY, QZ), pp. 476–481.
CASECASE-2017-ZhangWLL #string
Analysis string stability of a new car-following model considering response time (JZ0, YW, GL, WL), pp. 853–857.
CASECASE-2017-ZhaoLHD #flexibility #performance #problem
Optimal planning of plant flexibility: Problem formulation and performance analysis (CZ, JL, NH, GAD), p. 986.
CASECASE-2017-ZhongPPJ #case study #health #modelling #process
Modeling and analysis of primary care to specialty care referral process: A case study at the university of florida health Jacksonville (XZ, AMP, LP, RJ), pp. 819–824.
CASECASE-2017-ZhuangCG #parametricity
Parameters analysis of hierarchical evolutionary method with an application of HVAC system (LZ, XC0, XG), pp. 858–863.
CASECASE-2017-ZouZ #detection
Occupancy detection in elevator car by fusing analysis of dual videos (JZ, QZ), pp. 906–911.
CCCC-2017-FedericoPA #bound #framework
rev.ng: a unified binary analysis framework to recover CFGs and function boundaries (ADF, MP, GA), pp. 131–141.
CGOCGO-2017-JohnsonFBOJA #collaboration #dependence #framework
A collaborative dependence analysis framework (NPJ, JF, SRB, TO, TBJ, DIA), pp. 148–159.
ESOPESOP-2017-DArgenioBBFH #formal method #source code
Is Your Software on Dope? - Formal Analysis of Surreptitiously “enhanced” Programs (PRD, GB, SB, BF, HH), pp. 83–110.
ESOPESOP-2017-TangWXZW0 #library #performance #reachability #summary
Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization (HT, DW, YX, LZ, XW, LZ0), pp. 880–908.
FASEFASE-2017-Henda0LNSS #named #security
OpenSAW: Open Security Analysis Workbench (NBH, BJ0, PL, KN, PS, OS), pp. 321–337.
FASEFASE-2017-PhamKRR #testing
Bucketing Failing Tests via Symbolic Analysis (VTP, SK, SR, AR), pp. 43–59.
CAVCAV-2017-ChatterjeeFM #automation #bound
Automated Recurrence Analysis for Almost-Linear Expected-Runtime Bounds (KC, HF0, AM), pp. 118–139.
CAVCAV-2017-SiZGN #satisfiability
Maximum Satisfiability in Software Analysis: Applications and Techniques (XS, XZ, RG, MN), pp. 68–94.
CAVCAV-2017-Carbonneaux0RS #automation #coq #proving
Automated Resource Analysis with Coq Proof Objects (QC, JH0, TWR, ZS), pp. 64–85.
CAVCAV-2017-ChatterjeeFG #recursion #source code #worst-case
Non-polynomial Worst-Case Analysis of Recursive Programs (KC, HF0, AKG), pp. 41–63.
CAVCAV-2017-DanS0JV
Finding Fix Locations for CFL-Reachability Analyses via Minimum Cuts (AMD, MS, SC0, JBJ, MTV), pp. 521–541.
CAVCAV-2017-TouzeauMMR #nondeterminism #performance
Ascertaining Uncertainty for Efficient Exact Cache Analysis (VT, CM, DM, JR), pp. 22–40.
ICSTICST-2017-ChanWSPS #concurrent #fault #invariant #multi #named #source code #thread #using
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
ICSTICST-2017-HollandSK #benchmark #metric #state of the art
Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark (BH, GRS, SK), pp. 484–491.
ICSTICST-2017-LuckowKP #complexity #using
Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
TAPTAP-2017-BaranyS #c #data flow #hybrid
Hybrid Information Flow Analysis for Real-World C Code (GB, JS), pp. 23–40.
TAPTAP-2017-DamianiHL #abstraction #product line #refinement
Abstraction Refinement for the Analysis of Software Product Lines (FD, RH, ML), pp. 3–20.
VMCAIVMCAI-2017-GuW #float #source code #using
Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
VMCAIVMCAI-2017-Seladji #component
Finding Relevant Templates via the Principal Component Analysis (YS), pp. 483–499.
ECSAECSA-2016-AbukwaikAR #api #automation #concept #constraints #documentation #identification #towards
Towards Seamless Analysis of Software Interoperability: Automatic Identification of Conceptual Constraints in API Documentation (HA, MA, HDR), pp. 67–83.
ECSAECSA-2016-KaptoEKT #approach #architecture #detection #evolution #source code
Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
ECSAECSA-2016-SchmerlGSBMCG #android #architecture #modelling #security
Architecture Modeling and Analysis of Security in Android Systems (BRS, JG, AS, HB, SM, JC, DG), pp. 274–290.
QoSAQoSA-2016-StierK #adaptation #modelling #performance #self
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses (CS, AK), pp. 80–89.
WICSAWICSA-2016-FengKCMX #approach #architecture #security #towards
Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
WICSAWICSA-2016-GerlitzK16a #architecture #matlab #modelling
Architectural Analysis of MATLAB/Simulink Models with Artshop (TG, SK), pp. 307–310.
WICSAWICSA-2016-Hofig #architecture #component #dependence #summary #tutorial
Tutorial Summary for Dependability Analysis in the Context of Component-Based System Architectures (KH), p. 255.
WICSAWICSA-2016-MubeenN #abstraction #component #distributed #embedded #on the
On Timing Analysis of Component-Based Vehicular Distributed Embedded Systems at Various Abstraction Levels (SM, TN), pp. 277–278.
WICSAWICSA-2016-Seifermann #architecture #data flow
Architectural Data Flow Analysis (SS), pp. 270–271.
WICSAWICSA-2016-TaspolatogluH #architecture #security
Context-Based Architectural Security Analysis (ET, RH), pp. 281–282.
JCDLJCDL-2016-FuF #community #music #social
Music Information Seeking via Social Q&A: An Analysis of Questions in Music StackExchange Community (HF, YF), pp. 139–142.
CSEETCSEET-2016-KungL #design #object-oriented
An Object-Oriented Analysis and Design Environment (DK, JL), pp. 91–100.
CSEETCSEET-2016-PriesterSS #development #invariant
Tool-Assisted Loop Invariant Development and Analysis (CP, YSS, MS), pp. 66–70.
EDMEDM-2016-AllenJDRKLM #process
{ENTER}ing the Time Series {SPACE}: Uncovering the Writing Process through Keystroke Analyses (LKA, MEJ, MD, RDR, KK, ADL, DSM), pp. 22–29.
EDMEDM-2016-BaikadiELS #what
Redefining “What” in Analyses of Who Does What in MOOCs (AB, CDE, YL, CS), pp. 569–570.
EDMEDM-2016-Bydzovska #comparative #performance #predict #student
A Comparative Analysis of Techniques for Predicting Student Performance (HB), pp. 306–311.
EDMEDM-2016-DaiAY #learning #recommendation #towards
Course Content Analysis: An Initiative Step toward Learning Object Recommendation Systems for MOOC Learners (YD, YA, MY), pp. 347–352.
EDMEDM-2016-HaoLDKK #collaboration #data mining #mining #problem #statistics
Collaborative Problem Solving Skills versus Collaboration Outcomes: Findings from Statistical Analysis and Data Mining (JH, LL, AvD, PCK, CK), pp. 382–387.
EDMEDM-2016-KoedingerM
Closing the Loop with Quantitative Cognitive Task Analysis (KRK, EAM), pp. 412–417.
EDMEDM-2016-LeeRBY #approach #clustering #heatmap #interactive #learning #visualisation
Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
EDMEDM-2016-LiuBLBBBM #behaviour
MOOC Learner Behaviors by Country and Culture; an Exploratory Analysis (ZL, RB, CL, TB, RSB, YB, DSM), pp. 127–134.
EDMEDM-2016-MlynarskaCG #process
Time Series Analysis of VLE Activity Data (EM, PC, DG), pp. 613–614.
EDMEDM-2016-Sande16a #component #learning #problem
Learning curves versus problem difficulty: an analysis of the Knowledge Component picture for a given context (BvdS), pp. 646–647.
ICPCICPC-2016-KhatiwadaKM #named
STAC: A tool for Static Textual Analysis of Code (SK, MK, AM), pp. 1–3.
ICPCICPC-2016-ZhangT0 #android #dependence
Android build dependency analysis (BZ0, VLT, MB0), pp. 1–4.
ICSMEICSME-2016-HallW
Data and Analysis Code for GP EFSM Inference (MH, NW), p. 611.
ICSMEICSME-2016-KirchmayrMNPT #comprehension #integration #legacy #source code
Integration of Static and Dynamic Code Analysis for Understanding Legacy Source Code (WK, MM, LN, JP, RT), pp. 543–552.
MSRMSR-2016-BlazB #sentiment
Sentiment analysis in tickets for IT support (CCAB, KB), pp. 235–246.
MSRMSR-2016-NakshatriHT #empirical #exception #java
Analysis of exception handling patterns in Java projects: an empirical study (SN, MH, ST), pp. 500–503.
MSRMSR-2016-YangHL #query #stack overflow
From query to usable code: an analysis of stack overflow code snippets (DY, AH0, CVL), pp. 391–402.
SANERSANER-2016-BritoHVR #api #developer #java #scalability
Do Developers Deprecate APIs with Replacement Messages? A Large-Scale Analysis on Java Systems (GB, ACH, MTV, RR), pp. 360–369.
SANERSANER-2016-DavidBTMFPM #execution #named #symbolic computation #tool support
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis (RD, SB, TDT, LM, JF, MLP, JYM), pp. 653–656.
SANERSANER-2016-DecanMCG #dependence #git #problem
When GitHub Meets CRAN: An Analysis of Inter-Repository Package Dependency Problems (AD, TM, MC, PG), pp. 493–504.
SANERSANER-2016-ZhengRSLSJBCQB #hybrid #named #using
AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
FMFM-2016-AntoninoGR #reachability
Tighter Reachability Criteria for Deadlock-Freedom Analysis (PRGA, TGR, AWR), pp. 43–59.
FMFM-2016-BeckerCGHHKNSTT #formal method #modelling #proving #testing
Combining Mechanized Proofs and Model-Based Testing in the Formal Analysis of a Hypervisor (HB, JMC, JG, UH, YH, CK, KN0, JLS, HT, TT), pp. 69–84.
FMFM-2016-BenesBDPS #approach #model checking
A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
FMFM-2016-DimovskiBW #abstraction #variability
Finding Suitable Variability Abstractions for Family-Based Analysis (ASD, CB, AW), pp. 217–234.
FMFM-2016-StoenescuSPI #execution #framework #named #symbolic computation #using
RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
FSCDFSCD-2016-Nipkow #data type #functional
Verified Analysis of Functional Data Structures (TN), p. 2.
IFM-2016-AndreiCCMR #formal method #probability
Probabilistic Formal Analysis of App Usage to Inform Redesign (OA, MC, MC, AM, MR), pp. 115–129.
IFM-2016-AntoninoGR #performance #satisfiability #using
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
IFM-2016-BendispostoKLMP #reachability
Symbolic Reachability Analysis of B Through ProB and LTSmin (JB, PK, ML, JM, JvdP, HT, JW), pp. 275–291.
SEFMSEFM-2016-Agha #abstraction #concurrent #modelling #problem #semantics #tool support
Abstractions, Semantic Models and Analysis Tools for Concurrent Systems: Progress and Open Problems - (Extended Abstract) (GA), pp. 3–8.
SEFMSEFM-2016-BendikBBC #bound #order #requirements #safety #set
Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
SEFMSEFM-2016-Cerone #framework #interactive #logic
A Cognitive Framework Based on Rewriting Logic for the Analysis of Interactive Systems (AC), pp. 287–303.
SEFMSEFM-2016-DernehlHK #abstract interpretation #diagrams #execution #symbolic computation
Combining Abstract Interpretation with Symbolic Execution for a Static Value Range Analysis of Block Diagrams (CD, NH, SK), pp. 137–152.
ICFP-2016-Gilray0M #control flow
Allocation characterizes polyvariance: a unified methodology for polyvariant control-flow analysis (TG, MDA0, MM), pp. 407–420.
AIIDEAIIDE-2016-SinghV #2d
Staying Hidden: An Analysis of Hiding Strategies in a 2D Level with Occlusions (NS, CV), pp. 72–78.
CHI-PLAYCHI-PLAY-2016-HornHBFSH #black box #education #game studies
Opening the Black Box of Play: Strategy Analysis of an Educational Game (BH, AKH, JB, YF, GS, CH), pp. 142–153.
CHI-PLAYCHI-PLAY-2016-WallnerK #case study #game studies #user study #visualisation
Visualizations for Retrospective Analysis of Battles in Team-based Combat Games: A User Study (GW, SK), pp. 22–32.
CoGCIG-2016-AllartLPGN #design
Design influence on player retention: A method based on time varying survival analysis (TA, GL, MP, AG, SN), pp. 1–8.
CoGCIG-2016-DrachenGGHLSK #behaviour #clustering #comparative #profiling
Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny (AD, JG, CG, EH, PL, RS, DK), pp. 1–8.
DiGRADiGRA-FDG-2016-IsaksenN #statistics
A Statistical Analysis of Player Improvement and Single-Player High Scores (AI, AN).
DiGRADiGRA-FDG-2016-Willumsen #formal method #source code
Source Code and Formal Analysis: A Hermeneutic Reading of Passage (ECW).
CoGVS-Games-2016-GodinhoE #game studies
Open Device Lab: An Analysis of Available Devices in the Gaming Market (RPG, RSCE), pp. 1–4.
CoGVS-Games-2016-PatinoRP #game studies #learning
Analysis of Game and Learning Mechanics According to the Learning Theories (AP, MR, JNP), pp. 1–4.
CIKMCIKM-2016-AmeriFCR #framework #predict #student
Survival Analysis based Framework for Early Prediction of Student Dropouts (SA, MJF, RBC, CKR), pp. 903–912.
CIKMCIKM-2016-CheemaKALWCR #health #monitoring #on the #using
On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
CIKMCIKM-2016-FanWL #metric #mobile #network #on the #optimisation
On Backup Battery Data in Base Stations of Mobile Networks: Measurement, Analysis, and Optimization (XF, FW0, JL), pp. 1513–1522.
CIKMCIKM-2016-GuoS #behaviour #mobile #scalability #towards
Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems (QG, YS), pp. 579–588.
CIKMCIKM-2016-KraviGMCMPT #multi #query
One Query, Many Clicks: Analysis of Queries with Multiple Clicks by the Same User (EK, IG, AM, DC, YM, DP, GT), pp. 1423–1432.
CIKMCIKM-2016-LiuLWT #information management #named #visualisation
FIN10K: A Web-based Information System for Financial Report Analysis and Visualization (YWL, LCL, CJW, MFT), pp. 2441–2444.
CIKMCIKM-2016-LiZZWZWXHWZLCR #delivery #framework #named #performance #platform
DI-DAP: An Efficient Disaster Information Delivery and Analysis Platform in Disaster Management (TL0, WZ, CZ, QW, QZ, DW0, JX0, YH, WW0, MZ, SL, SCC, NR), pp. 1593–1602.
CIKMCIKM-2016-MaxwellA #behaviour #performance
Agents, Simulated Users and Humans: An Analysis of Performance and Behaviour (DM, LA), pp. 731–740.
CIKMCIKM-2016-YuSHCH #data-driven #multi #quantifier #sentiment
Data-Driven Contextual Valence Shifter Quantification for Multi-Theme Sentiment Analysis (HY, JS, MH, MC, JH0), pp. 939–948.
ECIRECIR-2016-FlaesRW #multi #sentiment #what
What Multimedia Sentiment Analysis Says About City Liveability (JBF, SR, MW), pp. 824–829.
ECIRECIR-2016-FoleyA
Retrieving Hierarchical Syllabus Items for Exam Question Analysis (JF, JA), pp. 575–586.
ECIRECIR-2016-LiWPA #empirical #learning #sentiment
An Empirical Study of Skip-Gram Features and Regularization for Learning on Sentiment Analysis (CL, BW, VP, JAA), pp. 72–87.
ECIRECIR-2016-ShariffSZ #correlation #twitter
Correlation Analysis of Reader's Demographics and Tweet Credibility Perception (SMS, MS, XZ), pp. 453–465.
ECIRECIR-2016-WakelingC #library #online #transaction
Determining the Optimal Session Interval for Transaction Log Analysis of an Online Library Catalogue (SW, PDC), pp. 703–708.
ICMLICML-2016-AchimSE #constraints #fourier
Beyond Parity Constraints: Fourier Analysis of Hash Functions for Inference (TA, AS, SE), pp. 2254–2262.
ICMLICML-2016-ChiangHD #component #robust
Robust Principal Component Analysis with Side Information (KYC, CJH, ISD), pp. 2291–2299.
ICMLICML-2016-ElhoseinyEBE #categorisation #comparative #estimation #modelling #multi
A Comparative Analysis and Study of Multiview CNN Models for Joint Object Categorization and Pose Estimation (ME, TEG, AB, AME), pp. 888–897.
ICMLICML-2016-FrostigMMS #component
Principal Component Projection Without Principal Component Analysis (RF, CM, CM, AS), pp. 2349–2357.
ICMLICML-2016-GeJKNS #algorithm #canonical #correlation #performance #scalability
Efficient Algorithms for Large-scale Generalized Eigenvector Computation and Canonical Correlation Analysis (RG0, CJ, SMK, PN, AS), pp. 2741–2750.
ICMLICML-2016-GeZ #component
Rich Component Analysis (RG0, JZ), pp. 1502–1510.
ICMLICML-2016-KhandelwalLNS #monte carlo #on the
On the Analysis of Complex Backup Strategies in Monte Carlo Tree Search (PK, EL, SN, PS), pp. 1319–1328.
ICMLICML-2016-MandtHB #algorithm #probability
A Variational Analysis of Stochastic Gradient Algorithms (SM, MDH, DMB), pp. 354–363.
ICMLICML-2016-MichaeliWL #canonical #correlation #parametricity
Nonparametric Canonical Correlation Analysis (TM, WW, KL), pp. 1967–1976.
ICMLICML-2016-QuXO #algorithm #optimisation #performance #probability
Fast Rate Analysis of Some Stochastic Optimization Algorithms (CQ, HX, CJO), pp. 662–670.
ICMLICML-2016-WangMCBPRGUA #matrix #network
Analysis of Deep Neural Networks with Extended Data Jacobian Matrix (SW, ArM, RC, JAB, MP, MR, KG, GU, ÖA), pp. 718–726.
ICMLICML-2016-Wipf #estimation #rank
Analysis of Variational Bayesian Factorizations for Sparse and Low-Rank Estimation (DPW), pp. 926–935.
ICMLICML-2016-XieGF #clustering
Unsupervised Deep Embedding for Clustering Analysis (JX, RBG, AF), pp. 478–487.
ICPRICPR-2016-AugereauFK #automation #estimation #towards
Towards an automated estimation of English skill via TOEIC score based on reading analysis (OA, HF, KK), pp. 1285–1290.
ICPRICPR-2016-BillingsAB #detection #image
Ultrasound image analysis for myopathy detection (SB, JA, PB), pp. 1461–1465.
ICPRICPR-2016-Brandtberg #classification #fourier #fuzzy #multi #order #rank #using
Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
ICPRICPR-2016-CardosoMA #performance #problem
Plücker correction problem: Analysis and improvements in efficiency (JRC, PM, HA), pp. 2795–2800.
ICPRICPR-2016-CorbelliBGC #classification #documentation #layout
Historical document digitization through layout analysis and deep content classification (AC, LB, CG, RC), pp. 4077–4082.
ICPRICPR-2016-CoteA #documentation #evaluation #image #statistics
Layered ground truth: Conveying structural and statistical information for document image analysis and evaluation (MC, ABA), pp. 3258–3263.
ICPRICPR-2016-DesrosiersDD #generative #novel #statistics
Novel generative model for facial expressions based on statistical shape analysis of landmarks trajectories (PAD, MD, MD), pp. 961–966.
ICPRICPR-2016-DevanneWDBBP #learning
Learning shape variations of motion trajectories for gait analysis (MD, HW, MD, SB, ADB, PP), pp. 895–900.
ICPRICPR-2016-EscalanteP0RCCE #challenge #contest #multi #overview #perspective #visual notation
ChaLearn Joint Contest on Multimedia Challenges Beyond Visual Analysis: An overview (HJE, VPL, JW0, MAR, BC, AC, SE, IG, XB, PH, HM, MAL), pp. 67–73.
ICPRICPR-2016-HanSG #image
A hyperspectral image restoration method based on analysis sparse filter (CH, NS, CG), pp. 769–774.
ICPRICPR-2016-JermanPLSC #automation #identification
Automatic cutting plane identification for computer-aided analysis of intracranial aneurysms (TJ, FP, BL, ZS, AC), pp. 1484–1489.
ICPRICPR-2016-KatsageorgiouZH #behaviour #data-driven #interactive
Unsupervised mouse behavior analysis: A data-driven study of mice interactions (VMK, MZ, HH, VF0, FP, DS, VM), pp. 925–930.
ICPRICPR-2016-LovellPSVW #contest #image #pattern matching #pattern recognition #recognition
International Contest on Pattern Recognition techniques for indirect immunofluorescence images analysis (BCL, GP, AS, MV, AW), pp. 74–76.
ICPRICPR-2016-LuoLQ #bound #optimisation #probability
Bound analysis of natural gradient descent in stochastic optimization setting (ZL, DL, YQ), pp. 4166–4171.
ICPRICPR-2016-MinciulloC #automation #detection
Fully automated shape analysis for detection of Osteoarthritis from lateral knee radiographs (LM, TFC), pp. 3787–3791.
ICPRICPR-2016-MinematsuST #bidirectional
Background initialization based on bidirectional analysis and consensus voting (TM, AS, RiT), pp. 126–131.
ICPRICPR-2016-MoralesROOOI #estimation #video
Outdoor omnidirectional video completion via depth estimation by motion analysis (CM, MR, YO, SO, TO, KI), pp. 3945–3950.
ICPRICPR-2016-NgoSMXC
Quantitative analysis of facial paralysis based on limited-orientation modified circular Gabor filters (THN, MS, NM, WX0, YWC), pp. 349–354.
ICPRICPR-2016-OsmanliogluOHS #approximate #performance #problem
Efficient approximation of labeling problems with applications to immune repertoire analysis (YO, SO, UH, AS), pp. 2410–2415.
ICPRICPR-2016-RotaSCP #education #forensics #image #learning #question #student
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? (PR, ES, VC, CP), pp. 2503–2508.
ICPRICPR-2016-SaikiaSSKG #kernel #learning #multi #using
Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
ICPRICPR-2016-SukS #detection #retrieval
Solar flare retrieval, detection and analysis (TS, SS), pp. 1183–1188.
ICPRICPR-2016-SuzuuchiK #behaviour #multi
Location-associated indoor behavior analysis of multiple persons (SS, MK), pp. 2079–2084.
ICPRICPR-2016-Troya-GalvisGB #classification #collaboration #image #segmentation
Collaborative segmentation and classification for remote sensing image analysis (ATG, PG, LBÉ), pp. 829–834.
ICPRICPR-2016-WangWH #network #using
Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
ICPRICPR-2016-ZamzamiPGKAS #approach #automation #multimodal
An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
ICPRICPR-2016-ZhangHMCP #3d #detection #image
Face spoofing detection based on 3D lighting environment analysis of image pair (XZ, XH, MM, CC0, SP), pp. 2995–3000.
KDDKDD-2016-BalcanLSW0 #communication #component #distributed #kernel #performance
Communication Efficient Distributed Kernel Principal Component Analysis (MFB, YL, LS, DPW, BX0), pp. 725–734.
KDDKDD-2016-ChengZCJCW #correlation #ranking
Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations (WC, KZ0, HC, GJ, ZC, WW0), pp. 805–814.
KDDKDD-2016-KangLSB #component
Subjectively Interesting Component Analysis: Data Projections that Contrast with Prior Expectations (BK, JL, RSR, TDB), pp. 1615–1624.
KDDKDD-2016-LiWYR #learning #multi
A Multi-Task Learning Formulation for Survival Analysis (YL, JW0, JY, CKR), pp. 1715–1724.
KDDKDD-2016-WangCF0E #modelling #topic
Targeted Topic Modeling for Focused Analysis (SW, ZC0, GF, BL0, SE), pp. 1235–1244.
KDDKDD-2016-XuZZLZCX #behaviour #network #perspective #social
Taxi Driving Behavior Analysis in Latent Vehicle-to-Vehicle Networks: A Social Influence Perspective (TX, HZ, XZ, QL0, HZ, EC, HX), pp. 1285–1294.
KDDKDD-2016-ZhuZXDX #modelling
Recruitment Market Trend Analysis with Sequential Latent Variable Models (CZ, HZ, HX, PD, FX), pp. 383–392.
SKYSKY-2016-ExmanK #concept #named
Modulaser: A Tool for Conceptual Analysis of Software Systems (IE, PK), pp. 19–26.
ECMFAECMFA-2016-BaburCB #clustering #comparative #metamodelling #visualisation
Hierarchical Clustering of Metamodels for Comparative Analysis and Visualization (ÖB, LC, MvdB), pp. 3–18.
MoDELSMoDELS-2016-DeVriesC #automation #detection #requirements
Automatic detection of incomplete requirements via symbolic analysis (BD, BHCC), pp. 385–395.
MoDELSMoDELS-2016-KahaniBDC #eclipse #modelling #problem #tool support #topic
The problems with eclipse modeling tools: a topic analysis of eclipse forums (NK, MB, JD, JRC), pp. 227–237.
MoDELSMoDELS-2016-ZhangYAL #case study #mutation testing #towards
Towards mutation analysis for use cases (HZ, TY, SA, CL), pp. 363–373.
ECOOPECOOP-2016-Chevalier-Boisvert #interprocedural #javascript #source code
Interprocedural Type Specialization of JavaScript Programs Without Type Analysis (MCB, MF), p. 24.
ECOOPECOOP-2016-SpathDAB #java #named #pointer
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
OOPSLAOOPSLA-2016-DanLHV #memory management #modelling #programming
Modeling and analysis of remote memory access programming (AMD, PL0, TH, MTV), pp. 129–144.
OOPSLAOOPSLA-2016-KulkarniMZN
Accelerating program analyses by cross-program training (SK, RM, XZ, MN), pp. 359–377.
AdaEuropeAdaEurope-2016-MohaqeqiAY #data flow #graph #modelling #realtime #using
Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
LOPSTRLOPSTR-2016-FangS #abstraction #memory management
Hierarchical Shape Abstraction for Analysis of Free List Memory Allocators (BF0, MS), pp. 151–167.
PEPMPEPM-2016-AntwerpenNTVW #constraints #graph #semantics
A constraint language for static semantic analysis based on scope graphs (HvA, PN, APT, EV, GW), pp. 49–60.
PEPMPEPM-2016-Asai #towards
Toward introducing binding-time analysis to MetaOCaml (KA), pp. 97–102.
PLDIPLDI-2016-El-HassanyMBVV #concurrent #named #network
SDNRacer: concurrency analysis for software-defined networks (AEH, JM, PB, LV, MTV), pp. 402–415.
POPLPOPL-2016-ChatterjeeFNH #algorithm #probability #problem #source code #termination
Algorithmic analysis of qualitative and quantitative termination problems for affine probabilistic programs (KC, HF0, PN0, RH), pp. 327–342.
POPLPOPL-2016-GilrayL0MH #automaton #control flow #for free
Pushdown control-flow analysis for free (TG, SL, MDA0, MM, DVH), pp. 691–704.
PPDPPPDP-2016-BertolissiTV #data access #policy
Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
PPDPPPDP-2016-MidtgaardNN #process #regular expression
Iterated process analysis over lattice-valued regular expressions (JM, FN, HRN), pp. 132–145.
SASSAS-2016-BalatsourasS #c #c++ #points-to
Structure-Sensitive Points-To Analysis for C and C++ (GB, YS), pp. 84–104.
SASSAS-2016-FrielinghausSV #interprocedural #termination
Enforcing Termination of Interprocedural Analysis (SSF, HS, RV), pp. 447–468.
SASSAS-2016-GharatKM #graph #points-to #using
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
SASSAS-2016-TanLX #pointer #precise
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting (TT0, YL0, JX), pp. 489–510.
ASEASE-2016-Babur #modelling #scalability #set #statistics
Statistical analysis of large sets of models (ÖB), pp. 888–891.
ASEASE-2016-KroeningPSW #concurrent #thread
Sound static deadlock analysis for C/Pthreads (DK, DP, PS, BW), pp. 379–390.
ASEASE-2016-MingWWXL #named
StraightTaint: decoupled offline symbolic taint analysis (JM, DW, JW, GX, PL), pp. 308–319.
ASEASE-2016-OgnawalaOPL #composition #execution #low level #named #symbolic computation
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution (SO, MO, AP, TL), pp. 780–785.
ASEASE-2016-RazaF #automation #development #named #performance #recommendation
ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software development (MR, JPF), pp. 798–803.
ASEASE-2016-SzaboAVE #data flow #framework
An extensible framework for variable-precision data-flow analyses in MPS (TS, SA, MV, SE), pp. 870–875.
ASEASE-2016-SzaboEV #domain-specific language #incremental #named
IncA: a DSL for the definition of incremental program analyses (TS, SE, MV), pp. 320–331.
FSEFSE-2016-BagheriM #alloy #evolution #named #performance #specification
Titanium: efficient analysis of evolving alloy specifications (HB, SM), pp. 27–38.
FSEFSE-2016-BangAPPB #string
String analysis for side channels with segmented oracles (LB, AA, QSP, CSP, TB), pp. 193–204.
FSEFSE-2016-Cheng #fault #integer #named
RABIEF: range analysis based integer error fixing (XC), pp. 1094–1096.
FSEFSE-2016-HuangZT #correlation #detection
Detecting sensitive data disclosure via bi-directional text correlation analysis (JH0, XZ0, LT0), pp. 169–180.
FSEFSE-2016-KangMJ #multi #security
Multi-representational security analysis (EK, AM, DJ0), pp. 181–192.
FSEFSE-2016-MacedoBCCK #lightweight #specification
Lightweight specification and analysis of dynamic systems with rich configurations (NM, JB, DC, AC, DK), pp. 373–383.
FSEFSE-2016-SuiX #on-demand #refinement
On-demand strong update analysis via value-flow refinement (YS, JX), pp. 460–473.
FSEFSE-2016-SungKS0 #dependence #testing #web
Static DOM event dependency analysis for testing web applications (CS, MK, NS0, CW0), pp. 447–459.
FSEFSE-2016-Xiaofei
Static loop analysis and its applications (XX), pp. 1130–1132.
FSEFSE-2016-XieCLLL #dependence #named #summary
Proteus: computing disjunctive loop summary via path dependency analysis (XX, BC0, YL0, WL, XL), pp. 61–72.
FSEFSE-2016-Xu0ZX #debugging #detection #predict #python
Python predictive analysis for bug detection (ZX, PL0, XZ0, BX), pp. 121–132.
FSEFSE-2016-ZalmanoviciRT #clustering #functional #testing
Cluster-based test suite functional analysis (MZ, OR, RTB), pp. 962–967.
FSEFSE-2016-ZhouW #api #detection #web
API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
ICSE-2016-BusanyM #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 877–887.
ICSE-2016-DevroeyPPLSH #modelling #mutation testing
Featured model-based mutation analysis (XD, GP, MP, AL, PYS, PH), pp. 655–666.
ICSE-2016-Huang #concurrent #scalability #thread
Scalable thread sharing analysis (JH0), pp. 1097–1108.
ICSE-2016-LongR #generative #validation
An analysis of the search spaces for generate and validate patch generation systems (FL, MCR), pp. 702–713.
ICSE-2016-MechtaevYR #multi #named #scalability #synthesis
Angelix: scalable multiline program patch synthesis via symbolic analysis (SM, JY, AR), pp. 691–701.
ICSE-2016-Rubio-Gonzalez0 #float #precise #using
Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
ICSE-2016-SchroterKTBS #composition #configuration management #interface
Feature-model interfaces: the highway to compositional analyses of highly-configurable systems (RS, SK, TT, FB, GS), pp. 667–678.
ICSE-2016-XieLSCXX #automation #debugging
Revisit of automatic debugging via human focus-tracking analysis (XX, ZL, SS, ZC0, JX, BX), pp. 808–819.
CASECASE-2016-AntunesCB #performance #petri net #probability
A stochastic Petri net model for simulation-based performance analysis of public bicycle sharing systems (IA, LKC, JCB), pp. 433–439.
CASECASE-2016-FengZLF
Analysis of closed loop production lines in automotive body shops (YF, XZ, JL, WF), pp. 849–854.
CASECASE-2016-HsuYL #process #using
Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
CASECASE-2016-JiLSWLSCJ #behaviour #smarttech
A human-centered smart home system with wearable-sensor behavior analysis (JJ, TL0, CS0, HW, WL, MS, SC, ZJ), pp. 1112–1117.
CASECASE-2016-KangJ #geometry
Integrated analysis of productivity and machine condition degradation: A geometric-machine case (YK, FJ), pp. 1128–1133.
CASECASE-2016-LioulemesTM
Quantitative analysis of the human upper-limp kinematic model for robot-based rehabilitation applications (AL, MT, FM), pp. 1061–1066.
CASECASE-2016-YangWBZ #clustering #multi #scheduling #tool support
Optimal one-wafer cyclic scheduling analysis of transport-dominant single-arm multi-cluster tools (FY, NW, LB, MZ), pp. 1405–1410.
CASECASE-2016-YangWQZ #clustering #hybrid #multi #scheduling #tool support
Optimal scheduling analysis of treelike hybrid multi-cluster tools (FY, NW, YQ, MZ), pp. 1400–1404.
CASECASE-2016-ZhangSMLZF #design #parametricity #process #simulation #towards
Robotic additive manufacturing process simulation - towards design and analysis with building parameter in consideration (GQZ, AS, CM, DTL, BZ, TAF), pp. 609–613.
CCCC-2016-SankarCN
Improved MHP Analysis (AS, SC, VKN), pp. 207–217.
CCCC-2016-SuiX #interprocedural #named
SVF: interprocedural static value-flow analysis in LLVM (YS, JX), pp. 265–266.
CGOCGO-2016-PaisanteMBGP #pointer
Symbolic range analysis of pointers (VP, MM, LBeO, LG, FMQP), pp. 171–181.
CGOCGO-2016-SuiDX #parallel #pointer #source code #thread
Sparse flow-sensitive pointer analysis for multithreaded programs (YS, PD, JX), pp. 160–170.
CGOCGO-2016-VassiliadisRDPA #approximate #automation #towards
Towards automatic significance analysis for approximate computing (VV, JR, JD, KP, CDA, NB, SL, UN), pp. 182–193.
FASEFASE-2016-ChrszonDKB #modelling #probability
Family-Based Modeling and Analysis for Probabilistic Systems - Featuring ProFeat (PC, CD, SK, CB), pp. 287–304.
CAVCAV-2016-ChatterjeeFG #probability #source code #termination
Termination Analysis of Probabilistic Programs Through Positivstellensatz's (KC, HF0, AKG), pp. 3–22.
CAVCAV-2016-FanQM0D #automation #hybrid #modelling #reachability
Automatic Reachability Analysis for Nonlinear Hybrid Models with C2E2 (CF, BQ, SM, MV0, PSD), pp. 531–538.
CAVCAV-2016-ManevichDR #linear #termination
From Shape Analysis to Termination Analysis in Linear Time (RM, BD, NR), pp. 426–446.
CAVCAV-2016-PrabhakarS #abstraction #refinement
Counterexample Guided Abstraction Refinement for Stability Analysis (PP, MGS), pp. 495–512.
CAVCAV-2016-WangTLYJ #automaton #logic #representation #string
String Analysis via Automata Manipulation with Logic Circuit Representation (HEW, TLT, CHL, FY, JHRJ), pp. 241–260.
CAVCAV-2016-SevegnaniC #graph #named
BigraphER: Rewriting and Analysis Engine for Bigraphs (MS, MC), pp. 494–501.
ICSTICST-2016-GaoJBL #effectiveness #framework #testing
A Framework to Evaluate the Effectiveness of Different Load Testing Analysis Techniques (RG, ZMJ, CB, ML), pp. 22–32.
ICSTICST-2016-TokumotoYSH #c #higher-order #mutation testing #named #virtual machine
MuVM: Higher Order Mutation Analysis Virtual Machine for C (ST, HY, KS, SH), pp. 320–329.
ICTSSICTSS-2016-SuzukiPKT #behaviour #network #visualisation
Distribution Visualization for User Behavior Analysis on LTE Network (MS, QP, TK, MT), pp. 249–255.
VMCAIVMCAI-2016-Parizek #array #hybrid #partial order #reduction #source code
Hybrid Analysis for Partial Order Reduction of Programs with Arrays (PP), pp. 291–310.
CBSECBSE-2015-KimBNMLSLP #probability #scheduling
Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
ECSAECSA-2015-StierKGR #architecture #energy #modelling #performance
Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
ECSAECSA-2015-TrubianiGE #architecture #modelling #nondeterminism #performance #traceability
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
WICSAWICSA-2015-AbukwaikNR #concept
A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
DocEngDocEng-2015-NicholasB #documentation
Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
DRRDRR-2015-ChenSWLHI #dataset #documentation #layout
Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
HTHT-2015-ApaolazaHJ #behaviour #interactive #low level #web
Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HTHT-2015-Baeza-YatesS #generative
Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
HTHT-2015-BurnapCS #classification #communication #twitter
Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
HTHT-2015-MishraDBS #incremental #learning #sentiment
Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
JCDLJCDL-2015-NielsenG #interactive #library #multi #named #transaction #visual notation
PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data (MN, KG), pp. 139–142.
SIGMODSIGMOD-2015-ElgamalYAMH #big data #component #distributed #named #platform #scalability
sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
SIGMODSIGMOD-2015-ZengADAS #big data #interactive #named #online
G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
VLDBVLDB-2015-BrancotteYBBDH #rank
Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
VLDBVLDB-2015-YangCLW #nearest neighbour #query
Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
EDMEDM-2015-AnayaGLH #approach #collaboration #diagrams #network #social #using
An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDMEDM-2015-BergnerKP #challenge #learning
Methodological Challenges in the Analysis of MOOC Data for Exploring the Relationship between Discussion Forum Views and Learning Outcomes (YB, DK, DEP), pp. 234–241.
EDMEDM-2015-BhatnagarDWLDLC #learning
An Analysis of Peer-submitted and Peer-reviewed Answer Rationales in a Web-based Peer Instruction Based Learning Environment (SB, MCD, CW, NL, MD, KL, ESC), pp. 456–459.
EDMEDM-2015-BlanchardDON #automation #education #speech #towards
Classifying Q&A from Teachers' Speech: Moving Toward an Automated System of Dialogic Analysis (NB, SKD, AO, MN), pp. 282–288.
EDMEDM-2015-BoubekkiKGSB #data-driven #towards
Toward Data-Driven Analyses of Electronic Text Books (AB, UK, FG, WS, UB), pp. 592–593.
EDMEDM-2015-GoldinG #convergence #student
Convergent Validity of a Student Model: Recent-Performance Factors Analysis (IMG, AG), pp. 548–551.
EDMEDM-2015-Hayashi #feedback #network #online #process
Psychological Effects of In-Group Activity Feedback in an Online Explanation Task: Lexical Network Analysis (YH), pp. 484–487.
EDMEDM-2015-JiangZLL #network #question #what
Influence Analysis by Heterogeneous Network in MOOC Forums: What can We Discover? (ZJ, YZ, CL, XL), pp. 242–249.
EDMEDM-2015-MorettiMS #education #evaluation #policy #sentiment #topic
Application of Sentiment and Topic Analysis to Teacher Evaluation Policy in the U.S (AM, KM, ASA), pp. 628–629.
EDMEDM-2015-PapousekPRS #adaptation
An Analysis of Response Times in Adaptive Practice of Geography Facts (JP, RP, JR, VS), pp. 562–563.
ITiCSEITiCSE-2015-BellettiniLMMMT #how #performance #student
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
ITiCSEITiCSE-2015-Rubio #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-UraiUO #distributed #programming
Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
ICPCICPC-2015-MartinCAA #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaeidiHKJ #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICSMEICSME-2015-GoeminneM #database #framework #java #towards
Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
ICSMEICSME-2015-JongelingDS #re-engineering #research #sentiment #tool support
Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
ICSMEICSME-2015-KhadkaSKSHJDB #case study #delivery #legacy #what
Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
ICSMEICSME-2015-XiaLWY #overview #recommendation
Who should review this change?: Putting text and file location analyses together for more accurate recommendations (XX, DL, XW, XY), pp. 261–270.
ICSMEICSME-2015-Yamashita #assessment #benchmark #case study #experience #metric #quality #visualisation
Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
ICSMEICSME-2015-YamashitaZFW #comparative #industrial #open source #replication #smell
Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
MSRMSR-2015-ClaesMCV
A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
MSRMSR-2015-MalikZG #energy
Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
MSRMSR-2015-ZouXGYYZ #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-AlawnehHH #metamodelling #performance #towards
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
SANERSANER-2015-CaiS15a #dependence #fine-grained #named
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
SANERSANER-2015-KoboriMI #evolution #java
Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
SANERSANER-2015-LaverdiereBM #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-Martin #framework #towards
Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
SANERSANER-2015-MattsenWS #abstract domain
A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SANERSANER-2015-MedicherlaK #approximate #precise #scalability
Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
SANERSANER-2015-NairJNH
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-SilvaCMS #fine-grained
Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
SCAMSCAM-2015-DarizRS #programmable
A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAMSCAM-2015-PintoKT #automation #multi #performance
Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
DLTDLT-2015-BrandlS #automaton #complexity #finite #monad
Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
ICALPICALP-v2-2015-Boreale #approximate #generative #probability
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
FMFM-2015-AlbertACGGMPR #concurrent #distributed #source code
Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
FMFM-2015-Damm #automation #lessons learnt #named #verification
AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
FMFM-2015-LiuH #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
RTARTA-2015-GenetS #reachability
Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
RTARTA-2015-NageleFM #automation #confluence #term rewriting
Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
SEFMSEFM-2015-KamaliHKP #distributed #formal method
Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
TLCATLCA-2015-HofmannM #multi #term rewriting
Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
AIIDEAIIDE-2015-SifaDB #behaviour #scalability
Large-Scale Cross-Game Player Behavior Analysis on Steam (RS, AD, CB), pp. 198–204.
CHI-PLAYCHI-PLAY-2015-BaskinZ #behaviour #exclamation #interactive #tablet #towards
The Player is Chewing the Tablet!: Towards a Systematic Analysis of User Behavior in Animal-Computer Interaction (SB, AZ), pp. 463–468.
CHI-PLAYCHI-PLAY-2015-FodorMG #difference
Agents and Avatars: Event based analysis of competitive differences (MF, PMB, JG), pp. 511–516.
CHI-PLAYCHI-PLAY-2015-HarpsteadA #design #education #empirical #game studies #learning #using
Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
CHI-PLAYCHI-PLAY-2015-Wallner #behaviour
Sequential Analysis of Player Behavior (GW), pp. 349–358.
CoGCIG-2015-ChangHH #algorithm #case study #convergence #correctness #monte carlo
Convergence and correctness analysis of Monte-Carlo tree search algorithms: A case study of 2 by 4 Chinese dark chess (HJC, CWH, TsH), pp. 260–266.
CoGCIG-2015-MasuiUYP #development #game studies #towards
Toward curling informatics - Digital scorebook development and game information analysis (FM, HU, HY, MP), pp. 481–488.
CoGCIG-2015-PaliyawanSCT #design #game studies #interface
Body motion design and analysis for fighting game interface (PP, KS, WC, RT), pp. 360–367.
DiGRADiGRA-2015-ShibuyaTS #game studies #mobile #social
Systematic Analysis of In-Game Purchases and Social Features of Mobile Social Games in Japan (AS, MT, AS).
FDGFDG-2015-IsaksenGN #game studies #using
Exploring Game Space Using Survival Analysis (AI, DG, AN).
FDGFDG-2015-MuellerKFKMSSG #behaviour #statistics
Statistical Analysis of Player Behavior in Minecraft (SM0, MK, SF, SK, RPM, BS, RWS, MHG).
FDGFDG-2015-RyanKMW15a #game studies #semantics #tool support #using
Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
FDGFDG-2015-ZookHR #game studies #monte carlo
Monte-Carlo Tree Search for Simulation-based Play Strategy Analysis (AZ, BH, MR).
CoGVS-Games-2015-BevilacquaBE #game studies #multimodal
Proposal for Non-Contact Analysis of Multimodal Inputs to Measure Stress Level in Serious Games (FB, PB, HE), pp. 1–4.
ICGTICGT-2015-Stuckrath #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-TaentzerG #confluence #graph transformation #towards
Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
CHICHI-2015-AmershiCDLSS #machine learning #named #performance #tool support
ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
CHICHI-2015-AsthanaSG #assessment #human-computer
Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
CHICHI-2015-ButlerASGP #automation #design #game studies
Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
CHICHI-2015-DerbovenMS #case study #design #multimodal
Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
CHICHI-2015-HourcadeMWP #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HoyleTACK #privacy #smarttech
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHICHI-2015-HuangSHH #how
How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHICHI-2015-LesselAK #people
Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
CHICHI-2015-OskampBHG #design #evaluation #multi #named
TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
CHICHI-2015-PandeyRSNB #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-VatavuW #elicitation #formal method #metric #tool support
Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
CHICHI-2015-Wacharamanotham #named #statistics
Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
CSCWCSCW-2015-MacLeanGLMH #health #named #online
Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
CSCWCSCW-2015-SavageM #online
Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
HCIDHM-EH-2015-Hu0LZY #3d #development #finite
Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
HCIDHM-EH-2015-HuDLZY
Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
HCIDHM-EH-2015-HuZZRL #correlation
Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
HCIDHM-EH-2015-KanazawaOWWTGH15a #experience
Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
HCIDHM-EH-2015-TianLYJCS #scalability #video
Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
HCIDHM-EH-2015-UchidaHKEMOUG #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhouYLXZ
Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
HCIDHM-HM-2015-BoringJM #modelling #performance #reliability
Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
HCIDHM-HM-2015-GotoLTYH #eye tracking
Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
HCIDHM-HM-2015-IkaiMKIH
Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
HCIDHM-HM-2015-KitajimaKMMMH #comprehension #process
Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
HCIDHM-HM-2015-KurataniHHKUGH #comparison #process
Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
HCIDHM-HM-2015-SendaSKST #process
Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
HCIDHM-HM-2015-ShodaYSS #behaviour #how #people
Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
HCIDHM-HM-2015-SudaTHYGH #process
Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
HCIDHM-HM-2015-SugimotoYNG #process
EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
HCIDHM-HM-2015-WangTTITGH
Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
HCIDHM-HM-2015-WangTTTGH #process
Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
HCIDHM-HM-2015-WangTTTGH15a #process
Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
HCIDUXU-DD-2015-EmanuelRM #interactive
Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
HCIDUXU-DD-2015-Fernandez #health #human-computer #interactive
Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
HCIDUXU-DD-2015-OliveiraMMM #behaviour #design
Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
HCIDUXU-DD-2015-TarkkanenHR #problem #testing #usability
Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
HCIDUXU-IXD-2015-IwamotoKM #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-KoshiyamaPR #architecture #repository #usability
Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
HCIDUXU-IXD-2015-Naskova #usability
Usability Analysis of IxDA.org (JN), pp. 63–73.
HCIDUXU-IXD-2015-OliveiraVSBRS #interactive #usability
Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
HCIDUXU-IXD-2015-RaffaeleAJCPCS #game studies #legacy #multi #platform #usability
Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
HCIDUXU-UI-2015-DaggeFR #comparative #named #process
HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
HCIDUXU-UI-2015-KronbauerMS #evaluation #experience #interactive #mobile #user interface
Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
HCIDUXU-UI-2015-LeeKK #case study #experience #user interface
A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
HCIDUXU-UI-2015-MarcusB #design
Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
HCIDUXU-UI-2015-MarczalJ #behaviour #mobile
Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
HCIDUXU-UI-2015-RodriguesEM #collaboration #platform
Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
HCIHCI-DE-2015-GrobelnyM #algorithm #comparative #design #grid #visual notation
Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
HCIHCI-DE-2015-HashizumeK #smarttech #usability
Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
HCIHCI-IT-2015-MurataM #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-MutoM #development #interactive
Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
HCIHCI-IT-2015-SarsharNR #human-computer #on the #smarttech #usability
On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
HCIHCI-IT-2015-SatoAOO #automation #classification #image
Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
HCIHCI-IT-2015-ZhuF #game studies #online
A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
HCIHCI-UC-2015-Ujita #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-HayashiH #concept #learning #process
Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
HCIHIMI-IKC-2015-MakhtarI #evaluation
An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
HCIHIMI-IKC-2015-MatsudaOHT #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-WangN #identification #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCIHIMI-IKC-2015-YamadaAY #internet
An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
HCIHIMI-IKD-2015-MorizumiA #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCILCT-2015-AltanC #animation #education
An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, ), pp. 3–13.
HCILCT-2015-DalipiYK #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCISCSM-2015-GerritsenB #predict
Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
HCISCSM-2015-KastratiIYD #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-KinclNPS #independence #sentiment
Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
ICEISICEIS-v2-2015-BandyszakRWP #information management #specification #validation
Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEISICEIS-v2-2015-Judrups #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEISICEIS-v2-2015-PerezNGD #development #process
A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEISICEIS-v2-2015-SariK #debugging #monitoring #predict #using
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-SouzaVS #semantics
Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEISICEIS-v2-2015-ZoglaMS #problem #quality #taxonomy
Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEISICEIS-v3-2015-BauerBTR #flexibility #maintenance #repository
A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
ICEISICEIS-v3-2015-ThabetGG #mining #petri net #process
Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
ICEISICEIS-v3-2015-ValentimCM #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
CIKMCIKM-2015-ChenSJ #data type #infinity
Private Analysis of Infinite Data Streams via Retroactive Grouping (RC, YS, HJ), pp. 1061–1070.
CIKMCIKM-2015-JoKB #gpu #matrix #multi #network #performance #scalability #social
Efficient Sparse Matrix Multiplication on GPU for Large Social Network Analysis (YYJ, SWK, DHB), pp. 1261–1270.
CIKMCIKM-2015-JoLR #predict #topic
Time Series Analysis of Nursing Notes for Mortality Prediction via a State Transition Topic Model (YJ, NL, CPR), pp. 1171–1180.
CIKMCIKM-2015-KimCLYK #semantics
Deep Semantic Frame-Based Deceptive Opinion Spam Analysis (SK, HC, SL, MY, JK), pp. 1131–1140.
CIKMCIKM-2015-MaxwellAJK
Searching and Stopping: An Analysis of Stopping Rules and Strategies (DM, LA, KJ, HK), pp. 313–322.
CIKMCIKM-2015-MukherjeeW #community #interactive
Leveraging Joint Interactions for Credibility Analysis in News Communities (SM, GW), pp. 353–362.
CIKMCIKM-2015-Paul #canonical #correlation
Core-Sets For Canonical Correlation Analysis (SP), pp. 1887–1890.
CIKMCIKM-2015-TehraniAT #interactive
Interactive User Group Analysis (BOT, SAY, AT), pp. 403–412.
CIKMCIKM-2015-Tomkins #scalability
Large-Scale Analysis of Dynamics of Choice Among Discrete Alternatives (AT), p. 1349.
CIKMCIKM-2015-ZhaoZK #game studies #network #recommendation #social
Exploiting Game Theoretic Analysis for Link Recommendation in Social Networks (TZ, HVZ, IK), pp. 851–860.
ECIRECIR-2015-BansalBV #semantics #towards
Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
ECIRECIR-2015-BiyaniBCM #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-CaoC #behaviour #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-HienertHWK #named
WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
ECIRECIR-2015-HuynhHR #learning #sentiment #strict
Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
ECIRECIR-2015-Kelly #estimation #information retrieval #statistics
Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
ECIRECIR-2015-KoolenBBK #social #social media
Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
ECIRECIR-2015-Moghaddam #fault #feedback #mining #sentiment
Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
ECIRECIR-2015-SabetghadamLBR #graph #reachability
Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
ICMLICML-2015-GanCHCC #modelling #scalability #topic
Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
ICMLICML-2015-GongY #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-HuangGS #component #independence
Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
ICMLICML-2015-KomiyamaHN #multi #probability #problem
Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
ICMLICML-2015-MaLF #canonical #correlation #dataset #linear #scalability
Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
ICMLICML-2015-NishiharaLRPJ #convergence
A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
ICMLICML-2015-PerrotH #learning #metric
A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
ICMLICML-2015-PrasadPR #axiom #rank
Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
ICMLICML-2015-WangWS #clustering
A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
ICMLICML-2015-YangX15a #component #streaming
Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
ICMLICML-2015-ZhouZS #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-ChaoHZ #kernel
Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
KDDKDD-2015-EmbarBPV #online #social #topic
Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
KDDKDD-2015-NagarajanWBNBHT #predict
Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
KDDKDD-2015-OkumuraST #classification #incremental #linear #problem
Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
KDDKDD-2015-ZhangLZSKYJ #biology #image #learning #modelling #multi
Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
KDDKDD-2015-ZhouLB #clustering #graph
Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
MLDMMLDM-2015-CoralloFMACCGS #approach #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-KarkkainenS #component #robust
Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
MLDMMLDM-2015-KrasotkinaM15a #approach
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
MLDMMLDM-2015-MojahedBWI #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-ShaluntsB #named #sentiment
SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
RecSysRecSys-2015-SifaOB #migration
User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
RecSysRecSys-2015-SousaDBM #named #network #recommendation
CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
SEKESEKE-2015-BarchetSF #collaboration #dependence #risk management
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
SEKESEKE-2015-GokhaleE #network #social
Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
SEKESEKE-2015-RamosCRSAP #architecture #recommendation
Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
SEKESEKE-2015-SaputriL #machine learning #perspective
Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
SEKESEKE-2015-SunSWZ #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-Tasse #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-ValeSSA #agile #evaluation #industrial #named #process
RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
SEKESEKE-2015-ZhangGAU #mobile
Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
SIGIRSIGIR-2015-Dori-Hacohen #detection
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #corpus #detection #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
SIGIRSIGIR-2015-KrstovskiSK #modelling #retrieval
Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
SIGIRSIGIR-2015-SeverynM15a #network #sentiment #twitter
Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
SKYSKY-2015-FragaMRM #assessment #automation #generative #health #natural language
Natural Language Processing System Applied in Public Health for Assessment of an Automatic Analysis of Patterns Generator (AF, JLM, VR, VM), pp. 31–38.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
AMTAMT-2015-GholizadehDKM #model transformation
Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
BXBX-2015-HidakaBTM #approach #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BerardinelliMPP #design #energy
Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
MoDELSMoDELS-2015-Rodriguez-Echeverria #approach #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
SPLCSPLC-2015-BeekFG #adaptation #paradigm #product line
Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
SPLCSPLC-2015-BeekFGM #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeekLLV #constraints #modelling #probability #product line #statistics
Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
SPLCSPLC-2015-DomisAB #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-LiangGCR #feature model #modelling #satisfiability #scalability
SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
SPLCSPLC-2015-YueAS #case study #cyber-physical #experience #product line
Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
ECOOPECOOP-2015-CentonzePT
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ECOOPECOOP-2015-DimovskiBW #abstraction #precise #variability
Variability Abstractions: Trading Precision for Speed in Family-Based Analyses (ASD, CB, AW), pp. 247–270.
ECOOPECOOP-2015-WeiR #adaptation #javascript
Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
OOPSLAOOPSLA-2015-DietrichHS #java #points-to
Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
OOPSLAOOPSLA-2015-FuBS #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
AdaEuropeAdaEurope-2015-JaradatBP #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEuropeAdaEurope-2015-ZamoranoG #scheduling
Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
LOPSTRLOPSTR-2015-BodeiBGHL #calculus
A Global Occurrence Counting Analysis for Brane Calculi (CB, LB, RG, DH, FL), pp. 179–200.
LOPSTRLOPSTR-2015-CominiGTV
Abstract Analysis of Universal Properties for tccp (MC, MdMG, LT, AV), pp. 163–178.
LOPSTRLOPSTR-2015-MantelMPW #automaton #composition #data flow #network #using
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
LOPSTRLOPSTR-2015-RiescoAA #maude #memory management #policy #semantics #specification
Memory Policy Analysis for Semantics Specifications in Maude (AR0, IMA, MA), pp. 293–310.
PEPMPEPM-2015-HoekH #php
Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
PEPMPEPM-2015-KootH #exception #functional #higher-order #semantics #strict #type system
Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
PEPMPEPM-2015-VerstoepH #functional #higher-order #strict
Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
PLDIPLDI-2015-DeligiannisDKLT #programming #state machine #testing
Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
PLDIPLDI-2015-WeijiangBLK #dependence
Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
POPLPOPL-2015-ChatterjeePV #interprocedural
Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
POPLPOPL-2015-GiacobazziLR #metaprogramming
Analyzing Program Analyses (RG, FL, FR), pp. 261–273.
POPLPOPL-2015-PredaGLM #automaton #bytecode #semantics #similarity
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
POPLPOPL-2015-TangWZXZM #data flow
Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
PPDPPPDP-2015-Hofmann #automation
Automatic amortized analysis (MH), p. 5.
QAPLQAPL-2015-RosendahlK #probability
Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
SASSAS-2015-AlbertGG #interprocedural #source code
May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
SASSAS-2015-BakhirkinBP #set
A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
SASSAS-2015-CastelnuovoNRSY #bottom-up #case study #composition #top-down
Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
SASSAS-2015-CattaruzzaASK #bound
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
SASSAS-2015-LiRC
Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
SASSAS-2015-LiTX #effectiveness
Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
SASSAS-2015-RapoportLT #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
ASEASE-2015-DeligiannisDR #concurrent #debugging #performance #precise
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers (T) (PD, AFD, ZR), pp. 166–177.
ASEASE-2015-LerchSBM #abstraction #bound #data flow #scalability
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
ASEASE-2015-ShermanD #data flow #performance #precise
Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T) (ES, MBD), pp. 608–618.
ASEASE-2015-VecchioSYWKZ #android #string
String Analysis of Android Applications (N) (JDV, FS, KMY, BW, SYK, LZ), pp. 680–685.
ASEASE-2015-WaterlooPE #fault #testing
Test Analysis: Searching for Faults in Tests (N) (MW, SP, SGE), pp. 149–154.
ESEC-FSEESEC-FSE-2015-BusanyM #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ESEC-FSEESEC-FSE-2015-FuLB #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-LiLWH #android #java #string
String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ICSEICSE-v1-2015-HuangLR #concurrent #named #predict
GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
ICSEICSE-v1-2015-OcteauLDJM #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSEICSE-v1-2015-PanW0G #javascript
Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
ICSEICSE-v1-2015-PradelSS #consistency #javascript #named #nondeterminism
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
ICSEICSE-v1-2015-YangYWWR #android #control flow
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSEICSE-v1-2015-YiYLZW #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-AlexandruG #agile #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-Berghe #security #towards
Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSEICSE-v2-2015-Bichhawat
Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
ICSEICSE-v2-2015-Hachem #architecture #data access #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
ICSEICSE-v2-2015-HermansM #dataset #email #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
ICSEICSE-v2-2015-KlasBDSH #evaluation #modelling #scalability #testing
A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
ICSEICSE-v2-2015-MaleticC #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-Palomba #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-SadeghiBM #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-Zieris #information management #programming
Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
SACSAC-2015-DuanZHX #delivery #framework #network #performance #platform
Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SACSAC-2015-FerreiraMME #comparison #kernel #memory management
An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SACSAC-2015-GimenesGRG #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SACSAC-2015-IqbalKK #sentiment
Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SACSAC-2015-IsraelHS #multi #semantics #summary
Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SACSAC-2015-JakobsW #data flow #proving #source code
Programs from proofs of predicated dataflow analyses (MCJ, HW), pp. 1729–1736.
SACSAC-2015-Jung0B #embedded #encoding #identification #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SACSAC-2015-KrutzMS #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-MaltaPSBF #case study #distance #information management #overview
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SACSAC-2015-MongioviGFPT #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-MoreiraJR #reduction #similarity #visual notation
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SACSAC-2015-OjameruayeB #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SACSAC-2015-PiMMG #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SACSAC-2015-Puffitsch #bound #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SACSAC-2015-RaniseTV #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SACSAC-2015-SilvaMS #quality
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
GPCEGPCE-2015-El-SharkawyKS #semantics #tool support
Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
SLESLE-2015-Bagge #library
Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
CASECASE-2015-CarmenateRLBM #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-HanZ #energy
Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
CASECASE-2015-JiaZAX #performance
Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
CASECASE-2015-MeddouriDF #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-NonakaSLNKK #simulation #statistics
The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
CASECASE-2015-SaezMBT #hybrid #performance #realtime #simulation
Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
CASECASE-2015-XiePLLY
Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
CASECASE-2015-XieZLSD #agile #approach #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CASECASE-2015-ZhongLBM #modelling
Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
CCCC-2015-AllenSK #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CGOCGO-2015-NagarajG #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-OanceaR #induction #scalability
Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
DACDAC-2015-ChangHLW #encoding #functional #named
TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DACDAC-2015-ChenTSHK #modelling #multi #reliability
Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
DACDAC-2015-EspinosaHAAR #correlation #robust #set #verification
Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
DACDAC-2015-HanF #approach #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KrishnaNRT #composition #modelling #product line
Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
DACDAC-2015-LiuZWYX #difference #encryption #fault #named
DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DACDAC-2015-MundhenkSLFC #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-RoseM #design #performance
Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DACDAC-2015-ThieleAE #scheduling
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DACDAC-2015-YangTJ
Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATEDATE-2015-AhmadyanGNCV #diagrams #performance
Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
DATEDATE-2015-AndradeMVAPL #data flow #modelling
Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
DATEDATE-2015-BaldwinBRPB #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BiondiB #modelling
Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
DATEDATE-2015-ChangD #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-DeyCAM #difference #fault
Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
DATEDATE-2015-DuongNXWTBYWW
Coherent crosstalk noise analyses in ring-based optical interconnects (LHKD, MN, JX, ZW, YT, SLB, PY, XW, ZW), pp. 501–506.
DATEDATE-2015-FeldS #dependence
Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
DATEDATE-2015-GuanTW0 #realtime
Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
DATEDATE-2015-HoqueMS #approach #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-IqtedarHSH #distributed #probability
Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
DATEDATE-2015-KhosraviMGT #optimisation #reliability
Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
DATEDATE-2015-KriebelRSASH #combinator #configuration management #fault #named #performance
ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
DATEDATE-2015-LezosDM #distance #locality #optimisation #reuse
Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
DATEDATE-2015-MacherSBAK #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-MajumderLBP #architecture #manycore #probability
NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
DATEDATE-2015-RamboE #communication #worst-case
Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
DATEDATE-2015-SeylerSGNT #formal method
Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
DATEDATE-2015-ThangamuthuCCL #network
Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
DATEDATE-2015-WartelKGBSTQLMB #case study #hardware #platform
Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
HPCAHPCA-2015-ZhaoY #distance #manycore #reuse #scalability
Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
HPDCHPDC-2015-AlvarezOEAGR
HPC System Lifetime Story: Workload Characterization and Evolutionary Analyses on NERSC Systems (GPRÁ, POÖ, EE, KA, RG, LR), pp. 57–60.
LCTESLCTES-2015-0001HL #kernel #realtime
Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
LCTESLCTES-2015-BarijoughHKG #streaming #trade-off
Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
LCTESLCTES-2015-StilkerichLES #embedded #realtime
A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
LCTESLCTES-2015-ZhangK #abstract interpretation #persistent #precise
Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
PDPPDP-2015-AbadalMMACM #design #manycore
Multicast On-chip Traffic Analysis Targeting Manycore NoC Design (SA, AM, RM, EA, ACA, RM), pp. 370–378.
PDPPDP-2015-AkutsuUCKS #distributed #reliability
Reliability Analysis of Highly Redundant Distributed Storage Systems with Dynamic Refuging (HA, KU, TC, TK, NS), pp. 261–268.
PDPPDP-2015-CabreraAAP #energy #library #metric
Energy Measurement Library (EML) Usage and Overhead Analysis (AC, FA, JA, VBP), pp. 554–558.
PDPPDP-2015-FedorchenkoKC #database #design #network #security
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis (AF, IVK, AC), pp. 559–566.
PDPPDP-2015-PatelDSE #comparative #embedded
Embedded Hypervisor Xvisor: A Comparative Analysis (AP, MD, MS, MWEK), pp. 682–691.
PDPPDP-2015-XavierORPMR #performance
A Performance Isolation Analysis of Disk-Intensive Workloads on Container-Based Clouds (MGX, ICDO, FDR, RDDP, KJM, CAFDR), pp. 253–260.
SOSPSOSP-2015-HooffLZZ #named #scalability
Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
ESOPESOP-2015-CernyHKRZ #abstraction #execution #worst-case
Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
ESOPESOP-2015-EmmiGMR #source code
Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
ESOPESOP-2015-VasconcelosJFH #functional #lazy evaluation #recursion #type system
Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
STOCSTOC-2015-SchulmanS #algorithm #matrix
Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
TACASTACAS-2015-AlbertFR #cumulative
Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
TACASTACAS-2015-DjoudiB #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
TACASTACAS-2015-FleuryLPV #framework #named
Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
TACASTACAS-2015-GuanTAS0 #refinement #scalability
Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
TACASTACAS-2015-HolikHLRSV #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-Immler #reachability
Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
TACASTACAS-2015-KongGCC #hybrid #named
dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
TACASTACAS-2015-NamjoshiT #network #process
Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
TACASTACAS-2015-Sankur #automaton #robust
Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
CAVCAV-2015-AbateBCK #adaptation #markov #network
Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
CAVCAV-2015-BozzanoCGM #modelling #performance #safety
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAVCAV-2015-BozzanoCPJKPRT #design #safety
Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CSLCSL-2015-ClementeL #automaton #first-order #reachability
Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
ICLPICLP-2015-KieslST #on the #source code
On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT), pp. 221–234.
ICSTICST-2015-0001YPGS #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-NardoPB #generative #modelling #mutation testing #testing
Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
ISSTAISSTA-2015-DimjasevicG #assurance #generative #runtime #testing #verification
Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
ISSTAISSTA-2015-HuangDMD #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTAISSTA-2015-QiLAR #correctness #generative
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
ICSTSAT-2015-FalknerLH #automation #named #performance #satisfiability
SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
TAPTAP-2015-GrinchteinCP #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
VMCAIVMCAI-2015-BackesR #abstraction #clustering #graph transformation #infinity
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
VMCAIVMCAI-2015-NagarS #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
VMCAIVMCAI-2015-PrabhakarS #abstraction #hybrid
Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
ECSAECSA-2014-BerardinelliMP #design #network #performance
fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
WICSAWICSA-2014-FuZBX
A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
DocEngDocEng-2014-DiemKS #classification #documentation
Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
DocEngDocEng-2014-KolbergFRF #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DRRDRR-2014-FengLLLT #geometry
Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
DRRDRR-2014-LiPLD #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
DRRDRR-2014-LiuWTLG #automation #comprehension #image
Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
HTHT-2014-KimWWO #multi #twitter
Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
HTHT-2014-ZhangBR #empirical #network #social #social media
Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
JCDLJCDL-2014-Dallmeier-TiessenLHRKN #comparative #data transformation #workflow
A comparative analysis of disciplinary data management workflows (SDT, AL, PH, LR, RK, EN), pp. 281–284.
JCDLJCDL-2014-KanhabuaNN #memory management #scalability #what #wiki
What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia (NK, TNN, CN), pp. 341–350.
JCDLJCDL-2014-KimuraM #documentation
Method for supporting analysis of personal relationships through place names extracted from documents (FK, AM), pp. 253–256.
JCDLJCDL-2014-MajidiC #dependence #fault #parsing
Human and machine error analysis on dependency parsing of ancient Greek texts (SM, GRC), pp. 221–224.
JCDLJCDL-2014-TakanoSIHT #behaviour #classification #documentation #towards
Microscopic analysis of document handling while reading: Classification of behavior toward paper document (KT, HS, JI, TH, ST), pp. 445–446.
JCDLJCDL-2014-ZhouTG #scalability #web
Extraction and analysis of referenced web links in large-scale scholarly articles (KZ, RT, CG), pp. 451–452.
PODSPODS-2014-Cohen #graph #sketching
All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
PODSPODS-2014-NgoNRR #worst-case
Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
SIGMODSIGMOD-2014-Musleh #twitter #visual notation
Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
SIGMODSIGMOD-2014-ZhuGCL #clustering #graph #sentiment #social #social media
Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
VLDBVLDB-2014-DeutchMT #framework #process
A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
VLDBVLDB-2014-JacobKS
A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
VLDBVLDB-2014-ZhangTCO #data transformation #in memory #performance
Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
CSEETCSEET-2014-Steppe #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
EDMEDM-2014-GalyardtG
Recent-Performance Factors Analysis (AG, IMG), pp. 411–412.
EDMEDM-2014-GerykP #student #using #visual notation
Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
EDMEDM-2014-KaserKG #learning #parametricity #predict
Different parameters - same prediction: An analysis of learning curves (TK, KRK, MHG), pp. 52–59.
EDMEDM-2014-MorganBR #fault #learning #validation
Error Analysis as a Validation of Learning Progressions (BM, WB, VR), pp. 245–248.
EDMEDM-2014-SnowVM #learning
Tracking Choices: Computational Analysis of Learning Trajectories (ELS, LKV, DSM), pp. 316–319.
EDMEDM-2014-WatanabeOK #behaviour #student
Analysis and extraction of behaviors by students in lectures (EW, TO, TK), pp. 329–330.
EDMEDM-2014-WenYR #question #sentiment #what
Sentiment Analysis in MOOC Discussion Forums: What does it tell us? (MW, DY, CPR), pp. 130–137.
ITiCSEITiCSE-2014-FerreiraM #algorithm #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-KohNBR #validation
Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
SIGITESIGITE-2014-JacksonEC #contest #performance #programming
An analysis of team performance in high school programming contests (SJ, HJCE, RC), pp. 27–32.
SIGITESIGITE-2014-PeltsvergerZ #education #security
Bottleneck analysis with NetKit: teaching information security with hands-on labs (SP, CZ), pp. 45–50.
SIGITESIGITE-2014-VihavainenLI #source code
Analysis of source code snapshot granularity levels (AV, ML, PI), pp. 21–26.
SANERCSMR-WCRE-2014-AlalfiCD #clustering #experience #industrial
Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
SANERCSMR-WCRE-2014-SantosVA #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-BinkleyHLO #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICSMEICSME-2014-ChaikalisLMC #evolution #named
SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
ICSMEICSME-2014-KlattKS #dependence
Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
ICSMEICSME-2014-LandmanSV #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
ICSMEICSME-2014-MondalRS #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #clustering #overview
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-SajnaniSOL #component #quality
Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
ICSMEICSME-2014-Stephan #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-TaoQ #concurrent #java #refactoring #source code
Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
ICSMEICSME-2014-WongXZHZM #fault #locality #segmentation
Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
MSRMSR-2014-BloemenAKO #database #dependence #open source
Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
MSRMSR-2014-FarahTC #architecture #named #quality #scalability
OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
MSRMSR-2014-GuzmanAL #commit #empirical #git #sentiment
Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
MSRMSR-2014-MurgiaTAO #developer
Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
MSRMSR-2014-PleteaVS #git #security #sentiment
Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
MSRMSR-2014-SteidlHJ #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
SCAMSCAM-2014-CaiJSZZ #named #predict
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAMSCAM-2014-HutchinsBS #c #c++ #concurrent #safety #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAMSCAM-2014-LiangSM #performance
Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAMSCAM-2014-LiangSMKH #automaton #exception
Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAMSCAM-2014-TengeriBHG #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAMSCAM-2014-YadegariD
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
ICALPICALP-v1-2014-DosaS
Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
LATALATA-2014-FelgenhauerT #automaton #reachability
Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
LATALATA-2014-SeidlK #data flow #interprocedural #xml
Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
FMFM-2014-AntoninoSW #concurrent #csp #network #process #refinement
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
FMFM-2014-BaeOM #multi #semantics
Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
FMFM-2014-ButinM
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
FMFM-2014-ForejtKNS #communication #precise #predict #source code
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
FMFM-2014-KordyLMP #algorithm #automaton #robust
A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
FMFM-2014-LakshmiAK #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-LiuGL #reliability
MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
FMFM-2014-WenMM #formal method #information management #towards
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
IFMIFM-2014-BruniSNN #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-CalvaneseKSVZ #data type
Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
IFMIFM-2014-GilmoreTV #evaluation
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
IFMIFM-2014-RamsdellDGR #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
RTARTA-TLCA-2014-HirokawaM #automation #complexity
Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
RTARTA-TLCA-2014-LiuDJ #confluence
Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
RTARTA-TLCA-2014-Schmidt-Schauss #concurrent #programming language #semantics
Concurrent Programming Languages and Methods for Semantic Analyses (MSS), pp. 21–30.
SEFMSEFM-2014-BeckerSAB #constraints #deployment #fault tolerance #formal method
A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
SEFMSEFM-2014-GrovO #consistency #formal method #multi
Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
SFMSFM-2014-BubelMH #execution #modelling
Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
FLOPSFLOPS-2014-HoffmannS #array #integer #type system
Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
ICFPICFP-2014-ChenE #parametricity #product line #type system
Type-based parametric analysis of program families (SC, ME), pp. 39–51.
ICFPICFP-2014-KakiJ #framework #higher-order #relational
A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
IFLIFL-2014-AdsitF #control flow #performance #system f
An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
LISPILC-2014-LevineY #assessment #profiling
Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
FDGFDG-2014-Grace #estimation #game studies
A linguistic analysis of games: Verbs and nouns for content estimation (LDG).
FDGFDG-2014-GrowGGMW #architecture #authoring #requirements #tool support
A methodology for requirements analysis of AI architecture authoring tools (AG, SEG, PG, MM, NWF).
FDGFDG-2014-SiPT #automation #game studies #realtime
Automated terrain analysis in real-time strategy games (CS, YP, CTT).
GRAPHITEGRAPHITE-2014-DelzannoRT #protocol
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
GRAPHITEGRAPHITE-2014-FernandezKP #framework #graph grammar #interactive #modelling
Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
CHICHI-2014-GoyalLCF #collaboration
Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
CHICHI-2014-LeeSS #bound #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-LiuGFXHK
CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
CHICHI-2014-Smith #comprehension #game studies #generative
Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
CHICHI-2014-XuYRFHB #exclamation
Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
CSCWCSCW-2014-BackstromK #facebook #network #social
Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
CSCWCSCW-2014-KangKK #collaboration #information management #tool support
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
HCIDHM-2014-ItoTGK #research
Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
HCIDHM-2014-KarlovicPMSRRS #case study #comparison
Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
HCIDHM-2014-MirandaRV #development #memory management #mobile #testing
Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
HCIDHM-2014-OhgiriYYKH #comparison
Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
HCIDHM-2014-OkaGTNH
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-SugimotoYG
Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
HCIDHM-2014-WongpatikasereeKT
Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
HCIDHM-2014-ZhouLXZZ #metric #parametricity
Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
HCIDUXU-DI-2014-ChammasQM #design #interactive
An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
HCIDUXU-DI-2014-NovickVSG #empirical #game studies #usability
Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
HCIDUXU-DI-2014-ShafiqICRAAR #case study #learning #smarttech #usability #user satisfaction #what
To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
HCIDUXU-DP-2014-BarrosSF14a #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-SilvaPS #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-TMT-2014-FilippiB #aspect-oriented #functional #human-computer #interactive #nondeterminism
In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
HCIDUXU-TMT-2014-NieminenRTN #collaboration #industrial #information management
Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
HCIDUXU-TMT-2014-QuaresmaG #smarttech #usability
Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
HCIDUXU-TMT-2014-Tao #identification #user interface
Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCIHCI-AS-2014-FerreiraB #elicitation #people #requirements #semantics
Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCIHCI-AS-2014-HooeyABF #design #fault
Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
HCIHCI-AS-2014-LandyLNPLM #comparative #development #predict
Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
HCIHCI-AS-2014-RafalakBW #evaluation
Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
HCIHIMI-AS-2014-Coelho
Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
HCIHIMI-AS-2014-JangKJS #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-AS-2014-TanikawaA #overview
User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
HCIHIMI-DE-2014-KimitaNS #education
Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
HCIHIMI-DE-2014-LinKT #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-NazemiRKK #adaptation #similarity #visualisation
User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
HCILCT-NLE-2014-BrayshawGNWB #case study #evaluation #heuristic
Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
HCILCT-NLE-2014-IbanezN #architecture #interactive
An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
HCILCT-NLE-2014-Jo0L #empirical #people
Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
HCISCSM-2014-AhangamaLKP #mobile #monitoring
Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
HCISCSM-2014-AhnMHNHPM #network #representation #semantics #social #twitter
Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
HCISCSM-2014-IoannidisPKKFA #named #social #social media
SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
HCISCSM-2014-LopesMP #social #web
Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
HCISCSM-2014-MendesFFC #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
VISSOFTVISSOFT-2014-VoineaT #visual notation
Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
CAiSECAiSE-2014-NobauerSG #approach #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
CAiSECAiSE-2014-RuizCEFP #information management #process
Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
EDOCEDOC-2014-FlorezSV #approach #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
EDOCEDOC-2014-Franke #architecture #enterprise
Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
EDOCEDOC-2014-MukkamalaHV #sentiment #social
Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
EDOCEDOC-2014-NardiFA #modelling #ontology
An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
ICEISICEIS-v1-2014-TimoteoVF #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v2-2014-BeenK #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-HernandesTTF #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-HoosGKM #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v2-2014-ProcaciSA #community #metric #online #people #reduction #reliability
Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
ICEISICEIS-v2-2014-VieiraJF #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-AlvesVS #architecture
Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
ICEISICEIS-v3-2014-NaranjoSV #architecture #enterprise #named
PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
CIKMCIKM-2014-ArapakisLV #comprehension #gesture
Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
CIKMCIKM-2014-CarmelMPS #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-JiaDGZ #community #network
Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
CIKMCIKM-2014-LinJXWCW #sentiment
A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
CIKMCIKM-2014-MengCS #approximate #keyword #query #semantics
Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
CIKMCIKM-2014-PhanDXPK #health #network #physics #process #social
Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
CIKMCIKM-2014-RahimiSK #axiom #information retrieval
Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
CIKMCIKM-2014-RosenthalJ #enterprise
Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
CIKMCIKM-2014-ShangLCC #component #robust
Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
CIKMCIKM-2014-SpirinHDKB #facebook #graph #network #online #people #query #scalability #social
People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKMCIKM-2014-TaoIWS #canonical #correlation
Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
CIKMCIKM-2014-TaxidouF #agile #information management #named #realtime #twitter
RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
CIKMCIKM-2014-WilkieA #bias #performance #retrieval
A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
CIKMCIKM-2014-YilmazVCRB #documentation
Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
ECIRECIR-2014-MonizJ #sentiment
Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
ECIRECIR-2014-WilkieA #bias #empirical #retrieval
Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
ICMLICML-c1-2014-MillerBAG #process
Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
ICMLICML-c1-2014-TangMNMZ #comprehension #modelling #topic
Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
ICMLICML-c2-2014-Lopez-PazSSGS #component #random
Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
ICMLICML-c2-2014-MukutaH #canonical #correlation #probability
Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
ICMLICML-c2-2014-NguyenMVEB #correlation #multi
Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
ICMLICML-c2-2014-NieYH #component #robust
Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
ICMLICML-c2-2014-SatoKN #normalisation
Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
ICMLICML-c2-2014-SatoN #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SunZZ #convergence
A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
ICMLICML-c2-2014-TaylorGP #approximate #linear #programming
An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
ICMLICML-c2-2014-ToulisAR #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICMLICML-c2-2014-TuZWQ #scalability
Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
ICMLICML-c2-2014-ZhaoMXZZ #component #robust
Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
ICPRICPR-2014-AhmadKM
Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
ICPRICPR-2014-AndreuLMG #automation #classification #gender #image
Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
ICPRICPR-2014-ArvanitopoulosBT #learning
Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
ICPRICPR-2014-BauckhageM #clustering #kernel #web
Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
ICPRICPR-2014-BiswasZLMV #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-ChengY
Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICPRICPR-2014-ChenYJ #feature model #linear #robust
An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
ICPRICPR-2014-DengHXC #composition #matrix #rank
Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
ICPRICPR-2014-FernandezT #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-Hess-FloresRJ #multi #nondeterminism
Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
ICPRICPR-2014-HongZP #estimation #image
Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
ICPRICPR-2014-HuDGX #distance #reduction
Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
ICPRICPR-2014-KrytheL #linear
Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
ICPRICPR-2014-KurtekS #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LinCCLH #detection
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LinH #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiuS
Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
ICPRICPR-2014-LiuXYZ
Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
ICPRICPR-2014-LiWQXG #estimation
Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
ICPRICPR-2014-MoilanenZP #agile #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MollerPB #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKO #collaboration #framework #online #platform #search-based
Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
ICPRICPR-2014-OhPKHB #image #personalisation #social
Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
ICPRICPR-2014-OkadaFWP #random
Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
ICPRICPR-2014-OnalAVFOOY #modelling
Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, , FTYV), pp. 3339–3344.
ICPRICPR-2014-SariE #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SeckDT #3d #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-SlitiHBA #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-TavakoliYRHS #eye tracking #recognition
Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
ICPRICPR-2014-TuXN #detection #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-WangGLYWY #canonical #correlation
Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
ICPRICPR-2014-WatanabeW #component #distance #learning #metric #performance
Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
ICPRICPR-2014-YanRLSS #clustering #invariant #linear #multi #recognition
Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
ICPRICPR-2014-YeWH #component #graph
Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
ICPRICPR-2014-ZhangWGZZ #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
KDDKDD-2014-AkibaMK #network
Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
KDDKDD-2014-JiangCWXZY #behaviour #flexibility #multi #named
FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDDKDD-2014-LanSB #learning
Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
KDDKDD-2014-TamhaneISDA #predict #risk management #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-YuH0 #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDDKDD-2014-ZhuSY #mining #network #social
Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
KDIRKDIR-2014-CastelltortL #graph
NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
KDIRKDIR-2014-HafethAC #case study #classification
Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
KDIRKDIR-2014-LiuF #classification #sentiment #topic #web
Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
KDIRKDIR-2014-LiuF14a #classification #n-gram #sentiment #similarity #web
Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
KDIRKDIR-2014-PsomakelisTAV #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-WanJLL #challenge #sentiment #web
Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
KEODKEOD-2014-AzaiezA #how #question #towards
How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KRKR-2014-BhattST #architecture #design #experience #industrial #user interface
Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
KRKR-2014-Delgrande #towards
Towards a Knowledge Level Analysis of Forgetting (JPD).
RecSysRecSys-2014-NoiaORTS #recommendation #towards
An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
SEKESEKE-2014-BarnesL #clustering
Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
SEKESEKE-2014-El-KharboutlyGF #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKESEKE-2014-Garcia-NunesSZB #collaboration #fuzzy #modelling
Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
SEKESEKE-2014-PaikariF #design #implementation #simulation
Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
SEKESEKE-2014-SchotsRS #performance #process
A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
SEKESEKE-2014-VianaCS #information management
Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
SEKESEKE-2014-WangC #approach #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-WanZWS #graph #performance #points-to
Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
SEKESEKE-2014-YangWSFC #debugging #fault
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
SIGIRSIGIR-2014-FangZ #axiom #information retrieval #modelling #optimisation
Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
SIGIRSIGIR-2014-GoeuriotKL #information retrieval #query
An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
SIGIRSIGIR-2014-LourencoVPMFP #sentiment
Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
SIGIRSIGIR-2014-PelejaSM #sentiment
Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
SIGIRSIGIR-2014-TsolmonL #modelling #timeline
An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
SIGIRSIGIR-2014-UstaAVOU #education #how #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIRSIGIR-2014-ZhangL0ZLM #modelling #recommendation #sentiment
Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
ECMFAECMFA-2014-Moreno-DelgadoDZT #composition #domain-specific language #flexibility
Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
ICMTICMT-2014-GonzalezC #constraints #generative #model transformation #testing
Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
ICMTICMT-2014-GuanaS
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
SPLCSPLC-2014-DomisSGAK #case study #experience #industrial #reuse
Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
ECOOPECOOP-2014-LiT #fault #python #source code
Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
ECOOPECOOP-2014-WeiR #behaviour #javascript #points-to
State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLAOOPSLA-2014-NazareMSBGP #memory management #validation
Validation of memory accesses through symbolic analyses (HN, IM, WS, LB, LG, FMQP), pp. 791–809.
OOPSLAOOPSLA-2014-ZhangXZYS #alias #c #performance
Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
AdaEuropeAdaEurope-2014-QamhiehM #graph #multi #scheduling
Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
PEPMPEPM-2014-HanusS #composition #functional #logic programming #source code
A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
PLDIPLDI-2014-ArztRFBBKTOM #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDIPLDI-2014-BorgesFdPV #composition #probability #quantifier
Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
PLDIPLDI-2014-MitraLABSG #debugging #parallel #scalability
Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
PLDIPLDI-2014-SmaragdakisKB #context-sensitive grammar
Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
PLDIPLDI-2014-ZhangMGNY #abstraction #datalog #on the #refinement
On abstraction refinement for program analyses in Datalog (XZ, RM, RG, MN, HY), p. 27.
PLDIPLDI-2014-ZhangMNY #bottom-up #hybrid #interprocedural #top-down
Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
POPLPOPL-2014-ChaudhuriFK #consistency #source code
Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
POPLPOPL-2014-CoughlinC #composition #invariant
Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
POPLPOPL-2014-SergeyVJ #composition #higher-order #theory and practice
Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
SASSAS-2014-BakhirkinBP #abstraction #approximate
Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
SASSAS-2014-CoxCR #automation #source code
Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
SASSAS-2014-MadsenM #data flow #pointer #reachability
Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SASSAS-2014-YeSX #pointer
Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
RERE-2014-AnishG #requirements
Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
RERE-2014-BadgerTC #design #named #requirements #verification
VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
RERE-2014-GuzmanM #fine-grained #how #sentiment
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
RERE-2014-MartinsO #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-NguyenGA #automation #named #ontology #requirements
GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
RERE-2014-SaxenaC #agile #named #requirements
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
REFSQREFSQ-2014-AlebrahimFHM #interactive #problem #requirements
Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
REFSQREFSQ-2014-NairVMTdB #problem #safety #traceability
Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
REFSQREFSQ-2014-RiegelD #elicitation #heuristic #optimisation #performance
An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
REFSQREFSQ-2014-SannierB #approach #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
REFSQREFSQ-2014-SethiaP #elicitation #empirical #performance #requirements
The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
REFSQREFSQ-2014-YangLJC #adaptation #modelling #overview #requirements #self
A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
ASEASE-2014-AbalBW #debugging #kernel #linux #variability
42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
ASEASE-2014-EllisHKLLLMM #automation #requirements
Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
ASEASE-2014-MarasSC #named #reuse #web
Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
ASEASE-2014-NearJ #interactive #named #security #web
Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASEASE-2014-SeguraSC #automation #case study #e-commerce #experience #testing #variability
Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
ASEASE-2014-TarvoR #automation #modelling #parallel #performance #source code #thread
Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
FSEFSE-2014-DevroeyPCPLS #mutation testing #variability
A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
FSEFSE-2014-Gui00ND #agile #named #nondeterminism #reliability #tool support
RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
FSEFSE-2014-LerchHBM #named #performance #scalability
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
FSEFSE-2014-LuoHEM #empirical #testing
An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
FSEFSE-2014-XiaoCK #architecture #named #quality #tool support
Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
FSEFSE-2014-Yang #network #open source #overview #perspective #social
Social network analysis in open source software peer review (XY), pp. 820–822.
ICSEICSE-2014-AndroutsopoulosCDHH #fault #testing
An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
ICSEICSE-2014-ArztB #data flow #incremental #named
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes (SA, EB), pp. 288–298.
ICSEICSE-2014-HuangMSZ #performance #testing
Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSEICSE-2014-NadiBKC #constraints #empirical #mining
Mining configuration constraints: static analyses and empirical results (SN, TB, CK, KC), pp. 140–151.
ICSEICSE-2014-SuR #empirical #parametricity #probability
Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICSEICSE-2014-YaoHJ #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
SACSAC-2014-AntunesBMBC #architecture #enterprise #ontology
Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SACSAC-2014-ChangCHKL #behaviour #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SACSAC-2014-Chen #behaviour #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SACSAC-2014-EliasMFB #algorithm #memory management
Experimental and theoretical analyses of memory allocation algorithms (DE, RM, MF, LBdA), pp. 1545–1546.
SACSAC-2014-HalderZC #database #information management #query
Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SACSAC-2014-HuangLD #delivery #modelling #multi #network #performance
Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SACSAC-2014-HuangYKYLYGFQ #clustering #self
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SACSAC-2014-KangS #implementation #scheduling
Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SACSAC-2014-OliveiraO #kernel #linux
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SACSAC-2014-OliveiraSB #coordination
Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SACSAC-2014-PapadakisT #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParkH #network #performance
Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SACSAC-2014-QuilleTR
Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SACSAC-2014-SeoKTC #framework #network #social
A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SACSAC-2014-ShoshitaishviliIDV #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SACSAC-2014-XiaLWZ #predict
Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SACSAC-2014-ZhanLS #in the cloud #mobile
A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
LDTALDTA-J-2011-SauthoffG #domain-specific language #optimisation #programming
Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
SLESLE-J-2012-KrishnanW #attribute grammar #composition #higher-order #termination
Monolithic and modular termination analyses for higher-order attribute grammars (LK, EVW), pp. 511–526.
CASECASE-2014-ChenGGLCL #approach #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChuLSO #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-GargSYPCHPAG #automation #reachability
Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
CASECASE-2014-HanZH
System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
CASECASE-2014-HuYLC #automation #modelling #multi #petri net
Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
CASECASE-2014-JiangCWWS #3d #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-JiaZAX
Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
CASECASE-2014-LiaoLCHF
Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
CASECASE-2014-PengHHW #effectiveness #metric
An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
CASECASE-2014-WangGWG #behaviour #generative #multi
Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
CASECASE-2014-WuCT #memory management #modelling #multi
Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
CASECASE-2014-ZhuWQZ #clustering #constraints #modelling #multi #petri net #scheduling #tool support
Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
CCCC-2014-MadsenA #string
String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
CCCC-2014-TavaresBPR #data flow
Parameterized Construction of Program Representations for Sparse Dataflow Analyses (ALCT, BB, FMQP, FR), pp. 18–39.
CGOCGO-2014-RountevY #android #user interface
Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
CGOCGO-2014-StadlerWM #java
Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
CGOCGO-2014-YeSX #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
DACDAC-2014-AthavaleMHV #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-IyengarG #embedded #memory management #modelling #power management #robust
Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
DACDAC-2014-KiamehrOTN #approach #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-KleebergerMS
Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
DACDAC-2014-LiangC #clustering #named #network #probability #reduction #scalability #smarttech
ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
DACDAC-2014-LinL #parallel #reachability #verification
Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
DACDAC-2014-NandakumarM
System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
DACDAC-2014-QuintonBHNNE #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-SchneiderPP #agile #multi
MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
DACDAC-2014-ShankarSWP #concept #design #specification
Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
DACDAC-2014-ShanSFZTXYL #algorithm #configuration management #encryption #multi
A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
DACDAC-2014-ShrivastavaRJW #control flow #fault
Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
DACDAC-2014-SiyoumGC #data flow
Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
DACDAC-2014-WaksmanRSS #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-XueQBYT #framework #manycore #platform #scalability
Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
DACDAC-2014-ZhengBB #identification #named #robust #towards
CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATEDATE-2014-AltmeyerD #correctness #on the #precise #probability
On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
DATEDATE-2014-BeneventiBVDB #identification #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATEDATE-2014-ButtazzoBB #adaptation #design
Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
DATEDATE-2014-ChenHD #graph #modelling
May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
DATEDATE-2014-ChienYHLC #geometry #image
Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
DATEDATE-2014-EbrahimiETSCA #embedded #fault
Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
DATEDATE-2014-FischerCM #design #modelling
Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
DATEDATE-2014-FrijnsASVGSC #graph
Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
DATEDATE-2014-GanapathyCACGR #framework #memory management #named #robust
INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
DATEDATE-2014-GangopadhyayLNR #adaptation #linear #modelling #performance
Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATEDATE-2014-GhalatyAS #fault
Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
DATEDATE-2014-Guan0 #performance #scheduling
General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
DATEDATE-2014-HoffmanRAA #fault #memory management
Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATEDATE-2014-KarakonstantisSSAB #approach #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KhanAHKKRC #bias
Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
DATEDATE-2014-LongLY #bound #evaluation #modelling #multi
Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATEDATE-2014-NowotschPHPS #monitoring #multi #off the shelf
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATEDATE-2014-PandeyV #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RadojicicGMP
Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
DATEDATE-2014-RamboTDAE #realtime
Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATEDATE-2014-RanaC #named #reduction #scalability #simulation
SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DATEDATE-2014-SalunkheMB #data flow #modelling
Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
DATEDATE-2014-SiddiqueT #formal method #towards
Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
DATEDATE-2014-SinghSWPWC #specification
Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
DATEDATE-2014-SongDY #bound #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATEDATE-2014-VijaykumarV #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-VillenaS #network #performance #variability
Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
DATEDATE-2014-ZhangB #probability
Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
DATEDATE-2014-ZhangYW #performance #problem
Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
HPDCHPDC-2014-BeaumontM #matrix #multi #platform #scheduling
Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
HPDCHPDC-2014-SuAWBS #correlation #dataset #distributed #parallel
Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
HPDCHPDC-2014-YinWFZZ #middleware #named #scalability #visualisation
SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
ISMMISMM-2014-RatnakarN #constraints #graph #performance #points-to
Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
LCTESLCTES-2014-BallabrigaCR
Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
LCTESLCTES-2014-RoyRWW #approximate #automation #named
ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
OSDIOSDI-2014-ChowMFPW #internet #performance #scalability
The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
OSDIOSDI-2014-YuanLZRZZJS #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
PDPPDP-2014-AcostaA #performance #source code
Performance Analysis of Paralldroid Generated Programs (AA, FA), pp. 60–67.
PDPPDP-2014-BelliniBCMN #gpu #simulation
Simulation and Analysis of the Blood Coagulation Cascade Accelerated on GPU (MB, DB, PC, GM, MSN), pp. 590–593.
PDPPDP-2014-ItoF #hardware #problem #resource management #using
An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
PDPPDP-2014-KumarL #latency #manycore
Latency Analysis of Network-on-Chip Based Many-Core Processors (SK, GL), pp. 432–439.
PDPPDP-2014-RonchieriCDCTCSCMM #case study #framework
The WNoDeS Cloud Virtualization Framework: A Macromolecular Surface Analysis Application Case Study (ER, DC, DD, VC, GDT, PC, DS, AC, LM, IM), pp. 218–222.
PPoPPPPoPP-2014-MaAC #algorithm #manycore #thread
Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
ESOPESOP-2014-Fu #abstraction #memory management
Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
ESOPESOP-2014-MangalNY #interprocedural
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FASEFASE-2014-CohenM #configuration management #semantics #specification
Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
FASEFASE-2014-HuangDM #java #type system #web
Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
FASEFASE-2014-KowalST #performance
Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
FASEFASE-2014-SadeghiEM #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FoSSaCSFoSSaCS-2014-BonnetKL #parallel #probability #process
Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
STOCSTOC-2014-BhaskaraCMV
Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
STOCSTOC-2014-DworkTT0 #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
TACASTACAS-2014-BrockschmidtEFFG #complexity #integer #runtime #source code
Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
TACASTACAS-2014-LoweMW #contest
CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses — (Competition Contribution) (SL, MUM, PW), pp. 392–394.
WRLAWRLA-2014-RochaMM #smt
Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
CAVCAV-2014-ChatterjeeCD #probability
CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
CAVCAV-2014-EsparzaLMMN #approach #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAVCAV-2014-Hagemann #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-HeizmannHP #learning #source code #termination
Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
CAVCAV-2014-ItzhakyBRST
Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
CAVCAV-2014-LeGQC #higher-order
Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICSTICST-2014-LiO #empirical #modelling #testing
An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
ICSTICST-2014-MiicBT #automation #multi #platform #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PapadakisHT #combinator #interactive #mutation testing #testing
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
ICSTICST-2014-WiklundSEL #automation #empirical #testing
Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
ISSTAISSTA-2014-HendersonPYHWZY #framework #performance #platform
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
ISSTAISSTA-2014-Just #framework #java #mutation testing #performance #scalability
The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
ISSTAISSTA-2014-JustEF #clustering #execution #mutation testing #performance
Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
ISSTAISSTA-2014-MarinescuHC #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TrippFP #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
ISSTAISSTA-2014-XiaoBIMGC #dependence #effectiveness #type system
ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
LICSLICS-CSL-2014-BaierDK #model checking #probability #trade-off
Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
ICSTSAT-2014-BacchusN #algorithm #satisfiability
Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
SMTSMT-2014-CarlssonGP #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
TAPTAP-2014-KosmatovS #runtime #tutorial
Runtime Assertion Checking and Its Combinations with Static and Dynamic Analyses — Tutorial Synopsis (NK, JS), pp. 165–168.
VMCAIVMCAI-2014-Ferrara #abstract interpretation
Generic Combination of Heap and Value Analyses in Abstract Interpretation (PF), pp. 302–321.
VMCAIVMCAI-2014-Fu #abstract domain #java #points-to #scalability
Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
VMCAIVMCAI-2014-GustavssonGL #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-Mine #abstract interpretation #relational #thread
Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAIVMCAI-2014-SchwarzSVA #precise #source code
Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
CBSECBSE-2013-LednickiCS #execution #worst-case
Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
ECSAECSA-2013-BuchgeherW #architecture #consistency #towards
Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
ECSAECSA-2013-GoknilSPM #constraints #modelling
Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
QoSAQoSA-2013-BeckerLB #adaptation #performance #requirements #self #validation
Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
QoSAQoSA-2013-BerardinelliLM #execution #non-functional
Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
QoSAQoSA-2013-KlattK #architecture #difference
Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
QoSAQoSA-2013-TrubianiMCAG #architecture #modelling #nondeterminism #performance
Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
DRRDRR-2013-MehriGHM #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SimistiraPKC #online
Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
HTHT-2013-WangQS #realtime #social #twitter
Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
HTHT-2013-WeiHGLZW #behaviour #case study #twitter
Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
ICDARICDAR-2013-AlkalaiBSL #identification
Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDARICDAR-2013-AntonacopoulosCPP #contest #layout
ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
ICDARICDAR-2013-GriechischML #online
Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDARICDAR-2013-KirbyH #using
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-LiPXW #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-StammLD #approach #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-TangHF #approach #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-WangLD #recognition
Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
ICDARICDAR-2013-WeiBSI #classification #documentation #evaluation #layout
Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
ICDARICDAR-2013-YinLS #detection #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZirariENM #component #documentation #image #segmentation #using
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
PODSPODS-2013-CalvaneseGM #database #perspective #process
Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
SIGMODSIGMOD-2013-GuilleFHZ #framework #mining #named #open source #platform #social
SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
SIGMODSIGMOD-2013-MoustafaMDG #declarative #interactive #named #network
GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
SIGMODSIGMOD-2013-SuZWHZ #similarity
Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
SIGMODSIGMOD-2013-TaoYLBCHKSWWW #named #network #research
Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
TPDLTPDL-2013-KemmanK #named
PoliMedia — Improving Analyses of Radio, TV and Newspaper Coverage of Political Debates (MK, MK), pp. 401–404.
TPDLTPDL-2013-ManghiM #data flow
Data Searchery — Preliminary Analysis of Data Sources Interlinking (PM, AM), pp. 458–461.
TPDLTPDL-2013-TranZBNK #corpus #topic
Topic Cropping: Leveraging Latent Topics for the Analysis of Small Corpora (NKT, SZ, KB, CN, RK), pp. 297–308.
VLDBVLDB-2013-DeutchMT #named #process
PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
VLDBVLDB-2013-MoyersSWKVBC #array #image #parallel
A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
VLDBVLDB-2013-OkcanRPF #named
Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
VLDBVLDB-2013-SeoPSL #distributed #graph #scalability
Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
VLDBVLDB-2013-SowellSCDG #in memory #memory management
An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
VLDBVLDB-2013-Taxidou #information management #realtime #social #social media
Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
ITiCSEITiCSE-2013-HerreroLOST13a #empirical #performance
An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
ITiCSEITiCSE-2013-Trakhtenbrot #algorithm #complexity #concept #problem #student
Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
CSMRCSMR-2013-BhattacharyaUNK #android #debugging #empirical #open source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMRCSMR-2013-GhaithWPM #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-JezekHB #compilation #library
Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
ICPCICPC-2013-MurakamiHHIK #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-PruijtKB #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICPCICPC-2013-SteidlHJ #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AnandEKSBK #abstraction #bytecode #framework #memory management #stack
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
ICSMEICSM-2013-Beck #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-LabicheKM #diagrams
Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams (YL, BK, HM), pp. 130–139.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-OsmanCP #algorithm #diagrams #machine learning
An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
ICSMEICSM-2013-SahaRS #evolution #named
gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
ICSMEICSM-2013-TianLS #debugging #multi #named #predict
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
ICSMEICSM-2013-VenkataramaniABM #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-YukselS #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-CampbellZXHM #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-DemeyerMWL #exclamation
Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
MSRMSR-2013-FuLLDZX #behaviour #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSRMSR-2013-VasquezDP #development #mobile #stack overflow #using
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
SCAMSCAM-2013-BiallasOCH #named #pointer
PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SCAMSCAM-2013-FabryRJ #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-PapadakisDT #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SCAMSCAM-2013-SvajlenkoRD #generative #named #similarity #tool support
ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
WCREWCRE-2013-ClearyGVSSP #interactive #memory management #multi
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
WCREWCRE-2013-SaeidiHKJ #legacy #modelling #named #tool support
Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
CIAACIAA-2013-DreyfusHK #approximate #reachability
Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
ICALPICALP-v1-2013-DeDS #algorithm #difference #fourier #geometry #robust
A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
ICALPICALP-v2-2013-HartungNNS #complexity #graph
A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
LATALATA-2013-FernauHV #automaton #multi #problem
A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
IFMIFM-2013-GiachinoGLLW #concurrent #theory and practice
Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
IFMIFM-2013-Song00LD #divide and conquer #reachability
Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
RTARTA-2013-BauLNW #term rewriting #termination
Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
SFMSFM-2013-GratieIP #biology
ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
SFMSFM-2013-KopfR #automation #data flow
Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
CoGCIG-2013-DivillyOH #evolution
Exploration and analysis of the evolution of strategies for Mancala variants (CD, CO, SH), pp. 1–7.
CoGCIG-2013-ShakerSNST #automation #game studies #generative
Automatic generation and analysis of physics-based puzzle games (MS, MHS, OAN, NS, JT), pp. 1–8.
CoGCIG-2013-SifaB #behaviour #game studies #learning
Archetypical motion: Supervised game behavior learning with Archetypal Analysis (RS, CB), pp. 1–8.
DiGRADiGRA-2013-Grace #game studies #web
Affection Games in Digital Play: A Content Analysis of Web Playable Games (LDG).
DiGRADiGRA-2013-Prax #design #game studies
Game Design and Business Model: an Analysis of Diablo 3 (PP).
DiGRADiGRA-2013-WehbeN #game studies #human-computer #interface #research
An Introduction to EEG Analysis Techniques and Brain-Computer Interfaces for Games User Researchers (RRW, LEN).
FDGFDG-2013-CaplarSM #case study #performance #rating
Analysis of players' in-game performance vs rating: Case study of Heroes of Newerth (NC, MS, MM), pp. 237–244.
FDGFDG-2013-Milik #category theory #multi #online #social
Protecting face in virtual life: An ethnographic analysis of identity categories and informal systems of social control in massively multiplayer online worlds (OM), pp. 477–478.
FDGFDG-2013-Waern #game studies
Game analysis as a signature pedagogy of game studies (AW), pp. 275–282.
FDGFDG-2013-Wallner #approach #named #visualisation
Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
GT-VMTGT-VMT-2013-MaximovaEE #graph transformation
Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
CHICHI-2013-AlperBRIF #comparison #graph
Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHICHI-2013-BrownML #mobile #video
iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHICHI-2013-GoyalLF #visualisation
Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
CHICHI-2013-VellosoBG #modelling #named
MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
CHICHI-2013-WalshFYD #design #framework
FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
CHICHI-2013-WangBK #facebook #gender #topic
Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
CSCWCSCW-2013-AlmuhimediWLSA #scalability #twitter
Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
CSCWCSCW-2013-Hautasaari #process #quote #wiki
“Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
CSCWCSCW-2013-Robert #multi
A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
CSCWCSCW-2013-SmithQC #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDHM-HB-2013-ZhaoLZ #higher-order #statistics
Higher Order Statistics Analyses Based on the Mathematical Model of Surface Electromyography (YZ, DL, JZ), pp. 402–408.
HCIDHM-SET-2013-ChiLC
The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
HCIDHM-SET-2013-HungCSC #case study #comparative #education #effectiveness #women
A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
HCIDUXU-CXC-2013-AsanoY #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-CarvalhoSNM #comparative #game studies #interactive #usability
Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
HCIDUXU-NTE-2013-BarrosSFCC #artificial reality #people
Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
HCIDUXU-NTE-2013-Danylak #gesture #human-computer #interactive
Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
HCIDUXU-NTE-2013-Gyoda #ad hoc #communication #evaluation #network #performance
Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
HCIDUXU-PMT-2013-KohnoYSN #approach #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-ZhangD #interactive
User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
HCIDUXU-WM-2013-BucchianicoCP #communication #towards #visual notation
Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
HCIDUXU-WM-2013-Kim13a #query
Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
HCIHCI-III-2013-IteyaMK #using #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-KimKAPW #artificial reality #social
Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
HCIHCI-III-2013-StorzRMLE #detection #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-IMT-2013-Farhadi-NiakiEA #design #gesture #usability
Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
HCIHCI-IMT-2013-SakataKN #collaboration #communication #scalability
Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
HCIHCI-IMT-2013-SrivastavaT #realtime #using
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-UC-2013-KuramochiOTHN #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-TajimaIK
Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
HCIHIMI-D-2013-KobayashiYA #behaviour
Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HCIHIMI-D-2013-KotaniKSA #development #memory management #using
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-SusukiTOM #behaviour
Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HCIHIMI-HSM-2013-ChiangWCH #performance #smarttech
An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
HCIHIMI-HSM-2013-HerronV #overview
Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
HCIHIMI-HSM-2013-LeeJ #simulation #using
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-Noda #industrial #monitoring #performance #statistics
Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
HCIHIMI-LCCB-2013-AntolosLLV #using
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-KuritaKWS
A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HCIHIMI-LCCB-2013-YajimaHY #communication #design
Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
HCIOCSC-2013-Abascal-MenaLZ #behaviour #mining #twitter
User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
HCIOCSC-2013-AdnanHAT #behaviour #eye tracking #network #online #social
Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
HCIOCSC-2013-YamauchiHN #source code #twitter
Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
VISSOFTVISSOFT-2013-KarranTD #named #thread #visual notation
SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
CAiSECAiSE-2013-BeheshtiBN #ad hoc #aspect-oriented #process
Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
CAiSECAiSE-2013-PapottiPSCP #code generation #modelling
A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
EDOCEDOC-2013-TranZ #approach #architecture #verification
Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEISICEIS-J-2013-PintoKG13a #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEISICEIS-J-2013-RothPS13a #twitter
Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
ICEISICEIS-v1-2013-BentayebK #adaptation #constraints #semantics
Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
ICEISICEIS-v1-2013-ChiuFW #collaboration #integration #performance #social
An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
ICEISICEIS-v1-2013-QasimR #classification #evaluation #linear #using
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-ZaamouneBPB #approach #multi #relational
A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEISICEIS-v2-2013-CuzzocreaF #comparative #exclamation #metamodelling #power of #state of the art
Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
ICEISICEIS-v2-2013-SampaioM
Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
ICEISICEIS-v2-2013-SuB #composition #data flow #graph #web #web service
Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
ICEISICEIS-v3-2013-AndargoliBK
Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
ICEISICEIS-v3-2013-DiefenthalerB #architecture #enterprise #semantics #using #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-FerreiraFSCRPO #interactive #search-based
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
CIKMCIKM-2013-ArdonBMRSTT #topic #twitter
Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
CIKMCIKM-2013-FangHZ #overview #sentiment
Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
CIKMCIKM-2013-KellerMWB #adaptation #flexibility
Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
CIKMCIKM-2013-SubbianAS #mining #social
Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
ECIRECIR-2013-ChenC #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-HuiGHL #keyword
Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
ECIRECIR-2013-NarangNMSD #evolution #microblog #social #topic
Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
ECIRECIR-2013-PicaultR #interactive #multi #named #social
SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
ICMLICML-c1-2013-AvronBTZ #canonical #correlation #performance #reduction
Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
ICMLICML-c1-2013-HanL13a #component
Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
ICMLICML-c1-2013-LivniLSNSG #component
Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
ICMLICML-c1-2013-ZhangC #linear
Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
ICMLICML-c2-2013-ChangKKZ #canonical #correlation #independence #kernel
Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
ICMLICML-c2-2013-Goerg #component
Forecastable Component Analysis (GMG), pp. 64–72.
ICMLICML-c3-2013-AndrewABL #canonical #correlation
Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
ICMLICML-c3-2013-BaktashmotlaghHBLS #classification #video
Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
ICMLICML-c3-2013-Kuleshov #algorithm #component #performance
Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
KDDKDD-2013-CaiQ #linear #on the #rank
On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
KDDKDD-2013-ChenTTY #kernel #modelling #performance
Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
KDDKDD-2013-DavidsonGCW #network
Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
KDDKDD-2013-KermanyMBNM #framework
Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
KDDKDD-2013-MaiyaTLR #documentation
Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
KDDKDD-2013-SunXY #component #robust
Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
KDDKDD-2013-WangLLWWC #named #twitter
SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
KDDKDD-2013-ZhuYGM #modelling #scalability #topic
Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
KDIRKDIR-KMIS-2013-Gonzalez-BrambilaJG #database #research
Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #case study #risk management #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-LlavoriLGNAS #framework #named #sentiment #towards
i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
KDIRKDIR-KMIS-2013-OliveiraCL #concept
Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
KDIRKDIR-KMIS-2013-PapulaVH #enterprise #network #process
Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
KDIRKDIR-KMIS-2013-SaijoSWK #case study #collaboration #community #multi #process
An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
MLDMMLDM-2013-SentzH
Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
MLDMMLDM-2013-YasojimaFBOS #case study #generative #power management
Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
RecSysRecSys-2013-DoerfelJ #evaluation #recommendation
An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
SEKESEKE-2013-ChaoY #order #reachability #scalability
A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (DYC, THY), pp. 417–420.
SEKESEKE-2013-HansenM #ecosystem #network #towards
Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
SEKESEKE-2013-JanesMSS #problem #programming #requirements
Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (AJ, SM, AS, GS), pp. 226–231.
SEKESEKE-2013-LiuWL #detection #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-NishiuraMWH #mutation testing #testing
Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
SEKESEKE-2013-SantosBC #education #game studies #modelling #programming #semantics
A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
SEKESEKE-2013-WangWMX #how #performance
How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (YW, JW, JM, BX), pp. 537–541.
SEKESEKE-2013-WangZLBCT #modelling #non-functional #object-oriented #requirements
Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
SEKESEKE-2013-WeiX #e-commerce #effectiveness #evaluation
A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
SIGIRSIGIR-2013-AnH #information retrieval #probability #semantics
Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
SIGIRSIGIR-2013-ChaBHC #modelling #network #social #topic
Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
SIGIRSIGIR-2013-GippMBLN #detection
Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIRSIGIR-2013-GolbusA #framework #information retrieval
A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
SIGIRSIGIR-2013-PappasP #collaboration #sentiment
Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
SIGIRSIGIR-2013-SonKP #locality #recommendation #semantics
A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
MODELSMoDELS-2013-NoyritGT #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-PerezGCCC #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-SaadB #data flow
Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MODELSMoDELS-2013-StorrleF #physics #towards #visual notation
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
PLEASEPLEASE-2013-HuangYKHU #domain-specific language #mining #repository #towards
Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
SPLCSPLC-2013-EichelbergerS #modelling #variability
A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
SPLCSPLC-2013-KoziolekGGDS #case study #experience #identification #reuse
Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
SPLCSPLC-2013-McGregor #ecosystem #modelling #tutorial
Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
OnwardOnward-2013-RossoJ #concept #design #git #what
What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
OOPSLAOOPSLA-2013-ChongDKKQ #abstraction #gpu #invariant #kernel
Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
OOPSLAOOPSLA-2013-HuangB #context-sensitive grammar #memory management #performance
Efficient context sensitivity for dynamic analyses via calling context uptrees and customized memory management (JH, MDB), pp. 53–72.
OOPSLAOOPSLA-2013-MeyerovichR #empirical #programming language
Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
OOPSLAOOPSLA-2013-SmaragdakisBK #points-to #preprocessor
Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
AdaEuropeAdaEurope-2013-AsensioLCN #approach #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILTHILT-2013-CarterFHHT #named
SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
HILTHILT-2013-Whalen #architecture #development #formal method #modelling #scalability #using
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
LOPSTRLOPSTR-2013-AlbertGG #approach
A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
LOPSTRLOPSTR-2013-LiqatKSGLGHE #energy #modelling #source code
Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
PADLPADL-2013-RodriguesASF #abstraction #composition #declarative #multi #using
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
PEPMPEPM-2013-SunCZ #constraints #locality #source code
Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
PLDIPLDI-2013-KastrinisS #context-sensitive grammar #hybrid #points-to
Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
PLDIPLDI-2013-SchaferSDT
Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
PLDIPLDI-2013-ZhangLYS #algorithm #alias #performance
Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
PLDIPLDI-2013-ZhangNY #abstraction #data flow #parametricity
Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
PPDPPPDP-2013-MontenegroPS #functional #regular expression #using
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
QAPLQAPL-2013-NgoH #concurrent #multi #security #source code #thread
Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
SASSAS-2013-BlazyLMP #abstract interpretation #c #verification
Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
SASSAS-2013-DragoiES #data type
Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
SASSAS-2013-WhiteM #algebra #memory management #optimisation #using
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
RERE-2013-BreauxR #formal method #multi #privacy #requirements #specification
Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
RERE-2013-MasseyEAS #automation #documentation #mining #policy #requirements
Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
RERE-2013-NistalaK #approach #consistency #requirements #validation
An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
REFSQREFSQ-2013-BonBGALTBFGATA #case study #requirements
Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
REFSQREFSQ-2013-BreauxG #requirements #specification #traceability #using
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
SACSAC-PL-J-2010-PopeeaC13 #debugging #proving #safety
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
ASEASE-2013-AnnervazKSS #domain model #modelling #natural language #quality #requirements
Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
ASEASE-2013-GarciaIM #architecture #comparative
A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
ASEASE-2013-LetsholoZC #modelling #named #requirements
TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
ASEASE-2013-OhmannL #control flow #debugging #lightweight
Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
ASEASE-2013-RosnerSAKF #alloy #clustering #modelling #named #parallel
Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
ASEASE-2013-Servant #debugging #using
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-SumnerZ #execution #identification
Identifying execution points for dynamic analyses (WNS, XZ), pp. 81–91.
ASEASE-2013-Wu0LD #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #data flow #using
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-JiangZLSHGS #reliability #runtime
System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
ESEC-FSEESEC-FSE-2013-KumarCS #industrial #precise #scalability
Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSEESEC-FSE-2013-LiebigRKADL #scalability
Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
ESEC-FSEESEC-FSE-2013-MusluBEN
Making offline analyses continuous (KM, YB, MDE, DN), pp. 323–333.
ESEC-FSEESEC-FSE-2013-QiuLS #co-evolution #database #empirical
An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSEESEC-FSE-2013-WuHTY #alias #detection #effectiveness #fault
Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ESEC-FSEESEC-FSE-2013-ZhengZG #named #string #web
Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
ICSEICSE-2013-AlmorsyGI #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-CarrenoW #approach #evolution #requirements
Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSEICSE-2013-FilieriPV #reliability
Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
ICSEICSE-2013-Le
Segmented symbolic analysis (WL), pp. 212–221.
ICSEICSE-2013-Muslu #development #maintenance
Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
ICSEICSE-2013-NguyenQRC #named #program repair #semantics
SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
ICSEICSE-2013-SchwankeXC #architecture #quality
Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
ICSEICSE-2013-StephanASC #clone detection #comparison #detection #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
SACSAC-2013-AbeniM #interactive
Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
SACSAC-2013-CameronSNMM #component #performance #realtime #rule-based
Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
SACSAC-2013-GregioFAGMJ #behaviour #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SACSAC-2013-HogenboomBFBJK #sentiment
Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
SACSAC-2013-HuangXCL #adaptation #algorithm #detection #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SACSAC-2013-KalyanC #navigation #using
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KoPH #design #realtime #video
Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
SACSAC-2013-MeloAOAMB #approach #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SACSAC-2013-PayetDKV #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
SACSAC-2013-TsukudaOYIT #coordination
Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
SACSAC-2013-VeeraragavanBMVNM #comprehension #distributed #experience #interactive #metric #multi #quality
Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
SACSAC-2013-WaflerH #approach #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SACSAC-2013-ZhongM #empirical #game studies
Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
LDTALDTA-J-2009-SoderbergEHM #abstract syntax tree #syntax
Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
SLESLE-2013-WachsmuthKVGV #incremental #independence
A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
CASECASE-2013-ChenZAX #finite
Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
CASECASE-2013-ChenZH #modelling #performance
Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
CASECASE-2013-FantiIRU #scheduling #simulation
A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
CASECASE-2013-GiulianiCP #optimisation
A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
CASECASE-2013-LanzaKPSS #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-Markovski #synthesis
Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
CASECASE-2013-SaidiM #configuration management #development #self
Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
CASECASE-2013-WuCY #policy #reachability
A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASECASE-2013-XieLSD #approach #markov #modelling #process
Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASECASE-2013-ZhangH #algorithm #convergence #coordination #implementation #optimisation #parallel
Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
CASECASE-2013-ZhaoL #exponential #multi
Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
CASECASE-2013-ZhongLEHF #modelling #process #testing
Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
CASECASE-2013-ZhouKZS
Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
CCCC-2013-KastrinisS #effectiveness #exception #java #performance #points-to
Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
CCCC-2013-LuSXX #incremental #points-to
An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
CCCC-2013-SiegelS #named
FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
CGOCGO-2013-KruijfS #code generation #evaluation #implementation
Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
CGOCGO-2013-LaiS #bound #optimisation #performance
Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
DACDAC-2013-AgostaBMP
Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DACDAC-2013-AlleMD #dependence #pipes and filters #runtime #synthesis
Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
DACDAC-2013-AndalamGSRR #precise
Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
DACDAC-2013-ChippaCRR #approximate
Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
DACDAC-2013-DingLM #multi #realtime
Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
DACDAC-2013-EbrahimiAT #approach #multi
A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DACDAC-2013-KuruvillaSPVC #optimisation #set #statistics
Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
DACDAC-2013-LinLM #hybrid #kernel #reachability #verification
Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
DACDAC-2013-MallikZLCBBBCRBMV #evaluation #framework #named
TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
DACDAC-2013-Miskov-ZivanovMF #automation #behaviour #design #network
Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
DACDAC-2013-RaiSST #algorithm #distributed #network #process
Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
DATEDATE-2013-AhmadyanV #reachability #reduction #set
Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
DATEDATE-2013-AitkenFKRR #how #question #reliability
Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
DATEDATE-2013-AlieeGRT #automation #fault #reliability
Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
DATEDATE-2013-BanaiyanMofradDG #distributed #fault tolerance #modelling
Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
DATEDATE-2013-BoleyCAC #estimation #performance
Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
DATEDATE-2013-BundMS
Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
DATEDATE-2013-CaiHMM #memory management #modelling
Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
DATEDATE-2013-CastellanaF #independence #liveness #scheduling #synthesis
Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
DATEDATE-2013-ChenM #modelling #reliability
System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
DATEDATE-2013-ChenRSIFC #process
A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
DATEDATE-2013-DiazSSR #network #performance #security #simulation
Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
DATEDATE-2013-DoganBCABA #embedded #execution #multi #platform #power management
Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATEDATE-2013-FakihGFR #architecture #model checking #performance #towards #using
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-FirouziKTN #runtime
Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
DATEDATE-2013-GuanYL0 #approach #estimation
FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATEDATE-2013-HasanA #fault #feedback #formal method #using
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HellwegeHPP #metric #reliability
Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATEDATE-2013-ImagawaTOS #architecture #configuration management #effectiveness
A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
DATEDATE-2013-KosmidisCQABC #design #probability
Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
DATEDATE-2013-LishernessLC #mutation testing
Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
DATEDATE-2013-LiZCZ #multi #simulation
Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
DATEDATE-2013-MalburgFF #comprehension #data flow #design
Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
DATEDATE-2013-MaYGGTBH #architecture #towards #validation
Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
DATEDATE-2013-NegreanKE #manycore
Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
DATEDATE-2013-NeukirchnerQMAE #realtime
Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
DATEDATE-2013-PollexFSMMW #constant #realtime
Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
DATEDATE-2013-QianJBTMM #named #performance #using
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-QuintonNE #formal method #realtime
Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
DATEDATE-2013-RaminiGBB #3d #manycore #power management #using
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-SchneiderZGMC #composition
Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
DATEDATE-2013-ShahKA #bound
Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATEDATE-2013-StanisicVCDMLM #embedded #performance #platform #power management
Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
DATEDATE-2013-SubramanyanTPRSM #functional #reverse engineering #using
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TheissingMSSS #fault
Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
DATEDATE-2013-WagnerW #performance #statistics
Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
DATEDATE-2013-WildermannZT #distributed #game studies #manycore
Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
DATEDATE-2013-YaoYW #adaptation #modelling #online #performance
Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
DATEDATE-2013-YilmazSWO #fault #industrial #scalability #simulation
Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
ISMMISMM-2013-LiCK #graph #pointer #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
LCTESLCTES-2013-HuberPP #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-MorenoFH #debugging #embedded
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
PDPPDP-2013-BasileCLP #reachability #security
Improved Reachability Analysis for Security Management (CB, DC, AL, CP), pp. 534–541.
PDPPDP-2013-EittenbergerSK #network #peer-to-peer #streaming
Location-Aware Traffic Analysis of a Peer-to-Peer Streaming Application in a HSPA Network (PME, KMS, URK), pp. 444–448.
PDPPDP-2013-McCoolSMK #named #parallel
Paralysis: An Extensible Multi-tiered Guidance Environment for Program Parallelization and Analysis (SM, RS, PM, FK), pp. 400–404.
PLOSPLOS-2013-BurtsevMER #named #performance #streaming
Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
PPoPPPPoPP-2013-WuZZJS #algorithm #complexity #design #gpu #memory management
Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
PPoPPPPoPP-2013-YukiFRS #array #data flow #source code
Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
SOSPSOSP-2013-HuangBRLKL #facebook
An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
ESOPESOP-2013-AlpuenteBFS #logic #specification
Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
ESOPESOP-2013-BeyerHTV #multi #reachability #reuse
Information Reuse for Multi-goal Reachability Analyses (DB, AH, MT, HV), pp. 472–491.
ESOPESOP-2013-CollingbourneDKQ #gpu #kernel #semantics #verification
Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
ESOPESOP-2013-HofmannR #automation #type inference
Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
FASEFASE-2013-LinPEHR #behaviour #requirements #sequence #specification #string
Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
FASEFASE-2013-TrippPCCG #named #scalability #security #web
Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
FoSSaCSFoSSaCS-2013-HainryMP #complexity #process #type system
Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
STOCSTOC-2013-HardtR #worst-case
Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
STOCSTOC-2013-KwokLLGT #algorithm #clustering #difference #higher-order
Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
TACASTACAS-2013-BalasubramanianPKL #multi #named #statechart
Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
TACASTACAS-2013-FerraraMP #data access #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-GodefroidY #source code
Analysis of Boolean Programs (PG, MY), pp. 214–229.
TACASTACAS-2013-Lowe #contest
CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
TACASTACAS-2013-VizelGS #reachability #using
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
TACASTACAS-2013-Wendler #contest
CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
CADECADE-2013-ErbaturEKLLMMNSS #encryption #paradigm #protocol #symmetry #unification
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAVCAV-2013-HolikLRSV #automation #automaton
Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
CAVCAV-2013-MeierSCB #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-Sankur #automaton #named #robust
Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
ICLPICLP-J-2013-LiangK #logic programming #scalability #source code
A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
ICLPICLP-J-2013-MaLWRL #approach #declarative #distributed #execution #specification
A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICSTICST-2013-CarrozzaCNPR #industrial #predict
Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
ICSTICST-2013-FryW #maintenance
Leveraging Light-Weight Analyses to Aid Software Maintenance (ZPF, WW), pp. 507–508.
ICSTICST-2013-GargantiniGM #automation #named #robust
AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
ICSTICST-2013-ShuSHP #dependence #framework #named #platform
JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
ISSTAISSTA-2013-Ghaith #performance #testing #transaction
Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
ISSTAISSTA-2013-HowarGR #generative #hybrid #interface #learning
Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
ISSTAISSTA-2013-RosnerGBBRPZF #bound #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
ISSTAISSTA-2013-WeiR #javascript
Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
LICSLICS-2013-ChaudhuriSV
Regular Real Analysis (SC, SS, MYV), pp. 509–518.
TAPTAP-2013-GogollaBC #benchmark #metric #ocl #tool support #uml
Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
VMCAIVMCAI-2013-SamantaDC #robust
Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
VMCAIVMCAI-2013-SeladjiB #abstract domain #fixpoint #tool support #using
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
CBSECBSE-2012-BenesBCO #component #development #model checking #probability #reliability
Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
CBSECBSE-2012-Carlson #component #embedded
Timing analysis of component-based embedded systems (JC), pp. 151–156.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #clone detection #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
WICSA-ECSAWICSA-ECSA-2012-EdwardsBM #automation #code generation #modelling
Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSAWICSA-ECSA-2012-SuYZ #architecture #component #semantics
Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
WICSA-ECSAWICSA-ECSA-2012-TauschPA #domain-specific language #named #traceability
TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
DocEngDocEng-2012-JunediGL #independence #revisited #xml
XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
DRRDRR-2012-ChazalonC #documentation #interactive #performance
Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
HTHT-2012-AisoposPTV #comparative #microblog #sentiment
Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
HTHT-2012-KlienS #network
Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
HTHT-2012-NakajimaZIN #detection #scalability
Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
JCDLJCDL-2012-FreireBC #library #metadata #problem #recognition
An analysis of the named entity recognition problem in digital library metadata (NF, JLB, PC), pp. 171–174.
JCDLJCDL-2012-YiZYYPW #multi #semantics
Improving multi-faceted book search by incorporating sparse latent semantic analysis of click-through logs (DY, YZ, HY, YY, JP, BW), pp. 249–258.
SIGMODSIGMOD-2012-YangZMWX #difference #privacy
Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
TPDLTPDL-2012-LeeTC #challenge #game studies #metadata #video
Domain Analysis for a Video Game Metadata Schema: Issues and Challenges (JHL, JTT, RIC), pp. 280–285.
TPDLTPDL-2012-LlewellynGOH #tool support #using
Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
TPDLTPDL-2012-TranF
Quantitative Analysis of Search Sessions Enhanced by Gaze Tracking with Dynamic Areas of Interest (VTT, NF), pp. 468–473.
VLDBVLDB-2012-AlsubaieeAABBBCGHKLOPVW #big data #data transformation #named #open source
ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
VLDBVLDB-2012-DalviMP #web
An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
VLDBVLDB-2012-DasTADY #framework #what
Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
VLDBVLDB-2012-GawadeK #execution #framework #interactive #named #platform #query #visual notation
Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
VLDBVLDB-2012-LetelierPPS #named
SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
VLDBVLDB-2012-RoyDMSW
Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
VLDBVLDB-2012-SunHYY #approach #mining #network
Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDBVLDB-2012-XuLGC #big data #clustering #in the cloud #interactive #named #visual notation
CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
VLDBVLDB-2012-ZhangZXYW #difference #functional #privacy
Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
VLDBVLDB-2013-ZhaoT12 #network #scalability #social #visual notation
Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
ITiCSEITiCSE-2012-BrownPSE #complexity #generative #named
JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
SIGITESIGITE-2012-AlviEAA #education
Analysis and extraction of sentence-level paraphrase sub-corpus in CS education (FA, ESMEA, WGAK, REAA), pp. 49–54.
CSMRCSMR-2012-GoulaoFWA #case study #comparative #evolution #predict #using
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-HashimotoM #fine-grained #mining
Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
CSMRCSMR-2012-HoraADBCVM #debugging #visual notation
Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
CSMRCSMR-2012-KimKKB #database
Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
CSMRCSMR-2012-LamkanfiD #debugging
Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
CSMRCSMR-2012-PerezDGM #ecosystem #named
SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
CSMRCSMR-2012-TerceiroMCC #complexity #comprehension #evolution
Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
ICPCICPC-2012-TenevD
Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
ICSMEICSM-2012-BauerHHJC #framework #incremental #quality #scalability
A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
ICSMEICSM-2012-BavotaQOLB #empirical #maintenance #smell #testing
An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
ICSMEICSM-2012-ChaikalisMC #evolution #named #network
SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
ICSMEICSM-2012-HindleBZN #developer #implementation #question #requirements #topic
Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
ICSMEICSM-2012-Pollock #challenge #natural language
Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
ICSMEICSM-2012-RaemaekersDV #library
Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
MSRMSR-2012-GigerPG #empirical #predict
Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
MSRMSR-2012-GuanaRHS #android #architecture #multi
Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
MSRMSR-2012-HarmanJZ #mining
App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
MSRMSR-2012-RotellaC #overview
Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
SCAMSCAM-2012-GutzmannLL #framework #points-to
Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
SCAMSCAM-2012-KargenS #comprehension #data flow #named
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
SCAMSCAM-2012-LazarescuL #c #dependence #parallel #source code
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
SCAMSCAM-2012-MayerS #refactoring
Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAMSCAM-2012-Xie #testing
Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
WCREWCRE-2012-ClearySCSP #assembly #named
ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
WCREWCRE-2012-HanZFHWS #android #comprehension #debugging #topic
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
WCREWCRE-2012-SteidlHJ #network #recommendation #using
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
LATALATA-2012-NikolicS #array
Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
FMFM-2012-BeekMS #named #variability
VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
FMFM-2012-MinamideM #html #parsing #reachability #specification #testing
Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
FMFM-2012-NguyenSLDL
Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
FMFM-2012-OwreSS #automation #cyber-physical
Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
IFMIFM-2012-BorgerCG #framework #web
Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
IFMIFM-2012-KazemeyniJOB #modelling #network #probability
MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
SEFMSEFM-2012-AyraultBDP #dependence #ml
ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
SEFMSEFM-2012-CuoqKKPSY #named #perspective
Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
SEFMSEFM-2012-FerraraFJ
TVAL+ : TVLA and Value Analyses Together (PF, RF, UJ), pp. 63–77.
SFMSFM-2012-Becker #model transformation #non-functional
Model Transformations in Non-functional Analysis (SB), pp. 263–289.
SFMSFM-2012-CortellessaMT #modelling #performance
Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
FLOPSFLOPS-2012-TobitaTK #higher-order #model checking
Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
ICFPICFP-2012-EarlSMH #automaton #higher-order #source code
Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
ICFPICFP-2012-SimoesVFJH #automation #functional #lazy evaluation #memory management #source code
Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
IFLIFL-2012-Fluet #control flow #system f
A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
AIIDEAIIDE-2012-BauerP #game studies #refinement #visual notation #visualisation
RRT-Based Game Level Analysis, Visualization, and Visual Refinement (AWB, ZP).
CoGCIG-2012-McGuinness #generative #representation #statistics
Statistical analyses of representation choice in level generation (CM), pp. 312–319.
GRAPHITEGRAPHITE-2012-BeckmannFKM #graph
A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
CHICHI-2012-BaurBB #component #music #scalability
Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
CHICHI-2012-BrechtEBG #network #social
Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
CHICHI-2012-ChuangRMH #design #modelling #trust #visualisation
Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHICHI-2012-DixonFW #interface #using #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-FolstadLH #evaluation #overview #usability
Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
CHICHI-2012-KapteinR #statistics
Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHICHI-2012-MustafaLM #visual notation
EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
CHICHI-2012-WallnerK #approach #visualisation
A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CHICHI-2012-ZiemkiewiczGL #graph #visualisation
Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
CSCWCSCW-2012-BorgeGSC #process
Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
CSCWCSCW-2012-EhrlichC #communication #development #distributed #multi #performance
All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
CSCWCSCW-2012-KeeganGC #collaboration #editing #multi #network #statistics #wiki
Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
CSCWCSCW-2012-McDonaldGZ #prototype #social #type system
Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
CSCWCSCW-2012-NguyenF #how
How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
CAiSECAiSE-2012-ZawawyKMM #logic #markov #network #using
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
EDOCEDOC-2012-BinzLNS #enterprise #graph transformation #segmentation
Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
EDOCEDOC-2012-BurattinMAS #declarative #process
Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
EDOCEDOC-2012-WangWART #composition #ecosystem #modelling
Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
ICEISICEIS-J-2012-GeJG #recommendation
Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
ICEISICEIS-v2-2012-PolasikGWKPT #mobile #process
Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
ICEISICEIS-v2-2012-SemenovV #architecture #social #social media
Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
ICEISICEIS-v3-2012-BauerEFH #consistency #process
Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
ICEISICEIS-v3-2012-BonacinHRPB #aspect-oriented #challenge #problem #social
Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
ICEISICEIS-v3-2012-CansadoVS #architecture #enterprise #multi #using
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
CIKMCIKM-2012-AmatiAG #microblog
Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
CIKMCIKM-2012-AshkanC #behaviour #modelling
Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
CIKMCIKM-2012-DengSZ #documentation #performance #scalability
Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
CIKMCIKM-2012-DybalaRAS #comparative #generative #ranking
Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKMCIKM-2012-EldardiryN #classification #graph #how #predict
An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
CIKMCIKM-2012-HuHXLUZ #mining
Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
CIKMCIKM-2012-JatowtT #scalability
Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
CIKMCIKM-2012-JatowtT12a #comparative #readability #wiki
Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
CIKMCIKM-2012-Jin #multi #process #profiling
User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
CIKMCIKM-2012-KazaiCYT #fault #information retrieval
An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
CIKMCIKM-2012-LeelanupabZJ #cumulative #parametricity
A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
CIKMCIKM-2012-LiuW #on the #semantics
On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
CIKMCIKM-2012-LiuZG #ranking
Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
CIKMCIKM-2012-RahmanBH #algorithm #approximate #graph #named #scalability
GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
CIKMCIKM-2012-YueJHH #collaboration #query #web
Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
ECIRECIR-2012-AlbakourKNASFR #query #web
Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
ECIRECIR-2012-Bloom #graph
Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
ECIRECIR-2012-KarimzadehganZ #axiom #information retrieval
Axiomatic Analysis of Translation Language Model for Information Retrieval (MK, CZ), pp. 268–280.
ECIRECIR-2012-KarlgrenSOEH #sentiment
Usefulness of Sentiment Analysis (JK, MS, FO, FE, OH), pp. 426–435.
ECIRECIR-2012-ZucconAZW #retrieval #using
Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICMLICML-2012-ChenCRCC #linear
Communications Inspired Linear Discriminant Analysis (MC, WRC, MRDR, LC, ARC), p. 196.
ICMLICML-2012-KalaitzisL #component
Residual Components Analysis (AAK, NDL), p. 73.
ICMLICML-2012-MairalY #complexity
Complexity Analysis of the Lasso Regularization Path (JM, BY), p. 238.
ICMLICML-2012-MerchanteGG #approach #linear #performance
An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
ICMLICML-2012-PachauriCS #problem
Incorporating Domain Knowledge in Matching Problems via Harmonic Analysis (DP, MDC, VS), p. 112.
ICMLICML-2012-VogtR
A Complete Analysis of the l_1, p Group-Lasso (JEV, VR), p. 143.
ICMLICML-2012-YgerBGR #adaptation #canonical #correlation #matrix
Adaptive Canonical Correlation Analysis Based On Matrix Manifolds (FY, MB, GG, AR), p. 43.
ICMLICML-2012-YuS #kernel
Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
ICPRICPR-2012-Abdel-HakimE #component #named #online #performance #robust
FRPCA: Fast Robust Principal Component Analysis for online observations (AEAH, MES), pp. 413–416.
ICPRICPR-2012-AbouelenienY #fault #named #performance
SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
ICPRICPR-2012-AiDHC #component #feature model #independence #multi
Multiple feature selection and fusion based on generalized N-dimensional independent component analysis (DA, GD, XHH, YWC), pp. 971–974.
ICPRICPR-2012-AjmeraD #detection #word
Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
ICPRICPR-2012-BenJY #automation #clustering #fuzzy
Automatic fuzzy clustering based on mistake analysis (SB, ZJ, JY), pp. 2914–2917.
ICPRICPR-2012-CantoniOFP
Structural analysis of protein Secondary Structure by GHT (VC, OO, AF, AP), pp. 1767–1770.
ICPRICPR-2012-ChenHCHC #using
Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPRICPR-2012-ChenYY #null #recognition #scalability
Large margin null space discriminant analysis with applications to face recognition (XC, JY, WY), pp. 1679–1682.
ICPRICPR-2012-ElnakibNCPGE #3d #quantifier #using
Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPRICPR-2012-ErYAK #modelling
Traffic accident risk analysis based on relation of Common Route Models (UE, SY, OA, MEK), pp. 2561–2564.
ICPRICPR-2012-GaoM #canonical #correlation #detection #kernel #multi #using
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GhoshC #automation #classification
Feature analysis for automatic classification of HEp-2 florescence patterns : Computer-Aided Diagnosis of Auto-immune diseases (SG, VC), pp. 174–177.
ICPRICPR-2012-GuiST #estimation #parametricity
Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
ICPRICPR-2012-HuangA #detection #perspective
Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
ICPRICPR-2012-HuangL #automation #component #detection #independence
Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
ICPRICPR-2012-Iwata #optimisation
Placing landmarks suitably for shape analysis by optimization (KI), pp. 2359–2362.
ICPRICPR-2012-JoshiDGBP #classification
Neural-net classification for spatio-temporal descriptor based depression analysis (JJ, AD, RG, MB, GP), pp. 2634–2638.
ICPRICPR-2012-KimuraSKS #component #design
Designing various component analysis at will (AK, HS, HK, MS), pp. 2959–2962.
ICPRICPR-2012-KorffFKSBPS #image #library #recognition
Compound color recognition via image analysis on high-throughput compound libraries (MvK, JF, AK, JS, GB, OP, TS), pp. 1289–1293.
ICPRICPR-2012-KostopoulouZMV #2d #image
2D-GE image analysis focusing on elimination of spurious spots (EK, EZ, DM, AV), pp. 1627–1630.
ICPRICPR-2012-KrawczykS #classification #effectiveness #multi
Effective multiple classifier systems for breast thermogram analysis (BK, GS), pp. 3345–3348.
ICPRICPR-2012-LeiLL #feature model #linear #performance #recognition
Efficient feature selection for linear discriminant analysis and its application to face recognition (ZL, SL, SZL), pp. 1136–1139.
ICPRICPR-2012-LiuF #kernel #multi
Multiple kernel discriminant analysis (XZL, GCF), pp. 1691–1694.
ICPRICPR-2012-LiuL #detection #learning #multi
Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
ICPRICPR-2012-LuuSBS #adaptation #multi
Compressed Submanifold Multifactor Analysis with adaptive factor structures (KL, MS, TDB, CYS), pp. 2715–2718.
ICPRICPR-2012-MoriyamaAS #using
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-MoyouP
Shape analysis on the hypersphere of wavelet densities (MM, AMP), pp. 2091–2094.
ICPRICPR-2012-Noh #classification #learning #metric #nearest neighbour
χ2 Metric learning for nearest neighbor classification and its analysis (SN), pp. 991–995.
ICPRICPR-2012-Ohtsuka #detection
Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
ICPRICPR-2012-PangHYQW #classification #learning
Theoretical analysis of learning local anchors for classification (JP, QH, BY, LQ, DW), pp. 1803–1806.
ICPRICPR-2012-ParisHG #categorisation #image #towards
Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
ICPRICPR-2012-RingJKE #classification #complexity #design #embedded #performance
Software-based performance and complexity analysis for the design of embedded classification systems (MR, UJ, PK, BE), pp. 2266–2269.
ICPRICPR-2012-SantosFTRGPF #classification #correlation #image #multi
Descriptor correlation analysis for remote sensing image multi-scale classification (JAdS, FAF, RdST, AR, PHG, SPF, AXF), pp. 3078–3081.
ICPRICPR-2012-SchaeferD #multi
Multi-dimensional local binary pattern descriptors for improved texture analysis (GS, NPD), pp. 2500–2503.
ICPRICPR-2012-ShaoS #distance #reduction
Fractional-step max-min distance analysis for dimension reduction (GS, NS), pp. 396–400.
ICPRICPR-2012-ShenMZ #graph #learning #online
Unsupervised online learning trajectory analysis based on weighted directed graph (YS, ZM, JZ), pp. 1306–1309.
ICPRICPR-2012-StammD #documentation
Searching attentive tasks with document analysis evidences and Dempster-Shafer theory (KS, AD), pp. 529–532.
ICPRICPR-2012-SuWF #canonical #correlation #evaluation #generative
Evaluation of canonical correlation analysis: A Correlation Generation Model (YS, SW, YF), pp. 1751–1754.
ICPRICPR-2012-TangZKC #forensics #image #visualisation
Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
ICPRICPR-2012-TawariT
Audio-visual data association for face expression analysis (AT, MMT), pp. 1120–1123.
ICPRICPR-2012-WangGFC #segmentation
Curvature-driven volumetric segmentation of binary shapes: An application to snow microstructure analysis (XW, LG, FF, DC), pp. 742–745.
ICPRICPR-2012-WangSCPZ #component #feature model #named
STPCA: Sparse tensor Principal Component Analysis for feature extraction (SW, MS, YHC, EPP, CZ), pp. 2278–2281.
ICPRICPR-2012-WangWZJ #bias #database
Bias analyses of spontaneous facial expression database (ZW, SW, YZ, QJ), pp. 2926–2929.
ICPRICPR-2012-WilkinsonO #documentation
Mask-edge connectivity: Theory, computation, and application to historical document analysis (MHFW, JO), pp. 1334–1337.
ICPRICPR-2012-YokotaHKW #estimation #image
Estimation of earthquake ground motion by image analysis of sliding objects taken with a fixed camera (AY, TH, HK, TW), pp. 784–787.
ICPRICPR-2012-ZhangLC #detection #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
KDDKDD-2012-KangPHF #algorithm #named #scalability
GigaTensor: scaling tensor analysis up by 100 times — algorithms and discoveries (UK, EEP, AH, CF), pp. 316–324.
KDDKDD-2012-MiaoGMYTAS #documentation
Latent association analysis of document pairs (GM, ZG, LEM, XY, ST, NA, JS), pp. 1415–1423.
KDDKDD-2012-SongCWWYD #behaviour
Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
KDDKDD-2012-TangWYHZYGHXLU #mining #named #topic
PatentMiner: topic-driven patent analysis and mining (JT, BW, YY, PH, YZ, XY, BG, MH, PX, WL, AKU), pp. 1366–1374.
KDDKDD-2012-YuanWTNY #learning #multi
Multi-source learning for joint analysis of incomplete multi-modality neuroimaging data (LY, YW, PMT, VAN, JY), pp. 1149–1157.
KDDKDD-2012-YuZSWWQZ #data mining #in the cloud #mining #named #network #social
BC-PDM: data mining, social network analysis and text mining system based on cloud computing (LY, JZ, WCS, BW, BW, LQ, BRZ), pp. 1496–1499.
KDDKDD-2012-ZhaoDWX #named #sentiment #twitter
MoodLens: an emoticon-based sentiment analysis system for chinese tweets (JZ, LD, JW, KX), pp. 1528–1531.
KDIRKDIR-2012-FukumotoMM #collaboration #recommendation #sentiment
Collaborative Filtering based on Sentiment Analysis of Guest Reviews for Hotel Recommendation (FF, CM, SM), pp. 193–198.
KDIRKDIR-2012-Machado #image #retrieval
Factor Analysis and the Retrieval of Medical Images Depicting Structures with Similar Shapes (AMCM), pp. 175–180.
KDIRKDIR-2012-MountassirBB #problem #semistructured data #sentiment #set
Addressing the Problem of Unbalanced Data Sets in Sentiment Analysis (AM, HB, IB), pp. 306–311.
KDIRKDIR-2012-SpiegelA #distance #invariant
An Order-invariant Time Series Distance Measure — Position on Recent Developments in Time Series Analysis (SS, SA), pp. 264–268.
KDIRKDIR-2012-UddinAH #network #social
New Directions in the Analysis of Social Network Dynamics (MSU, SRA, LH), pp. 269–274.
KEODKEOD-2012-HlomaniS #framework #towards #workflow
Towards an Ontology-driven Framework for Workflow Analysis (HH, DAS), pp. 405–410.
KEODKEOD-2012-LinharesD #functional #geometry
Geometric Knowledge Analysis based in Part Functional Descriptions (JCL, AD), pp. 307–313.
KMISKMIS-2012-MarsanCE #behaviour #enterprise #framework #information management #platform #scalability #tool support #using
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMISKMIS-2012-PanTG #component
A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
KRKR-2012-CohnRS #representation #video
Thinking Inside the Box: A Comprehensive Spatial Representation for Video Analysis (AGC, JR, MS).
MLDMMLDM-2012-KalpakisYHMSSS #permutation #predict #using
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDMMLDM-2012-StaroszczykOM #comparative #feature model #recognition
Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
SEKESEKE-2012-ChenCZS #approach #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-DingM #fuzzy #modelling
Modeling and Analysis of Switched Fuzzy Systems (ZD, JM), pp. 135–138.
SEKESEKE-2012-DuttaUA #approach #automation #semantics #verification
Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
SEKESEKE-2012-JangidPE #mobile #predict #sentiment #using
A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKESEKE-2012-LiuMLS #non-functional #specification
Risk-driven Non-functional Requirement Analysis and Specification (YL, ZM, HL, WS), pp. 55–60.
SEKESEKE-2012-LiuZSH #architecture #modelling #named
SAMAT — A Tool for Software Architecture Modeling and Analysis (SL, RZ, ZS, XH), pp. 352–358.
SEKESEKE-2012-MaZQQXY #dependence #design pattern #identification #using
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-VegiFCOB #named
DC2AP: A Dublin Core Application Profile to Analysis Patterns (LFdMV, JLF, GLdSC, AdPO, JLB), pp. 511–516.
SEKESEKE-2012-WangL #approach #modelling #petri net #workflow
Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
SIGIRSIGIR-2012-ChaC #modelling #topic #using
Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIRSIGIR-2012-ChinS
Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
SIGIRSIGIR-2012-YangLLR #graph #twitter
Finding interesting posts in Twitter based on retweet graph analysis (MCY, JTL, SWL, HCR), pp. 1073–1074.
MODELSMoDELS-2012-MaraeeB #comparative #constraints #guidelines #modelling #recommendation #uml
Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
MODELSMoDELS-2012-NejatiASB #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
MODELSMoDELS-2012-ShinJB #empirical #evaluation #modelling #mutation testing #test coverage #using
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
MODELSMoDELS-2012-WilliamsBPP #modelling
Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
SPLCSPLC-2012-El-SharkawyDS #feature model #modelling
From feature models to decision models and back again an analysis based on formal transformations (SES, SD, KS), pp. 126–135.
SPLCSPLC-2012-OliveiraBN #debugging #product line
Supporting the analysis of bug prevalence in software product lines with product genealogy (THBdO, MB, EYN), pp. 181–185.
ECOOPECOOP-2012-DeD #java #pointer #scalability
Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
ECOOPECOOP-2012-KarimDGS #framework
An Analysis of the Mozilla Jetpack Extension Framework (RK, MD, VG, CcS), pp. 333–355.
ECOOPECOOP-2012-SridharanDCST #correlation #javascript #points-to
Correlation Tracking for Points-To Analysis of JavaScript (MS, JD, SC, MS, FT), pp. 435–458.
OOPSLAOOPSLA-2012-MusluBHEN #development #ide #recommendation
Speculative analysis of integrated development environment recommendations (KM, YB, RH, MDE, DN), pp. 669–682.
OOPSLAOOPSLA-2012-SiddiquiK #execution #scalability #symbolic computation #using
Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
HILTHILT-2012-LiSRM #protocol #realtime #scheduling
Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
LOPSTRLOPSTR-2012-MantelS #data flow #dependence
Types vs. PDGs in Information Flow Analysis (HM, HS), pp. 106–121.
PEPMPEPM-2012-AlbertCPR #incremental #resource management
Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
PLDIPLDI-2012-AlbarghouthiKNR #interprocedural #top-down
Parallelizing top-down interprocedural analyses (AA, RK, AVN, SKR), pp. 217–228.
PLDIPLDI-2012-ChiwKRSS #domain-specific language #image #named #parallel #visualisation
Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
PLDIPLDI-2012-HolewinskiRRFPRS
Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
PLDIPLDI-2012-OhHLLY #design #implementation
Design and implementation of sparse global analyses for C-like languages (HO, KH, WL, WL, KY), pp. 229–238.
PLDIPLDI-2012-WuTHCY #parallel #precise #source code
Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
POPLPOPL-2012-BouajjaniE #parallel #recursion #source code
Analysis of recursively parallel programs (AB, ME), pp. 203–214.
QAPLQAPL-2012-GazeauMP #float #robust #source code
A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
SASSAS-2012-CalvertM #calculus #control flow
Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
SASSAS-2012-HenryMM #abstract interpretation #algorithm #evaluation
Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
SASSAS-2012-HoweK #parametricity #using
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-KhedkerMR #pointer
Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
SASSAS-2012-Krishnamurthi #javascript #semantics #web
Semantics and Analyses for JavaScript and the Web (SK), p. 4.
SASSAS-2012-Ledesma-GarzaR #functional #higher-order #reachability #source code
Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
SASSAS-2012-LeePMH #parallel #performance
Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
SASSAS-2012-MadhavanRV #composition #higher-order #source code
Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
RERE-2012-Alexandrova #development #legacy #requirements
Business requirements analysis and development for legacy system replacement projects in government organizations (AA), pp. 337–340.
RERE-2012-CailliauL #framework #probability
A probabilistic framework for goal-oriented risk analysis (AC, AvL), pp. 201–210.
RERE-2012-LutzLLKMSBH #product line #requirements
Requirements analysis for a product family of DNA nanodevices (RRL, JHL, JIL, THK, DM, DMS, TB, ERH), pp. 211–220.
REFSQREFSQ-2012-BruniFST #automation #multimodal #perspective #requirements #research
Automatic Analysis of Multimodal Requirements: A Research Preview (EB, AF, NS, GT), pp. 218–224.
REFSQREFSQ-2012-Radlinski #empirical #quality #requirements
Empirical Analysis of the Impact of Requirements Engineering on Software Quality (LR), pp. 232–238.
REFSQREFSQ-2012-RaspotnigO #case study #diagrams #sequence chart
Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams (CR, ALO), pp. 117–131.
ASEASE-2012-AlmorsyGI #automation #using
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-IbrahimGHA #ambiguity #kernel #operating system #points-to #using
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-Shang0X #experience #incremental #performance #points-to #precise #summary
Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
ASEASE-2012-TamrawiNNN #named #refactoring
SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASEASE-2012-XiaoTFHM #privacy
User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
FSEFSE-2012-BirdZ #branch
Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
FSEFSE-2012-GanaiLG #concurrent #multi #named #source code #thread
DTAM: dynamic taint analysis of multi-threaded programs for relevancy (MKG, DL, AG), p. 46.
FSEFSE-2012-RayWK #migration #named
REPERTOIRE: a cross-system porting analysis tool for forked software projects (BR, CW, MK), p. 8.
FSEFSE-2012-WangZXXM #automation #collaboration #hybrid #web
Automating presentation changes in dynamic web applications via collaborative hybrid analysis (XW, LZ, TX, YX, HM), p. 16.
ICSEICSE-2012-AlkhalafBG #string #using #validation #verification
Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSEICSE-2012-BhattacharyaINF #evolution #graph #predict
Graph-based analysis and prediction for software evolution (PB, MI, IN, MF), pp. 419–429.
ICSEICSE-2012-Camilli #in the cloud #petri net
Petri nets state space analysis in the cloud (MC), pp. 1638–1640.
ICSEICSE-2012-EsteveKNPY #correctness #dependence #performance #safety
Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
ICSEICSE-2012-Ghardallou #invariant #termination #using
Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSEICSE-2012-Jaafar #evolution #on the #source code
On the analysis of evolution of software artefacts and programs (FJ), pp. 1563–1566.
ICSEICSE-2012-MesbahM #automation #css #maintenance
Automated analysis of CSS rules to support style maintenance (AM, SM), pp. 408–418.
ICSEICSE-2012-NguyenNDKS #developer #fault
Inferring developer expertise through defect analysis (TTN, TNN, ED, TK, PS), pp. 1297–1300.
ICSEICSE-2012-Schulte #automation
Ten years of automated code analysis at Microsoft (WS), p. 1001.
ICSEICSE-2012-ShahzadSL #lifecycle #scalability
A large scale exploratory analysis of software vulnerability life cycles (MS, MZS, AXL), pp. 771–781.
ICSEICSE-2012-TamrawiNNN #evaluation #symbolic computation
Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
ICSEICSE-2012-UddinDR #api #concept
Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
ICSEICSE-2012-Yu #identification #using
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SACSAC-2012-BalduzziZBKL #security
A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
SACSAC-2012-DasguptaK #precise #using
Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SACSAC-2012-DestefanisTCM #anti #java #scalability
An analysis of anti-micro-patterns effects on fault-proneness in large Java systems (GD, RT, GC, MM), pp. 1251–1253.
SACSAC-2012-DragoB #architecture #design #graph #manycore #named
DAG3: a tool for design and analysis of applications for multicore architectures (MLD, JB), pp. 1159–1164.
SACSAC-2012-GomesP #interactive #social
A media-based social interactions analysis procedure (AKG, MdGCP), pp. 1018–1024.
SACSAC-2012-KhucSRR #distributed #scalability #sentiment #towards #twitter
Towards building large-scale distributed systems for twitter sentiment analysis (VNK, CS, RR, JR), pp. 459–464.
SACSAC-2012-MengHO #algorithm #search-based
Analysis of a triploid genetic algorithm over deceptive landscapes (LM, SH, CO), pp. 244–249.
SACSAC-2012-NetoA #process
Keeping decisions and rationale explicit in business process analysis (MSdSN, RMdA), pp. 1702–1708.
SACSAC-2012-NunesARTCS #data type
To be or not to be real: fractal analysis of data streams from a regional climate change model (SAN, AMHdÁ, LASR, AJMT, PPC, EPMdS), pp. 831–832.
SACSAC-2012-SantosCSLB #heuristic #identification #modelling #process
Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
SACSAC-2012-SarroMFG #algorithm #fault #predict #search-based #using
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SACSAC-2012-SchaadB #automation #named
TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
SACSAC-2012-ScholteRBK #empirical #validation #web
An empirical analysis of input validation mechanisms in web applications and languages (TS, WKR, DB, EK), pp. 1419–1426.
SACSAC-2012-SwainCNB #markov #performance #using
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SACSAC-2012-TangJ #precise
Exploiting regularity of user-defined types to improve precision of program analyses (XT, JJ), pp. 1743–1750.
SLESLE-2012-KaminskiW #attribute grammar #composition
Modular Well-Definedness Analysis for Attribute Grammars (TK, EVW), pp. 352–371.
SLESLE-2012-KrishnanW #attribute grammar #higher-order #termination
Termination Analysis for Higher-Order Attribute Grammars (LK, EVW), pp. 44–63.
SLESLE-2012-Sloane #abstraction #attribute grammar
Profile-Based Abstraction and Analysis of Attribute Grammar Evaluation (AMS), pp. 24–43.
ASPLOSASPLOS-2012-HongCSO #domain-specific language #graph #named #performance
Green-Marl: a DSL for easy and efficient graph analysis (SH, HC, ES, KO), pp. 349–362.
ASPLOSASPLOS-2012-OlszewskiZKAA #named
Aikido: accelerating shared data dynamic analyses (MO, QZ, DK, JA, SPA), pp. 173–184.
CASECASE-2012-ChenF #rule-based
Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
CASECASE-2012-ChenZAB #approach #performance #realtime
Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
CASECASE-2012-ChoiFN #assembly
Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
CASECASE-2012-CostantinoDEFS #evaluation #fuzzy #novel #performance
A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
CASECASE-2012-HoerningSWS #robust #simulation #tool support
Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
CASECASE-2012-Kim #fuzzy #robust
Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
CASECASE-2012-LinKH #functional #modelling
Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
CASECASE-2012-LiuJCLX #canonical #correlation #fault #identification #linear #research
Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
CASECASE-2012-QiaoWZ #clustering #petri net #scheduling #tool support
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
CASECASE-2012-ShinPKA #linear
Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
CASECASE-2012-WangHDS #agile #protocol #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-YumKK #overview #perspective
Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
CCCC-2012-MarronLB #paradigm #programming
Programming Paradigm Driven Heap Analysis (MM, OL, AB), pp. 41–60.
CCCC-2012-PuttaN #parallel #points-to
Parallel Replication-Based Points-To Analysis (SP, RN), pp. 61–80.
CGOCGO-2012-MatosevicA #bottom-up #data access #performance #summary
Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
CGOCGO-2012-ShangXX #on-demand #points-to
On-demand dynamic summary-based points-to analysis (LS, XX, JX), pp. 264–274.
DACDAC-2012-AgostaBP
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DACDAC-2012-ChungJ #functional #performance
Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
DACDAC-2012-GhosalLRTPWTA #data access #data flow #semantics
Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DACDAC-2012-KumarBKV #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LoS #execution #monitoring #parallel #runtime #worst-case
Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
DACDAC-2012-MeirR #biology #named #network #performance #using
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-RajendranPSK #logic #obfuscation #security
Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
DACDAC-2012-RoyC #predict
Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
DACDAC-2012-UkhovBEP #embedded #multi #optimisation #reliability
Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
DACDAC-2012-WenZCWX #named #performance #reliability #scalability #statistics
PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DACDAC-2012-ZhaoSL #3d
Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
DACDAC-2012-ZolotovSHFVXLV #statistics
Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
DATEDATE-2012-BesteT #robust #standard
Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
DATEDATE-2012-BozgaDHHLLT #embedded #modelling #state of the art #tool support
State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
DATEDATE-2012-CaiHMM #fault #memory management #metric
Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
DATEDATE-2012-ChangCM
RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
DATEDATE-2012-JafariJL #scheduling #worst-case
Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
DATEDATE-2012-KnothJS #modelling
Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
DATEDATE-2012-LiH #logic #named #performance #reliability
RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
DATEDATE-2012-LinWCCCHYS #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-LiuTW #approach #graph #parallel #statistics
Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
DATEDATE-2012-MaricauJG #learning #multi #reliability #using
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinhoNPP #float #scheduling
Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
DATEDATE-2012-MasrurGCCAB #communication #cyber-physical #hybrid #protocol
Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATEDATE-2012-MengC #3d #energy #performance #runtime
Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
DATEDATE-2012-MiryalaCMP #network
IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
DATEDATE-2012-NeogyR #design #injection
Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
DATEDATE-2012-OzTKT #parallel #thread #trade-off
Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
DATEDATE-2012-PerinTBM #implementation
Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
DATEDATE-2012-PiscitelliP #design #hybrid
Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
DATEDATE-2012-QuintonEBY #challenge #probability #roadmap
Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
DATEDATE-2012-QuintonHE #formal method #realtime
Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
DATEDATE-2012-RahimiBG
Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
DATEDATE-2012-RajendranPSK #encryption #fault #logic #perspective
Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
DATEDATE-2012-RoxEG #design #network #using
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SchrijenL #comparative
Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
DATEDATE-2012-TangZBM #correlation #modelling #statistics
Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
DATEDATE-2012-ThieleE #data flow #graph #optimisation #performance
Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
DATEDATE-2012-TsaiLL #configuration management #design
Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
DATEDATE-2012-XuLHRHT #power management
Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
DATEDATE-2012-ZhangPM #3d #grid #power management
Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DATEDATE-2012-ZimmermannBR #multi #power management
Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
DATEDATE-2012-ZohnerKSH
Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
ISMMISMM-2012-Nasre #constraints #graph #performance #points-to
Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
LCTESLCTES-2012-FangLZLCZ #multi #predict
Improving dynamic prediction accuracy through multi-level phase analysis (ZF, JL, WZ, YL, HC, BZ), pp. 89–98.
PDPPDP-2012-BaumannS #markov #modelling #network #security
Markovian Modeling and Security Measure Analysis for Networks under Flooding DoS Attacks (HB, WS), pp. 298–302.
PDPPDP-2012-CastilloFMQR #algebra #energy #kernel #linear #message passing
Analysis of Strategies to Save Energy for Message-Passing Dense Linear Algebra Kernels (MC, JCF, RM, ESQO, VR), pp. 346–352.
PDPPDP-2012-DilchM #algorithm #architecture #gpu #novel #optimisation #performance
Optimization Techniques and Performance Analyses of Two Life Science Algorithms for Novel GPU Architectures (DD, EM), pp. 376–383.
PDPPDP-2012-HuWB #design
Design and Analysis of a Mesh-based Wireless Network-on-Chip (WHH, CW, NB), pp. 483–490.
PDPPDP-2012-LahyaniKJ #approach #monitoring
QoS Monitoring and Analysis Approach for Publish/Subscribe Systems Deployed on MANET (IL, NK, MJ), pp. 120–124.
PDPPDP-2012-RuizHMDKC #component #embedded #modelling #security
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components (JFR, RH, AM, VD, IVK, AC), pp. 261–268.
PPoPPPPoPP-2012-CaniouDRCA #constraints #parallel #performance
Performance analysis of parallel constraint-based local search (YC, DD, FR, PC, SA), pp. 337–338.
PPoPPPPoPP-2012-Mendez-LojoBP #gpu #implementation #points-to
A GPU implementation of inclusion-based points-to analysis (MML, MB, KP), pp. 107–116.
PPoPPPPoPP-2012-SimDKV #framework #identification #performance
A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
PPoPPPPoPP-2012-TzenakisPKPVN #dependence #named #parallel
BDDT: : block-level dynamic dependence analysis for deterministic task-based parallelism (GT, AP, JK, PP, HV, DSN), pp. 301–302.
STOCSTOC-2012-BrandtIKK
An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
STOCSTOC-2012-BrunschR #multi #optimisation
Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
STOCSTOC-2012-ChanP #bound #fourier #network
Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
TACASTACAS-2012-BouajjaniE #bound #message passing #source code
Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACASTACAS-2012-DSilvaHKT #bound #learning
Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACASTACAS-2012-FehnkerGHMPT #automation #using
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-FriedmannL #automaton
Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
TACASTACAS-2012-LoweW #contest
CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
TACASTACAS-2012-ShvedMM #contest
Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
TACASTACAS-2012-WangTGLS #formal method
Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
WRLAWRLA-2012-FadlisyahOA #formal method #modelling
Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, ), pp. 139–161.
WRLAWRLA-2012-WirsingEMM #architecture #design #maude
Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
CAVCAV-2012-BerdineCIW #abstraction
Diagnosing Abstraction Failure for Separation Logic-Based Analyses (JB, AC, SI, CMW), pp. 155–173.
CAVCAV-2012-BogomolovFGLPW #distance #reachability
A Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx (SB, GF, RG, HL, AP, MW), pp. 479–494.
CAVCAV-2012-HagueL #bound #parallel #source code #thread
Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
CAVCAV-2012-LeeWY #algorithm #learning #termination
Termination Analysis with Algorithmic Learning (WL, BYW, KY), pp. 88–104.
CAVCAV-2012-Venet #difference #invariant #linear #scalability
The Gauge Domain: Scalable Analysis of Linear Inequality Invariants (AV), pp. 139–154.
ICLPICLP-2012-Hanus #lazy evaluation #nondeterminism
Improving Lazy Non-Deterministic Computations by Demand Analysis (MH), pp. 130–143.
ICSTICST-2012-CunninghamHH #combinator #testing
A System Analysis Study Comparing Reverse Engineered Combinatorial Testing to Expert Judgment (AMCJ, JDH, RJH), pp. 630–635.
ICSTICST-2012-DanH #comparison #float #mutation testing #semantics
Semantic Mutation Analysis of Floating-Point Comparison (HD, RMH), pp. 290–299.
ICSTICST-2012-ElrakaibyMT #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICSTICST-2012-GuoSC #clustering #testing
Analysis of Test Clusters for Regression Testing (BG, MS, PC), p. 736.
ICSTICST-2012-JustKS #effectiveness #mutation testing #performance #question
Do Redundant Mutants Affect the Effectiveness and Efficiency of Mutation Analysis? (RJ, GMK, FS), pp. 720–725.
ICSTICST-2012-MalikK #graph #using
Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICSTICST-2012-MassicotteCNM #testing
A Testing Model for Dynamic Malware Analysis Systems (FM, MC, HN, FM), pp. 826–833.
ICSTICST-2012-MizanF #automation #performance
Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
ICSTICST-2012-PasareanuB #statechart
Statechart Analysis with Symbolic PathFinder (CSP, DB), p. 772.
ICSTICST-2012-PonsiniMR #abstract interpretation #constraints #float #programming #source code
Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
ICSTICST-2012-SiddiquiMK #constraints #data flow #lightweight #theorem proving
Lightweight Data-Flow Analysis for Execution-Driven Constraint Solving (JHS, DM, SK), pp. 91–100.
ICSTICST-2012-ZamanAH #empirical #performance #scalability
A Large Scale Empirical Study on User-Centric Performance Analysis (SZ, BA, AEH), pp. 410–419.
ICTSSICTSS-2012-Havelund
Requirements-Driven Log Analysis (KH), pp. 1–4.
IJCARIJCAR-2012-FosterS #algebra #automation
Automated Analysis of Regular Algebra (SF, GS), pp. 271–285.
IJCARIJCAR-2012-NikolicS #reachability
Reachability Analysis of Program Variables (DN, FS), pp. 423–438.
ISSTAISSTA-2012-AlkhalafCFBOK #consistency #difference #named #nondeterminism #string #validation
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
ISSTAISSTA-2012-SuiYX #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
ISSTAISSTA-2012-TombF #consistency #detection #nondeterminism #reachability
Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
ICSTSAT-2012-KottlerZSK #named #satisfiability
CoPAn: Exploring Recurring Patterns in Conflict Analysis of CDCL SAT Solvers — (SK, CZ, PS, MK), pp. 449–455.
TAPTAP-2012-SulzmannZ #finite #linear #logic
Constructive Finite Trace Analysis with Linear Temporal Logic (MS, AZ), pp. 132–148.
CBSECBSE-2011-DistefanoFGM #composition #multi #reliability #workflow
A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
CBSECBSE-2011-InoueH #component #data flow
A method for data-flow analysis of business components (TI, SH), pp. 51–60.
ECSAECSA-2011-AdmodisastroK #approach #architecture #black box #development
An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
QoSAQoSA-ISARCS-2011-HofigD #execution
Failure-dependent execution time analysis (KH, DD), pp. 115–122.
WICSAWICSA-2011-BrownNOP #architecture #dependence #release planning
Analysis and Management of Architectural Dependencies in Iterative Release Planning (NB, RLN, IO, MP), pp. 103–112.
WICSAWICSA-2011-Dobrica #architecture #integration #modelling #quality
Exploring Approaches of Integration Software Architecture Modeling with Quality Analysis Models (LD), pp. 113–122.
WICSAWICSA-2011-GanesanLCJJZ #architecture #re-engineering
Architecture Reconstruction and Analysis of Medical Device Software (DG, ML, RC, RPJ, PLJ, YZ), pp. 194–203.
WICSAWICSA-2011-GhezziG #architecture #as a service #lightweight #named
SOFAS: A Lightweight Architecture for Software Analysis as a Service (GG, HCG), pp. 93–102.
WICSAWICSA-2011-PetrovBN #architecture #design #enterprise #multi
The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
DocEngDocEng-2011-BeelL #mindmap
An exploratory analysis of mind maps (JB, SL), pp. 81–84.
DRRDRR-2011-LamiroyLKH #documentation #how #research #resource management
How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
DRRDRR-2011-SiddiqiKV #identification
Feature relevance analysis for writer identification (IS, KK, NV), pp. 1–10.
HTHT-2011-TakahashiOYIOT #using #wiki
Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDARICDAR-2011-AbediF #documentation #image #locality #string #using
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDARICDAR-2011-AbedWM #contest #documentation #overview #perspective #recognition
International Conference on Document Analysis and Recognition (ICDAR 2011) — Competitions Overview (HEA, LW, VM), pp. 1437–1443.
ICDARICDAR-2011-AhmedLWD #architecture #automation
Improved Automatic Analysis of Architectural Floor Plans (SA, ML, MW, AD), pp. 864–869.
ICDARICDAR-2011-AntonacopoulosCPP #contest #documentation #layout
Historical Document Layout Analysis Competition (AA, CC, CP, SP), pp. 1516–1520.
ICDARICDAR-2011-BaechlerI #layout #multi #using
Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDARICDAR-2011-BakerSSS #documentation
Comparing Approaches to Mathematical Document Analysis from PDF (JBB, APS, VS, MS), pp. 463–467.
ICDARICDAR-2011-BukhariSB11a #documentation #image #layout #performance
High Performance Layout Analysis of Arabic and Urdu Document Images (SSB, FS, TMB), pp. 1275–1279.
ICDARICDAR-2011-ChattopadhyaySSR #corpus
Creation and Analysis of a Corpus of Text Rich Indian TV Videos (TC, SS, AS, NR), pp. 849–853.
ICDARICDAR-2011-ChazalonCL #documentation #interactive #performance
Iterative Analysis of Pages in Document Collections for Efficient User Interaction (JC, BC, AL), pp. 503–507.
ICDARICDAR-2011-ClausnerPA11a #documentation #evaluation #layout #performance
Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
ICDARICDAR-2011-DiemKS #classification #documentation #layout
Text Classification and Document Layout Analysis of Paper Fragments (MD, FK, RS), pp. 854–858.
ICDARICDAR-2011-GalballyFMP #quality
Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
ICDARICDAR-2011-GarzSD #layout #using
Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDARICDAR-2011-KokawaBOWK #automation #classification #fault
An Impact of OCR Errors on Automated Classification of OCR Japanese Texts with Parts-of-Speech Analysis (AK, LSPB, WO, TW, FK), pp. 543–547.
ICDARICDAR-2011-KurbielKE #component #independence #novel #preprocessor
A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
ICDARICDAR-2011-LamiroyL #architecture #benchmark #documentation #metric
An Open Architecture for End-to-End Document Analysis Benchmarking (BL, DPL), pp. 42–47.
ICDARICDAR-2011-LamiroyLS #algorithm #contest #documentation
Document Analysis Algorithm Contributions in End-to-End Applications: Report on the ICDAR 2011 Contest (BL, DPL, TS), pp. 1521–1525.
ICDARICDAR-2011-LazzaraLGJMC #documentation #framework #image #platform
The SCRIBO Module of the Olena Platform: A Free Software Framework for Document Image Analysis (GL, RL, TG, YJ, JM, ACL), pp. 252–258.
ICDARICDAR-2011-MalleronE #approach #documentation
A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
ICDARICDAR-2011-XuYWL #using
Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
SIGMODSIGMOD-2011-CastellanosDHGDLZS #framework #named #platform #social
LCI: a social channel analysis platform for live customer intelligence (MC, UD, MH, RG, MD, YL, LZ, MS), pp. 1049–1058.
SIGMODSIGMOD-2011-FlaounasATSNBC #monitoring #named
NOAM: news outlets analysis and monitoring system (INF, OA, MT, TS, FN, TDB, NC), pp. 1275–1278.
SIGMODSIGMOD-2011-HanPLKY #graph #performance
iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
SIGMODSIGMOD-2011-KanagalLD #database #evaluation #probability #query #robust
Sensitivity analysis and explanations for robust query evaluation in probabilistic databases (BK, JL, AD), pp. 841–852.
SIGMODSIGMOD-2011-LiuRGGWAM #multi #named #query #sequence #using
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMODSIGMOD-2011-WeningerDFHHJKKLMSTWY #named #network
WINACS: construction and analysis of web-based computer science information networks (TW, MD, FF, JMH, JH, TJJ, SK, HK, ZL, DM, YS, NET, CW, XY), pp. 1255–1258.
TPDLTPDL-2011-ParkLLFSHAH #collaboration #empirical #library #research
Experiment and Analysis Services in a Fingerprint Digital Library for Collaborative Research (SHP, JL, LTL, EAF, NJS, KEH, ALA, MSH), pp. 179–191.
VLDBVLDB-2011-BudakAA #network #online #social
Structural Trend Analysis for Online Social Networks (CB, DA, AEA), pp. 646–656.
VLDBVLDB-2011-HuiKS #documentation #named #xml
HIWAS: Enabling Technology for Analysis of Clinical Data in XML Documents (JH, SEK, PS), pp. 1260–1271.
VLDBVLDB-2011-KarwaRSY #graph
Private Analysis of Graph Structure (VK, SR, AS, GY), pp. 1146–1157.
CSEETCSEET-2011-LuLL #using
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-TsukamotoTNM #motivation #programming
Analysis of the motivation of learners in the in-house training of programming in Japanese ICT industries (HT, YT, HN, KiM), pp. 121–128.
ITiCSEITiCSE-2011-Hijon-NeiraV #interactive
Merlin-Mo, an interactions analysis system for Moodle (RHN, JÁVI), p. 340.
ITiCSEITiCSE-2011-KleinKT #assessment #automation #semantics #using
Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ICPCICPC-J-2009-HsuH11 #comparison #estimation #relational
Comparison of weighted grey relational analysis for software effort estimation (CJH, CYH), pp. 165–200.
SCAMSCAM-J-2009-DesharnaisAS11 #identification #metric
Identification and analysis of attributes and base measures within ISO 9126 (JMD, AA, WS), pp. 447–460.
CSMRCSMR-2011-KohlKPDM #maintenance #multi #using
Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
ICPCICPC-2011-Ali #automation #named #retrieval #trust
Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
ICPCICPC-2011-Sharafi #architecture #visualisation
A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
ICSMEICSM-2011-PirzadehHS #execution #mining
Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
ICSMEICSM-2011-SnipesRM
Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
ICSMEICSM-2011-TorresTPWY #evolution #named #visual notation
Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
MSRMSR-2011-HindleEGM #automation #maintenance #process #topic
Automated topic naming to support cross-project analysis of software maintenance activities (AH, NAE, MWG, JM), pp. 163–172.
MSRMSR-2011-SadowskiLLZW #algorithm #empirical
An empirical analysis of the FixCache algorithm (CS, CL, ZL, XZ, EJWJ), pp. 219–222.
MSRMSR-2011-WangBD #debugging #eclipse
System compatibility analysis of Eclipse and Netbeans based on bug data (XOW, EB, PTD), pp. 230–233.
SCAMSCAM-2011-Gold #music #programming #source code
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
SCAMSCAM-2011-Keul
Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
SCAMSCAM-2011-PavluSK #alias #comparison #graph #precise #set
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
SCAMSCAM-2011-SfayhiS #interactive #visualisation #what
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
WCREWCRE-2011-GrantCS #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
ICALPICALP-v1-2011-BodlaenderJK #combinator #kernel #preprocessor
Preprocessing for Treewidth: A Combinatorial Analysis through Kernelization (HLB, BMPJ, SK), pp. 437–448.
ICALPICALP-v1-2011-BorosEFGMM #approximate #game studies #probability
Stochastic Mean Payoff Games: Smoothed Analysis and Approximation Schemes (EB, KME, MF, VG, KM, BM), pp. 147–158.
ICALPICALP-v2-2011-BrazdilKKV #bound #probability #recursion #runtime #source code
Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
FMFM-2011-BarringerH #domain-specific language #named #scala
TraceContract: A Scala DSL for Trace Analysis (HB, KH), pp. 57–72.
RTARTA-2011-FalkeKS #c #compilation #source code #termination #using
Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
RTARTA-2011-KochemsO #functional #linear #reachability #using
Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
SEFMSEFM-2011-EggersRNF #hybrid #satisfiability
Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
SEFMSEFM-2011-ErnstSR #empirical #interactive #proving #theorem proving #verification
Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving (GE, GS, WR), pp. 188–203.
SEFMSEFM-2011-FadlisyahOA #formal method #hybrid #modelling #object-oriented
Object-Oriented Formal Modeling and Analysis of Interacting Hybrid Systems in HI-Maude (MF, PCÖ, ), pp. 415–430.
SEFMSEFM-2011-ParrinoGGF #bound #data flow #satisfiability #verification
A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
SEFMSEFM-2011-Pedercini11a #development #policy
Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
ICFPICFP-2011-VardoulakisS #automaton
Pushdown flow analysis of first-class control (DV, OS), pp. 69–80.
CoGCIG-2011-AlviA #complexity #game studies
Complexity analysis and playing strategies for Ludo and its variant race games (FA, MAA), pp. 134–141.
CoGCIG-2011-ShakerYT #game studies #modelling #quality
Feature analysis for modeling game content quality (NS, GNY, JT), pp. 126–133.
DiGRADiGRA-2011-Asad #constraints #design #game studies
Meaning Making Through Constraint: Modernist Poetics and Game Design Analysis (MA).
DiGRADiGRA-2011-BelmanNF #design #game studies #named
Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games (JB, HN, MF).
DiGRADiGRA-2011-KrogerDQ #game studies #industrial #network
The game boy's network. A network analysis of the German digital games industry (SK, ED, TQ).
DiGRADiGRA-2011-SoppittM #comprehension #experience #using
Understanding Player Experience using Sequential Analysis (MS, GM).
FDGFDG-2011-CooperKMLBBFPp #metaprogramming #social
Analysis of social gameplay macros in the Foldit cookbook (SC, FK, IM, HL, JB, DB, JF, ZP, Fp), pp. 9–14.
FDGFDG-2011-LiuASCP #effectiveness
Feature-based projections for effective playtrace analysis (YEL, EA, RS, SC, ZP), pp. 69–76.
FDGFDG-2011-Martin
A spatial analysis of the JBA headquarters in Splinter Cell: Double Agent (PM0), pp. 123–130.
AGTIVEAGTIVE-2011-GalvaoZRWA #graph #knowledge-based
Knowledge-Based Graph Exploration Analysis (IG, EZ, AR, LW, MA), pp. 105–120.
CHICHI-2011-Bargas-AvilaH #challenge #empirical #experience #novel #user interface
Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
CHICHI-2011-BaumerT #distributed #process #video
Comparing activity theory with distributed cognition for video analysis: beyond “kicking the tires” (EPSB, BT), pp. 133–142.
CHICHI-2011-BragdonNLH #design #gesture #mobile
Experimental analysis of touch-screen gesture designs in mobile environments (AB, EN, YL, KH), pp. 403–412.
CHICHI-2011-FourneyMT #interactive #query #usability
Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
CHICHI-2011-GillVPJ #privacy #taxonomy
Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
CHICHI-2011-MaLD #perspective
Perceptual analysis of talking avatar head movements: a quantitative perspective (XM, BHL, ZD), pp. 2699–2702.
CHICHI-2011-WillettHHA #collaboration #named #visual notation
CommentSpace: structured support for collaborative visual analysis (WW, JH, JMH, MA), pp. 3131–3140.
CHICHI-2011-WobbrockFGH #parametricity #rank #using
The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
CSCWCSCW-2011-BardramD #process
Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
HCIDHM-2011-BenderiusMWW #modelling #optimisation #simulation
A Simulation Environment for Analysis and Optimization of Driver Models (OB, GM, KW, MW), pp. 453–462.
HCIDHM-2011-MarlerKJ #predict
Optimization-Based Posture Prediction for Analysis of Box Lifting Tasks (TM, LK, RJ), pp. 151–160.
HCIDHM-2011-SixiangCIL #3d #modelling #parametricity
3D Parametric Body Model Based on Chinese Female Anhtropometric Analysis (PS, CKC, WHI, AL), pp. 22–29.
HCIDHM-2011-TangwenF #architecture #cumulative #learning #polymorphism
Polymorphic Cumulative Learning in Integrated Cognitive Architectures for Analysis of Pilot-Aircraft Dynamic Environment (TY, SF), pp. 409–416.
HCIDHM-2011-WelkePRJ #how #modelling #validation #what
What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
HCIDUXU-v1-2011-HuangW #gesture #interactive #mobile #usability
Usability Analysis in Gesture Operation of Interactive E-Books on Mobile Devices (CHH, CMW), pp. 573–582.
HCIDUXU-v1-2011-Schmid #development #feedback #learning
Development of an Augmented Feedback Application to Support Motor Learning after Stroke: Requirement Analysis (SS), pp. 305–314.
HCIDUXU-v1-2011-YeratziotisSVN
Analysis of Emergent Use for Wellbeing Service Innovation (AY, CS, JV, MN), pp. 332–341.
HCIDUXU-v2-2011-Hsu11b #design
Analysis of Causal Relationships between Blog Design Criteria (CCH), pp. 13–19.
HCIDUXU-v2-2011-InversiniCB #assessment #case study #experience #risk management #usability #user interface
Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCIDUXU-v2-2011-Nakata #clustering #monitoring #usability
Clustering Analysis to Evaluate Usability of Work-Flow Systems and to Monitor Proficiency of Workers (TN), pp. 487–496.
HCIDUXU-v2-2011-PohlmeyerB
A Conjoint Analysis of Attributes Affecting the Likelihood of Technology Use (AEP, LTMB), pp. 303–312.
HCIHCD-2011-ChoiPJP #research #smarttech #state of the art
Scientometric Analysis of Research in Smart Clothing: State of the Art and Future Direction (KC, HP, ESJ, SP), pp. 500–508.
HCIHCD-2011-WangL11a #behaviour #design #evaluation
Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
HCIHCI-DDA-2011-CharfiEKM #automation #evaluation #human-computer #interactive #network #towards
Towards an Automatic Analysis of Interaction Data for HCI Evaluation Application to a Transport Network Supervision System (SC, HE, CK, FM), pp. 175–184.
HCIHCI-DDA-2011-InoueAN #modelling
Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work (SI, HA, KN), pp. 341–350.
HCIHCI-DDA-2011-KaelberM
From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications (CK, CM), pp. 258–267.
HCIHCI-ITE-2011-AbeOO #detection #image
Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
HCIHCI-ITE-2011-BarbuceanuADR #artificial reality #interactive #user interface
Attentive User Interface for Interaction within Virtual Reality Environments Based on Gaze Analysis (FB, CA, MD, ZR), pp. 204–213.
HCIHCI-ITE-2011-HsiaoJ #named #user interface
TiMBA — Tangible User Interface for Model Building and Analysis (CPH, BRJ), pp. 43–52.
HCIHCI-ITE-2011-InoueIFHIM
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues (MI, TI, NF, RH, TI, HM), pp. 259–267.
HCIHCI-MIIE-2011-KimHJHMJ #behaviour #using #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-UA-2011-LeeKJ #fault
Control Error Analysis of Computerized Operational Environment in Nuclear Power Plants (SJL, JK, SCJ), pp. 360–367.
HCIHCI-UA-2011-RhiuRJY
Analysis of Customer Satisfaction on the Stiffness of Outside Panels of Passenger Cars (IR, TR, BJ, MHY), pp. 257–265.
HCIHCI-UA-2011-YangCS #learning #recognition
Facial Expression Recognition for Learning Status Analysis (MTY, YJC, YCS), pp. 131–138.
HCIHCI-UA-2011-YoshimiMIKOT #database
Construction and Analysis of Database on Outer Cases of Medicines (HY, HM, AI, MK, MO, FT), pp. 226–231.
HCIHIMI-v1-2011-JeonKLW #security #smarttech
A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
HCIHIMI-v1-2011-JeonLW
Analysis of Content Filtering Software (WJ, YL, DW), pp. 548–557.
HCIHIMI-v1-2011-OhoriSNI
Construction of a Model for Discriminating between Electroencephalographic Patterns at the Time of Incorrect Inputs Based on Sensitivity Spectrum Analysis (RO, DS, YN, SI), pp. 618–626.
HCIHIMI-v1-2011-Pavel #authentication #case study #protocol
Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
HCIHIMI-v1-2011-TakahashiSHNIHKWK #process
Basic Study of Analysis of Human Brain Activities during Car Driving (NT, SS, YH, HN, HI, NH, SK, EW, SK), pp. 627–635.
HCIHIMI-v1-2011-VogelZO
Constructing Phylogenetic Trees Based on Intra-group Analysis of Human Mitochondrial DNA (IV, FZ, PO), pp. 165–169.
HCIHIMI-v2-2011-ItouOM #chat #word
Analysis on Relationship between Smiley and Emotional Word Included in Chat Text (JI, TO, JM), pp. 141–146.
HCIHIMI-v2-2011-KwackKC #mobile
Economic Analysis of SON-Enabled Mobile WiMAX (SK, JK, JC), pp. 268–277.
HCIHIMI-v2-2011-Otsuka #behaviour #comprehension #multimodal #people
Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
HCIHIMI-v2-2011-SagaTKTM #comparison #using
Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HCIIDGD-2011-GaoQ #distributed #simulation
Analysis of the Applied Pattern of Distributed Computing Used in Simulation (SfG, HQ), pp. 152–158.
HCIIDGD-2011-RigbyD #design #network #on the
On the Design of Organizational Network Analysis Software (JR, HD), pp. 550–555.
HCIIDGD-2011-YuSZ
Driving Distraction Analysis by ECG Signals: An Entropy Analysis (LY, XS, KZ), pp. 258–264.
VISSOFTVISSOFT-2011-BeckTD #design #visual notation
A visual analysis and design tool for planning software reengineerings (MB, JT, JD), pp. 1–8.
CAiSECAiSE-2011-KabicherR #process
Human-Centered Process Engineering Based on Content Analysis and Process View Aggregation (SK, SRM), pp. 467–481.
CAiSECAiSE-2011-MoserWHB #automation #categorisation #empirical #requirements #semantics
Requirements Management with Semantic Technology: An Empirical Study on Automated Requirements Categorization and Conflict Analysis (TM, DW, MH, SB), pp. 3–17.
CAiSECAiSE-2011-SchmidtJ #design #requirements #security #using
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
EDOCEDOC-2011-Bellamy-McIntyreLW #authentication #enterprise #modelling
OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
EDOCEDOC-2011-MelleriHM #modelling #standard #xml
Comparing Information Models in XML-based e-Business Standards — A Quantitative Analysis (IM, KH, JM), pp. 225–234.
ICEISICEIS-J-2011-ChangS11a #mobile #process #research #simulation
Research on Grid-Based Mobile Business Process and Analysis on Process Simulation (DC, LS), pp. 349–361.
ICEISICEIS-J-2011-Li11f #approach #case study #machine learning #type system #using
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-PereiraB11a #evaluation #lens #social
Seeing Social Software Analysis and Evaluation through the Lenses of Culture (RP, MCCB), pp. 374–387.
ICEISICEIS-J-2011-PhillisK #approach
A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
ICEISICEIS-v1-2011-ChenZ #bound
Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
ICEISICEIS-v1-2011-NiknafsSRR #comparative #predict
Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
ICEISICEIS-v1-2011-WeiY #behaviour #game studies #metric #security
Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
ICEISICEIS-v2-2011-CanoCSF #architecture #integration #multi #process #segmentation
Multisensory Architecture for Intelligent Surveillance Systems — Integration of Segmentation, Tracking and Activity Analysis (FAC, JCC, JSC, AFC), pp. 157–162.
ICEISICEIS-v2-2011-LivaniPR
Decision Support System for Cost-benefit Analysis in Service Provision (EL, EP, GR), pp. 198–203.
ICEISICEIS-v2-2011-Pang #quality
Analysis of Remote Quality Inspection System for Construction Projects (JP), pp. 341–344.
ICEISICEIS-v2-2011-TianZX #case study #network #social #using
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEISICEIS-v2-2011-WangJ #empirical
An Empirical Analysis of Beijing Public Transport Users’ Satisfaction Level (HW, LJ), pp. 384–388.
ICEISICEIS-v3-2011-Li11e #quality
Construction and Analysis of Service Quality Model for Beijing Urban Mass Transit (WL), pp. 541–543.
ICEISICEIS-v3-2011-NiZY #uml
Analysis of Requirement Capture based on UML (TN, ZZ, YY), pp. 313–317.
ICEISICEIS-v3-2011-QuG #identification #outsourcing #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
ICEISICEIS-v3-2011-ShenYZT #documentation #security
Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
ICEISICEIS-v3-2011-TangX #communication #modelling #network
Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure (ST, YX), pp. 184–189.
ICEISICEIS-v3-2011-Zhao #contest #industrial
The Competitive Strategy Analysis of Express Industry based on Time-based Competition (JZ), pp. 502–506.
ICEISICEIS-v3-2011-ZhouL #metric
A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
ICEISICEIS-v3-2011-ZongYTS #research #visual notation
Visual Analysis of Research on Acceptance of Information Technology (QJZ, QJY, LyT, HZS), pp. 415–420.
ICEISICEIS-v4-2011-CuiYZ #empirical #industrial #social
An Empirical Analysis of the Relationship between Social Consumption Demand Factors and the Cultural Industry in China (LC, HY, HZ), pp. 606–610.
ICEISICEIS-v4-2011-FarwickABRVH #architecture #automation #enterprise #maintenance #overview #requirements
Requirements for Automated Enterprise Architecture Model Maintenance — A Requirements Analysis based on a Literature Review and an Exploratory Survey (MF, BA, RB, SR, KV, IH), pp. 325–337.
ICEISICEIS-v4-2011-Feng11a #enterprise
Factorial Analysis to Measure Developing Ability of Listed Retail Enterprises (YF), pp. 553–556.
ICEISICEIS-v4-2011-Huang #empirical #industrial #statistics
Which is Better Innovative Investment — An Empirical Analysis of Statistics from Chinese Industrial Undertakings (ZH), pp. 617–628.
ICEISICEIS-v4-2011-ShiL
Analysis of the Economic Benefit of Used Batteries based on Reverse Logistics (XS, ZL), pp. 736–742.
ICEISICEIS-v4-2011-SunL #industrial
Brief Analysis on Profits Allocation of IOT Industry Chain (QS, XL), pp. 165–169.
ICEISICEIS-v4-2011-XiongLL #industrial
The Analysis of the Internet-of-things Industrial Chain based on Hypercycle Theory (QX, XL, YL), pp. 513–517.
ICEISICEIS-v4-2011-YangR #e-commerce
Cost Earnings Analysis on Aquatic Product e-Commerce (ZY, SR), pp. 111–115.
CIKMCIKM-2011-BespalovBQS #classification #n-gram #sentiment
Sentiment classification based on supervised latent n-gram analysis (DB, BB, YQ, AS), pp. 375–382.
CIKMCIKM-2011-CachedaCFF #algorithm #dataset #nearest neighbour
Improving k-nearest neighbors algorithms: practical application of dataset analysis (FC, VC, DF, VF), pp. 2253–2256.
CIKMCIKM-2011-GaoL #adaptation #classification #probability #sentiment #using
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-GottronAS #semantics
Insights into explicit semantic analysis (TG, MA, BS), pp. 1961–1964.
CIKMCIKM-2011-GuoZGS #aspect-oriented #multi #sentiment
Domain customization for aspect-oriented opinion analysis with multi-level latent sentiment clues (HG, HZ, ZG, ZS), pp. 2493–2496.
CIKMCIKM-2011-HeerschopGHFKJ #using
Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKMCIKM-2011-HsuC #component #independence #privacy
Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
CIKMCIKM-2011-KimKFL
Spectral analysis of a blogosphere (SWK, KNK, CF, JHL), pp. 2145–2148.
CIKMCIKM-2011-LiBS #named #network #online #social #towards
CASINO: towards conformity-aware social influence analysis in online social networks (HL, SSB, AS), pp. 1007–1012.
CIKMCIKM-2011-WangWLZZ #approach #classification #graph #hashtag #sentiment #topic #twitter
Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
CIKMCIKM-2011-YinHD #microblog #predict
Structural link analysis and prediction in microblogs (DY, LH, BDD), pp. 1163–1168.
ECIRECIR-2011-Carrillo-de-AlbornozPGD #mining #overview #rating #sentiment
A Joint Model of Feature Mining and Sentiment Analysis for Product Review Rating (JCdA, LP, PG, AD), pp. 55–66.
ECIRECIR-2011-KimC #web
An Analysis of Time-Instability in Web Search Results (JK, VRC), pp. 466–478.
ECIRECIR-2011-NunzioLM #multi
Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
ECIRECIR-2011-Rehurek #semantics
Subspace Tracking for Latent Semantic Analysis (RR), pp. 289–300.
ECIRECIR-2011-ZucconAR
Back to the Roots: Mean-Variance Analysis of Relevance Estimations (GZ, LA, KvR), pp. 716–720.
ICMLICML-2011-ChenPSDC #learning #process
The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning (BC, GP, GS, DBD, LC), pp. 361–368.
ICMLICML-2011-GhavamzadehLMH
Finite-Sample Analysis of Lasso-TD (MG, AL, RM, MWH), pp. 1177–1184.
KDDKDD-2011-ChenDWSNL #process
Activity analysis based on low sample rate smart meters (FC, JD, BW, SS, MRN, CTL), pp. 240–248.
KDDKDD-2011-GuerraVMA #approach #bias #realtime #sentiment
From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
KDDKDD-2011-Norton #power of
The power of analysis and data (DN), p. 784.
KDDKDD-2011-SinkovitsCSTRWB #data-driven #performance
Data intensive analysis on the gordon high performance data and compute system (RSS, PC, SS, MT, PR, NW, NB), pp. 747–748.
KDDKDD-2011-TanLTJZL #network #sentiment #social
User-level sentiment analysis incorporating social networks (CT, LL, JT, LJ, MZ, PL), pp. 1397–1405.
KDDKDD-2011-WangBB #component #matrix #multi
Common component analysis for multiple covariance matrices (HW, AB, DB), pp. 956–964.
KDDKDD-2011-WangLZ #keyword #rating
Latent aspect rating analysis without aspect keyword supervision (HW, YL, CZ), pp. 618–626.
KDIRKDIR-2011-BallesterosFDHG #dependence #using
Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIRKDIR-2011-CostantiniFP #framework #natural language #representation
A Framework for Structured Knowledge Extraction and Representation from Natural Language through Deep Sentence Analysis (SC, NF, AP), pp. 282–287.
KDIRKDIR-2011-OlegA #approach #clustering
Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
KDIRKDIR-2011-SethCRSB #query #similarity
A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
KEODKEOD-2011-GoczylaWWZ #framework
Analysis of Mapping within S-module Framework (KG, AW, WW, TZ), pp. 267–272.
KEODKEOD-2011-PinchukINDBP #distributed #semantics #visual notation
Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
KEODKEOD-2011-SeppalaN #modelling
Contextual Analysis and Modeling of Personal Wellness (AS, PN), pp. 202–207.
KMISKMIS-2011-CostantinoDFS #evaluation #nondeterminism #using
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMISKMIS-2011-SchauerZM #collaboration #enterprise #open source #tool support
A Feature-based Analysis of Open Source Tools for Enterprise 2.0 — Open Source Tools for Team Collaboration in SMEs (BS, MZ, RM), pp. 57–66.
MLDMMLDM-2011-AdolfHHCH #grid #power management
Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
MLDMMLDM-2011-JiangMY #sentiment #topic
Topic Sentiment Change Analysis (YJ, WM, CTY), pp. 443–457.
MLDMMLDM-2011-MohebzadaRR #constraints #generative
Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
MLDMMLDM-2011-PiatkowskaMNP #image #multi #semantics #using
A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSysRecSys-2011-Faridani #canonical #correlation #recommendation #sentiment #using
Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSysRecSys-2011-LeeL #behaviour #music #recommendation
My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
SEKESEKE-2011-AlmeidaMA #execution #process #using
Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKESEKE-2011-BadriT #control flow #dependence #empirical #testing
Empirical Analysis for Investigating the Effect of Control Flow Dependencies on Testability of Classes (MB, FT), pp. 475–480.
SEKESEKE-2011-ChangSWSP #component #design #social
Design of Component-based Slow Intelligence Systems and Application to Social Influence Analysis (SKC, YS, YW, CCS, TCP), pp. 9–16.
SEKESEKE-2011-ChenHS #adaptation #modelling #process #towards #validation
Towards Modeling and Validating Analysis Processes for Software Adaptation (XC, GH, LS), pp. 547–552.
SEKESEKE-2011-DoranTFG #architecture #nondeterminism #parametricity #reliability
Architecture-based Reliability Analysis With Uncertain Parameters (DD, MT, LF, SSG), pp. 629–634.
SEKESEKE-2011-El-KharboutlyG #architecture #concurrent #probability #reliability #using
Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKESEKE-2011-GaoGMTBK #complexity #component #configuration management #modelling #testing
Testing Configurable Component-Based Software — Configuration Test Modeling and Complexity Analysis (JG, JG, AM, CT, XB, DCK), pp. 495–502.
SEKESEKE-2011-GuedesV #case study #metamodelling #multi #requirements #uml #validation
Applying and Validating a UML Metamodel for the Requirements Analysis in Multi-Agent Systems: The AME-A Case Study (GTAG, RMV), pp. 746–751.
SEKESEKE-2011-GuoC #comparison #ontology #tool support #visualisation
A Comparison and Analysis of Some Ontology Visualization Tools (SSG, CWC), pp. 357–362.
SEKESEKE-2011-JuniorGM #architecture #product line #trade-off
A Meta-Process to Support Trade-Off Analysis in Software Product Line Architecture (EAdOJ, IMdSG, JCM), pp. 687–692.
SEKESEKE-2011-LiuL #parallel #petri net #pointer #thread
Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
SEKESEKE-2011-MoserWHB #automation #detection #empirical #requirements #semantics
Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
SEKESEKE-2011-SanfordWX #modelling #security #using
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-WuXKP #data mining #debugging #mining #named #reliability
BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports (LW, BX, GEK, RJP), pp. 95–100.
SIGIRSIGIR-2011-BelloginCC #hybrid #network #recommendation #self #social
Self-adjusting hybrid recommenders based on social network analysis (AB, PC, IC), pp. 1147–1148.
SIGIRSIGIR-2011-Campos #query #using #web
Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIRSIGIR-2011-FangSSKM #query
Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
SIGIRSIGIR-2011-KotovBWDT #modelling
Modeling and analysis of cross-session search tasks (AK, PNB, RWW, STD, JT), pp. 5–14.
SIGIRSIGIR-2011-Shokouhi #detection #query
Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
SIGIRSIGIR-2011-SilvaGVMF #effectiveness #self #sentiment
Effective sentiment stream analysis with self-augmenting training and demand-driven projection (ISS, JG, AV, WMJ, RF), pp. 475–484.
SIGIRSIGIR-2011-WangA #semantics
Temporal latent semantic analysis for collaboratively generated content: preliminary results (YW, EA), pp. 1145–1146.
SIGIRSIGIR-2011-WeerkampBKMBR #people
People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
SIGIRSIGIR-2011-WeiHL #framework #recommendation #semantics
A unified framework for recommendations based on quaternary semantic analysis (WC, WH, MLL), pp. 1023–1032.
SIGIRSIGIR-2011-YangYD #network #predict
Award prediction with temporal citation network analysis (ZY, DY, BDD), pp. 1203–1204.
SIGIRSIGIR-2011-YinHXD #microblog
Link formation analysis in microblogs (DY, LH, XX, BDD), pp. 1235–1236.
SIGIRSIGIR-2011-Zhai #modelling #statistics #topic
Beyond search: statistical topic models for text analysis (CZ), pp. 3–4.
BXBX-2011-Hermann #graph grammar #model transformation
Analysis of Model Transformations based on TGGs (FH), p. 52.
ECMFAECMFA-2011-ColomboKL #design #generative #modelling #problem #requirements #using
Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
ICMTICMT-2011-AmstelB #maintenance #model transformation
Model Transformation Analysis: Staying Ahead of the Maintenance Nightmare (MvA, MvdB), pp. 108–122.
ICMTICMT-2011-LepperT #optimisation #performance #visitor
Optimization of Visitor Performance by Reflection-Based Analysis (ML, BTyW), pp. 15–30.
MODELSMoDELS-2011-MaozRR #configuration management #consistency #diagrams #semantics
Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
MODELSMoDELS-2011-MaozRR11a #alloy #diagrams #named #revisited #using
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
PLEASEPLEASE-2011-ChastekDM #variability
Commonality and variability analysis for resource constrained organizations (GJC, PD, JDM), pp. 31–34.
ECOOPECOOP-2011-PrabhuMBIG #c++ #exception #interprocedural
Interprocedural Exception Analysis for C++ (PP, NM, GB, FI, AG), pp. 583–608.
OOPSLAOOPSLA-2011-DohertyHR #matlab
Kind analysis for MATLAB (JD, LJH, SR), pp. 99–118.
OOPSLAOOPSLA-2011-LiSD #concurrent #detection #named
SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
OOPSLAOOPSLA-2011-MadhavanK #approximate #null #verification
Null dereference verification via over-approximated weakest pre-conditions analysis (RM, RK), pp. 1033–1052.
OOPSLAOOPSLA-2011-SeweMSB #benchmark #design #java #metric #scala #virtual machine
Da capo con scala: design and analysis of a scala benchmark suite for the java virtual machine (AS, MM, AS, WB), pp. 657–676.
OOPSLAOOPSLA-2011-SridharanAPGTB #named #web
F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
TOOLSTOOLS-EUROPE-2011-CianconeFDMG #component #modelling #named #performance #reliability
KlaperSuite: An Integrated Model-Driven Environment for Reliability and Performance Analysis of Component-Based Systems (AC, AF, MLD, RM, VG), pp. 99–114.
AdaEuropeAdaEurope-2011-CoqR #ada #modelling #quality #source code
The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
AdaEuropeAdaEurope-2011-MedinaC #ada #design #distributed #modelling #realtime #uml
Model-Based Analysis and Design of Real-Time Distributed Systems with Ada and the UML Profile for MARTE (JLM, ÁGC), pp. 89–102.
LOPSTRLOPSTR-2011-Gallagher #logic programming #source code #using
Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
LOPSTRLOPSTR-2011-PilozziS #self #termination #using
Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
LOPSTRLOPSTR-2011-StroderESGF #complexity #linear #prolog #semantics #termination
A Linear Operational Semantics for Termination and Complexity Analysis of ISO Prolog (TS, FE, PSK, JG, CF), pp. 237–252.
PLDIPLDI-2011-BouajjaniDES #interprocedural #on the #source code
On inter-procedural analysis of programs with lists and data (AB, CD, CE, MS), pp. 578–589.
POPLPOPL-2011-CousotCL #array #automation #parametricity #scalability #segmentation
A parametric segmentation functor for fully automatic and scalable array content analysis (PC, RC, FL), pp. 105–118.
POPLPOPL-2011-HoffmannAH #multi
Multivariate amortized resource analysis (JH, KA, MH), pp. 357–370.
POPLPOPL-2011-LhotakC #performance #points-to
Points-to analysis with efficient strong updates (OL, KCAC), pp. 3–16.
POPLPOPL-2011-PrabhuRMH #named
EigenCFA: accelerating flow analysis with GPUs (TP, SR, MM, MWH), pp. 511–522.
POPLPOPL-2011-PrountzosMPM #graph #optimisation #parallel #source code
A shape analysis for optimizing parallel graph programs (DP, RM, KP, KSM), pp. 159–172.
PPDPPPDP-2011-BourdierC #network #policy #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDPPPDP-2011-EscobarKLMMNS #encryption #protocol #unification #using
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
QAPLQAPL-2011-AssouramouD #hybrid #probability
Analysis of Non-Linear Probabilistic Hybrid Systems (JA, JD), pp. 104–119.
QAPLQAPL-2011-LeitnerFischerL #modelling #named #quantum #safety #uml
QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
SASSAS-2011-BlackshearCSS #precise
The Flow-Insensitive Precision of Andersen’s Analysis in Practice (SB, BYEC, SS, MS), pp. 60–76.
SASSAS-2011-FlexederPS #assembly
Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
SASSAS-2011-MadhavanRV #abstract interpretation
Purity Analysis: An Abstract Interpretation Formulation (RM, GR, KV), pp. 7–24.
SASSAS-2011-ZulegerGSV #abstraction #bound #imperative #source code
Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
AdaSIGAda-2011-AbrahamCP #ada #quality
Improving quality of Ada software with range analysis (JA, JC, CP), pp. 7–8.
AdaSIGAda-2011-AbrahamCP11a #ada #quality
Improving quality of Ada software with range analysis (JA, JC, CP), pp. 69–74.
AdaSIGAda-2011-GaudelSPRDL #ada #design pattern #pattern matching #pattern recognition #performance #recognition
An Ada design pattern recognition tool for AADL performance analysis (VG, FS, AP, SR, PD, JL), pp. 61–68.
RERE-2011-CoteHSH #named #problem #requirements #uml
UML4PF — A tool for problem-oriented requirements analysis (IC, MH, HS, DH), pp. 349–350.
RERE-2011-DekhtyarDHHCK #on the #performance #requirements #statistics
On human analyst performance in assisted requirements tracing: Statistical analysis (AD, OD, JH, JHH, DC, WKK), pp. 111–120.
RERE-2011-KomssiKTLD #perspective #process
Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
RERE-2011-UbayashiKHT #bound #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
RERE-2011-WeverM #effectiveness #question #what
What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
ASEASE-2011-Dwyer #behaviour #testing
Unifying testing and analysis through behavioral coverage (MBD), p. 2.
ASEASE-2011-Ganai #precise #scalability
Scalable and precise symbolic analysis for atomicity violations (MKG), pp. 123–132.
ASEASE-2011-GanovKP #alloy #incremental #performance
A case for alloy annotations for efficient incremental analysis via domain specific solvers (SRG, SK, DEP), pp. 464–467.
ASEASE-2011-JustSK #compilation #java #mutation testing #named #performance
MAJOR: An efficient and extensible tool for mutation analysis in a Java compiler (RJ, FS, GMK), pp. 612–615.
ASEASE-2011-OsterSB #automation #requirements
Automating analysis of qualitative preferences in goal-oriented requirements engineering (ZJO, GRS, SB), pp. 448–451.
ASEASE-2011-OverbeyJ #difference #lightweight #refactoring #reuse #tool support
Differential precondition checking: A lightweight, reusable analysis for refactoring tools (JLO, REJ), pp. 303–312.
ASEASE-2011-PohlLP #algorithm #automation #comparison #feature model #modelling #performance
A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models (RP, KL, KP), pp. 313–322.
ASEASE-2011-ZurowskaD #modelling #named #uml
SAUML: A tool for symbolic analysis of UML-RT models (KZ, JD), pp. 604–607.
ESEC-FSEESEC-FSE-2011-LiCK #performance #points-to #using
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-MeneelyRW #empirical #quality
Does adding manpower also affect quality?: an empirical, longitudinal analysis (AM, PR, LW), pp. 81–90.
ESEC-FSEESEC-FSE-2011-RamamurthiRS #data flow #graph #probability #using
Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
ICSEICSE-2011-AdlerBRSSUZ #scalability #test coverage
Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
ICSEICSE-2011-CataldoH #development #empirical #feature model #integration
Factors leading to integration failures in global feature-oriented development: an empirical analysis (MC, JDH), pp. 161–170.
ICSEICSE-2011-Malik #graph #using
Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSEICSE-2011-NearMKJ #dependence #evaluation #lightweight
A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
ICSEICSE-2011-PirzadehH #behaviour #framework
A software behaviour analysis framework based on the human perception systems (HP, AHL), pp. 948–951.
ICSEICSE-2011-RamasubbuCBH #configuration management #multi #quality
Configuring global software teams: a multi-company analysis of project productivity, quality, and profits (NR, MC, RKB, JDH), pp. 261–270.
ICSEICSE-2011-SchmerlGDBC #case study #design #framework #named #platform
SORASCS: a case study in soa-based platform design for socio-cultural analysis (BRS, DG, VD, MWB, KMC), pp. 643–652.
ICSEICSE-2011-SumnerBZP #nondeterminism #performance
Coalescing executions for fast uncertainty analysis (WNS, TB, XZ, SP), pp. 581–590.
ICSEICSE-2011-XiaoZZ #data type
Tracking data structures for postmortem analysis (XX, JZ, CZ), pp. 896–899.
ICSEICSE-2011-Xue #automation #legacy #product line #re-engineering #variability
Reengineering legacy software products into software product line based on automatic variability analysis (YX), pp. 1114–1117.
SACSAC-2011-ClaycombS #authentication #formal method #ubiquitous
Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
SACSAC-2011-ClevenWW #design #performance #problem #process
Process performance management: illuminating design issues through a systematic problem analysis (AC, RW, FW), pp. 280–286.
SACSAC-2011-DingZ #forensics
Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
SACSAC-2011-ElahiY #heuristic #metric #requirements #trade-off
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
SACSAC-2011-GomiI
A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
SACSAC-2011-GutzmannLL #points-to
Feedback-driven points-to analysis (TG, JL, WL), pp. 1341–1342.
SACSAC-2011-HaBKBJ #network #perspective #social
Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
SACSAC-2011-HuangK #ad hoc #performance
Performance analysis of IEEE 802.11 ad hoc based broadcast (YHH, CYK), pp. 72–73.
SACSAC-2011-LammelPS #java #open source #scalability
Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
SACSAC-2011-LanLSH #algorithm #case study #classification #comparative #image
A comparative study and analysis on K-view based algorithms for image texture classification (YL, HL, ES, CCH), pp. 859–860.
SACSAC-2011-LiuZ11a #distance #performance #stack #worst-case
Stack distance based worst-case instruction cache performance analysis (YL, WZ), pp. 723–728.
SACSAC-2011-LuKNB #approach #embedded #realtime #simulation #statistics #validation
A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systems (YL, JK, TN, IB), pp. 711–716.
SACSAC-2011-MagalhaesS #performance
Root-cause analysis of performance anomalies in web-based applications (JPM, LMS), pp. 209–216.
SACSAC-2011-ManyD #evaluation #fault tolerance #scheduling
Fault tolerance evaluation and schedulability analysis (FM, DD), pp. 729–734.
SACSAC-2011-SinhaTKWG #mobile #resource management
Resource-aware ECG analysis on mobile devices (AS, HT, SK, ABW, MMG), pp. 1012–1013.
SACSAC-2011-VarelaABM #aspect-oriented #product line #requirements
Aspect-oriented analysis for software product lines requirements engineering (PV, JA, ISB, AMDM), pp. 667–674.
SACSAC-2011-YamamotoT #named #web
ImageAlert: credibility analysis of text-image pairs on the web (YY, KT), pp. 1724–1731.
SACSAC-2011-Zhang #constraints #geometry #graph #problem
Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
LDTALDTA-2011-GiegerichS #compilation
Yield grammar analysis in the Bellman’s GAP compiler (RG, GS), p. 7.
SLESLE-2011-KlintLP #towards #visualisation
Towards a One-Stop-Shop for Analysis, Transformation and Visualization of Software (PK, BL, AvdP), pp. 1–18.
ASPLOSASPLOS-2011-ChipounovKC #framework #multi #named #platform
S2E: a platform for in-vivo multi-path analysis of software systems (VC, VK, GC), pp. 265–278.
CASECASE-2011-BasileCC #automation
A discrete event model for the control and analysis of complex automated warehouse systems (FB, PC, JC), pp. 201–207.
CASECASE-2011-Gonzalez-CastoloL #fuzzy #nondeterminism
State uncertainty analysis of Fuzzy Timed DES (JCGC, ELM), pp. 600–606.
CASECASE-2011-JulvezMV #simulation #using
Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASECASE-2011-LeH #random
Marginal analysis on binary pairwise Gibbs random fields (TL, CNH), pp. 316–321.
CASECASE-2011-LemattreDFPS #architecture #design #reachability
Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
CASECASE-2011-QiaoWZ #clustering #modelling #tool support
Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting (YQ, NW, MZ), pp. 90–95.
CASECASE-2011-TalpasanuK #approach
Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
CASECASE-2011-WangLH #delivery #modelling
Modeling and analysis of care delivery services within patient rooms (JW, JL, PKH), pp. 537–542.
CCCC-2011-JoynerBS #array #bound
Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
CCCC-2011-NaeemL #alias #performance #set #summary #using
Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CCCC-2011-RimsadP #source code
Tainted Flow Analysis on e-SSA-Form Programs (AR, Md, FMQP), pp. 124–143.
CCCC-2011-RodriguezL #data flow #parallel
Actor-Based Parallel Dataflow Analysis (JR, OL), pp. 179–197.
CCCC-2011-SunZC #java #points-to #probability
Probabilistic Points-to Analysis for Java (QS, JZ, YC), pp. 62–81.
CGOCGO-2011-GreathouseLAB #data flow #distributed #scalability
Highly scalable distributed dataflow analysis (JLG, CL, TMA, VB), pp. 277–288.
CGOCGO-2011-HardekopfL #pointer
Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
CGOCGO-2011-LiuM #locality #problem #using
Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGOCGO-2011-NasreG #constraints #evaluation #performance #points-to
Prioritizing constraint evaluation for efficient points-to analysis (RN, RG), pp. 267–276.
DACDAC-2011-BayrakRBSI #automation #towards
A first step towards automatic application of power analysis countermeasures (AGB, FR, PB, FXS, PI), pp. 230–235.
DACDAC-2011-ChenKCH #multi #reliability
Reliability analysis and improvement for multi-level non-volatile memories with soft information (SLC, BRK, JNC, CTH), pp. 753–758.
DACDAC-2011-CoptyKN #architecture #performance #statistics #transaction
Transaction level statistical analysis for efficient micro-architectural power and performance studies (EC, GK, SN), pp. 351–356.
DACDAC-2011-Fey #data flow #multi
Orchestrated multi-level information flow analysis to understand SoCs (GF), pp. 284–285.
DACDAC-2011-GongYH #monte carlo #orthogonal #performance #probability
Fast non-monte-carlo transient noise analysis for high-precision analog/RF circuits by stochastic orthogonal polynomials (FG, HY, LH), pp. 298–303.
DACDAC-2011-HaddadN #grid #power management #using
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-HaoTSS #bound #performance #process
Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
DACDAC-2011-HsuLFWHHY #design #manycore #modelling #named
PowerDepot: integrating IP-based power modeling with ESL power analysis for multi-core SoC designs (CWH, JLL, SCF, CCW, SYH, WTH, JCY), pp. 47–52.
DACDAC-2011-JungMPL #3d #optimisation #reliability
TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC (MJ, JM, DZP, SKL), pp. 188–193.
DACDAC-2011-KoseF #algorithm #information retrieval #locality #performance
Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
DACDAC-2011-KuoSR #performance #reachability #source code #using
Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DACDAC-2011-LiuSCKKL #3d #optimisation
Full-chip TSV-to-TSV coupling analysis and optimization in 3D IC (CL, TS, JC, JK, JK, SKL), pp. 783–788.
DACDAC-2011-MillerBHDCB #testing #validation
A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
DACDAC-2011-OnaissiTLN #approach #performance
A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
DACDAC-2011-SunLT #approximate #grid #incremental #performance #power management
Efficient incremental analysis of on-chip power grid via sparse approximation (PS, XL, MYT), pp. 676–681.
DACDAC-2011-ThieleSYB #embedded #multi #synthesis
Thermal-aware system analysis and software synthesis for embedded multi-processors (LT, LS, HY, IB), pp. 268–273.
DACDAC-2011-ToettcherCTW #constraints
Biochemical oscillator sensitivity analysis in the presence of conservation constraints (JET, AC, BT, JW), pp. 806–811.
DACDAC-2011-YounKH #convergence
Global convergence analysis of mixed-signal systems (SY, JK, MH), pp. 498–503.
DATEDATE-2011-AndalamRG #source code
Pruning infeasible paths for tight WCRT analysis of synchronous programs (SA, PSR, AG), pp. 204–209.
DATEDATE-2011-BiKVSM #performance #statistics
Fast statistical analysis of RC nets subject to manufacturing variabilities (YB, KJvdK, JFV, LMS, NvdM), pp. 31–37.
DATEDATE-2011-BoghratiS #grid #performance #power management #random
A scaled random walk solver for fast power grid analysis (BB, SSS), pp. 38–43.
DATEDATE-2011-BonannoBS #energy #modelling #monitoring #optimisation #tool support
Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
DATEDATE-2011-BoosNSHHGKS
Strategies for initial sizing and operating point analysis of analog circuits (VB, JN, MS, SH, SH, HG, DK, RS), pp. 1672–1674.
DATEDATE-2011-ChenGSS #performance
Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
DATEDATE-2011-ChenO #fault #image #statistics
Diagnosing scan chain timing faults through statistical feature analysis of scan images (MC, AO), pp. 185–190.
DATEDATE-2011-ErbP #performance
A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
DATEDATE-2011-GielenMW #reliability
Analog circuit reliability in sub-32 nanometer CMOS: Analysis and mitigation (GGEG, EM, PHNDW), pp. 1474–1479.
DATEDATE-2011-HanJS
Clause simplification through dominator analysis (HH, HJ, FS), pp. 143–148.
DATEDATE-2011-KimYLAJ #3d #embedded #mobile #performance
A quantitative analysis of performance benefits of 3D die stacking on mobile and embedded SoC (DK, SY, SL, JHA, HJ), pp. 1333–1338.
DATEDATE-2011-KobayashiH #correlation #power management
An LOCV-based static timing analysis considering spatial correlations of power supply variations (SK, KH), pp. 559–562.
DATEDATE-2011-KozhikkottuVRD #named #performance #variability
VESPA: Variability emulation for System-on-Chip performance analysis (VJK, RV, AR, SD), pp. 2–7.
DATEDATE-2011-LiuV #generative #performance #source code #validation
Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
DATEDATE-2011-MaricauG #probability #reliability
Stochastic circuit reliability analysis (EM, GGEG), pp. 1285–1290.
DATEDATE-2011-MerrettAWZRMRLFA #modelling #monte carlo #performance #statistics #variability
Modelling circuit performance variations due to statistical variability: Monte Carlo static timing analysis (MM, PA, YW, MZ, DR, CM, SR, ZL, SBF, AA), pp. 1537–1540.
DATEDATE-2011-PerathonerLT #component #performance
Composing heterogeneous components for system-wide performance analysis (SP, KL, LT), pp. 842–847.
DATEDATE-2011-RaiYBCT #realtime #worst-case
Worst-case temperature analysis for real-time systems (DR, HY, IB, JJC, LT), pp. 631–636.
DATEDATE-2011-RossiTSM #fault #memory management #performance #reliability
Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
DATEDATE-2011-StattelmannBR #manycore #performance #simulation
Fast and accurate resource conflict simulation for performance analysis of multi-core systems (SS, OB, WR), pp. 210–215.
DATEDATE-2011-TsukiyamaF #algorithm #statistics
An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
DATEDATE-2011-VatajeluF #in memory #memory management #robust
Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
DATEDATE-2011-WuM #optimisation
Aging-aware timing analysis and optimization considering path sensitization (KCW, DM), pp. 1572–1577.
HPCAHPCA-2011-LeeSNY #order
Offline symbolic analysis to infer Total Store Order (DL, MS, SN, ZY), pp. 357–358.
HPCAHPCA-2011-ZhangO #architecture #gpu #performance
A quantitative performance analysis model for GPU architectures (YZ, JDO), pp. 382–393.
HPDCHPDC-2011-MinhW #parallel #performance #towards
Towards a profound analysis of bags-of-tasks in parallel systems and their performance impact (TNM, LW), pp. 111–122.
LCTESLCTES-2011-AlbertAGZ #parallel
Task-level analysis for a language with async/finish parallelism (EA, PA, SG, DZ), pp. 21–30.
LCTESLCTES-2011-AlthausAN #parametricity #performance #precise
Precise and efficient parametric path analysis (EA, SA, RN), pp. 141–150.
LCTESLCTES-2011-Cullmann #novel #persistent #theory and practice
Cache persistence analysis: a novel approachtheory and practice (CC), pp. 121–130.
PDPPDP-2011-CastroGMMFS #architecture #manycore #memory management #transaction
Analysis and Tracing of Applications Based on Software Transactional Memory on Multicore Architectures (MBC, KG, VMM, JFM, LGF, MS), pp. 199–206.
PDPPDP-2011-KotenkoSD #information management #security #social
Security Analysis of Information Systems Taking into Account Social Engineering Attacks (IVK, MS, ED), pp. 611–618.
PDPPDP-2011-ShaikhGLWS #visual notation
In Situ Power Analysis of General Purpose Graphical Processing Units (MZS, MG, WL, MW, SS), pp. 40–44.
PPoPPPPoPP-2011-DonaldsonKR #automation #named
SCRATCH: a tool for automatic analysis of dma races (AFD, DK, PR), pp. 311–312.
SOSPSOSP-2011-ChenSGK #design #enterprise #multi
Design implications for enterprise storage systems via multi-dimensional trace analysis (YC, KS, GRG, RHK), pp. 43–56.
ESOPESOP-2011-ChenMWC #linear
Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
ESOPESOP-2011-DeDN #data flow #source code
Dataflow Analysis for Datarace-Free Programs (AD, DD, RN), pp. 196–215.
ESOPESOP-2011-GuhaSK #type system #using
Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
ESOPESOP-2011-SotinJ #interprocedural #pointer #precise #stack
Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
FASEFASE-2011-BendispostoL #automation
Automatic Flow Analysis for Event-B (JB, ML), pp. 50–64.
FASEFASE-2011-KhanH #contract #dependence #modelling #on the #testing #using #visual notation
On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
FASEFASE-2011-TkachukR #automation #generative #web
Automated Driver Generation for Analysis of Web Applications (OT, SPR), pp. 326–340.
FoSSaCSFoSSaCS-2011-JaubertR #automaton #robust
Quantitative Robustness Analysis of Flat Timed Automata (RJ, PAR), pp. 229–244.
TACASTACAS-2011-GaravelLMS #distributed #process
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes (HG, FL, RM, WS), pp. 372–387.
TACASTACAS-2011-SeshiaK #named #tool support
GameTime: A Toolkit for Timing Analysis of Software (SAS, JK), pp. 388–392.
TACASTACAS-2011-TsitovichSWK #summary #termination
Loop Summarization and Termination Analysis (AT, NS, CMW, DK), pp. 81–95.
CADECADE-2011-AlbertiAR #automation #named #policy #security
ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
CADECADE-2011-FredriksonCJ #algorithm #approximate #behaviour #complexity
Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
CADECADE-2011-NoschinskiEG #complexity #dependence #framework #term rewriting
A Dependency Pair Framework for Innermost Complexity Analysis of Term Rewrite Systems (LN, FE, JG), pp. 422–438.
CAVCAV-2011-AtigBP
Getting Rid of Store-Buffers in TSO Analysis (MFA, AB, GP), pp. 99–115.
CAVCAV-2011-BabicRS #automaton
Malware Analysis with Tree Automata Inference (DB, DR, DS), pp. 116–131.
CAVCAV-2011-BardinHLLTV #framework
The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
CAVCAV-2011-BrazdilKK #bound #performance #probability #source code
Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
CAVCAV-2011-BrumleyJAS #framework #named #platform
BAP: A Binary Analysis Platform (DB, IJ, TA, EJS), pp. 463–469.
CAVCAV-2011-ChatterjeeHJS #algorithm #automaton #markov #process
Symbolic Algorithms for Qualitative Analysis of Markov Decision Processes with Büchi Objectives (KC, MH, MJ, NS), pp. 260–276.
CAVCAV-2011-GaneshKAGHE #detection #named #string #testing
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
CAVCAV-2011-Lahiri #composition #smt
SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
CSLCSL-2011-Aschieri
Transfinite Update Procedures for Predicative Systems of Analysis (FA), pp. 20–34.
ICLPICLP-2011-ChristiansenHLP #network #sequence
Bayesian Annotation Networks for Complex Sequence Analysis (HC, CTH, OTL, MP), pp. 220–230.
ICLPICLP-J-2011-CodishGBFG #constraints #integer #satisfiability #termination #using
SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLPICLP-J-2011-VoetsS #integer #logic programming #source code
Non-termination analysis of logic programs with integer arithmetics (DV, DDS), pp. 521–536.
ICSTICST-2011-CzerwonkaDNTT #case study #experience #named #predict
CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice — Experiences from Windows (JC, RD, NN, AT, AT), pp. 357–366.
ICSTICST-2011-EldhHP #design #testing
Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
ISSTAISSTA-2011-BalasubramanianPWKL #modelling #multi #named #statechart
Polyglot: modeling and analysis for multiple Statechart formalisms (DB, CSP, MWW, GK, MRL), pp. 45–55.
ISSTAISSTA-2011-LeS #detection #fault #generative
Generating analyses for detecting faults in path segments (WL, MLS), pp. 320–330.
ISSTAISSTA-2011-McGillDS #concept #modelling #scalability
Scalable analysis of conceptual data models (MJM, LKD, REKS), pp. 56–66.
ISSTAISSTA-2011-TateishiPT #higher-order #logic #monad #string
Path- and index-sensitive string analysis based on monadic second-order logic (TT, MP, OT), pp. 166–176.
ISSTAISSTA-2011-XiaoZ #encoding #geometry #java #performance #points-to
Geometric encoding: forging the high performance context sensitive points-to analysis for Java (XX, CZ), pp. 188–198.
ISSTAISSTA-2011-YanXR #alias #java
Demand-driven context-sensitive alias analysis for Java (DY, G(X, AR), pp. 155–165.
ISSTAISSTA-2011-YasmeenG #automation #framework
Automated framework for formal operator task analysis (AY, ELG), pp. 78–88.
LICSLICS-2011-Marion #complexity #type system
A Type System for Complexity Flow Analysis (JYM), pp. 123–132.
TAPTAP-2011-ChebaroKGJ #c #debugging #generative #slicing #testing
The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
VMCAIVMCAI-2011-GawlitzaLMSW #concurrent #process #reachability #source code
Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation (TMG, PL, MMO, HS, AW), pp. 199–213.
VMCAIVMCAI-2011-HooimeijerV #algorithm #automaton #evaluation #string
An Evaluation of Automata Algorithms for String Analysis (PH, MV), pp. 248–262.
VMCAIVMCAI-2011-KimC #abstract interpretation #string
String Analysis as an Abstract Interpretation (SWK, KMC), pp. 294–308.
VMCAIVMCAI-2011-SiegelG #formal method #message passing
Formal Analysis of Message Passing — (SFS, GG), pp. 2–18.
CBSECBSE-2010-FilieriGGM #component #multi #reliability
Reliability Analysis of Component-Based Systems with Multiple Failure Modes (AF, CG, VG, RM), pp. 1–20.
ECSAECSA-2010-KiwelekarJ #architecture #generative #ontology
Ontological Analysis for Generating Baseline Architectural Descriptions (AWK, RKJ), pp. 417–424.
DocEngDocEng-2010-TerradesTSRVJ #documentation #interactive #layout
Interactive layout analysis and transcription systems for historic handwritten documents (ORT, AHT, NS, VR, EV, AJ), pp. 219–222.
DRRDRR-2010-BallKSN #documentation #using
Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
TPDLECDL-2010-BiryukovD #community
Analysis of Computer Science Communities Based on DBLP (MB, CD), pp. 228–235.
TPDLECDL-2010-GippTB #clustering #proximity
Link Proximity Analysis — Clustering Websites by Examining Link Proximity (BG, AT, JB), pp. 449–452.
TPDLECDL-2010-HoareS #design #interface
Application of Session Analysis to Search Interface Design (CH, HS), pp. 208–215.
TPDLECDL-2010-Reitz0 #evolution #library
An Analysis of the Evolving Coverage of Computer Science Sub-fields in the DBLP Digital Library (FR, OH), pp. 216–227.
TPDLECDL-2010-SykesDBMRUF #library
A New Focus on End Users: Eye-Tracking Analysis for Digital Libraries (JS, MD, DB, EM, IR, , PF), pp. 510–513.
HTHT-2010-CartledgeN #graph
Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
HTHT-2010-MitzlaffBSH #network
Visit me, click me, be my friend: an analysis of evidence networks of user relationships in BibSonomy (FM, DB, GS, AH), pp. 265–270.
SIGMODSIGMOD-2010-Brown #array #overview #scalability
Overview of sciDB: large scale array storage, processing and analysis (PGB), pp. 963–968.
SIGMODSIGMOD-2010-HanSYY #approach #database #mining #network
Mining knowledge from databases: an information network analysis approach (JH, YS, XY, PSY), pp. 1251–1252.
VLDBVLDB-2010-BotanDDHMT #execution #named #semantics
SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
VLDBVLDB-2010-HaasJAXPJ #database #named
MCDB-R: Risk Analysis in the Database (SA, RJ, LLP, FX, CMJ, PJH), pp. 782–793.
VLDBVLDB-2010-MelnikGLRSTV #dataset #interactive #named
Dremel: Interactive Analysis of Web-Scale Datasets (SM, AG, JJL, GR, SS, MT, TV), pp. 330–339.
CSEETCSEET-2010-UsmanKHI
Pedagogical and Structural Analysis of SE Courses (MU, JIK, MH, NI), pp. 136–143.
EDMEDM-2010-BachmannGB #student
Tracking Students’ Inquiry Paths through Student Transition Analysis (MB, JDG, JB), pp. 269–270.
EDMEDM-2010-BakerG #difference #student
An Analysis of the Differences in the Frequency of Students’ Disengagement in Urban, Rural, and Suburban High Schools (RSJdB, SMG), pp. 11–20.
EDMEDM-2010-JeongBJH #behaviour #effectiveness #learning #markov #modelling #using
Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
EDMEDM-2010-KimC #case study #experience #learning #sentiment #student
Sentiment Analysis in Student Experiences of Learning (SMK, RAC), pp. 111–120.
EDMEDM-2010-KrugerMW #education #mining
A Data Model to Ease Analysis and Mining of Educational Data (AK, AM, BW), pp. 131–140.
EDMEDM-2010-RaiB #approach #case study #education #modelling
Analysis of a causal modeling approach: a case study with an educational intervention (DR, JEB), pp. 313–314.
EDMEDM-2010-RuppSC #game studies #learning #modelling #network #novel
Modeling Learning Trajectories with Epistemic Network Analysis: A Simulation-based Investigation of a Novel Analytic Method for Epistemic Games (AAR, SJS, YC), pp. 319–320.
EDMEDM-2010-XuR #learning #network #online #social
Peer Production of Online Learning Resources: A Social Network Analysis (BX, MR), pp. 315–316.
ITiCSEITiCSE-2010-Mirolo #learning #multi #recursion #student
Learning (through) recursion: a multidimensional analysis of the competences achieved by CS1 students (CM), pp. 160–164.
ITiCSEITiCSE-2010-SekiyaMY #education
Analysis of computer science related curriculum on LDA and Isomap (TS, YM, KY), pp. 48–52.
SIGITESIGITE-2010-UzubellLJ #assurance #information management
An analysis of the common body of knowledge of software assurance (SU, SL, KJ), pp. 125–130.
SIGITESIGITE-2010-WillisM #assessment
Centering resonance analysis: a potential tool for IT program assessment (CLW, SLM), pp. 135–142.
CSMRCSMR-2010-Koschke #incremental
Incremental Reflexion Analysis (RK), pp. 1–10.
CSMRCSMR-2010-LiuM #case study #data flow
Static Information Flow Analysis with Handling of Implicit Flows and a Study on Effects of Implicit Flows vs Explicit Flows (YL, AM), pp. 146–155.
CSMRCSMR-2010-MalikJAHFH #automation #comparison #enterprise #performance #scalability #testing
Automatic Comparison of Load Tests to Support the Performance Analysis of Large Enterprise Systems (HM, ZMJ, BA, AEH, PF, GH), pp. 222–231.
ICPCICPC-2010-OlszakJ #java #named
Featureous: A Tool for Feature-Centric Analysis of Java Software (AO, BNJ), pp. 44–45.
ICSMEICSM-2010-AryaniPH #case study #co-evolution #enterprise
Domain-based change propagation analysis: An enterprise system case study (AA, IDP, MH), pp. 1–9.
ICSMEICSM-2010-FisherDBR #context-sensitive grammar
Exploring the impact of context sensitivity on blended analysis (MFI, BD, SB, BGR), pp. 1–10.
ICSMEICSM-2010-ParandeK #dependence #open source
A longitudinal analysis of the dependency concentration in smaller modules for open-source software products (MAP, GK), pp. 1–5.
ICSMEICSM-2010-PerinGN #enterprise #java #transaction
Recovery and analysis of transaction scope from scattered information in Java Enterprise Applications (FP, TG, ON), pp. 1–10.
ICSMEICSM-2010-ZawawyKM
Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
MSRMSR-2010-ColacoMFH #developer
OSS developers context-specific Preferred Representational systems: A initial Neurolinguistic text analysis of the Apache mailing list (MCJ, MGM, MF, PHdS), pp. 126–129.
MSRMSR-2010-NiaBDF #network #open source
Validity of network analyses in Open Source Projects (RN, CB, PTD, VF), pp. 201–209.
PASTEPASTE-2010-AyewahP #null
Null dereference analysis in practice (NA, WP), pp. 65–72.
PASTEPASTE-2010-CalmanZ #induction #information retrieval #interprocedural
Interprocedural induction variable analysis based on interprocedural SSA form IR (SC, JZ), pp. 37–44.
SCAMSCAM-2010-EdvinssonLL #parallel #reachability
Parallel Reachability and Escape Analyses (ME, JL, WL), pp. 125–134.
SCAMSCAM-2010-GrantC #concept #source code
Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
SCAMSCAM-2010-Harman #source code #why
Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
WCREWCRE-2010-Boughanmi #multi
Multi-Language and Heterogeneously-licensed Software Analysis (FB), pp. 293–296.
WCREWCRE-2010-GanesanLRWLT #architecture
Architectural Analysis of Systems Based on the Publisher-Subscriber Style (DG, ML, LR, RW, VL, TT), pp. 173–182.
WCREWCRE-2010-Guerrouj #automation #concept #identifier #source code
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
WCREWCRE-2010-PerscheidSHGH #behaviour #online #runtime
Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
LATALATA-2010-Casadio
Agreement and Cliticization in Italian: A Pregroup Analysis (CC), pp. 166–177.
LATALATA-2010-MarschallR #algorithm #automaton #pattern matching #probability
Exact Analysis of Horspool’s and Sunday’s Pattern Matching Algorithms with Probabilistic Arithmetic Automata (TM, SR), pp. 439–450.
LATALATA-2010-Muscholl #automaton #communication
Analysis of Communicating Automata (AM), pp. 50–57.
IFMIFM-2010-MarronePV #dependence #inheritance #multi
Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
RTARTA-2010-OttoBEG #automation #bytecode #java #term rewriting #termination
Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
RTARTA-2010-ZanklK #complexity #composition
Modular Complexity Analysis via Relative Complexity (HZ, MK), pp. 385–400.
SEFMSEFM-2010-KokashKV #modelling #visual notation
Time and Data-Aware Analysis of Graphical Service Models in Reo (NK, CK, EPdV), pp. 125–134.
SEFMSEFM-2010-MassinkLBH #algebra #approach #process #scalability
A Scalable Fluid Flow Process Algebraic Approach to Emergency Egress Analysis (MM, DL, AB, MDH), pp. 169–180.
SEFMSEFM-2010-Powell #behaviour #modelling #scalability
Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
FLOPSFLOPS-2010-AvanziniM #complexity #graph grammar
Complexity Analysis by Graph Rewriting (MA, GM), pp. 257–271.
HaskellHaskell-2010-RamseyDJ #composition #data flow #library #named #reuse
Hoopl: a modular, reusable library for dataflow analysis and transformation (NR, JD, SLPJ), pp. 121–134.
ICFPICFP-2010-HoldermansH #higher-order #polymorphism
Polyvariant flow analysis with higher-ranked polymorphic types and higher-order effect operators (SH, JH), pp. 63–74.
AIIDEAIIDE-2010-Perkins #approach #composition #detection #game studies #realtime
Terrain Analysis in Real-Time Strategy Games: An Integrated Approach to Choke Point Detection and Region Decomposition (LP).
CoGCIG-2010-CiancariniF
Retrograde Analysis of Kriegspiel endgames (PC, GPF), pp. 411–418.
FDGFDG-2010-AndersenLABP
Gameplay analysis through state projection (EA, YEL, EA, FBG, ZP), pp. 1–8.
FDGFDG-2010-MilamE #design #game studies
Analysis of level design 'push & pull' within 21 games (DM, MSEN), pp. 139–146.
GT-VMTGT-VMT-2010-HermannCEK #equivalence #graph #performance #permutation #petri net
Efficient Analysis of Permutation Equivalence of Graph Derivations Based on Petri Nets (FH, AC, HE, BK).
ICGTICGT-2010-HermannEOG #behaviour #formal method #functional #graph grammar #model transformation
Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars (FH, HE, FO, UG), pp. 155–170.
ICGTICGT-2010-Modica #communication #formal method #modelling #petri net #platform
Formal Modeling and Analysis of Communication Platforms Like Skype Based on Petri Net Transformation Systems (TM), pp. 400–402.
CHICHI-2010-FreirePSG #interface #multi #named #network #visualisation
ManyNets: an interface for multiple network analysis and visualization (MF, CP, BS, JG), pp. 213–222.
CHICHI-2010-KapteinNM #consistency
Powerful and consistent analysis of likert-type ratingscales (MCK, CN, PM), pp. 2391–2394.
CHICHI-2010-PancieraPET #behaviour #lifecycle
Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
CHICHI-2010-ShengHKCD #effectiveness
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
CHICHI-2010-WeaverBSIL #artificial reality #empirical #order #using
An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CSCWCSCW-2010-BalakrishnanFKK #collaboration #information management #visualisation
Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
CSCWCSCW-2010-ScholandTP #network #social
Social language network analysis (AJS, YRT, JWP), pp. 23–26.
SOFTVISSOFTVIS-2010-AdamoliH #framework #named #performance #visualisation
Trevis: a context tree visualization & analysis framework and its use for classifying performance failure reports (AA, MH), pp. 73–82.
SOFTVISSOFTVIS-2010-BeckD10a #automation #distributed #towards #visualisation
Towards automated analysis and visualization of distributed software systems (MB, JD), pp. 213–214.
SOFTVISSOFTVIS-2010-KerrenJ #3d #diagrams #interactive #metric #roadmap
3D kiviat diagrams for the interactive analysis of software metric trends (AK, IJ), pp. 203–204.
CAiSECAiSE-2010-RamdoyalCH #concept #database #interactive #reverse engineering #user interface
Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis (RR, AC, JLH), pp. 332–347.
CAiSECAiSE-2010-SchonenbergJSA #simulation
Business Trend Analysis by Simulation (HS, JJ, NS, WMPvdA), pp. 515–529.
CAiSECAiSE-2010-StalhaneSB #case study #diagrams #safety #sequence chart
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
EDOCEDOC-2010-NarmanBKJ #hybrid #modelling #probability #quality #relational
Hybrid Probabilistic Relational Models for System Quality Analysis (PN, MB, JK, PJ), pp. 57–66.
ICEISICEIS-AIDSS-2010-CuzzocreaFP #abstraction #collaboration #effectiveness #flexibility #mining #process
Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
ICEISICEIS-AIDSS-2010-HusterB #evolution #industrial #ontology #visual notation
Visual Trend Analysis — Ontology Evolution Support for the Trend Related Industry Sector (JH, AB), pp. 46–53.
ICEISICEIS-DISI-2010-CaronD #case study
What-if Analysis in OLAP — With a Case Study in Supermarket Sales Data (EC, HD), pp. 208–213.
ICEISICEIS-HCI-2010-FerrazS #multi #named
GlobeOLAP — Improving the Geospatial Realism in Multidimensional Analysis Environment (VRTF, MTPS), pp. 99–107.
ICEISICEIS-ISAS-2010-HulstijnG
Risk Analysis for Inter-organizational Controls (JH, JG), pp. 314–320.
ICEISICEIS-ISAS-2010-IizukaIT #approach #effectiveness #process #re-engineering
Analysis of Effective Approach for Business Process re-Engineering — From the Perspective of Organizational Factors (KI, YI, KT), pp. 384–389.
ICEISICEIS-ISAS-2010-SetiawanS #process
Socialization of Work Practice through Business Process Analysis (MAS, SWS), pp. 165–170.
CIKMCIKM-2010-AjiWAG #modelling #using
Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKMCIKM-2010-BronBR #component #ranking
Ranking related entities: components and analyses (MB, KB, MdR), pp. 1079–1088.
CIKMCIKM-2010-GuanXZGY #classification #documentation #performance #reduction
Fast dimension reduction for document classification based on imprecise spectrum analysis (HG, BX, JZ, MG, TY), pp. 1753–1756.
CIKMCIKM-2010-GuoZGZS #mining #named
OpinionIt: a text mining system for cross-lingual opinion analysis (HG, HZ, ZG, XZ, ZS), pp. 1199–1208.
CIKMCIKM-2010-MadaniY #topic
Discovery of numerous specific topics via term co-occurrence analysis (OM, JY), pp. 1841–1844.
CIKMCIKM-2010-ShenWL #multi #summary #topic
Topic aspect analysis for multi-document summarization (CS, DW, TL), pp. 1545–1548.
CIKMCIKM-2010-XueCS #modelling #using
Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKMCIKM-2010-YangZ #multi
Language pyramid and multi-scale text analysis (SHY, HZ), pp. 639–648.
ECIRECIR-2010-UdupaK #canonical #correlation #equivalence #using
Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ICMLICML-2010-BoureauPL #recognition #visual notation
A Theoretical Analysis of Feature Pooling in Visual Recognition (YLB, JP, YL), pp. 111–118.
ICMLICML-2010-DillonBL #generative #learning
Asymptotic Analysis of Generative Semi-Supervised Learning (JVD, KB, GL), pp. 295–302.
ICMLICML-2010-LazaricGM #algorithm #classification #policy
Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
ICMLICML-2010-LazaricGM10a
Finite-Sample Analysis of LSTD (AL, MG, RM), pp. 615–622.
ICMLICML-2010-LiuNLL #graph #learning #relational
Learning Temporal Causal Graphs for Relational Time-Series Analysis (YL, ANM, ACL, YL), pp. 687–694.
ICMLICML-2010-LizotteBM #learning #multi #performance #random
Efficient Reinforcement Learning with Multiple Reward Functions for Randomized Controlled Trial Analysis (DJL, MHB, SAM), pp. 695–702.
ICMLICML-2010-TingHJ #convergence #graph
An Analysis of the Convergence of Graph Laplacians (DT, LH, MIJ), pp. 1079–1086.
ICMLICML-2010-WangZ
A New Analysis of Co-Training (WW, ZHZ), pp. 1135–1142.
ICPRICPR-2010-BoussellaaZABA #documentation #image #segmentation
Unsupervised Block Covering Analysis for Text-Line Segmentation of Arabic Ancient Handwritten Document Images (WB, AZ, HEA, AB, AMA), pp. 1929–1932.
ICPRICPR-2010-ChenSZCL #image
Color Image Analysis by Quaternion Zernike Moments (BC, HS, HZ, GC, LL), pp. 625–628.
ICPRICPR-2010-DonoserKB
Object Tracking by Structure Tensor Analysis (MD, SK, HB), pp. 2600–2603.
ICPRICPR-2010-DuboisPM #adaptation #component #composition #using
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-ElnakibECS #corpus
Dyslexia Diagnostics by Centerline-Based Shape Analysis of the Corpus Callosum (AE, AEB, MC, AES), pp. 261–264.
ICPRICPR-2010-FengY
Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
ICPRICPR-2010-Feschet #composition #geometry #multi #parametricity
Multiscale Analysis from 1D Parametric Geometric Decomposition of Shapes (FF), pp. 2102–2105.
ICPRICPR-2010-GarciaMS #performance
Theoretical Analysis of a Performance Measure for Imbalanced Data (VG, RAM, JSS), pp. 617–620.
ICPRICPR-2010-GilPT #adaptation #integration #visual notation
Analysis and Adaptation of Integration Time in PMD Camera for Visual Servoing (PG, JP, FT), pp. 311–315.
ICPRICPR-2010-IbrahimKKG #online #using #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-JagerPCC #3d #using
Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPRICPR-2010-Jean
Local Optical Operators for Subpixel Scene Analysis (YDJ), pp. 3448–3451.
ICPRICPR-2010-JingLYBY #kernel
Kernel Uncorrelated Adjacent-class Discriminant Analysis (XYJ, SL, YFY, LSB, JY), pp. 706–709.
ICPRICPR-2010-JirachawengHLYA #modelling
Residual Analysis for Fingerprint Orientation Modeling (SJ, ZH, JL, WYY, VA), pp. 1196–1199.
ICPRICPR-2010-KasiviswanathanBS #documentation #top-down
Top Down Analysis of Line Structure in Handwritten Documents (HK, GRB, SNS), pp. 2025–2028.
ICPRICPR-2010-KhushabaEAAM #fuzzy #locality #orthogonal
Orthogonal Locality Sensitive Fuzzy Discriminant Analysis in Sleep-Stage Scoring (RNK, RE, AA, AAA, SM), pp. 165–168.
ICPRICPR-2010-LiP10a #classification #monitoring #realtime
Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
ICPRICPR-2010-LiZXCG #documentation #multi #sentiment
Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
ICPRICPR-2010-MaalejADSB #3d #recognition
Local 3D Shape Analysis for Facial Expression Recognition (AM, BBA, MD, AS, SB), pp. 4129–4132.
ICPRICPR-2010-MakiharaY #clustering
Cluster-Pairwise Discriminant Analysis (YM, YY), pp. 577–580.
ICPRICPR-2010-MarcialisRT #detection
Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
ICPRICPR-2010-MaTW #random #using
Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPRICPR-2010-Meunier #assurance #automation #documentation #logic #quality
Automated Quality Assurance for Document Logical Analysis (JLM), pp. 253–256.
ICPRICPR-2010-OGorman #latency #speech
Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
ICPRICPR-2010-OReillyP #prototype #statistics
Prototype-Based Methodology for the Statistical Analysis of Local Features in Stereotypical Handwriting Tasks (CO, RP), pp. 1864–1867.
ICPRICPR-2010-PaclikLLD #classification #optimisation
ROC Analysis and Cost-Sensitive Optimization for Hierarchical Classifiers (PP, CL, TL, RPWD), pp. 2977–2980.
ICPRICPR-2010-PaivaJT #image #using
Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPRICPR-2010-PapadopoulosMKS #approach #image #learning #semantics #statistics
A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
ICPRICPR-2010-ParkY #approach #game studies #network #social
Social Network Approach to Analysis of Soccer Game (KJP, AY), pp. 3935–3938.
ICPRICPR-2010-PetersenK #estimation #modelling #process #statistics
Statistical Analysis of Kalman Filters by Conversion to Gauss-Helmert Models with Applications to Process Noise Estimation (AP, RK), pp. 2386–2389.
ICPRICPR-2010-PletschacherA #framework
The PAGE (Page Analysis and Ground-Truth Elements) Format Framework (SP, AA), pp. 257–260.
ICPRICPR-2010-QiaoC #3d #component #modelling #statistics #using
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-RahimBBP #sequence
Pelvic Organs Dynamic Feature Analysis for MRI Sequence Discrimination (MR, MEB, RB, NP), pp. 2496–2499.
ICPRICPR-2010-RomeroTV #corpus #image
Computer Assisted Transcription of Text Images: Results on the GERMANA Corpus and Analysis of Improvements Needed for Practical Use (VR, AHT, EV), pp. 2017–2020.
ICPRICPR-2010-SafayaniS #multi #recognition
Heteroscedastic Multilinear Discriminant Analysis for Face Recognition (MS, MTMS), pp. 4287–4290.
ICPRICPR-2010-SagheerNHS #component #novel #word
A Novel Handwritten Urdu Word Spotting Based on Connected Components Analysis (MWS, NN, CLH, CYS), pp. 2013–2016.
ICPRICPR-2010-SaidLF #2d #multi
Multiscale Analysis of Digital Segments by Intersection of 2D Digital Lines (MS, JOL, FF), pp. 4097–4100.
ICPRICPR-2010-SakarK #canonical #correlation #feature model #hybrid
A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
ICPRICPR-2010-ScandaliarisVS #comparative #detection #image #video
Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
ICPRICPR-2010-SertelCLSG #approach #detection #image
An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
ICPRICPR-2010-SethiC #motivation #probability #process #video
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
ICPRICPR-2010-SfikasHN #clustering #multi #using
Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPRICPR-2010-SmithW
A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
ICPRICPR-2010-SrikrishnanC #linear #using
Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPRICPR-2010-TawariT #speech
Speech Emotion Analysis in Noisy Real-World Environment (AT, MMT), pp. 4605–4608.
ICPRICPR-2010-TosunWSRM #component #image #independence
Joint Independent Component Analysis of Brain Perfusion and Structural Magnetic Resonance Images in Dementia (DT, MW, NS, HJR, BLM), pp. 2720–2723.
ICPRICPR-2010-UchidaL #recognition
Analysis of Local Features for Handwritten Character Recognition (SU, ML), pp. 1945–1948.
ICPRICPR-2010-VuYESHAY
Color Analysis for Segmenting Digestive Organs in VCE (HV, YY, TE, MS, KH, TA, KY), pp. 2468–2471.
ICPRICPR-2010-WangHL #incremental
Boosting Incremental Semi-supervised Discriminant Analysis for Tracking (HW, XH, CLL), pp. 2748–2751.
ICPRICPR-2010-WangWDTLG #interactive #video #web
Interactive Web Video Advertising with Context Analysis and Search (BW, JW, LYD, QT, HL, WG), pp. 3252–3255.
ICPRICPR-2010-WeissFM #3d #image #multi
Multiresolution Analysis of 3D Images Based on Discrete Distortion (KW, LDF, MMM), pp. 4093–4096.
ICPRICPR-2010-WilliamsTSB #multi #verification
Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
ICPRICPR-2010-YangGG #locality #recognition
Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
ICPRICPR-2010-YangSZ #multi #recognition #using
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-ZhangGA #linear
An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
ICPRICPR-2010-ZhangK #bound
Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
ICPRICPR-2010-ZhangZ #canonical #correlation #image #using
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
KDDKDD-2010-DurrantK #classification #linear
Compressed fisher linear discriminant analysis: classification of randomly projected data (RJD, AK), pp. 1119–1128.
KDDKDD-2010-MarchRG #algorithm #performance
Fast euclidean minimum spanning tree: algorithm, analysis, and applications (WBM, PR, AGG), pp. 603–612.
KDDKDD-2010-WangLZ #approach #overview #rating
Latent aspect rating analysis on review text data: a rating regression approach (HW, YL, CZ), pp. 783–792.
KDIRKDIR-2010-AchaKV #data mining #mining #modelling
Tactical Analysis Modeling through Data Mining — Pattern Discovery in Racket Sports (ATA, WAK, JKV), pp. 176–181.
KDIRKDIR-2010-CarulloB #machine learning #mining #web
Machine Learning and Link Analysis for Web Content Mining (MC, EB), pp. 156–161.
KDIRKDIR-2010-Codina-FilbaN #behaviour #internet #query #web
Collective Behaviour in Internet — Tendency Analysis of the Frequency of User Web Queries (JCF, DFN), pp. 168–175.
KDIRKDIR-2010-OzekiKT #multi #network
Multi-modal Analysis of Complex Network — Point Stimulus Response Depending on Its Location in the Network (TO, TK, YT), pp. 226–231.
KEODKEOD-2010-EynardMM #on the #ontology #using
On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KMISKMIS-2010-BrockV #data flow #semantics #using
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-Caballero-GilCM #clustering #information management #simulation #using
Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMISKMIS-2010-ScheibmayerIB #approach #framework #process
A Framework to Measure the Impact of Knowledge Process Supporting Technologies — An Integrated Approach for a Technology-oriented Business Benefit Analysis (MS, AI, MB), pp. 253–259.
KMISKMIS-2010-WiilGM #information management #network
CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
RecSysRecSys-2010-BerkovskyF #recommendation
Group-based recipe recommendations: analysis of data aggregation strategies (SB, JF), pp. 111–118.
SEKESEKE-2010-AlhassanCB #fault #network #people #social
Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
SEKESEKE-2010-CunhaCNAM #debugging #visual notation
A Visual Bug Report Analysis and Search Tool (CEAdC, YCC, PAdMSN, ESdA, SRdLM), pp. 742–747.
SEKESEKE-2010-El-Attar #case study #precise #robust #security
Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
SEKESEKE-2010-IbrahimWEF #development #off the shelf
Conflict Analysis in Commercial Off-The-Shelf (COTS) Based Development (HI, TW, AE, BHF), pp. 686–691.
SEKESEKE-2010-LuG #architecture #concurrent #performance #thread #web
Performance Analysis of a Web Server with Dynamic Thread Pool Architecture (JL, SSG), pp. 99–105.
SEKESEKE-2010-SarkarCCB #framework #object-oriented #requirements
Business-Object Oriented Requirements Analysis Framework for Data Warehouses (AS, SC, NC, SB), pp. 34–37.
SEKESEKE-2010-ThovexT #approach #modelling #multi #network #semantics #social
Dynamic and semantic social networks analysis: a new model based on a multidisciplinary approach (CT, FT), pp. 548–552.
SEKESEKE-2010-VilaMF #adaptation #qvt #strict #using
Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKESEKE-2010-WangHW #petri net #process
A Hierarchical Timed Coloured Petri Nets for BPMN-based Process Analysis (CHW, PSH, FJW), pp. 417–420.
SEKESEKE-2010-WangPACC #automation #process
An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
SIGIRSIGIR-2010-LiuWD #behaviour #comprehension #web
Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
SIGIRSIGIR-2010-LiuYHA #adaptation #performance #predict #sentiment
S-PLASA+: adaptive sentiment analysis with application to sales performance prediction (YL, XY, XH, AA), pp. 873–874.
SIGIRSIGIR-2010-LiZM #process
Exploring desktop resources based on user activity analysis (YL, XZ, XM), p. 700.
SIGIRSIGIR-2010-MuhrKG #clustering
Analysis of structural relationships for hierarchical cluster labeling (MM, RK, MG), pp. 178–185.
SIGIRSIGIR-2010-TorresHS #information retrieval #query
Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
SIGIRSIGIR-2010-WangZ #effectiveness #information retrieval #metric #on the #optimisation #statistics
On statistical analysis and optimization of information retrieval effectiveness metrics (JW, JZ), pp. 226–233.
ECMFAECMFA-2010-ColomboKL #case study #modelling #problem #requirements
Requirements Analysis and Modeling with Problem Frames and SysML: A Case Study (PC, FK, LL), pp. 74–89.
MODELSMoDELS-v1-2010-SchwarzlP #consistency #modelling #uml
Static- and Dynamic Consistency Analysis of UML State Chart Models (CS, BP), pp. 151–165.
SPLCSPLC-2010-FurtadoSR #game studies #product line
Streamlining Domain Analysis for Digital Games Product Lines (AWBF, ALMS, GLR), pp. 316–330.
OOPSLAOOPSLA-2010-AltmanAFM #performance #source code
Performance analysis of idle programs (ERA, MA, SF, NM), pp. 739–753.
OOPSLAOOPSLA-2010-Mendez-LojoMP #parallel #points-to
Parallel inclusion-based points-to analysis (MML, AM, KP), pp. 428–443.
OOPSLAOOPSLA-2010-OssherBSAACDVFK #architecture #challenge #concept #flexibility #modelling #research #tool support
Flexible modeling tools for pre-requirements analysis: conceptual architecture and research challenges (HO, RKEB, IS, DA, AAT, MC, MD, JdV, AF, SK), pp. 848–864.
OOPSLAOOPSLA-2010-RinardHMS #comprehension #statistics
Patterns and statistical analysis for understanding reduced resource computing (MCR, HH, SM, SS), pp. 806–821.
LOPSTRLOPSTR-2010-SchumannCL #synthesis
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System (JS, KC, AL), pp. 21–36.
LOPSTRLOPSTR-2010-StroderSG #dependence #logic programming #source code #termination
Dependency Triples for Improving Termination Analysis of Logic Programs with Cut (TS, PSK, JG), pp. 184–199.
LOPSTRLOPSTR-2010-VoetsS #logic programming #source code #using
Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PEPMPEPM-2010-LakhotiaBSM #bytecode #obfuscation
Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
PLDIPLDI-2010-BondBG #context-sensitive grammar #debugging #detection #named #performance
Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses (MDB, GZB, SZG), pp. 13–24.
PLDIPLDI-2010-RichardsLBV #behaviour #javascript #source code
An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
POPLPOPL-2010-ChaudhuriGL #source code
Continuity analysis of programs (SC, SG, RL), pp. 57–70.
PPDPPPDP-2010-TekleL #complexity #datalog #performance #precise #query
Precise complexity analysis for efficient datalog queries (KTT, YAL), pp. 35–44.
QAPLQAPL-2010-GuedemannO #modelling #probability #safety
Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
QAPLQAPL-2010-StefanekHB #parallel #performance
A new tool for the performance analysis of massively parallel computer systems (AS, RAH, JTB), pp. 159–181.
SASSAS-2010-AlbertAGPD #approach
From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis (EA, PA, SG, GP, DVRD), pp. 100–116.
SASSAS-2010-AmatoPS #abstract domain #component
Deriving Numerical Abstract Domains via Principal Component Analysis (GA, MP, FS), pp. 134–150.
SASSAS-2010-CheriniRB #data type
A Shape Analysis for Non-linear Data Structures (RC, LR, JOB), pp. 201–217.
SASSAS-2010-FarzanK #composition #concurrent #source code
Compositional Bitvector Analysis for Concurrent Programs with Nested Locks (AF, ZK), pp. 253–270.
SASSAS-2010-JensenMT #interprocedural #lazy evaluation
Interprocedural Analysis with Lazy Propagation (SHJ, AM, PT), pp. 320–339.
SASSAS-2010-NasreG #equation #linear #points-to
Points-to Analysis as a System of Linear Equations (RN, RG), pp. 422–438.
RERE-2010-Al-EmranPR #release planning #robust
Decision Support for Product Release Planning Based on Robustness Analysis (AAE, DP, GR), pp. 157–166.
RERE-2010-FrickerG #case study #comparison #requirements
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study (SF, MG), pp. 167–176.
RERE-2010-LockerbieBMBE #concept #modelling #simulation #using
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RERE-2010-SieglHG #modelling #requirements #testing
Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
RERE-2010-SinhaPTN #automation #case study #natural language
Extending Automated Analysis of Natural Language Use Cases to Other Languages (AS, AMP, HT, TN), pp. 364–369.
RERE-2010-Stanbridge #test coverage #testing #user interface #using
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RERE-2010-YangRGWN #ambiguity #natural language #requirements
Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (HY, ANDR, VG, AW, BN), pp. 25–34.
SACSAC-PL-J-2008-BussBSE10 #debugging #novel #pointer
A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
ASEASE-2010-FattoriPMM
Dynamic and transparent analysis of commodity production systems (AF, RP, LM, MM), pp. 417–426.
ASEASE-2010-IvanovOSV #behaviour #embedded #modelling #set #tool support
REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
ASEASE-2010-Letarte #graph #interprocedural #model checking #precise #representation
Model checking graph representation of precise boolean inter-procedural flow analysis (DL), pp. 511–516.
FSEFSE-2010-CossetteW #adaptation #dependence #lightweight #named #sketching
DSketch: lightweight, adaptable dependency analysis (BC, RJW), pp. 297–306.
FSEFSE-2010-HalleB #interactive #message passing #using
Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSEFSE-2010-LiCK #detection #effectiveness
Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
FSEFSE-2010-LitvakDBRS #dependence
Field-sensitive program dependence analysis (SL, ND, RB, NR, MS), pp. 287–296.
ICSEICSE-2010-Bodden #hybrid #performance #type system
Efficient hybrid typestate analysis by determining continuation-equivalent states (EB), pp. 5–14.
ICSEICSE-2010-CalikliBA #bias #developer #education #experience
An analysis of the effects of company culture, education and experience on confirmation bias levels of software developers and testers (, ABB, BA), pp. 187–190.
ICSEICSE-2010-Erdogmus #effectiveness #re-engineering
Cost effectiveness analysis in software engineering (HE), pp. 479–480.
ICSEICSE-2010-Ghezzi #named
SOFAS: software analysis services (GG), pp. 381–384.
ICSEICSE-2010-HumayunBFLA #development #education #empirical #overview #quality
An empirical analysis of team review approaches for teaching quality software development (AH, WB, GAF, FL, RA), pp. 567–575.
ICSEICSE-2010-LiebigALKS #product line #variability
An analysis of the variability in forty preprocessor-based software product lines (JL, SA, CL, CK, MS), pp. 105–114.
ICSEICSE-2010-LimQF10a #crowdsourcing #named #network #power of #social
StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis (SLL, DQ, AF), pp. 239–242.
ICSEICSE-2010-Ma #constraints #testing #theorem proving
Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
ICSEICSE-2010-Malik
A methodology to support load test analysis (HM), pp. 421–424.
ICSEICSE-2010-Nagappan #execution
Analysis of execution log files (MN), pp. 409–412.
SACSAC-2010-BayerKK #performance
Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
SACSAC-2010-CappelliCGL #requirements #security
Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
SACSAC-2010-ChakrabartiCGM #linear #privacy
Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
SACSAC-2010-ChokshiB #calculus #performance #realtime #revisited #using
Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SACSAC-2010-ClaycombS #framework #security
A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
SACSAC-2010-DongD #probability
Analysis of collision probability in unsaturated situation (QD, WD), pp. 772–777.
SACSAC-2010-GravinoTS #comprehension #empirical #modelling #source code
An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
SACSAC-2010-GuermaziHH #classification #image #using #web
Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SACSAC-2010-HansenS #implementation #optimisation #reachability
Reachability analysis of GSPDIs: theory, optimization, and implementation (HAH, GS), pp. 2511–2516.
SACSAC-2010-KhakpourKSJ #adaptation #formal method #self
Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
SACSAC-2010-MalkowskiJHPKP #benchmark #database #empirical #metric #scalability #using
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SACSAC-2010-MassinkHL #behaviour #scalability
Scalable analysis of collective behaviour in smart service systems (MM, MDH, DL), pp. 1173–1180.
SACSAC-2010-PopeeaC #debugging #proving #safety
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
SACSAC-2010-StoffelSKK #documentation #using #visual notation
Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SACSAC-2010-ZhangZ #canonical #correlation #random
Canonical random correlation analysis (JZ, DZ), pp. 1111–1112.
LDTALDTA-2009-DennisJW10 #algorithm #automation #memory management #named
SLAMM — Automating Memory Analysis for Numerical Algorithms (JMD, ERJ, WMW), pp. 89–104.
GPCEGPCE-2010-SinceroTLS #performance #variability
Efficient extraction and analysis of preprocessor-based variability (JS, RT, DL, WSP), pp. 33–42.
LDTALDTA-2010-CruzHP #named #online #verification
GamaSlicer: an online laboratory for program verification and analysis (DCdC, PRH, JSP), p. 3.
SLESLE-2010-FavreGLP #empirical
Empirical Language Analysis in Software Linguistics (JMF, DG, RL, EP), pp. 316–326.
SLESLE-2010-HerrmannsdoerferRK #identification #metamodelling
Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
ASPLOSASPLOS-2010-GoodsteinVCGKM #adaptation #data flow #monitoring #parallel
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring (MLG, EV, SC, PBG, MAK, TCM), pp. 257–270.
CASECASE-2010-AhnM #behaviour #clustering #modelling #tool support
Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
CASECASE-2010-AshrafTANBT #array #delivery
Structural and microfluidic analysis of MEMS based out-of-plane hollow silicon microneedle array for drug delivery (MWA, ST, NA, AN, ELB, AT), pp. 258–262.
CASECASE-2010-CaiM #approach #hybrid #industrial #process
Dwell-time approach to stability analysis for hybrid control systems: Application to an industrial refrigeration process (CC, SM), pp. 728–733.
CASECASE-2010-ChenWZZF #performance #process #towards
Towards performance analysis of wheel loading process in automotive manufacturing (HC, JW, BZ, GZ, TAF), pp. 234–239.
CASECASE-2010-DhupatiKRR #detection #novel #speech #using #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-GuoZW
Directed motion of an atomic scale engine and stability analysis (YG, WZ, ZW), pp. 545–550.
CASECASE-2010-HuSF #biology #using
Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASECASE-2010-IshiiONTOTM #image #using
Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASECASE-2010-LiH #framework #modelling #problem
Modeling and analysis of hospital emergency department: An analytical framework and problem formulation (JL, PKH), pp. 897–902.
CASECASE-2010-PintoKK #modelling #probability
A model-based end-to-end toolchain for the probabilistic analysis of complex systems (AP, SK, SK), pp. 994–1000.
CASECASE-2010-RodriguezBMRW #assembly #detection
Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
CASECASE-2010-SouzaPC #distributed #implementation #network #predict
Distributed model predictive control applied to urban traffic networks: Implementation, experimentation, and analysis (FAdS, VBP, EC), pp. 399–405.
CASECASE-2010-TahersimaSRN
Thermal analysis of an HVAC system with TRV controlled hydronic radiator (FT, JS, HR, PGN), pp. 756–761.
CASECASE-2010-Zhang #design #exponential
Kanban-controlled exponential production lines: Analysis and design (LZ), pp. 445–450.
CASECASE-2010-ZhangWPTCPJ
Micro-thermal-fluid transient analysis and active control for two-phase microelectronics cooling (TZ, JTW, YP, TT, JYC, RP, MKJ), pp. 750–755.
CCCC-2010-JiangZTS #distance #locality #multi #question #reuse
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors? (YJ, EZZ, KT, XS), pp. 264–282.
CCCC-2010-LogozzoV #abstract interpretation #agile #javascript #named #optimisation
RATA: Rapid Atomic Type Analysis by Abstract Interpretation — Application to JavaScript Optimization (FL, HV), pp. 66–83.
CGOCGO-2010-LindermanHDMN #automation #optimisation #precise #towards
Towards program optimization through automated analysis of numerical precision (MDL, MH, DLD, THYM, GPN), pp. 230–237.
CGOCGO-2010-PatilPSLC #framework #named #parallel #source code
PinPlay: a framework for deterministic replay and reproducible analysis of parallel programs (HP, CP, MS, GL, JC), pp. 2–11.
CGOCGO-2010-PriceV #scalability
Large program trace analysis and compression with ZDDs (GDP, MV), pp. 32–41.
CGOCGO-2010-YuXHFZ #pointer #scalability
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
DACDAC-2010-DadgourHSB #design #energy #logic #using
Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DACDAC-2010-FengZ #grid #parallel #power management #robust
Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis (ZF, ZZ), pp. 661–666.
DACDAC-2010-FonsecaDBGPVB #reliability #simulation #statistics
A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
DACDAC-2010-GaoYWY #correlation #estimation #performance #statistics
Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
DACDAC-2010-GlassLHT #reliability #scalability #towards
Towards scalable system-level reliability analysis (MG, ML, CH, JT), pp. 234–239.
DACDAC-2010-HorowitzJLLLM #equivalence #modelling
Fortifying analog models with equivalence checking and coverage analysis (MH, MJ, FL, SL, BL, JM), pp. 425–430.
DACDAC-2010-HsuLML #flexibility
Static timing analysis for flexible TFT circuits (CHH, CL, EHM, JCML), pp. 799–802.
DACDAC-2010-JuHRC #multi #source code
Timing analysis of esterel programs on general-purpose multiprocessors (LJ, BKH, AR, SC), pp. 48–51.
DACDAC-2010-LiuYT #algorithm #performance #robust #scalability
A robust periodic arnoldi shooting algorithm for efficient analysis of large-scale RF/MM ICs (XL, HY, SXDT), pp. 573–578.
DACDAC-2010-Miskov-ZivanovM #formal method #modelling #reasoning #reliability
Formal modeling and reasoning for reliability analysis (NMZ, DM), pp. 531–536.
DACDAC-2010-ObergHITSK #data flow
Theoretical analysis of gate level information flow tracking (JO, WH, AI, MT, TS, RK), pp. 244–247.
DACDAC-2010-SchranzhoferPCTC #manycore #modelling #resource management #worst-case
Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
DACDAC-2010-ShenTX #algorithm #correlation #linear #power management #statistics
A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
DACDAC-2010-SilvaPS #modelling #parametricity
Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
DACDAC-2010-TangZBM #simulation #statistics
RDE-based transistor-level gate simulation for statistical static timing analysis (QT, AZ, MB, NvdM), pp. 787–792.
DACDAC-2010-XieNXZLWYWL #fault
Crosstalk noise and bit error rate analysis for optical network-on-chip (YX, MN, JX, WZ, QL, XW, YY, XW, WL), pp. 657–660.
DACDAC-2010-YangALLP #3d #layout #optimisation
TSV stress aware timing analysis with applications to 3D-IC layout optimization (JSY, KA, YJL, SKL, DZP), pp. 803–806.
DACDAC-2010-YoonCPC #comparative #multi #network #physics
Virtual channels vs. multiple physical networks: a comparative analysis (YJY, NC, MP, LPC), pp. 162–165.
DACDAC-2010-ZengYFL #delivery #network #optimisation #power management #trade-off
Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation (ZZ, XY, ZF, PL), pp. 831–836.
DACDAC-2010-ZhangLH
Separatrices in high-dimensional state space: system-theoretical tangent computation and application to SRAM dynamic stability analysis (YZ, PL, GMH), pp. 567–572.
DACDAC-2010-ZuberDM #approach #statistics
A holistic approach for statistical SRAM analysis (PZ, PD, MM), pp. 717–722.
DATEDATE-2010-BauerSF #network #worst-case
Worst-case end-to-end delay analysis of an avionics AFDX network (HB, JLS, CF), pp. 1220–1224.
DATEDATE-2010-CastrillonVSSCLAM
Trace-based KPN composability analysis for mapping simultaneous applications to MPSoC platforms (JC, RV, AS, WS, JC, RL, GA, HM), pp. 753–758.
DATEDATE-2010-ChanHBBC #named #network
PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks (JC, GH, AB, KB, LPC), pp. 691–696.
DATEDATE-2010-ChenDS #algorithm
Properties of and improvements to time-domain dynamic thermal analysis algorithms (XC, RPD, LS), pp. 1165–1170.
DATEDATE-2010-DietrichEH #statistics #using
Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATEDATE-2010-GuglielmoFP
Vacuity analysis for property qualification by mutation of checkers (LDG, FF, GP), pp. 478–483.
DATEDATE-2010-HatamiP #component #library #performance #representation #robust #using
Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATEDATE-2010-JaffariA10a #correlation #performance #variability
Correlation controlled sampling for efficient variability analysis of analog circuits (JJ, MA), pp. 1305–1308.
DATEDATE-2010-KanoriaMM #markov #monte carlo #statistics #using
Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATEDATE-2010-KlobedanzKT0 #case study #development #modelling
Timing modeling and analysis for AUTOSAR-based software development — a case study (KK, CK, AT, WM), pp. 642–645.
DATEDATE-2010-LakshmananBR
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems (KL, GB, RR), pp. 331–334.
DATEDATE-2010-LarsenLNP #realtime #synthesis #using
Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATEDATE-2010-LiSBNO #implementation
Power Variance Analysis breaks a masked ASIC implementation of AES (YL, KS, LB, DN, KO), pp. 1059–1064.
DATEDATE-2010-LomneDMTR #difference #preprocessor #statistics
Differential Power Analysis enhancement with statistical preprocessing (VL, AD, PM, LT, MR), pp. 1301–1304.
DATEDATE-2010-LuckenbillLHMH #algorithm #fault #logic #named #reliability
RALF: Reliability Analysis for Logic Faults — An exact algorithm and its applications (SBL, JYL, YH, RM, LH), pp. 783–788.
DATEDATE-2010-PellizzoniSCCT #manycore #memory management
Worst case delay analysis for memory interference in multicore systems (RP, AS, JJC, MC, LT), pp. 741–746.
DATEDATE-2010-QaziTDSC #performance #reduction
Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
DATEDATE-2010-RitheGWDGBC #logic #statistics
Non-linear Operating Point Statistical Analysis for Local Variations in logic timing at low voltage (RR, JG, AW, SD, GG, DB, AC), pp. 965–968.
DATEDATE-2010-SchlieckerNE #bound #multi #performance
Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
DATEDATE-2010-WieckowskiSBCIPA #black box
A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
DATEDATE-2010-ZuberMDZJ #statistics
Statistical SRAM analysis for yield enhancement (PZ, MM, PD, KvdZ, JHJ), pp. 57–62.
HPDCHPDC-2010-DunlavySS #modelling #named #scalability
ParaText: scalable text modeling and analysis (DMD, TMS, ETS), pp. 344–347.
HPDCHPDC-2010-SonmezYAIE #clustering #multi #performance #scheduling #workflow
Performance analysis of dynamic workflow scheduling in multicluster grids (OOS, NY, SA, AI, DHJE), pp. 49–60.
LCTESLCTES-2010-AltmeyerMR #bound
Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
LCTESLCTES-2010-BiehlCT #development #embedded #modelling #safety
Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
LCTESLCTES-2010-ForoozannejadHHG #streaming
Look into details: the benefits of fine-grain streaming buffer analysis (MHF, MH, TLH, SG), pp. 27–36.
LCTESLCTES-2010-LiXLZ #approximate #architecture #memory management
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture (ML, CJX, TL, YZ), pp. 1–8.
LCTESLCTES-2010-PerathonerRTLR #modelling #performance
Modeling structured event streams in system level performance analysis (SP, TR, LT, KL, JR), pp. 37–46.
LCTESLCTES-2010-SchlicklingP #automation #modelling
Semi-automatic derivation of timing models for WCET analysis (MS, MP), pp. 67–76.
OSDIOSDI-2010-AttariyanF #automation #data flow #information management
Automating Configuration Troubleshooting with Dynamic Information Flow Analysis (MA, JF), pp. 237–250.
OSDIOSDI-2010-Boyd-WickizerCMPKMZ #linux #scalability
An Analysis of Linux Scalability to Many Cores (SBW, ATC, YM, AP, MFK, RM, NZ), pp. 1–16.
PDPPDP-2010-CuencaGGQ #compilation #manycore #performance
Analysis of the Influence of the Compiler on Multicore Performance (JC, LPG, DG, MQ), pp. 170–174.
PDPPDP-2010-LeoAGZ #clustering #data transformation #throughput #using
Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
PPoPPPPoPP-2010-Chakrabarti #abstraction #effectiveness #performance #source code
New abstractions for effective performance analysis of STM programs (DRC), pp. 333–334.
PPoPPPPoPP-2010-RomeinBMN #implementation #performance
The LOFAR correlator: implementation and performance analysis (JWR, PCB, JDM, RvN), pp. 169–178.
ESOPESOP-2010-Atkey #logic
Amortised Resource Analysis with Separation Logic (RA), pp. 85–103.
ESOPESOP-2010-HoffmannH #polynomial
Amortized Resource Analysis with Polynomial Potential (JH, MH), pp. 287–306.
ESOPESOP-2010-VardoulakisS #approach #control flow #named
CFA2: A Context-Free Approach to Control-Flow Analysis (DV, OS), pp. 570–589.
FASEFASE-2010-BerardinelliCM #mobile #modelling #performance
Performance Modeling and Analysis of Context-Aware Mobile Software Systems (LB, VC, ADM), pp. 353–367.
FASEFASE-2010-BeyerHTZ #refinement
Shape Refinement through Explicit Heap Analysis (DB, TAH, GT, DZ), pp. 263–277.
FASEFASE-2010-EhrigERBP #formal method #self #verification
Formal Analysis and Verification of Self-Healing Systems (HE, CE, OR, AB, PP), pp. 139–153.
FoSSaCSFoSSaCS-2010-HeussnerLMS #automaton #communication #reachability
Reachability Analysis of Communicating Pushdown Systems (AH, JL, AM, GS), pp. 267–281.
FoSSaCSFoSSaCS-2010-WiesZH #bound #process
Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
STOCSTOC-2010-KawamuraC #complexity
Complexity theory for operators in analysis (AK, SAC), pp. 495–502.
TACASTACAS-2010-Aderhold #automation #higher-order #recursion #source code #termination
Automated Termination Analysis for Programs with Second-Order Recursion (MA), pp. 221–235.
TACASTACAS-2010-DonaldsonKR #automation #manycore #memory management
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
TACASTACAS-2010-WangLGG
Trace-Based Symbolic Analysis for Atomicity Violations (CW, RL, MKG, AG), pp. 328–342.
TACASTACAS-2010-YuAB #named #php #string
Stranger: An Automata-Based String Analysis Tool for PHP (FY, MA, TB), pp. 154–157.
WRLAWRLA-2010-KatelmanKM #concurrent #semantics
Concurrent Rewriting Semantics and Analysis of Asynchronous Digital Circuits (MK, SK, JM), pp. 140–156.
CAVCAV-2010-AlbarghouthiGWC #symbolic computation
Abstract Analysis of Symbolic Executions (AA, AG, OW, MC), pp. 495–510.
CAVCAV-2010-BloemCGHKRSS #named #requirements #synthesis
RATSY — A New Requirements Analysis Tool with Synthesis (RB, AC, KG, GH, RK, MR, VS, RS), pp. 425–429.
CAVCAV-2010-KroeningSTW #composition #invariant #termination
Termination Analysis with Compositional Transition Invariants (DK, NS, AT, CMW), pp. 89–103.
CAVCAV-2010-KunduGW #concurrent #named #testing
Contessa: Concurrency Testing Augmented with Symbolic Analysis (SK, MKG, CW), pp. 127–131.
CAVCAV-2010-LiXBL #automaton #hardware #performance #reachability
Efficient Reachability Analysis of Büchi Pushdown Systems for Hardware/Software Co-verification (JL, FX, TB, VL), pp. 339–353.
ICLPICLP-2010-Zwirchmayr10
Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
ICLPICLP-J-2010-Schneider-KampGSST #automation #logic programming #source code #termination
Automated termination analysis for logic programs with cut (PSK, JG, TS, AS, RT), pp. 365–381.
ICSTICST-2010-KimSGSHN #automation #debugging #identification
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
ICSTICST-2010-SeguraHBR #approach #automation #feature model #generative #modelling #testing
Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach (SS, RMH, DB, ARC), pp. 35–44.
IJCARIJCAR-2010-ChevalCD #automation #constraints #equivalence #security
Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
ISSTAISSTA-2010-ArcuriIB #effectiveness #formal method #predict #random testing #testing
Formal analysis of the effectiveness and predictability of random testing (AA, MZZI, LCB), pp. 219–230.
ISSTAISSTA-2010-BaoZLZX #data flow #dependence #information management #strict
Strict control dependence and its effect on dynamic information flow analyses (TB, YZ, ZL, XZ, DX), pp. 13–24.
ISSTAISSTA-2010-GaleottiRPF #bound #invariant #performance #verification
Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
ISSTAISSTA-2010-Jiang #automation #testing
Automated analysis of load testing results (ZMJ), pp. 143–146.
ISSTAISSTA-2010-TangBLS #float #statistics
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
TAPTAP-2010-Blanchette #algebra #data type #induction #recursion #relational
Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions (JCB), pp. 117–134.
TAPTAP-2010-BousquetL #evaluation #mutation testing #process #proving
Proof Process Evaluation with Mutation Analysis (LdB, ML), pp. 55–60.
VMCAIVMCAI-2010-Esparza #probability #process
Analysis of Systems with Stochastic Process Creation (JE), p. 1.
VMCAIVMCAI-2010-KreikerSV #c #low level
Shape Analysis of Low-Level C with Overlapping Structures (JK, HS, VV), pp. 214–230.
VMCAIVMCAI-2010-MarronMSK #set
Shape Analysis with Reference Set Relations (MM, RM, DS, DK), pp. 247–262.
VMCAIVMCAI-2010-Might #pointer
Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
VMCAIVMCAI-2010-PerrelleH #array #permutation
An Analysis of Permutations in Arrays (VP, NH), pp. 279–294.
VMCAIVMCAI-2010-WilhelmABGHRWW #realtime
Static Timing Analysis for Hard Real-Time Systems (RW, SA, CB, DG, JH, JR, BW, SW), pp. 3–22.
DocEngDocEng-2009-BarcenasGL #constraints #on the #query
On the analysis of queries with counting constraints (EB, PG, NL), pp. 21–24.
DocEngDocEng-2009-GeorgHCPI #documentation
From rhetorical structures to document structure: shallow pragmatic analysis for document engineering (GG, HH, MC, HP, MI), pp. 185–192.
DocEngDocEng-2009-Hassan #documentation
Object-level document analysis of PDF files (TH), pp. 47–55.
DocEngDocEng-2009-JoshiL #documentation #image #natural language #using #web
Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRRDRR-2009-Ding #documentation #image #recognition #research #topic
Advanced topics in character recognition and document analysis: Research works in Intelligent Image & Document Research Lab, Tsinghua University (XD), pp. 1–10.
DRRDRR-2009-TaghvaC #bound #documentation #using
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRRDRR-2009-YouAADT #retrieval
Figure content analysis for improved biomedical article retrieval (DY, EA, SA, DDF, GRT), pp. 1–10.
HTHT-2009-RosenC #network #social
Social network analysis in virtual environments (DR, MC), pp. 317–322.
HTHT-2009-ToppanoR #design #hypermedia
Semiotic design and analysis of hypermedia (ET, VR), pp. 367–368.
HTHT-2009-WangC #web
Use noisy link analysis to improve web search (YW, JC), pp. 377–378.
ICDARICDAR-2009-AntonacopoulosBPP #dataset #documentation #evaluation #layout #performance
A Realistic Dataset for Performance Evaluation of Document Layout Analysis (AA, DB, CP, SP), pp. 296–300.
ICDARICDAR-2009-ChaudhuryJTSSM #image #pipes and filters
Google Newspaper Search — Image Processing and Analysis Pipeline (KC, AJ, ST, VS, SS, SM), pp. 621–625.
ICDARICDAR-2009-CollFL #documentation
Graphological Analysis of Handwritten Text Documents for Human Resources Recruitment (RC, AF, JL), pp. 1081–1085.
ICDARICDAR-2009-FerilliBEB #layout
A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
ICDARICDAR-2009-Franke #forensics #reliability
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
ICDARICDAR-2009-GaoTLTC #clustering #documentation
Analysis of Book Documents’ Table of Content Based on Clustering (LG, ZT, XL, XT, YC), pp. 911–915.
ICDARICDAR-2009-HeLS #linear #metric #novel #recognition
A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis (CLH, LL, CYS), pp. 451–455.
ICDARICDAR-2009-HendersonL #image
Raster Map Image Analysis (TCH, TL), pp. 376–380.
ICDARICDAR-2009-HuangDJG #adaptation #incremental #linear #online #recognition #using
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDARICDAR-2009-IbrahimKKAG #dependence #online #using #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-IndermuhleLB #documentation
Combining Alignment Results for Historical Handwritten Document Analysis (EI, ML, HB), pp. 1186–1190.
ICDARICDAR-2009-Long #architecture
An RDF-Based Blackboard Architecture for Improving Table Analysis (VL), pp. 916–920.
ICDARICDAR-2009-LoprestiZHT #documentation
Document Analysis Support for the Manual Auditing of Elections (DPL, XZ, XH, GT), pp. 733–737.
ICDARICDAR-2009-MalleronEEDR #documentation #layout
Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis (VM, VE, HE, SDC, PR), pp. 1001–1005.
ICDARICDAR-2009-SchullerSRK #estimation #online #overview #quote
“The Godfather” vs. “Chaos”: Comparing Linguistic Analysis Based on On-line Knowledge Sources and Bags-of-N-Grams for Movie Review Valence Estimation (BWS, JS, GR, TK), pp. 858–862.
ICDARICDAR-2009-SchulzEGAAD
Seizing the Treasure: Transferring Knowledge in Invoice Analysis (FS, ME, MG, BA, SA, AD), pp. 848–852.
ICDARICDAR-2009-Silva #documentation #learning #markov #modelling
Learning Rich Hidden Markov Models in Document Analysis: Table Location (ACeS), pp. 843–847.
ICDARICDAR-2009-Smith #detection #hybrid #layout
Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
JCDLJCDL-2009-GaleasKF #assessment #documentation #fourier #using
Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
JCDLJCDL-2009-JatowtKOT #web
Supporting analysis of future-related information in news archives and the web (AJ, KK, SO, KT), pp. 115–124.
JCDLJCDL-2009-WuTTW #enterprise
Cost and benefit analysis of mediated enterprise search (MW, JAT, AT, RW), pp. 267–276.
SIGMODSIGMOD-2009-ChenKM #multi
Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
SIGMODSIGMOD-2009-SunLDC #detection #workflow
Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
VLDBVLDB-2009-BenediktC #independence #xml
Schema-Based Independence Analysis for XML Updates (MB, JC), pp. 61–72.
VLDBVLDB-2009-CohenDDHW #big data
MAD Skills: New Analysis Practices for Big Data (JC, BD, MD, JMH, CW), pp. 1481–1492.
VLDBVLDB-2009-DaiGBBL #interactive #named
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
VLDBVLDB-2009-SchnaitterPG #design #interactive #modelling #physics
Index Interactions in Physical Design Tuning: Modeling, Analysis, and Applications (KS, NP, LG), pp. 1234–1245.
VLDBVLDB-2009-SunLNDC #detection #named #workflow
WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
VLDBVLDB-2009-WuXMH #multi
Promotion Analysis in Multi-Dimensional Space (TW, DX, QM, JH), pp. 109–120.
EDMEDM-2009-PavlikCK #automation #domain model #learning #modelling #using
Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
ITiCSEITiCSE-2009-BlasGMB #automation #composition #using
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSEITiCSE-2009-Mirolo #modelling #problem #recursion
Mental models of recursive computations vs. recursive analysis in the problem domain (CM), p. 397.
ITiCSEITiCSE-2009-RosslingK09a #performance
A system for integral efficiency analysis of sustainable technologies (GR, YK), p. 395.
CSMRCSMR-2009-BurenR #architecture #maintenance #using
Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMRCSMR-2009-EkstedtFJLSUB #architecture #enterprise #maintenance
A Tool for Enterprise Architecture Analysis of Maintainability (ME, UF, PJ, RL, TS, JU, MB), pp. 327–328.
CSMRCSMR-2009-Laitila #comprehension #named
SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
CSMRCSMR-2009-NagyM #fault #security
Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
ICPCICPC-2009-FigueiredoSSGWN #design
Crosscutting patterns and design stability: An exploratory analysis (EF, BCdS, CS, AFG, JW, DJN), pp. 138–147.
ICPCICPC-2009-ForwardLB #comprehension
Improving program comprehension by enhancing program constructs: An analysis of the Umple language (AF, TCL, DB), pp. 311–312.
ICPCICPC-2009-GrantC
Vector space analysis of software clones (SG, JRC), pp. 233–237.
ICPCICPC-2009-PopescuGM #dependence #precise
Enabling more precise dependency analysis in event-based systems (DP, JG, NM), pp. 305–306.
ICSMEICSM-2009-HindleGH #developer #topic #what
What’s hot and what’s not: Windowed developer topic analysis (AH, MWG, RCH), pp. 339–348.
ICSMEICSM-2009-JiangHHF #automation #performance #testing
Automated performance analysis of load tests (ZMJ, AEH, GH, PF), pp. 125–134.
ICSMEICSM-2009-Li #dependence #identification #using
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSMEICSM-2009-LiGMMMGC #component #fault #multi #pervasive #scalability
Analysis of pervasive multiple-component defects in a large software system (ZL, MG, SSM, NHM, AVM, DG, EC), pp. 265–273.
ICSMEICSM-2009-LuciaOT #empirical #traceability
The role of the coverage analysis during IR-based traceability recovery: A controlled experiment (ADL, RO, GT), pp. 371–380.
ICSMEICSM-2009-Roy #detection
Detection and analysis of near-miss software clones (CKR), pp. 447–450.
ICSMEICSM-2009-VasaLBN #comparative #evolution #using
Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSMEICSM-2009-WenzelKKK #3d #evolution #visualisation
Evolution analysis with animated and 3D-visualizations (SW, JK, UK, AK), pp. 475–478.
MSRMSR-2009-EnslenHPV #automation #identifier #mining #source code
Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
SCAMSCAM-2009-CanetCM #c #source code
A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
SCAMSCAM-2009-GutzmannKLL #points-to #towards
Towards Comparing and Combining Points-to Analyses (TG, AK, JL, WL), pp. 45–54.
SCAMSCAM-2009-KlintSV #domain-specific language #named #rascal #source code
RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
SCAMSCAM-2009-QianZX #lazy evaluation
Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
WCREWCRE-1999-BernardiL99a #identification #named #object-oriented
ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis (MLB, GADL), pp. 319–320.
WCREWCRE-1999-CapobiancoLOPP99a #traceability #using
Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCREWCRE-1999-Khomh99a #comprehension #design #named #quality
SQUAD: Software Quality Understanding through the Analysis of Design (FK), pp. 303–306.
CIAACIAA-J-2008-DixonES09
Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching (RD, ÖE, TS), pp. 597–612.
ICALPICALP-v1-2009-BecchettiK #streaming
Competitive Analysis of Aggregate Max in Windowed Streaming (LB, EK), pp. 156–170.
ICALPICALP-v2-2009-FinkelG
Forward Analysis for WSTS, Part II: Complete WSTS (AF, JGL), pp. 188–199.
ICALPICALP-v2-2009-FriedrichSV #network
Smoothed Analysis of Balancing Networks (TF, TS, DV), pp. 472–483.
ICALPICALP-v2-2009-Mosk-AoyamaR #performance #worst-case
Worst-Case Efficiency Analysis of Queueing Disciplines (DMA, TR), pp. 546–557.
FMFM-2009-AlbertAGP
Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
FMFM-2009-HeidarianSV #network #protocol
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
FMFM-2009-JostLHSH #bound #using
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-SeidlVV #alias #linear #polynomial
A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis (HS, VV, VV), pp. 644–659.
FMFM-2009-WangKGG #concurrent #predict #source code
Symbolic Predictive Analysis for Concurrent Programs (CW, SK, MKG, AG), pp. 256–272.
IFMIFM-2009-HasanAT #array #configuration management #fault #memory management #probability
Formal Probabilistic Analysis of Stuck-at Faults in Reconfigurable Memory Arrays (OH, NA, ST), pp. 277–291.
RTARTA-2009-TiuG #proving
A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
SEFMSEFM-2009-LienO #formal method #modelling #multi #protocol
Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
SEFMSEFM-2009-NgocO #fault #model checking
Overflow and Roundoff Error Analysis via Model Checking (DTBN, MO), pp. 105–114.
SEFMSEFM-2009-TruongTN #coordination #multi #using
Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFMSFM-2009-AalstMSW #formal method #interactive
Service Interaction: Patterns, Formalization, and Analysis (WMPvdA, AJM, CS, KW), pp. 42–88.
SFMSFM-2009-ClarkGT #using #web #web service
Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
ICFPICFP-2009-MidtgaardJ #abstract interpretation #control flow
Control-flow analysis of function calls and returns by abstract interpretation (JM, TPJ), pp. 287–298.
CoGCIG-2009-JaskowskiK #algorithm #coordination #formal method #game studies
Formal analysis and algorithms for extracting coordinate systems of games (WJ, KK), pp. 201–208.
DiGRADiGRA-2009-Carr #game studies
Textual Analysis, Digital Games, Zombies (DC).
DiGRADiGRA-2009-Conway #game studies
“It's in the game” and above the game: An analysis of the players of sports videogames [Abstract] (SC).
DiGRADiGRA-2009-Kuts #overview #user interface
Playful User Interfaces: Literature Review and Model for Analysis (EK).
DiGRADiGRA-2009-LandwehrDC #relational #word
The Words of Warcraft: relational text analysis of quests in an MMORPG (PML, JD, KMC).
DiGRADiGRA-2009-Linares
Discovering Super Mario Galaxy: A Textual Analysis (KL).
FDGFDG-2009-NelsonM #design #game studies #requirements #tool support
A requirements analysis for videogame design support tools (MJN, MM), pp. 137–144.
CHICHI-2009-AlexanderCFGG #design #evaluation
Revisiting read wear: analysis, design, and evaluation of a footprints scrollbar (JA, AC, SF, CG, SG), pp. 1665–1674.
CHICHI-2009-BartneckH
Scientometric analysis of the CHI proceedings (CB, JH), pp. 699–708.
CHICHI-2009-DiakopoulosGE #named #online #quality #video
Videolyzer: quality analysis of online informational video for bloggers and journalists (ND, SG, IAE), pp. 799–808.
HCIDHM-2009-DemirelD #feedback
Impact of Force Feedback on Computer Aided Ergonomic Analyses (HOD, VGD), pp. 608–613.
HCIDHM-2009-DzaackU #modelling #multi #performance #safety
Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
HCIDHM-2009-Godil
Facial Shape Analysis and Sizing System (AG), pp. 29–35.
HCIHCD-2009-CaratozzoloMPZ
Caring and Curing by Mixing Information and Emotions in Orphan Diseases Websites: A Twofold Analysis (MCC, EM, OP, MZ), pp. 661–670.
HCIHCD-2009-JarrettQRAS #development #metric #testing #usability #using #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCD-2009-KohNTTWH #why
Why Taking Medicine Is a Chore — An Analysis of Routine and Contextual Factors in the Home (WKK, JN, OYT, ZT, AHYW, MGH), pp. 452–461.
HCIHCD-2009-KurosuH #behaviour #communication #development #research
Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
HCIHCD-2009-LinO #information management
The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
HCIHCD-2009-LokmanHNN #difference #evaluation
Website Affective Evaluation: Analysis of Differences in Evaluations Result by Data Population (AML, AFH, NLMN, MN), pp. 643–652.
HCIHCD-2009-NakanoR #corpus #multimodal #usability
Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
HCIHCD-2009-NieminenKRM #fine-grained #testing #towards #usability
Towards Fine-Grained Usability Testing: New Methodological Directions with Conversation Analysis (MN, SK, SR, PM), pp. 879–887.
HCIHCD-2009-Stephane #behaviour #predict #simulation
User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
HCIHCD-2009-WadaY
The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
HCIHCI-AUII-2009-Cloud-BucknerSSYG #gender
Expression of Personality through Avatars: Analysis of Effects of Gender and Race on Perceptions of Personality (JCB, MS, BS, BY, JJG), pp. 248–256.
HCIHCI-AUII-2009-ImamuraOK #behaviour #modelling #ubiquitous
Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
HCIHCI-NIMT-2009-GastBRRWMR #gesture #human-computer #interactive
Did I Get It Right: Head Gestures Analysis for Human-Machine Interactions (JG, AB, TR, GR, FW, CM, BR), pp. 170–177.
HCIHCI-NIMT-2009-MatsumotoUYM #interactive #ubiquitous #video
Life with a Robot Companion: Video Analysis of 16-Days of Interaction with a Home Robot in a “Ubiquitous Home” Environment (NM, HU, TY, HM), pp. 341–350.
HCIHCI-NT-2009-Goschnick #design #interactive #programming
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems (SG), pp. 836–845.
HCIHCI-NT-2009-HoriguchiNSK #interactive
Analysis of Breakdowns in Menu-Based Interaction Based on Information Scent Model (YH, HN, TS, YK), pp. 438–445.
HCIHCI-NT-2009-LangeWB #automation #evaluation #information management
Automated Analysis of Eye-Tracking Data for the Evaluation of Driver Information Systems According to ISO/TS 15007-2: 2001 (CL, MW, HB), pp. 105–110.
HCIHCI-NT-2009-MatsudaUOM #eye tracking #multi
An Analysis of Eye Movements during Browsing Multiple Search Results Pages (YM, HU, MO, KiM), pp. 121–130.
HCIHCI-VAD-2009-EssabbahOHM #approach #design #interactive
A New Approach to Design an Interactive System for Molecular Analysis (ME, SO, JH, MM), pp. 713–722.
HCIHCI-VAD-2009-ParkHC #3d #experience #web
The Experience of Presence in 3D Web Environment: An Analysis of Korean Second Life (SP, HSH, MC), pp. 387–395.
HCIHCI-VAD-2009-Yarlikas #automation
A New Automatic Teller Machine (ATM) Proposal through the Analysis of ATMs of Three Banks (SY), pp. 641–650.
HCIHIMI-DIE-2009-BrangierDE #integration #library
The 7 Basic Functions of a Digital Library — Analysis of Focus Groups about the Usefulness of a Thematic Digital Library on the History of European Integration (EB, JD, LE), pp. 345–354.
HCIHIMI-DIE-2009-HendersonS #documentation #empirical
An Empirical Analysis of Personal Digital Document Structures (SH, AS), pp. 394–403.
HCIHIMI-DIE-2009-HorvathLK #approach #data mining #mining #usability
Usability Analyses of CRM Systems in Call Centers: The Data Mining Approach (ÁH, LL, AK), pp. 40–48.
HCIHIMI-DIE-2009-KumeS #using #web
Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HCIHIMI-DIE-2009-OcenasekS #metric #process #workflow
A Model for Measurement and Analysis of the Workflow Processes (PO, MS), pp. 149–153.
HCIHIMI-DIE-2009-UgaiA #network #social #tool support
Organization Diagnosis Tools Based on Social Network Analysis (TU, KA), pp. 181–189.
HCIHIMI-II-2009-FurukawaO
A Proposal of Collection and Analysis System of Near Miss Incident in Nursing Duties (AF, YO), pp. 497–502.
HCIHIMI-II-2009-FurutaSKAKT #collaboration #communication
Analysis of Team Communication and Collaboration in En-Route Air Traffic Control (KF, YS, TK, HA, DK, MT), pp. 758–765.
HCIHIMI-II-2009-KimuraONOT
Analysis on Descriptions of Dosage Regimens in Package Inserts of Medicines (MK, KO, KN, MO, FT), pp. 539–548.
HCIHIMI-II-2009-NozawaK #comparison #realtime #reduction
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
HCIHIMI-II-2009-SagaTT #mining #named
Loopo: Integrated Text Miner for FACT-Graph-Based Trend Analysis (RS, HT, KT), pp. 192–200.
HCIHIMI-II-2009-SpinilloPL #safety
Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
HCIIDGD-2009-MarcusK #network #social
Cross-Cultural Analysis of Social Network Services in Japan, Korea, and the USA (AM, NK), pp. 59–68.
HCIOCSC-2009-AoyagiFISSYS #collaboration
A Discussion System for Knowledge Sharing and Collaborative Analysis of Incidents in Nuclear Power Plants (SA, HF, HI, HS, HS, HY, TS), pp. 3–12.
HCIOCSC-2009-PetersonS #network #social
Analysis of Information Disclosure on a Social Networking Site (KP, KAS), pp. 256–264.
HCIOCSC-2009-TaylorT #game studies #multi #online
A Content Analysis of Interviews with Players of Massively Multiplayer Online Role-Play Games (MMORPGs): Motivating Factors and the Impact on Relationships (JT, JT), pp. 613–621.
HCIOCSC-2009-ZhaoYGL #modelling #topic
Propagation Modeling and Analysis of Incidental Topics in Blogosphere (LZ, RY, XG, ML), pp. 401–410.
VISSOFTVISSOFT-2009-HassaineDSP #generative #maintenance #visualisation
Generating visualization-based analysis scenarios from maintenance task descriptions (SH, KD, HAS, PP), pp. 41–44.
CAiSECAiSE-2009-EspanaGP #communication #information management #requirements
Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
CAiSECAiSE-2009-GuermoucheG #web #web service
Asynchronous Timed Web Service-Aware Choreography Analysis (NG, CG), pp. 364–378.
CAiSECAiSE-2009-KaiyaTSSK #quality #requirements #using
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSECAiSE-2009-LiuLYWH #constraints #using #verification #workflow
ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
EDOCEDOC-2009-NarmanJECK #architecture #enterprise
Enterprise Architecture Analysis for Data Accuracy Assessments (PN, PJ, ME, MC, JK), pp. 24–33.
ICEISICEIS-AIDSS-2009-AlbusacCLVL #detection
Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
ICEISICEIS-DISI-2009-GustienePH #design #framework #integration #semantics #using
Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEISICEIS-DISI-2009-PoelmansR #evaluation #workflow
Assessing Workflow Management Systems — A Quantitative Analysis of a Worfklow Evaluation Model (SP, HAR), pp. 183–189.
ICEISICEIS-ISAS-2009-BifflFHM #automation #evaluation #open source #process #tool support
Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
ICEISICEIS-ISAS-2009-GruhnK #mobile #modelling #process
Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
ICEISICEIS-ISAS-2009-LauITR #modelling #process
Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models (JML, CI, LHT, MR), pp. 83–88.
ICEISICEIS-ISAS-2009-LeiteG #multi #process #requirements
A Process for Multi-agent Domain and Application Engineering — The Domain Analysis and Application Requirements Engineering Phases (AL, RG), pp. 156–161.
ICEISICEIS-ISAS-2009-OussenaB #implementation #modelling #process #using
Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEISICEIS-ISAS-2009-SunyaevKMK #health #security
Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
ICEISICEIS-J-2009-ChangS #classification #performance
Fast Unsupervised Classification for Handwritten Stroke Analysis (WDC, JS), pp. 918–927.
ICEISICEIS-J-2009-FritzscheML #concept #data mining #design #industrial #interactive #mining #quality
Interactive Quality Analysis in the Automotive Industry: Concept and Design of an Interactive, Web-Based Data Mining Application (SF, MM, CL), pp. 402–414.
ICEISICEIS-J-2009-MartinoBBF #multi #tool support
Integrating Google Earth within OLAP Tools for Multidimensional Exploration and Analysis of Spatial Data (SDM, SB, MB, FF), pp. 940–951.
ICEISICEIS-J-2009-MohebiS #ambiguity #clustering #detection #hybrid #network #using
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEISICEIS-J-2009-NunesKNLC #approach #multi #product line
A Domain Analysis Approach for Multi-agent Systems Product Lines (IN, UK, CN, CJPdL, EC), pp. 716–727.
ICEISICEIS-J-2009-SpahnW #development #information management #problem
End-User Development for Individualized Information Management: Analysis of Problem Domains and Solution Approaches (MS, VW), pp. 843–857.
ICEISICEIS-J-2009-YamamotoIVCB #framework
Actor Relationship Analysis for the i* Framework (SY, KI, JMV, KC, SJB), pp. 491–500.
ICEISICEIS-SAIC-2009-DronavajjalaNS #enterprise #identification #process #project management #relational
Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
ICEISICEIS-SAIC-2009-PetersA #on the #platform #trust
On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
CIKMCIKM-2009-ChenR #detection
Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
CIKMCIKM-2009-JiaYM #effectiveness #retrieval #sentiment
The effect of negation on sentiment analysis and retrieval effectiveness (LJ, CTY, WM), pp. 1827–1830.
CIKMCIKM-2009-KobayakawaKTOKT #classification #kernel #using
Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKMCIKM-2009-LiBS #predict
Blog cascade affinity: analysis and prediction (HL, SSB, AS), pp. 1117–1126.
CIKMCIKM-2009-LinH #sentiment #topic
Joint sentiment/topic model for sentiment analysis (CL, YH), pp. 375–384.
CIKMCIKM-2009-LiuZPQCL #interactive #summary #topic #visual notation
Interactive, topic-based visual text summarization and analysis (SL, MXZ, SP, WQ, WC, XL), pp. 543–552.
CIKMCIKM-2009-LiuZY #collaboration #probability
Probabilistic latent preference analysis for collaborative filtering (NNL, MZ, QY), pp. 759–766.
CIKMCIKM-2009-MasadaFTHSO #optimisation #topic
Dynamic hyperparameter optimization for bayesian topical trend analysis (TM, DF, AT, TH, YS, KO), pp. 1831–1834.
CIKMCIKM-2009-MeiKKT #framework #sequence
An analysis framework for search sequences (QM, KLK, RK, AT), pp. 1991–1994.
CIKMCIKM-2009-MohammedFD
Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
CIKMCIKM-2009-ParkR #information retrieval #kernel #semantics #using
Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKMCIKM-2009-SayeedSDHMR #documentation #metric #similarity
Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
CIKMCIKM-2009-Wan #multi #summary #topic
Topic analysis for topic-focused multi-document summarization (XW), pp. 1609–1612.
CIKMCIKM-2009-ZhuM #identification #multi
Multidimensional political spectrum identification and analysis (LZ, PM), pp. 2045–2048.
ECIRECIR-2009-TanCWX #adaptation #naive bayes #sentiment
Adapting Naive Bayes to Domain Adaptation for Sentiment Analysis (ST, XC, YW, HX), pp. 337–349.
ECIRECIR-2009-Wang #documentation #information retrieval #ranking
Mean-Variance Analysis: A New Document Ranking Theory in Information Retrieval (JW0), pp. 4–16.
ICMLICML-2009-BaillyDR #component #grammar inference #problem
Grammatical inference as a principal component analysis problem (RB, FD, LR), pp. 33–40.
ICMLICML-2009-ChaudhuriKLS #canonical #clustering #correlation #multi
Multi-view clustering via canonical correlation analysis (KC, SMK, KL, KS), pp. 129–136.
ICMLICML-2009-ChoS #learning #modelling
Learning dictionaries of stable autoregressive models for audio scene analysis (YC, LKS), pp. 169–176.
ICMLICML-2009-LanLML #algorithm #ranking
Generalization analysis of listwise learning-to-rank algorithms (YL, TYL, ZM, HL), pp. 577–584.
ICMLICML-2009-PaisleyC #parametricity #process
Nonparametric factor analysis with beta process priors (JWP, LC), pp. 777–784.
ICMLICML-2009-Sutskever
A simpler unified analysis of budget perceptrons (IS), pp. 985–992.
KDDKDD-2009-AsurP #approach #graph #interactive
A viewpoint-based approach for interaction graph analysis (SA, SP), pp. 79–88.
KDDKDD-2009-ChuPBMPCZ #behaviour #case study #exclamation
A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
KDDKDD-2009-HasanSGA #named #novel
COA: finding novel patents through text analysis (MAH, WSS, TDG, AA), pp. 1175–1184.
KDDKDD-2009-MelvilleGL #classification #sentiment
Sentiment analysis of blogs by combining lexical knowledge with text classification (PM, WG, RDL), pp. 1275–1284.
KDDKDD-2009-PandeyASMK #approach #clustering
An association analysis approach to biclustering (GP, GA, MS, CLM, VK), pp. 677–686.
KDDKDD-2009-ScrippsTE #network #preprocessor
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis (JS, PNT, AHE), pp. 747–756.
KDDKDD-2009-TangSWY #network #scalability #social
Social influence analysis in large-scale networks (JT, JS, CW, ZY), pp. 807–816.
KEODKEOD-2009-DolsakN #design #process
Intelligent Analytical Aids in Design — Decision Support to Engineering Analysis Process (BD, MN), pp. 129–134.
KMISKMIS-2009-Bolisani #modelling #transaction
Modelling Cognitive Transactions for Economic and Accounting Analysis (EB), pp. 242–247.
KMISKMIS-2009-BounhasS #approach #documentation #social
A Social Approach for Document Analysis (IB, YS), pp. 95–102.
KMISKMIS-2009-BuchnerMN #concept #enterprise #open source #tool support
A Concept and Service based Analysis of Commercial and Open Source Enterprise 2.0 Tools (TB, FM, CN), pp. 37–45.
KMISKMIS-2009-Kume #using #visual notation #web
Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
KMISKMIS-2009-RadeschutzM #optimisation #process
Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
MLDMMLDM-2009-DereliogluGO #approach
A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
MLDMMLDM-2009-DuangsoithongW #classification
Relevance and Redundancy Analysis for Ensemble Classifiers (RD, TW), pp. 206–220.
RecSysRecSys-2009-CremonesiT #recommendation
Analysis of cold-start recommendations in IPTV systems (PC, RT), pp. 233–236.
RecSysRecSys-2009-TsatsouMKD #framework #personalisation #recommendation #semantics
A semantic framework for personalized ad recommendation based on advanced textual analysis (DT, FM, IK, PCD), pp. 217–220.
SEKESEKE-2009-AtkinsonD #modelling #re-engineering #social
Analysis of Agent Oriented Software Engineering Methodologies for Social Causal Models (MA, SD), pp. 157–163.
SEKESEKE-2009-ConejeroHJCR #composition #product line
Early Analysis of Modularity in Software Product Lines (JMC, JH, EJ, PJC, RR), pp. 721–736.
SEKESEKE-2009-GarlanCSBC #architecture #using
Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKESEKE-2009-IlievaO #design #object-oriented #representation
Nested NL Representation for OO Analysis and Design (MI, OO), pp. 49–54.
SEKESEKE-2009-JiCXZ #clustering #novel
A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
SEKESEKE-2009-KocaguneliTBTC #fault #metric #named #predict
Prest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool (EK, AT, ABB, BT, BC), pp. 637–642.
SEKESEKE-2009-LiuC #composition #data flow #testing #web #web service
Data Flow Analysis and Testing for Web Service Compositions Based on WS-BPEL (CHL, SLC), pp. 306–311.
SEKESEKE-2009-LudwigTA #concept #database #deduction #performance #reasoning #semantics #web
Performance Analysis of a Deductive Database with a Semantic Web Reasoning Engine: ConceptBase and Racer (SAL, CT, KA), pp. 688–693.
SIGIRSIGIR-2009-AlonsoM #e-commerce
Relevance criteria for e-commerce: a crowdsourcing-based experimental analysis (OA, SM), pp. 760–761.
SIGIRSIGIR-2009-AshkanC
Term-based commercial intent analysis (AA, CLAC), pp. 800–801.
SIGIRSIGIR-2009-Azzopardi #effectiveness #empirical #evaluation #query
Query side evaluation: an empirical analysis of effectiveness and effort (LA), pp. 556–563.
SIGIRSIGIR-2009-Peng #equivalence #probability #semantics
Equivalence between nonnegative tensor factorization and tensorial probabilistic latent semantic analysis (WP), pp. 668–669.
SIGIRSIGIR-2009-SakaiN #query #wiki
Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
SIGIRSIGIR-2009-SakumaK #graph
Link analysis for private weighted graphs (JS, SK), pp. 235–242.
SIGIRSIGIR-2009-TomsF #behaviour #predict
Predicting stopping behaviour: a preliminary analysis (EGT, LF), pp. 750–751.
ECMFAECMDA-FA-2009-AmeedeenBA #approach #modelling
A Model Driven Approach to the Analysis of Timeliness Properties (MAA, BB, RA), pp. 221–236.
ECMFAECMDA-FA-2009-KoudriCAS #design #process
MoPCoM/MARTE Process Applied to a Cognitive Radio System Design and Analysis (AK, JC, DA, PS), pp. 277–288.
MODELSMoDELS-2009-LloydJ #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-ShoushaBL #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-YueBL #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
SPLCSPLC-2009-KastnerARRBS #case study #on the #problem
On the impact of the optional feature problem: analysis and case studies (CK, SA, SSuR, MR, DSB, GS), pp. 181–190.
SPLCSPLC-2009-MendoncaWC #feature model #modelling #satisfiability
SAT-based analysis of feature models is easy (MM, AW, KC), pp. 231–240.
MODELSMoDELS-2009-LloydJ #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-ShoushaBL #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-YueBL #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
ECOOPECOOP-2009-XuRS #alias #points-to #scalability #using
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLAOOPSLA-2009-Abi-AntounA #architecture #consistency #runtime #using
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
OOPSLAOOPSLA-2009-BravenboerS #declarative #points-to #specification #strict
Strictly declarative specification of sophisticated points-to analyses (MB, YS), pp. 243–262.
AdaEuropeAdaEurope-2009-BurnsWZ #ada #implementation #scheduling
Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 (AB, AJW, FZ), pp. 119–133.
AdaEuropeAdaEurope-2009-LasnierZPH #automation #code generation #modelling
Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
AdaEuropeAdaEurope-2009-MarrefB #worst-case
Predicated Worst-Case Execution-Time Analysis (AM, GB), pp. 134–148.
PADLPADL-2009-MaldeO #haskell #scalability #sequence #using
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
PEPMPEPM-2009-FradeSU #bidirectional #data flow
Bidirectional data-flow analyses, type-systematically (MJF, AS, TU), pp. 141–150.
PLDIPLDI-2009-GulwaniJK #bound #control flow #invariant #refinement
Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
PLDIPLDI-2009-HoffmanEJ #semantics
Semantics-aware trace analysis (KJH, PE, SJ), pp. 453–464.
PLDIPLDI-2009-Rubio-GonzalezGLAA #fault #file system
Error propagation analysis for file systems (CRG, HSG, BL, RHAD, ACAD), pp. 270–280.
PLDIPLDI-2009-TallentMF #metric #performance
Binary analysis for measurement and attribution of program performance (NRT, JMMC, MWF), pp. 441–452.
PLDIPLDI-2009-TrippPFSW #effectiveness #named #web
TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
POPLPOPL-2009-CalcagnoDOY #composition
Compositional shape analysis by means of bi-abduction (CC, DD, PWO, HY), pp. 289–300.
POPLPOPL-2009-HardekopfL #pointer
Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
PPDPPPDP-2009-PhanJ #source code
Path-sensitive region analysis for mercury programs (QP, GJ), pp. 161–170.
SASSAS-2009-GulavaniCRN #bottom-up
Bottom-Up Shape Analysis (BSG, SC, GR, AVN), pp. 188–204.
SASSAS-2009-JensenMT #javascript
Type Analysis for JavaScript (SHJ, AM, PT), pp. 238–255.
SASSAS-2009-SeidlV #concurrent #detection
Region Analysis for Race Detection (HS, VV), pp. 171–187.
SASSAS-2009-Simon #optimisation #pointer #similarity #using
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
SASSAS-2009-SridharanF #complexity
The Complexity of Andersen’s Analysis in Practice (MS, SJF), pp. 205–221.
AdaSIGAda-2009-Gluch #embedded #modelling
Embedded systems engineering with the AADL: modeling & analysis (DPG), pp. 7–8.
RERE-2009-ClassenHH #feature model #workflow
Analysis of Feature Configuration Workflows (AC, AH, PH), pp. 381–382.
RERE-2009-ElahiY #requirements #security #trade-off #trust
Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
RERE-2009-GhanavatiAP #evaluation
Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
RERE-2009-JuretaMF #multi #requirements #validation
Analysis of Multi-Party Agreement in Requirements Validation (IJ, JM, SF), pp. 57–66.
RERE-2009-MussbacherGA #modelling
Modeling and Analysis of URN Goals and Scenarios with jUCMNav (GM, SG, DA), pp. 383–384.
ASEASE-2009-Balagtas-FernandezH #framework #mobile #usability
A Methodology and Framework to Simplify Usability Analysis of Mobile Applications (FTBF, HH), pp. 520–524.
ASEASE-2009-DeshmukhES #concurrent #library
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients (JVD, EAE, SS), pp. 480–491.
ASEASE-2009-GonzalezCD #automation #implementation #workflow
Automating the Implementation of Analysis Concerns in Workflow Applications (OG, RC, DD), pp. 585–589.
ASEASE-2009-SaekiHK #requirements
A Tool for Attributed Goal-Oriented Requirements Analysis (MS, SH, HK), pp. 674–676.
ASEASE-2009-WongC #dependence #logic #modelling #performance
Improving the Efficiency of Dependency Analysis in Logical Decision Models (SW, YC), pp. 173–184.
ASEASE-2009-YuAB #generative #source code #string #using
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ESEC-FSEESEC-FSE-2009-ArbabMMKQ #coordination #modelling #named #performance
Reo2MC: a tool chain for performance analysis of coordination models (FA, SM, YJM, MZK, HQ), pp. 287–288.
ESEC-FSEESEC-FSE-2009-BeltRD #lightweight #optimisation #symbolic computation
Sireum/Topi LDP: a lightweight semi-decision procedure for optimizing symbolic execution-based analyses (JB, R, XD), pp. 355–364.
ESEC-FSEESEC-FSE-2009-CataldoN #empirical #maturity #on the #process #quality
On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality (MC, SN), pp. 101–110.
ESEC-FSEESEC-FSE-2009-PaveseBU #behaviour #modelling #probability
Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models (EP, VAB, SU), pp. 335–344.
ICSEICSE-2009-CalinescuK #using
Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSEICSE-2009-ComanSS #automation #case study #industrial #metric #re-engineering #using
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSEICSE-2009-DagenaisR #api #evolution #named #recommendation
SemDiff: Analysis and recommendation support for API evolution (BD, MPR), pp. 599–602.
ICSEICSE-2009-GeayPTRD #composition #precise #string
Modular string-sensitive permission analysis with demand-driven precision (EG, MP, TT, BGR, JD), pp. 177–187.
ICSEICSE-2009-MarianiPP #automation #tool support
A toolset for automated failure analysis (LM, FP, MP), pp. 563–566.
ICSEICSE-2009-NandaS #interprocedural #java
Accurate Interprocedural Null-Dereference Analysis for Java (MGN, SS), pp. 133–143.
ICSEICSE-2009-RamasubbuB #empirical #maturity #process
The impact of process choice in high maturity environments: An empirical analysis (NR, RKB), pp. 529–539.
ICSEICSE-2009-SentillesPNNPC #component #design #embedded #implementation #named
Save-IDE — A tool for design, analysis and implementation of component-based embedded systems (SS, AP, DN, TN, PP, IC), pp. 607–610.
ICSEICSE-2009-WlokaRTR #development
Safe-commit analysis to facilitate team software development (JW, BGR, FT, XR), pp. 507–517.
ICSEICSE-2009-WolfSDN #communication #developer #network #predict #social #using
Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
SACSAC-2009-FahmyRJ #distributed #realtime #transaction
Response time analysis of software transactional memory-based distributed real-time systems (SFF, BR, EDJ), pp. 334–338.
SACSAC-2009-GohKCC #performance #scalability #video
Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
SACSAC-2009-HijikataHON #algorithm #using
HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SACSAC-2009-JangC #javascript #points-to
Points-to analysis for JavaScript (DJ, KMC), pp. 1930–1937.
SACSAC-2009-OliveiraLG #development #framework #usability
Development of a biosignals framework for usability analysis (IO, RL, NG), pp. 156–157.
SACSAC-2009-PassitoMM #network #protocol #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-PopovaS #constraints #modelling
Constraint-based modelling and analysis of organisations (VP, AS), pp. 283–284.
SACSAC-2009-SmileyHKD #architecture #evaluation #requirements
Architectural requirements prioritization and analysis applied to software technology evaluation (KS, QH, EK, AD), pp. 397–398.
LDTALDTA-2008-Nilsson-NymanHME09 #declarative #java #source code
Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
GPCEGPCE-2009-WillcockLQ #reuse
Reusable, generic program analyses and transformations (JW, AL, DJQ), pp. 5–14.
ASPLOSASPLOS-2009-AleenC #commutative #parallel #program transformation
Commutativity analysis for software parallelization: letting program transformations see the big picture (FA, NC), pp. 241–252.
CASECASE-2009-DotoliFMSU #petri net
The impact of ICT on an Intermodal Transportation System: an analysis by Petri Nets (MD, MPF, AMM, GS, WU), pp. 513–518.
CASECASE-2009-HeraguCKM #network #retrieval
Analysis of autonomous vehicle storage and retrieval system by open queueing network (SSH, XC, AK, CJM), pp. 455–459.
CASECASE-2009-KumarWKSS #fuzzy #predict #using #variability
A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASECASE-2009-LiZF
Analysis of two-loop closed production systems (NL, LZ, WF), pp. 460–465.
CASECASE-2009-RamakrishnanR #linear
Delay-dependent stability analysis of linear system with additive time-varying delays (KR, GR), pp. 122–126.
CCCC-2009-VasudevanTDE #concurrent #source code
Compile-Time Analysis and Specialization of Clocks in Concurrent Programs (NV, OT, JD, SAE), pp. 48–62.
CGOCGO-2009-CordesFM #abstract interpretation #modelling #performance #precise #slicing
A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models (PL, DC, HF, PM), pp. 136–146.
CGOCGO-2009-PereiraB #pointer
Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
DACDAC-2009-AyalaAB #data flow
Thermal-aware data flow analysis (JLA, DA, PB), pp. 613–614.
DACDAC-2009-CallegariWB #ranking
Speedpath analysis based on hypothesis pruning and ranking (NC, LCW, PB), pp. 346–351.
DACDAC-2009-GlassLTBC #architecture #design #encoding #hybrid #network
Designing heterogeneous ECU networks via compact architecture encoding and hybrid timing analysis (MG, ML, JT, UDB, SC), pp. 43–46.
DACDAC-2009-JuHCR #source code
Context-sensitive timing analysis of Esterel programs (LJ, BKH, SC, AR), pp. 870–873.
DACDAC-2009-KamhiNTW #architecture #named #statistics #transaction
MAGENTA: transaction-based statistical micro-architectural root-cause analysis (GK, AN, AT, AW), pp. 639–643.
DACDAC-2009-KimRH #probability
Stochastic steady-state and AC analyses of mixed-signal systems (JK, JR, MAH), pp. 376–381.
DACDAC-2009-LinB #process
Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
DACDAC-2009-LingVFA #effectiveness
A moment-based effective characterization waveform for static timing analysis (DDL, CV, PF, SA), pp. 19–24.
DACDAC-2009-LuSZZYZ #process #reliability #statistics
Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
DACDAC-2009-MutluLMC #approach #parametricity
A parametric approach for handling local variation effects in timing analysis (AAM, JL, RM, MC), pp. 126–129.
DACDAC-2009-ShiCHMTHW #gpu #grid #network #performance #power management
GPU friendly fast Poisson solver for structured power grid network analysis (JS, YC, WH, LM, SXDT, PHH, XW), pp. 178–183.
DACDAC-2009-TakahashiYT #statistics
A Gaussian mixture model for statistical timing analysis (ST, YY, ST), pp. 110–115.
DACDAC-2009-VeetilSBSR #dependence #performance
Efficient smart sampling based full-chip leakage analysis for intra-die variation considering state dependence (VV, DS, DB, SS, SR), pp. 154–159.
DACDAC-2009-WalravensVD #modelling #named #performance
ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
DACDAC-2009-WangYLP #parametricity
SRAM parametric failure analysis (JW, SY, XL, LTP), pp. 496–501.
DACDAC-2009-YeLCC #layout #process #variability
Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
DATEDATE-2009-BartoliniRB #quality #scalability #visual notation
Visual quality analysis for dynamic backlight scaling in LCD systems (AB, MR, LB), pp. 1428–1433.
DATEDATE-2009-BellasiFS #modelling #multi #power management #predict
Predictive models for multimedia applications power consumption based on use-case and OS level analysis (PB, WF, DS), pp. 1446–1451.
DATEDATE-2009-ChakrabortyGRP #optimisation
Analysis and optimization of NBTI induced clock skew in gated clock trees (AC, GG, AR, DZP), pp. 296–299.
DATEDATE-2009-GargM #3d #process #variability
System-level process variability analysis and mitigation for 3D MPSoCs (SG, DM), pp. 604–609.
DATEDATE-2009-HolcombLS #design #fault
Design as you see FIT: System-level soft error analysis of sequential circuits (DEH, WL, SAS), pp. 785–790.
DATEDATE-2009-IzosimovPPEP #embedded #fault tolerance #optimisation
Analysis and optimization of fault-tolerant embedded systems with hardened processors (VI, IP, PP, PE, ZP), pp. 682–687.
DATEDATE-2009-KuhneGD #comprehension #design
Property analysis and design understanding (UK, DG, RD), pp. 1246–1249.
DATEDATE-2009-LiCSSS #on the #statistics
On hierarchical statistical static timing analysis (BL, NC, MS, WS, US), pp. 1320–1325.
DATEDATE-2009-NegreanSE #multi
Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources (MN, SS, RE), pp. 524–529.
DATEDATE-2009-RistauLAF #parallel
Dimensioning heterogeneous MPSoCs via parallelism analysis (BR, TL, OA, GF), pp. 554–557.
DATEDATE-2009-SreedharK #on the
On linewidth-based yield analysis for nanometer lithography (AS, SK), pp. 381–386.
DATEDATE-2009-TannirK #using
Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATEDATE-2009-ViehlPBR #performance #scheduling
White box performance analysis considering static non-preemptive software scheduling (AV, MP, OB, WR), pp. 513–518.
ISMMISMM-2009-AlbertGG #garbage collection
Live heap space analysis for languages with garbage collection (EA, SG, MGZ), pp. 129–138.
ISMMISMM-2009-JumpM #metric
Dynamic shape analysis via degree metrics (MJ, KSM), pp. 119–128.
ISMMISMM-2009-NaeemL #alias #performance #set #using
Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMMISMM-2009-UnnikrishnanS #functional #parametricity #source code
Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
ISMMISMM-2009-Vengerov #garbage collection #modelling #optimisation #throughput
Modeling, analysis and throughput optimization of a generational garbage collector (DV), pp. 1–9.
LCTESLCTES-2009-FidgeC #data flow #hardware
Integrating hardware and software information flow analyses (CJF, DC), pp. 157–166.
PDPPDP-2009-Ito #effectiveness #evaluation #parametricity
Job Scheduler Parameter Analysis for Evaluation of Effectiveness (RI), pp. 62–69.
PDPPDP-2009-MortaraG #named #parallel #performance
ProTailor: A Parallel Operator for Extremely Fast Shape Analysis in Bioinformatics Applications (MM, AG), pp. 276–282.
PPoPPPPoPP-2009-KejariwalC #concurrent #parallel #source code #thread
Parallelization spectroscopy: analysis of thread-level parallelism in hpc programs (AK, CC), pp. 293–294.
PPoPPPPoPP-2009-TallentM #effectiveness #metric #parallel #performance #thread
Effective performance measurement and analysis of multithreaded applications (NRT, JMMC), pp. 229–240.
ESOPESOP-2009-Campbell #data type #memory management #using
Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
FASEFASE-2009-AlTurkiDYCI #specification
Formal Specification and Analysis of Timing Properties in Software Systems (MA, DD, DY, AC, HI), pp. 262–277.
FASEFASE-2009-ClarkGT #scalability
Scalable Analysis of Scalable Systems (AC, SG, MT), pp. 1–17.
FoSSaCSFoSSaCS-2009-KuhnrichSSK #data flow #infinity #interprocedural
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains (MK, SS, JS, SK), pp. 440–455.
TACASTACAS-2009-AtigBQ #bound #concurrent #source code #thread
Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
TACASTACAS-2009-BjornerTV #source code #string
Path Feasibility Analysis for String-Manipulating Programs (NB, NT, AV), pp. 307–321.
TACASTACAS-2009-GofmanLSZYS #data access #named #policy
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
TACASTACAS-2009-YuBI #string #verification
Symbolic String Verification: Combining String Analysis and Size Analysis (FY, TB, OHI), pp. 322–336.
CADECADE-2009-FalkeK #approach #automation #imperative #source code #term rewriting #termination
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs (SF, DK), pp. 277–293.
CADECADE-2009-SebastianiV #axiom #encoding #lightweight #logic
Axiom Pinpointing in Lightweight Description Logics via Horn-SAT Encoding and Conflict Analysis (RS, MV), pp. 84–99.
CADECADE-2009-SwiderskiPGFS #dependence #induction #proving #termination #theorem proving
Termination Analysis by Dependency Pairs and Inductive Theorem Proving (SS, MP, JG, CF, PSK), pp. 322–338.
CAVCAV-2009-CernyA #automation #java
Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
CAVCAV-2009-GuernicG #hybrid #reachability #using
Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAVCAV-2009-Gulwani #bound #complexity #named
SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
CSLCSL-2009-AlurCW #algorithm #source code
Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
CSLCSL-2009-HofmannR #performance
Efficient Type-Checking for Amortised Heap-Space Analysis (MH, DR), pp. 317–331.
ICLPICLP-2009-ChristiansenL #modelling #optimisation #preprocessor #sequence
Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis (HC, OTL), pp. 70–83.
ICLPICLP-2009-Have #biology #constraints #modelling #sequence #statistics
Logic-Statistic Models with Constraints for Biological Sequence Analysis (CTH), pp. 549–550.
ICLPICLP-2009-Voets #logic programming #research #source code #summary
Research Summary: Non-termination Analysis of Logic Programs (DV), pp. 553–554.
ICLPICLP-2009-VoetsS #approach #logic programming #source code
A New Approach to Non-termination Analysis of Logic Programs (DV, DDS), pp. 220–234.
ICSTICST-2009-AngelettiGNPS #automation #generative #testing
Automatic Test Generation for Coverage Analysis of ERTMS Software (DA, EG, MN, AP, SS), pp. 303–306.
ISSTAISSTA-2009-AdlerFKPRSUZ #string #test coverage #using
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-BravenboerS #exception #points-to
Exception analysis and points-to analysis: better together (MB, YS), pp. 1–12.
ISSTAISSTA-2009-HalfondAO #identification #interface #precise #testing #web
Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
ISSTAISSTA-2009-PecheurRB #formal method #testing
A formal analysis of requirements-based testing (CP, FR, GB), pp. 47–56.
LICSLICS-2009-RougemontT #probability #process #statistics
Statistic Analysis for Probabilistic Processes (MdR, MT), pp. 299–308.
ICSTSAT-2009-Skvortsov
A Theoretical Analysis of Search in GSAT (ESS), pp. 265–275.
FATESTestCom-FATES-2009-Szabados #scalability
Structural Analysis of Large TTCN-3 Projects (KS), pp. 241–246.
VMCAIVMCAI-2009-AmjadB #automation #proving #towards
Towards Automatic Stability Analysis for Rely-Guarantee Proofs (HA, RB), pp. 14–28.
VMCAIVMCAI-2009-Sagiv #thread
Thread-Modular Shape Analysis (MS), p. 3.
CBSECBSE-2008-Tolosana-CalasanzRB #automation #performance #workflow
Automating Performance Analysis from Taverna Workflows (RTC, OFR, JAB), pp. 1–15.
ECSAECSA-2008-LosavioMR #quality #standard #web #web service
Web Services Domain Analysis Based on Quality Standards (FL, AM, RR), pp. 354–358.
QoSAQoSA-2008-CortellessaPSV #architecture #framework #modelling #named #performance #platform #uml
MOSES: MOdeling Software and platform architEcture in UML 2 for Simulation-based performance analysis (VC, PP, RS, AV), pp. 86–102.
QoSAQoSA-2008-JansenVAV #architecture
Sharing the Architectural Knowledge of Quantitative Analysis (AJ, TdV, PA, MvV), pp. 220–234.
QoSAQoSA-2008-MalletR #distributed #model transformation
Style-Based Model Transformation for Early Extrafunctional Analysis of Distributed Systems (JM, SR), pp. 55–70.
QoSAQoSA-2008-MorenoM #modelling #performance
Model-Driven Performance Analysis (GAM, PM), pp. 135–151.
QoSAQoSA-2008-WaignierMD #architecture #specification
Architectural Specification and Static Analyses of Contractual Application Properties (GW, AFLM, LD), pp. 152–170.
WICSAWICSA-2008-HarrisonA #design pattern #documentation #legacy
Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
WICSAWICSA-2008-KeulerMU #architecture #performance #quality
Efficient Quality Impact Analyses for Iterative Architecture Construction (TK, DM, TU), pp. 19–28.
WICSAWICSA-2008-MolesiniGCB #architecture #on the
On the Quantitative Analysis of Architecture Stability in Aspectual Decompositions (AM, AFG, CvFGC, TVB), pp. 29–38.
WICSAWICSA-2008-MucciniP #architecture #functional #simulation
Simulating Software Architectures for Functional Analysis (HM, PP), pp. 289–292.
DRRDRR-2008-DejeanM
Versatile page numbering analysis (HD, JLM), p. 68150.
DRRDRR-2008-FumeI #categorisation #clustering #documentation #modelling #semantics
Model-based document categorization employing semantic pattern analysis and local structure clustering (KF, YI), p. 68150.
TPDLECDL-2008-PfefferES #classification #library #visual notation
Visual Analysis of Classification Systems and Library Collections (MP, KE, HS), pp. 436–439.
HTHT-2008-Yalcin
Writing on the blog: an assemblage analysis (STY), pp. 253–254.
JCDLJCDL-2008-CarmelYR #library #using
Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
JCDLJCDL-2008-Marshall #repository
From writing and analysis to the repository: taking the scholars’ perspective on scholarly archiving (CCM), pp. 251–260.
JCDLJCDL-2008-McCownN08a #re-engineering
Usage analysis of a public website reconstruction tool (FM, MLN), pp. 371–374.
SIGMODSIGMOD-2008-XiaoT #privacy #statistics
Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDBVLDB-2008-AntonellisGC #graph #query
Simrank++: query rewriting through link analysis of the click graph (IA, HGM, CCC), pp. 408–421.
VLDBVLDB-2008-BalminCCLOSV #named #xml
SEDA: a system for search, exploration, discovery, and analysis of XML Data (AB, LSC, EC, QL, , SS, ZV), pp. 1408–1411.
VLDBVLDB-2008-PoessN #challenge #energy #power management
Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
VLDBVLDB-2008-WeigelPRGC #collaboration #scalability #web
Large-scale collaborative analysis and extraction of web data (FW, BP, MR, JG, MC), pp. 1476–1479.
EDMEDM-2008-Heiner #student
A Preliminary Analysis of the Logged Questions that Students Ask in Introductory Computer Science (CH), pp. 250–257.
EDMEDM-2008-KoedingerCSL #fine-grained #repository #tool support
An Open Repository and analysis tools for fine-grained, longitudinal learner data (KRK, KC, AS, BL), pp. 157–166.
EDMEDM-2008-PardosHRB #composition #multi
The Composition Effect: Conjuntive or Compensatory? An Analysis of Multi-Skill Math Questions in ITS (ZAP, NTH, CR, JEB), pp. 147–156.
ITiCSEITiCSE-2008-KiesmullerB #algorithm #how #problem
How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
ITiCSEITiCSE-2008-Leach #process
Analysis of ABET accreditation as a software process (RJL), p. 356.
SIGITESIGITE-2008-LeePH
An instant messenger system for learner analysis in e-learning environment (HL, DSP, MH), pp. 51–52.
CSMRCSMR-2008-DAmbrosL #collaboration #evolution #flexibility #framework
A Flexible Framework to Support Collaborative Software Evolution Analysis (MD, ML), pp. 3–12.
CSMRCSMR-2008-KenmeiAP #open source #predict #scalability
Trend Analysis and Issue Prediction in Large-Scale Open Source Systems (BK, GA, MDP), pp. 73–82.
CSMRCSMR-2008-PapastefanatosAVV #database #evolution #named
Hecataeus: A What-If Analysis Tool for Database Schema Evolution (GP, FA, YV, PV), pp. 326–328.
ICSMEICSM-2008-DAmbros #dependence #evolution #fault
Supporting software evolution analysis with historical dependencies and defect information (MD), pp. 412–415.
ICSMEICSM-2008-Kamiya #identifier
Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
ICSMEICSM-2008-YangLLW #empirical #maintenance
An empirical analysis on distribution patterns of software maintenance effort (YY, QL, ML, QW), pp. 456–459.
ICSMEICSM-2008-ZhangBJAL #generative #visual notation
Query-based filtering and graphical view generation for clone analysis (YZ, HAB, SJ, DA, ML), pp. 376–385.
ICSMEICSM-2008-Zhu #fault
Goal trees and fault trees for root cause analysis (QZ), pp. 436–439.
MSRMSR-2008-LaymanNGBB #mining #visual notation
Mining software effort data: preliminary analysis of visual studio team system data (LL, NN, SG, JB, AB), pp. 43–46.
MSRMSR-2008-YoshimuraNHK #approach #detection #named #product line #variability
FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
PASTEPASTE-2008-MarronMHSK #array #recursion
Sharing analysis of arrays, collections, and recursive structures (MM, MML, MVH, DS, DK), pp. 43–49.
SCAMSCAM-2008-BinkleyGHLM
Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
SCAMSCAM-2008-BoogerdM #data flow #on the #profiling #using
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAMSCAM-2008-GiffhornH #java #precise #source code #using
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAMSCAM-2008-GondowKI #approach #automation #behaviour #c #named #preprocessor
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
SCAMSCAM-2008-GorbovitskiTRSL #debugging #performance
Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
SCAMSCAM-2008-LundbergGL #performance #points-to #precise
Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
SCAMSCAM-2008-ScholzZC #dependence #graph #reachability
User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
SCAMSCAM-2008-StoneSB #automation #data flow #set
Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
SCAMSCAM-2008-SunZ #points-to
Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
WCREWCRE-2008-GhanbariCA #aspectj #hybrid #java #query #source code
A Hybrid Query Engine for the Structural Analysis of Java and AspectJ Programs (HG, CC, VA), pp. 133–137.
WCREWCRE-2008-GrantCS #automation #component #concept #independence #using
Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCREWCRE-2008-HashimotoM #fine-grained #named
Diff/TS: A Tool for Fine-Grained Structural Change Analysis (MH, AM), pp. 279–288.
WCREWCRE-2008-HayesAG #clustering #named
PREREQIR: Recovering Pre-Requirements via Cluster Analysis (JHH, GA, YGG), pp. 165–174.
WCREWCRE-2008-JiangHH
Analysis of Procedure Splitability (TJ, MH, YH), pp. 247–256.
WCREWCRE-2008-SobreiraM #comprehension #visual notation
A Visual Trace Analysis Tool for Understanding Feature Scattering (VS, MdAM), pp. 337–338.
CIAACIAA-2008-DixonES
Automata-Theoretic Analysis of Bit-Split Languages for Packet Scanning (RD, ÖE, TS), pp. 141–150.
DLTDLT-2008-EsparzaKL #fixpoint
Derivation Tree Analysis for Accelerated Fixed-Point Computation (JE, SK, ML), pp. 301–313.
DLTDLT-2008-KarhumakiS #theorem
An Analysis and a Reproof of Hmelevskii’s Theorem (JK, AS), pp. 467–478.
ICALPICALP-B-2008-Canetti #composition #performance #security
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
LATALATA-2008-RegnaultST #2d #automaton #on the #probability
On the Analysis of “Simple” 2D Stochastic Cellular Automata (DR, NS, ET), pp. 452–463.
FMFM-2008-GawlitzaS #game studies #precise
Precise Interval Analysis vs. Parity Games (TG, HS), pp. 342–357.
FMFM-2008-UzuncaovaK #constraints #declarative #modelling #performance
Constraint Prioritization for Efficient Analysis of Declarative Models (EU, SK), pp. 310–325.
SEFMSEFM-2008-Spoto
Nullness Analysis in Boolean Form (FS), pp. 21–30.
SFMSFM-2008-DegasperiG #modelling #probability
Sensitivity Analysis of Stochastic Models of Bistable Biochemical Reactions (AD, SG), pp. 1–20.
FLOPSFLOPS-2008-AvanziniM #complexity
Complexity Analysis by Rewriting (MA, GM), pp. 130–146.
FLOPSFLOPS-2008-Yokouchi #algorithm #difference #lazy evaluation #strict
Strictness Analysis Algorithms Based on an Inequality System for Lazy Types (HY), pp. 255–271.
GT-VMTGT-VMT-2006-KonigK08 #graph transformation
Augur 2 — A New Version of a Tool for the Analysis of Graph Transformation Systems (BK, VK), pp. 201–210.
GT-VMTGT-VMT-2006-KovacsG08 #formal method #modelling #simulation #workflow
Simulation and Formal Analysis of Workflow Models (MK, LG), pp. 221–230.
GT-VMTGT-VMT-2008-BiermannM #configuration management #independence #rule-based
Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets (EB, TM).
GT-VMTGT-VMT-2008-BrielerM #ambiguity #diagrams #graph grammar #sketching #syntax
Ambiguity Resolution for Sketched Diagrams by Syntax Analysis Based on Graph Grammars (FB, MM).
ICGTICGT-2008-EhrigP #formal method #graph #kernel #model transformation
Formal Analysis of Model Transformations Based on Triple Graph Rules with Kernels (HE, UP), pp. 178–193.
ICGTICGT-2008-Hermann #process #workflow
Process Construction and Analysis for Workflows Modelled by Adhesive HLR Systems with Application Conditions (FH), pp. 496–498.
ICGTICGT-2008-Khan #configuration management #graph transformation #modelling #network #using
Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
CHICHI-2008-AdarTD #scalability #web
Large scale analysis of web revisitation patterns (EA, JT, STD), pp. 1197–1206.
CHICHI-2008-GilbertKS #empirical #network #social #social media
The network in the garden: an empirical analysis of social media in rural life (EG, KK, CS), pp. 1603–1612.
CHICHI-2008-IsenbergTC #case study #visual notation
An exploratory study of visual information analysis (PI, AT, MSTC), pp. 1217–1226.
CHICHI-2008-KatsanosTA #architecture #design #named #semantics #using #web
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHICHI-2008-MiaskiewiczSK #identification #semantics
A latent semantic analysis methodology for the identification and creation of personas (TM, TS, KAK), pp. 1501–1510.
CHICHI-2008-OConnellC #interactive #metric #visualisation
Metrics for measuring human interaction with interactive visualizations for information analysis (TAO, YYC), pp. 1493–1496.
CSCWCSCW-2008-SteptoeWMGRSRS #collaboration
Eye-tracking for avatar eye-gaze and interactional analysis in immersive collaborative virtual environments (WS, RW, AM, EG, JR, PMS, DJR, AS), pp. 197–200.
SOFTVISSOFTVIS-2008-DietrichYMJD #clustering #dependence #graph #java
Cluster analysis of Java dependency graphs (JD, VY, CM, GJ, MD), pp. 91–94.
SOFTVISSOFTVIS-2008-PichNR #dependence #graph #visual notation
Visual analysis of importance and grouping in software dependency graphs (CP, LN, GGR), pp. 29–32.
SOFTVISSOFTVIS-2008-Stasko #visualisation
Visualization for information exploration and analysis: keynote presentation (JTS), pp. 7–8.
CAiSECAiSE-2008-KongdenfhaBSC #interactive #named
SpreadMash: A Spreadsheet-Based Interactive Browsing and Analysis Tool for Data Services (WK, BB, RSP, FC), pp. 343–358.
CAiSECAiSE-2008-NiknafsR
Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
CAiSECAiSE-2008-SpiessNWMB #modelling #performance #process #simulation #ubiquitous
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems (PS, DKN, IW, IM, MB), pp. 579–582.
CAiSECAiSE-2008-VaraSP #information management #modelling #process #requirements
Business Process Modelling and Purpose Analysis for Requirements Analysis of Information Systems (JLdlV, JS, OP), pp. 213–227.
EDOCEDOC-2008-NarmanSJEC #architecture #enterprise #modelling #quality #using
Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOCEDOC-2008-SommestadEJ #architecture #enterprise #graph #modelling #security
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
ICEISICEIS-AIDSS-2008-SharpanskykhSB #modelling #safety
Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
ICEISICEIS-AIDSS-2008-VolkelA #design #information management
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems (MV, AA), pp. 95–105.
ICEISICEIS-ISAS2-2008-AgostinhoMMABFRKRC #approach #aspect-oriented #requirements
A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis (SA, AMDM, AM, JA, ISB, RF, RR, JK, RAR, PC), pp. 129–136.
ICEISICEIS-ISAS2-2008-BoukhebouzeAB #framework #modelling #named #process
BP-FAMA: Business Process Framework for Agility of Modelling and Analysis (MB, YA, ANB), pp. 368–373.
ICEISICEIS-ISAS2-2008-BrockeSC #framework #process #re-engineering #specification #towards
ECM Systems Analysis and Specification — Towards a Framework for Business Process Re-Engineering (JvB, AS, AC), pp. 345–350.
ICEISICEIS-ISAS2-2008-GustieneG #design
Introducing Service-Orientation into System Analysis and Design (PG, RG), pp. 189–194.
ICEISICEIS-ISAS2-2008-HuberSK #framework #health #security
Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
ICEISICEIS-ISAS2-2008-LeL #web
Realizing Web Application Vulnerability Analysis via AVDL (HTL, PKKL), pp. 259–265.
ICEISICEIS-ISAS2-2008-MonteiroFBM #information management #mobile #towards
An Analysis Pattern for Mobile Geographic Information Systems toward Municipal Urban Administration (BRM, JLF, JLB, WSM), pp. 311–318.
ICEISICEIS-ISAS2-2008-ParvathyVB #case study #comparative #correlation #documentation #traceability
A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
ICEISICEIS-ISAS2-2008-SantosBBR #architecture #modelling #semantics
A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
ICEISICEIS-ISAS2-2008-Venable #problem #requirements
Improving Requirements Analysis — Rigourous Problem Analysis and Formulation with Coloured Cognitive Maps (JRV), pp. 466–470.
ICEISICEIS-SAIC-2008-Bachlechner #architecture #integration #semantics #web #web service
Integration Architectures Based on Semantic Web Services: Fad or Model for the Future? — Findings of a Comprehensive SWOT Analysis (DB), pp. 45–52.
CIKMCIKM-2008-AcharyyaG #product line
A spam resistant family of concavo-convex ranks for link analysis (SA, JG), pp. 1505–1506.
CIKMCIKM-2008-DashRMAL
Dynamic faceted search for discovery-driven analysis (DD, JR, NM, AA, GML), pp. 3–12.
CIKMCIKM-2008-ItoNHN #wiki
Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
CIKMCIKM-2008-NajorkC #effectiveness #performance
Efficient and effective link analysis with precomputed salsa maps (MN, NC), pp. 53–62.
CIKMCIKM-2008-NguyenS #correlation #dataset #performance
Fast correlation analysis on time series datasets (PN, NS), pp. 787–796.
ECIRECIR-2008-HannahMO #graph
Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
ECIRECIR-2008-LangWJLX #ad hoc #dependence #evaluation #retrieval
An Evaluation and Analysis of Incorporating Term Dependency for Ad-Hoc Retrieval (HL, BW, GJFJ, JL, YX), pp. 602–606.
ECIRECIR-2008-MohdCR #comparison
A Comparison of Named Entity Patterns from a User Analysis and a System Analysis (MM, FC, IR), pp. 679–683.
ICMLICML-2008-AnWSWCD #image #kernel #multi #process
Hierarchical kernel stick-breaking process for multi-task image analysis (QA, CW, IS, EW, LC, DBD), pp. 17–24.
ICMLICML-2008-HamL #learning
Grassmann discriminant analysis: a unifying view on subspace-based learning (JH, DDL), pp. 376–383.
ICMLICML-2008-LiangJ #generative #pseudo
An asymptotic analysis of generative, discriminative, and pseudolikelihood estimators (PL, MIJ), pp. 584–591.
ICMLICML-2008-LuPV #component #multi
Uncorrelated multilinear principal component analysis through successive variance maximization (HL, KNP, ANV), pp. 616–623.
ICMLICML-2008-MeloMR #approximate #learning
An analysis of reinforcement learning with function approximation (FSM, SPM, MIR), pp. 664–671.
ICMLICML-2008-ParrLTPL #approximate #feature model #learning #linear #modelling
An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
ICMLICML-2008-SalakhutdinovM #network #on the
On the quantitative analysis of deep belief networks (RS, IM), pp. 872–879.
ICMLICML-2008-SunJY #canonical #correlation
A least squares formulation for canonical correlation analysis (LS, SJ, JY), pp. 1024–1031.
ICMLICML-2008-WangM #using
Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICMLICML-2008-WangYQZ #component #composition #feature model
Dirichlet component analysis: feature extraction for compositional data (HYW, QY, HQ, HZ), pp. 1128–1135.
ICMLICML-2008-ZhangTK #approximate #fault #rank
Improved Nyström low-rank approximation and error analysis (KZ, IWT, JTK), pp. 1232–1239.
ICPRICPR-2008-Boccignone #parametricity #video
Nonparametric Bayesian attentive video analysis (GB), pp. 1–4.
ICPRICPR-2008-BridsonA #approach #evaluation #geometry #layout #performance
A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
ICPRICPR-2008-ChoiGCC #independence #kernel
Kernel oriented discriminant analysis for speaker-independent phoneme spaces (HC, RGO, SC, YC), pp. 1–4.
ICPRICPR-2008-ChoiMSH #using
Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPRICPR-2008-ChuangLL #process #representation
Human activity analysis based on a torso-less representation (JHC, CWL, KHL), pp. 1–4.
ICPRICPR-2008-DingB #adaptation
Adaptive Laplacian eigenfunctions as bases for regression analysis (LD, XB), pp. 1–4.
ICPRICPR-2008-El-BazCGMSVM #3d #matter
Dyslexia diagnostics by 3D texture analysis of cerebral white matter gyrifications (AEB, MC, GLG, MM, AES, EV, RM), pp. 1–4.
ICPRICPR-2008-El-BazGFE #3d #approach #automation #detection #image #monitoring
A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
ICPRICPR-2008-HardingE #2d #fourier #gesture #recognition
The Fourier Analysis of 2DT movement with particular reference to hand gesture recognition (PRGH, TJE), pp. 1–4.
ICPRICPR-2008-HouLLCWY #modelling
Fingerprint orientation analysis with topological modeling (ZH, JL, HKL, TPC, HLW, WYY), pp. 1–4.
ICPRICPR-2008-IhaddadeneD #realtime
Real-time crowd motion analysis (NI, CD), pp. 1–4.
ICPRICPR-2008-KaholV #modelling #process #using
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPRICPR-2008-KaiserH #detection
Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
ICPRICPR-2008-KleberSGM #documentation
Ancient document analysis based on text line extraction (FK, RS, MG, HM), pp. 1–4.
ICPRICPR-2008-LablackD #behaviour
Analysis of human behaviour in front of a target scene (AL, CD), pp. 1–4.
ICPRICPR-2008-LiuS #correlation
Recovering audio-to-video synchronization by audiovisual correlation analysis (YL, YS), pp. 1–4.
ICPRICPR-2008-LiZWH #clustering #multi
Multiclass spectral clustering based on discriminant analysis (XL, ZZ, YW, WH), pp. 1–4.
ICPRICPR-2008-LuCC #image #multi #recognition
Multilinear analysis based on image texture for face recognition (HL, HC, YWC), pp. 1–4.
ICPRICPR-2008-MorrisT #adaptation #process #video
An adaptive scene description for activity analysis in surveillance video (BM, MMT), pp. 1–4.
ICPRICPR-2008-NedzvedABMD #image
The structure analysis of ultra thin magnetic film images (AN, SA, AB, AM, WD), pp. 1–4.
ICPRICPR-2008-NohHL #invariant #recognition
Regularized discriminant analysis for transformation-invariant object recognition (YKN, JH, DDL), pp. 1–5.
ICPRICPR-2008-OjansivuRH #invariant
Rotation invariant local phase quantization for blur insensitive texture analysis (VO, ER, JH), pp. 1–4.
ICPRICPR-2008-PaclikLND #estimation #multi #using
Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPRICPR-2008-ParkCDK #clustering #linear
Linear discriminant analysis for data with subcluster structure (HP, JC, BLD, JK), pp. 1–4.
ICPRICPR-2008-ParkSK
Facial expression analysis with facial expression deformation (SP, JS, DK), pp. 1–4.
ICPRICPR-2008-SaitohMK #performance
Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
ICPRICPR-2008-ShafaitBKB #layout #modelling #statistics #variability
Background variability modeling for statistical layout analysis (FS, JvB, DK, TMB), pp. 1–4.
ICPRICPR-2008-ThomasRCB #comparative
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
ICPRICPR-2008-VillS #automation #classification
Automated stroke ending analysis for drawing tool classification (MCV, RS), pp. 1–4.
ICPRICPR-2008-WangYY #fuzzy #recognition
Fuzzy maximum scatter discriminant analysis and its application to face recognition (JW, WY, JY), pp. 1–4.
ICPRICPR-2008-XiaDG #invariant
Locally invariant texture analysis from the topographic map (GSX, JD, YG), pp. 1–4.
ICPRICPR-2008-YangQ #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-ZengLH
Analysis on two fishermethods and a synthesized discriminant projection (ZZ, CL, LH), pp. 1–4.
KDDKDD-2008-BoutsidisMD #component #feature model
Unsupervised feature selection for principal components analysis (CB, MWM, PD), pp. 61–69.
KDDKDD-2008-GodboleR #automation #classification #industrial
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry (SG, SR), pp. 911–919.
KDDKDD-2008-GodboleR08a #automation #industrial
An integrated system for automatic customer satisfaction analysis in the services industry (SG, SR), pp. 1073–1076.
KDDKDD-2008-KoenigsteinST #query #string #using
Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDDKDD-2008-YuFRKRDL #privacy
Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
KDDKDD-2008-ZengMLBM #predict #using
Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KRKR-2008-Balbiani #reasoning #representation #standard
Time Representation and Temporal Reasoning from the Perspective of Non-Standard Analysis (PB), pp. 695–704.
RecSysRecSys-2008-Domingues #adaptation #framework #independence #monitoring #platform #web
An independent platform for the monitoring, analysis and adaptation of web sites (MAD), pp. 299–302.
RecSysRecSys-2008-LakiotakiTM #multi #named #recommendation
UTA-Rec: a recommender system based on multiple criteria analysis (KL, ST, NFM), pp. 219–226.
RecSysRecSys-2008-WuWC #automation #incremental #probability #recommendation #semantics
Incremental probabilistic latent semantic analysis for automatic question recommendation (HW, YW, XC), pp. 99–106.
SEKESEKE-2008-AltahatET #detection #diagrams #graph transformation #interactive #uml
Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
SEKESEKE-2008-DrumondGS #information management #semantics #similarity #web
A Similarity Analysis Model for Semantic Web Information Filtering Applications (LD, RG, FS), pp. 638–642.
SEKESEKE-2008-EmerVJ #database #relational #testing
Testing Relational Database Schemas with Alternative Instance Analysis (MCFPE, SRV, MJ), pp. 357–362.
SEKESEKE-2008-GaoKF #complexity #modelling #testing
Model-based Test Complexity Analysis for Software Installation Testing (JG, KK, TF), pp. 631–637.
SEKESEKE-2008-LiuCH #named
PSPCAT: A PSP Data Collection and Analysis Tool (CHL, SLC, YCH), pp. 33–37.
SEKESEKE-2008-MatalongaG #fault
Linking Return on Training Investment with Defects Causal Analysis (SM, TSFG), pp. 42–47.
SEKESEKE-2008-ParveenATMF #detection #probability #towards
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
SEKESEKE-2008-WuC #data transformation
A Wed-based data Management and Analysis System for CO2 Capture (YW, CWC), pp. 857–860.
SIGIRSIGIR-2008-JiangA #categorisation
Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
SIGIRSIGIR-2008-PengL #evolution #topic #using
Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIRSIGIR-2008-WangLZD #matrix #multi #semantics #summary #symmetry
Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization (DW, TL, SZ, CHQD), pp. 307–314.
SIGIRSIGIR-2008-WanY #clustering #multi #summary #using
Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIRSIGIR-2008-XuZL #image #named #novel #semantics #web
WISA: a novel web image semantic analysis system (HX, XZ, LL), pp. 777–778.
ECMFAECMDA-FA-2008-FritzscheGFSKB #modelling #performance #towards
Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
ECMFAECMDA-FA-2008-WaheedIM #action semantics #data flow #execution #modelling #semantics #uml
Data Flow Analysis of UML Action Semantics for Executable Models (TW, MZZI, ZIM), pp. 79–93.
MODELSMoDELS-2008-BernardiMP #dependence
Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
MODELSMoDELS-2008-CabotCGL #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-NugrohoFC #empirical #fault #modelling #uml
Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
MODELSMoDELS-2008-ShoushaBL #algorithm #concurrent #search-based #uml
A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
MODELSMoDELS-2008-TawhidP #development #modelling #performance #product line
Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
SPLCSPLC-2008-AlvesSBRSRPR #case study #information retrieval
An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
SPLCSPLC-2008-HarhurinH
Service-Oriented Commonality Analysis Across Existing Systems (AH, JH), pp. 255–264.
SPLCSPLC-2008-NiuE #clustering #functional #on-demand #product line #requirements
On-Demand Cluster Analysis for Product Line Functional Requirements (NN, SME), pp. 87–96.
MODELSMoDELS-2008-BernardiMP #dependence
Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
MODELSMoDELS-2008-CabotCGL #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-NugrohoFC #empirical #fault #modelling #uml
Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
MODELSMoDELS-2008-ShoushaBL #algorithm #concurrent #search-based #uml
A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
MODELSMoDELS-2008-TawhidP #development #modelling #performance #product line
Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
ECOOPECOOP-2008-HessellundS
Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
OOPSLAOOPSLA-2008-GopinathanR #protocol #runtime
Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
OOPSLAOOPSLA-2008-KawachiyaOO #java #memory management #reduction #string
Analysis and reduction of memory inefficiencies in Java strings (KK, KO, TO), pp. 385–402.
OOPSLAOOPSLA-2008-NaeemL #multi
Typestate-like analysis of multiple interacting objects (NAN, OL), pp. 347–366.
AdaEuropeAdaEurope-2008-Pettit #architecture #concurrent
Increasing Confidence in Concurrent Software through Architectural Analysis (RGPI), pp. 199–210.
LOPSTRLOPSTR-2008-BandaG #hybrid #linear
Analysis of Linear Hybrid Systems in CLP (GB, JPG), pp. 55–70.
PADLPADL-2008-EshkevariAC #aspect-oriented #comprehension #declarative #dependence #reasoning #source code
Comprehension and Dependency Analysis of Aspect-Oriented Programs through Declarative Reasoning (LME, VA, CC), pp. 35–52.
PEPMPEPM-2008-PietrzakCPH #composition #prolog #source code #verification
A practical type analysis for verification of modular prolog programs (PP, JC, GP, MVH), pp. 61–70.
PLDIPLDI-2008-ChughVJL #concurrent #data flow #detection #source code #using
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
PLDIPLDI-2008-DilligDA #scalability
Sound, complete and scalable path-sensitive analysis (ID, TD, AA), pp. 270–280.
PLDIPLDI-2008-DincklageD
Explaining failures of program analyses (DvD, AD), pp. 260–269.
PLDIPLDI-2008-Kahlon #alias #named #pointer #scalability
Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
PLDIPLDI-2008-WangXLGWZ #correlation #memory management
Conditional correlation analysis for safe region-based memory management (XW, ZX, XL, ZG, XW, ZZ), pp. 45–55.
POPLPOPL-2008-ChangR #induction #relational
Relational inductive shape analysis (BYEC, XR), pp. 247–260.
POPLPOPL-2008-Danielsson #complexity #data type #functional #lightweight
Lightweight semiformal time complexity analysis for purely functional data structures (NAD), pp. 133–144.
POPLPOPL-2008-ZhengR #alias #c
Demand-driven alias analysis for C (XZ, RR), pp. 197–208.
PPDPPPDP-2008-Hanus #functional #logic programming #source code
Call pattern analysis for functional logic programs (MH), pp. 67–78.
QAPLQAPL-2008-PierroSW #abstract interpretation #precise #probability #relational
Relational Analysis and Precision via Probabilistic Abstract Interpretation (ADP, PS, HW), pp. 23–42.
SASSAS-2008-BalakrishnanSIWG #detection #named #refinement
SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
SASSAS-2008-BauerNNP #correlation #relational
Relational Analysis of Correlation (JB, FN, HRN, HP), pp. 32–46.
SASSAS-2008-ConwayDNB #fault #pointer #proving
Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
SASSAS-2008-HornM
Flow Analysis, Linearity, and PTIME (DVH, HGM), pp. 255–269.
SASSAS-2008-LammichM #concurrent #monitoring #source code #thread
Conflict Analysis of Programs with Procedures, Dynamic Thread Creation, and Monitors (PL, MMO), pp. 205–220.
SASSAS-2008-ManevichLSRB #composition #concurrent
Heap Decomposition for Concurrent Shape Analysis (RM, TLA, MS, GR, JB), pp. 363–377.
SASSAS-2008-MidtgaardJ #abstract interpretation #approach #control flow
A Calculational Approach to Control-Flow Analysis by Abstract Interpretation (JM, TPJ), pp. 347–362.
SASSAS-2008-Perdrix #abstract interpretation #quantum
Quantum Entanglement Analysis Based on Abstract Interpretation (SP), pp. 270–282.
SASSAS-2008-PrabhuS #array #java #pointer #using
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
RERE-2008-FeatherHMU #deployment #requirements #using
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RERE-2008-FinkelsteinHMRZ #requirements
“Fairness Analysis” in Requirements Assignments (AF, MH, SAM, JR, YZ), pp. 115–124.
RERE-2008-GlorioPMT #eclipse #named #plugin
DaWaRA: An Eclipse Plugin for Usingi* on Data Warehouse Requirement Analysis (OG, JP, JNM, JT), pp. 317–318.
RERE-2008-TanabeUAYKS #requirements
Supporting Requirements Change Management in Goal Oriented Analysis (DT, KU, KA, TY, HK, MS), pp. 3–12.
ASEASE-2008-AdnanGDZ #clustering #component #design #interface #using
Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASEASE-2008-Frisby #tool support
Unifying Analysis Tools with Rosetta (NF), pp. 505–508.
ASEASE-2008-MooreS #design #layout
Combining the Analysis of Spatial Layout and Text to Support Design Exploration (JMM, FMSI), pp. 379–382.
ASEASE-2008-Pinzger #automation #performance #web
Automated Web Performance Analysis (MP), pp. 513–516.
ASEASE-2008-SchumannGPMB #parametricity #scalability #simulation #tool support
Tool Support for Parametric Analysis of Large Software Simulation Systems (JS, KGB, CSP, TM, TB), pp. 497–498.
ASEASE-2008-ZhangGC #automation #clustering #recommendation
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis (DZ, YG, XC), pp. 278–287.
FSEFSE-2008-JiangS #effectiveness #testing
Profile-guided program simplification for effective testing and analysis (LJ, ZS), pp. 48–58.
FSEFSE-2008-MeneelyWSO #developer #network #predict #social
Predicting failures with developer networks and social network analysis (AM, LW, WS, JAO), pp. 13–23.
ICSEICSE-2008-ChenSR #java #named #predict #runtime
jPredictor: a predictive runtime analysis tool for java (FC, TFS, GR), pp. 221–230.
ICSEICSE-2008-JurjensSB #mobile #modelling #security
Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
ICSEICSE-2008-MoserPS #comparative #fault #metric #performance #predict
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
ICSEICSE-2008-ReichertKSMH #network #protocol
A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
ICSEICSE-2008-ZimmermannN #dependence #fault #graph #network #predict #using
Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
SACSAC-2008-AbedMS #graph #multi #proving #reachability #theorem proving #using
Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SACSAC-2008-AmatoCCMTVGLGM #detection
A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
SACSAC-2008-AraujoSF #algebra #process
HIV drug resistance analysis tool based on process algebra (LVdA, ECS, JEF), pp. 1358–1363.
SACSAC-2008-AvolaC #image
Encephalic NMR image analysis by textural interpretation (DA, LC), pp. 1338–1342.
SACSAC-2008-BallabrigaCS #approach
An improved approach for set-associative instruction cache partial analysis (CB, HC, PS), pp. 360–367.
SACSAC-2008-BaveraB #bytecode #data flow #policy #type system
Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
SACSAC-2008-BussBSE #flexibility #graph #pointer #using
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SACSAC-2008-CernuzziZ #comparative #evaluation
Profile based comparative analysis for AOSE methodologies evaluation (LC, FZ), pp. 60–65.
SACSAC-2008-ChenXN #detection #fault #specification
A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
SACSAC-2008-CorreaIZF #image #mobile #using
Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SACSAC-2008-CostaNFC #assessment #parametricity
Parametric cepstral analysis for pathological voice assessment (SCC, BGAN, JMF, SC), pp. 1410–1414.
SACSAC-2008-Denner-Broser #algorithm #problem #using
An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SACSAC-2008-GarciaH #functional #metric #using
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-KaiyaSOKK #quality #requirements #towards
Toward quality requirements analysis based on domain specific quality spectrum (HK, TS, AO, NK, KK), pp. 596–601.
SACSAC-2008-OliveiraMWS #locality
Brain registration and subtraction — improved localization for SPECT analysis (B.R.A.S.I.L.): a computer-aided diagnosis in epilepsy tool kit (LFdO, PMdAM, LWA, ACS), pp. 1390–1394.
SACSAC-2008-Papadopoulos #retrieval #semantics
Trajectory retrieval with latent semantic analysis (ANP), pp. 1089–1094.
SACSAC-2008-Schneider #hybrid #reachability
Reachability analysis of generalized polygonal hybrid systems (GS), pp. 327–332.
SACSAC-2008-SilvaDSSM #automation #component #segmentation
Automated segmentation and volumetric analysis of brain components on MR imaging (MPS, JRD, FLS, ASdS, DCMS), pp. 1422–1423.
SACSAC-2008-TakasuA #documentation #information management #layout #probability
Information extraction from scanned documents by stochastic page layout analysis (AT, KA), pp. 447–448.
SACSAC-2008-VellosoR #algorithm
Percolation analyses in a swarm based algorithm for shortest-path finding (BPV, MR), pp. 1861–1865.
SACSAC-2008-WendtGSWNM #mobile #optimisation #smarttech
System level power profile analysis and optimization for smart cards and mobile devices (MW, MG, CS, RW, UN, AM), pp. 1884–1888.
ATEMATEM-J-2006-MiguelBSA #development #integration #modelling #safety
Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
SLESLE-2008-HageK #library #named
Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
SLESLE-2008-MoodyH #diagrams #effectiveness #syntax #uml #visual notation
Evaluating the Visual Syntax of UML: An Analysis of the Cognitive Effectiveness of the UMLFamily of Diagrams (DLM, JvH), pp. 16–34.
ASPLOSASPLOS-2008-TuckACT #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CASECASE-2008-EconomopoulosK
Analysis of a simple CONWIP system with impatient customers (AAE, VSK), pp. 291–296.
CASECASE-2008-FanKJAB #architecture #design
Integrated fixture design and analysis system based on service-oriented architecture (LF, ASK, BNJ, SA, SHB), pp. 656–661.
CASECASE-2008-GarciaJMM #distributed #effectiveness #modelling
A procedure for modeling and analysis of service-oriented and distributed productive systems (JIG, FJ, RAGM, PEM), pp. 941–946.
CASECASE-2008-HuangK #assembly #design #evaluation #multi #process
Process capability sensitivity analysis for design evaluation of multi station assembly systems (WH, ZK), pp. 400–405.
CASECASE-2008-LeeCAG #automation #evaluation #image #quality
Color quantization and image analysis for automated fruit quality evaluation (DJL, YC, JKA, CRG), pp. 194–199.
CASECASE-2008-LiuL #interactive #mobile
Track-stair and vehicle-manipulator interaction analysis for tracked mobile manipulators climbing stairs (YL, GL), pp. 157–162.
CASECASE-2008-MatsumotoUOI #empirical #process
Business process analysis to obtain empirical lot sizing rule in printing process (SM, NU, KO, HI), pp. 591–596.
CASECASE-2008-MitaniH #metric #symmetry #using
Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASECASE-2008-NandakumarHM #automation #flexibility #framework #interactive
A flexible framework for automation of single cell and cell-to-cell interaction analyses (VN, MH, DRM), pp. 424–430.
CASECASE-2008-NieIYTOM #behaviour #performance #video
High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
CASECASE-2008-SunEHMMMBLM #automation #biology #integration #multi #user interface
Integration of user interface, device control, data acquisition and analysis for automated multi-spectral imaging of single biological cells (CSS, JRE, MH, TWM, SKM, SM, LWB, MEL, DRM), pp. 1013–1018.
CASECASE-2008-WangLABH #flexibility #quality
Quality analysis in flexible manufacturing systems with batch productions (JW, JL, JA, SB, NH), pp. 460–465.
CCCC-2008-KhedkerK #data flow #interprocedural #performance #precise #string
Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
CCCC-2008-LogozzoF #bytecode #on the #source code
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
CCCC-2008-MarronHKS #graph #modelling #performance
Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models (MM, MVH, DK, DS), pp. 245–259.
CCCC-2008-RepsB #bytecode
Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
CCCC-2008-RountevSX #data flow #ide #library #object-oriented #scalability
IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries (AR, MS, G(X), pp. 53–68.
CGOCGO-2008-ThakurG #data flow
Comprehensive path-sensitive data-flow analysis (AVT, RG), pp. 55–63.
CGOCGO-2008-ZhaoCW #manycore #named #pipes and filters #profiling
Pipa: pipelined profiling and analysis on multi-core systems (QZ, IC, WFW), pp. 185–194.
CGOCGO-2008-ZhuangKSC #difference #framework #named #performance #virtual machine
Perfdiff: a framework for performance difference analysis in a virtual machine environment (XZ, SK, MJS, JDC), pp. 4–13.
DACDAC-2008-AhmadiZ #approach #hardware #optimisation
Symbolic noise analysis approach to computational hardware optimization (AA, MZ), pp. 391–396.
DACDAC-2008-FeldmannASSBG #modelling #multi
Driver waveform computation for timing analysis with multiple voltage threshold driver models (PF, SA, DS, GS, RB, HG), pp. 425–428.
DACDAC-2008-GandikotaBS #modelling #statistics
Modeling crosstalk in statistical static timing analysis (RG, DB, DS), pp. 974–979.
DACDAC-2008-GoelV #modelling #standard #statistics
Statistical waveform and current source based standard cell models for accurate timing analysis (AG, SBKV), pp. 227–230.
DACDAC-2008-GuzeyWLF #functional #testing
Functional test selection based on unsupervised support vector analysis (OG, LCW, JRL, HF), pp. 262–267.
DACDAC-2008-HeloueN #modelling
Parameterized timing analysis with general delay models and arbitrary variation sources (KRH, FNN), pp. 403–408.
DACDAC-2008-ImaiSNM #framework #parametricity #statistics
Non-parametric statistical static timing analysis: an SSTA framework for arbitrary distribution (MI, TS, NN, KM), pp. 698–701.
DACDAC-2008-KshirsagarEB #performance
Analysis and implications of parasitic and screening effects on the high-frequency/RF performance of tunneling-carbon nanotube FETs (CK, MNEZ, KB), pp. 250–255.
DACDAC-2008-KumarKS #framework
A framework for block-based timing sensitivity analysis (SVK, CVK, SSS), pp. 688–693.
DACDAC-2008-LiangM #execution #modelling #probability
Cache modeling in probabilistic execution time analysis (YL, TM), pp. 319–324.
DACDAC-2008-LiZY #verification
Full-chip leakage analysis in nano-scale technologies: mechanisms, variation sources, and verification (TL, WZ, ZY), pp. 594–599.
DACDAC-2008-MohalikRDRSPJ #embedded #latency #model checking #realtime
Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts (SM, ACR, MGD, SR, PVS, PKP, SJ), pp. 296–299.
DACDAC-2008-ParkM #debugging #locality #named
IFRA: instruction footprint recording and analysis for post-silicon bug localization in processors (SBP, SM), pp. 373–378.
DACDAC-2008-RajaVBG #modelling #performance
Transistor level gate modeling for accurate and fast timing, noise, and power analysis (SR, FV, MRB, JG), pp. 456–461.
DACDAC-2008-TamPB #automation #layout #locality #precise #using
Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DACDAC-2008-VeetilSB #incremental #monte carlo #performance #statistics
Efficient Monte Carlo based incremental statistical timing analysis (VV, DS, DB), pp. 676–681.
DACDAC-2008-YeZP #equation #linear #multi
Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
DATEDATE-2008-DasMJZMC #component #detection #implementation #network #performance
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
DATEDATE-2008-DubrovaTT #feedback #on the #synthesis
On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers (ED, MT, HT), pp. 1286–1291.
DATEDATE-2008-ElmqvistN #component #incremental #tool support
Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems (JE, SNT), pp. 921–927.
DATEDATE-2008-ErnstJSBC #formal method #optimisation #performance
Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
DATEDATE-2008-FrankWESN #architecture #design #evaluation #standard #tool support
Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
DATEDATE-2008-FrenkilCU #design #physics #power management
Power Gating for Ultra-low Leakage: Physics, Design, and Analysis (JF, KC, KU).
DATEDATE-2008-GhamarianGBS #data flow #graph #parametricity #throughput
Parametric Throughput Analysis of Synchronous Data Flow Graphs (AHG, MG, TB, SS), pp. 116–121.
DATEDATE-2008-GlassLRHT #network #optimisation #reliability
Symbolic Reliability Analysis and Optimization of ECU Networks (MG, ML, FR, CH, JT), pp. 158–163.
DATEDATE-2008-GoelV #standard
Current source based standard cell model for accurate signal integrity and timing analysis (AG, SBKV), pp. 574–579.
DATEDATE-2008-GouraryRUZMG #injection
Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
DATEDATE-2008-HauslerPHHN #design
Qalitative and Quantitative Analysis of IC Designs (SH, FP, KH, AH, WN), pp. 935–936.
DATEDATE-2008-Katoen #design #embedded #evaluation #modelling #roadmap
Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
DATEDATE-2008-LiTM #grid #named #network #power management
ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
DATEDATE-2008-Liu #probability #statistics
Signal Probability Based Statistical Timing Analysis (BL), pp. 562–567.
DATEDATE-2008-RealCCDV #hardware
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis (DR, CC, JC, MD, FV), pp. 1274–1279.
DATEDATE-2008-Rimolo-DonadioSGKR #metric #optimisation
Analysis and Optimization of the Recessed Probe Launch for High Frequency Measurements of PCB Interconnects (RRD, CS, XG, YHK, MBR), pp. 252–255.
DATEDATE-2008-ShiRWP #modelling #statistics
Latch Modeling for Statistical Timing Analysis (SXS, AR, DW, DZP), pp. 1136–1141.
DATEDATE-2008-SilvaPS #performance #power management #representation
Efficient Representation and Analysis of Power Grids (JMSS, JRP, LMS), pp. 420–425.
DATEDATE-2008-SinanogluM #composition #reduction #testing
Analysis of The Test Data Volume Reduction Benefit of Modular SOC Testing (OS, EJM), pp. 182–187.
DATEDATE-2008-VersenSSD #locality
Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
DATEDATE-2008-VinkBW #architecture #performance
Performance Analysis of SoC Architectures Based on Latency-Rate Servers (JPV, KvB, PvdW), pp. 200–205.
DATEDATE-2008-VytyazHMM #constraints #design #similarity
Periodic Steady-State Analysis Augmented with Design Equality Constraints (IV, PKH, UKM, KM), pp. 312–317.
DATEDATE-2008-WolffPBC #detection #problem #towards
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
DATEDATE-2008-ZengC #polynomial #random
Deep Submicron Interconnect Timing Model with Quadratic Random Variable Analysis (JKZ, CPC), pp. 1091–1094.
DATEDATE-2008-ZhouPB #generative #metric #modelling #using
Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
DATEDATE-2008-ZjajoG #fault #multi
Diagnostic Analysis of Static Errors in Multi-Step Analog to Digital Converters (AZ, JPdG), pp. 74–79.
HPCAHPCA-2008-KimGWB #performance #using
System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
LCTESLCTES-2008-AnandL #embedded #robust #scheduling
Robust and sustainable schedulability analysis of embedded software (MA, IL), pp. 61–70.
LCTESLCTES-2008-ReinekeG #policy
Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
PDPPDP-2008-AlbrechtRKPM #configuration management #framework #performance #platform #runtime
Performance Analysis of Bus-Based Interconnects for a Run-Time Reconfigurable Co-Processor Platform (CA, PR, RK, TP, EM), pp. 200–205.
PDPPDP-2008-KrenekPKFSDSWM #multi #simulation #using
Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
PPoPPPPoPP-2008-ChandraSSB #data type #distributed #locality #type inference
Type inference for locality analysis of distributed data structures (SC, VAS, VS, RB), pp. 11–22.
PPoPPPPoPP-2008-PraunBC #concurrent #dependence #modelling #using
Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPPPPoPP-2008-WangYFDWJ #automation #source code
Automated application-level checkpointing based on live-variable analysis in MPI programs (PW, XY, HF, YD, ZW, JJ), pp. 273–274.
FASEFASE-2008-JurjensSY #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FASEFASE-2008-LaraV #modelling
Translating Model Simulators to Analysis Models (JdL, HV), pp. 77–92.
FASEFASE-2008-MohaGMD #algorithm #design #detection #fault
A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
FoSSaCSFoSSaCS-2008-BouyerMR #automaton #robust
Robust Analysis of Timed Automata via Channel Machines (PB, NM, PAR), pp. 157–171.
STOCSTOC-2008-ODonnell #topic
Some topics in analysis of boolean functions (RO), pp. 569–578.
TACASTACAS-2008-BlancKS #modelling #named
Scoot: A Tool for the Analysis of SystemC Models (NB, DK, NS), pp. 467–470.
TACASTACAS-2008-LalTKR #bound #concurrent #interprocedural #source code
Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
TACASTACAS-2008-TorreMP #bound #concurrent #queue
Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
CAVCAV-2008-BackesLMP #abstraction #protocol #security
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
CAVCAV-2008-BerdineLMRS #concurrent #quantifier #thread
Thread Quantification for Concurrent Shape Analysis (JB, TLA, RM, GR, SS), pp. 399–413.
CAVCAV-2008-Cremers #protocol #security #verification
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
CAVCAV-2008-GulavaniG #abstract domain #abstraction
A Numerical Abstract Domain Based on Expression Abstraction and Max Operator with Application in Timing Analysis (BSG, SG), pp. 370–384.
CAVCAV-2008-GulwaniT #approach #constraints #hybrid
Constraint-Based Approach for Analysis of Hybrid Systems (SG, AT), pp. 190–203.
CAVCAV-2008-KimJRSPKS #random #simulation
Application of Formal Word-Level Analysis to Constrained Random Simulation (HK, HJ, KR, PS, JP, RPK, FS), pp. 487–490.
CAVCAV-2008-LalR #bound #concurrent
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
CAVCAV-2008-YangLBCCDO #scalability
Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
ICLPICLP-2008-Lassen #sequence
Biosequence Analysis in PRISM (OTL), pp. 809–810.
ICLPICLP-2008-PilozziS #revisited #termination
Termination Analysis of CHR Revisited (PP, DDS), pp. 501–515.
ICLPICLP-2008-Vidal #effectiveness #partial evaluation #predict
Trace Analysis for Predicting the Effectiveness of Partial Evaluation (GV), pp. 790–794.
ICSTICST-2008-McQuillanP #alloy #metamodelling #metric #object-oriented #using
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
IJCARIJCAR-2008-AvanziniMS #automation #complexity
Automated Implicit Computational Complexity Analysis (MA, GM, AS), pp. 132–138.
IJCARIJCAR-2008-HirokawaM #automation #complexity #dependence
Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
ISSTAISSTA-2008-DoR #modelling #testing #using
Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTAISSTA-2008-LoginovYCFRN #safety #verification
Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
ISSTAISSTA-2008-XuR #points-to #scalability
Merging equivalent contexts for scalable heap-cloning-based context-sensitive points-to analysis (G(X, AR), pp. 225–236.
LICSLICS-2008-Kahlon #abstraction #approach #concurrent #data flow #source code
Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs (VK), pp. 181–192.
ICSTSAT-2008-AudemardBHJS #framework
A Generalized Framework for Conflict Analysis (GA, LB, YH, SJ, LS), pp. 21–27.
TAPTAP-2008-DunetsSR #bound #data type #relational
Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
FATESTestCom-FATES-2008-GrozLPS #composition #reachability #testing #verification
Modular System Verification by Inference, Testing and Reachability Analysis (RG, KL, AP, MS), pp. 216–233.
FATESTestCom-FATES-2008-WangH #concurrent #generative #realtime #testing
Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis (FW, GDH), pp. 234–249.
VMCAIVMCAI-2008-Mendez-LojoH #precise #set #source code
Precise Set Sharing Analysis for Java-Style Programs (MML, MVH), pp. 172–187.
ECSAECSA-2007-Zalewski #architecture #development #scalability
Beyond ATAM: Architecture Analysis in the Development of Large Scale Software Systems (AZ), pp. 92–105.
WICSAWICSA-2007-Apte #distributed #performance
Performance Analysis of Distributed Software Systems: Approaches Based on Queueing Theory (VA), p. 39.
WICSAWICSA-2007-Florentz #architecture #evaluation #optimisation #representation
Inside Architecture Evaluation: Analysis and Representation of Optimization Potential (BF), p. 3.
WICSAWICSA-2007-SangwanH #architecture #design #object-oriented
Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
DocEngDocEng-2007-ZouLT #approach #html #markov
Structure and content analysis for html medical articles: a hidden markov model approach (JZ, DXL, GRT), pp. 199–201.
DRRDRR-2007-ZouLT #layout #online
Online medical journal article layout analysis (JZ, DXL, GRT).
TPDLECDL-2007-NakamuraKJOKTOT #web
Trustworthiness Analysis of Web Search Results (SN, SK, AJ, HO, HK, TT, SO, KT), pp. 38–49.
HTHT-2007-HalveyK #online #video
Analysis of online video search and sharing (MH, MTK), pp. 217–226.
ICDARICDAR-2007-AntonacopoulosB #framework #layout #performance
Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
ICDARICDAR-2007-BelaidRF #data transformation #documentation #image #representation #xml
XML Data Representation in Document Image Analysis (AB, YR, IF), pp. 78–82.
ICDARICDAR-2007-BoussellaaZTAB #documentation #named #preprocessor
PRAAD: Preprocessing and Analysis Tool for Arabic Ancient Documents (WB, AZ, BT, AMA, AB), pp. 1058–1062.
ICDARICDAR-2007-BulacuKSZ #documentation #layout
Layout Analysis of Handwritten Historical Documents for Searching the Archive of the Cabinet of the Dutch Queen (MB, RvK, LS, TvdZ), pp. 357–361.
ICDARICDAR-2007-GazzahA #identification #using
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-HerouxBAT #automation #comprehension #documentation #generative #image
Automatic Ground-truth Generation for Document Image Analysis and Understanding (PH, EB, SA, ÉT), pp. 476–480.
ICDARICDAR-2007-HiranoOOY #documentation #information management #layout
Text and Layout Information Extraction from Document Files of Various Formats Based on the Analysis of Page Description Language (TH, YO, YO, FY), pp. 262–266.
ICDARICDAR-2007-KoklaPK #image
Ink Discrimination Based on Co-occurrence Analysis of Visible and Infrared Images (VK, AP, VK), pp. 1148–1152.
ICDARICDAR-2007-KwonP #implementation #recognition
Implementation of Content Analysis System for Recognition of Journals_ Table of Contents (YBK, JP), pp. 1018–1022.
ICDARICDAR-2007-LemaitreGP #2d #approach #layout #markov
Preliminary experiments in layout analysis of handwritten letters based on textural and spatial information and a 2D Markovian approach (ML, EG, FJP), pp. 1023–1027.
ICDARICDAR-2007-MinagawaFTF #image #layout #logic
Logical Structure Analysis for Form Images with Arbitrary Layout by Belief Propagation (AM, YF, HT, KF), pp. 714–718.
ICDARICDAR-2007-SekiFNSM #documentation #information management #using
Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDARICDAR-2007-Silva #documentation #metric #performance
New Metrics for Evaluating Performance in Document Analysis Tasks_Application to the Table Case (ACeS), pp. 481–485.
ICDARICDAR-2007-SmirnovaW #aspect-oriented
Aspects of Mathematical Expression Analysis in Arabic Handwriting (ESS, SMW), pp. 1183–1187.
ICDARICDAR-2007-TerradesTV #documentation #overview
A Review of Shape Descriptors for Document Analysis (ORT, ST, EV), pp. 227–231.
JCDLJCDL-2007-AbbasiC #categorisation #communication #using #visualisation
Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
JCDLJCDL-2007-ShimboIM #evaluation #kernel #metric #recommendation #research
Evaluation of kernel-based link analysis measures on research paper recommendation (MS, TI, YM), pp. 354–355.
JCDLJCDL-2007-ThomasMW #music #resource management
Preparing resource discovery for digitized music: an analysis of an australian application (JAT, MRM, MW), pp. 298–302.
JCDLJCDL-2007-YangM #named
CiteSearch: next-generation citation analysis (KY, LIM), pp. 101–102.
SIGMODSIGMOD-2007-RusuD #sketching #statistics
Statistical analysis of sketch estimators (FR, AD), pp. 187–198.
SIGMODSIGMOD-2007-StahlbergML #database #forensics #privacy
Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
VLDBVLDB-2007-BansalK #named #online
BlogScope: A System for Online Analysis of High Volume Text Streams (NB, NK), pp. 1410–1413.
VLDBVLDB-2007-ParreiraMBCW #community #social
P2P Authority Analysis for Social Communities (JXP, SM, MB, TC, GW), pp. 1398–1401.
VLDBVLDB-2007-PossNW #why
Why You Should Run TPC-DS: A Workload Analysis (MP, RON, DW), pp. 1138–1149.
CSEETCSEET-2007-SobelC #design #formal method
Supporting the Formal Analysis of Software Designs (AEKS, SC), pp. 123–132.
CSEETCSEET-2007-Staron #learning #student #using
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEETCSEET-2007-TakemuraNHM #education #motivation #programming
Analysis of the Relation between the Teaching Materials and Motivation in Programming Education (YT, HN, KLH, KiM), pp. 317–326.
ITiCSEITiCSE-2007-Bower #concept #independence #online
Independent, synchronous and asynchronous an analysis of approaches to online concept formation (MB), pp. 141–145.
SIGITESIGITE-2007-MalikHGS #comparative
Laboratory modules for conducting comparative analysis of 802.11 frames (RAM, RAH, JEG, AHS), pp. 225–232.
CSMRCSMR-2007-Stoermer #architecture #quality #re-engineering
Software Quality Attribute Analysis by Architecture Reconstruction (SQUA3RE) (CS), pp. 361–364.
ICPCICPC-2007-ZhangI #fault
Error Report Driven Post-Mortem Analysis (YZ, SPI), pp. 208–220.
ICSMEICSM-2007-BrandBS #debugging #detection
Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
ICSMEICSM-2007-Bruntink #legacy
Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems (MB), pp. 499–500.
ICSMEICSM-2007-CapraFM #empirical #maintenance #open source
The Economics of Open Source Software: An Empirical Analysis of Maintenance Costs (EC, CF, FM), pp. 395–404.
ICSMEICSM-2007-Chaabane #detection
Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
ICSMEICSM-2007-CossetteW #dependence #evaluation #semiparsing #using
Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSMEICSM-2007-DongG #dependence #object-oriented
System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
ICSMEICSM-2007-McMasterM #detection #fault #probability #reduction #testing
Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
MSRMSR-2007-HerraizGR07a #eclipse #using
Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSRMSR-2007-LivieriHMI #evolution #kernel #linux #using
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSRMSR-2007-RigbyH #developer #what
What Can OSS Mailing Lists Tell Us? A Preliminary Psychometric Text Analysis of the Apache Developer Mailing List (PCR, AEH), p. 23.
PASTEPASTE-2007-Brown #composition #integration #named
AWE: improving software analysis through modular integration of static and dynamic analyses (REB), pp. 69–74.
PASTEPASTE-2007-LeS #detection
Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
PASTEPASTE-2007-MarronSHK #library
Heap analysis in the presence of collection libraries (MM, DS, MVH, DK), pp. 31–36.
PASTEPASTE-2007-Milanova #java #points-to
Light context-sensitive points-to analysis for java (AM), pp. 25–30.
PASTEPASTE-2007-QianXM #alias #data flow #dependence
Interstatement must aliases for data dependence analysis of heap locations (JQ, BX, HM), pp. 17–24.
PASTEPASTE-2007-XuPV #java #source code
Dynamic purity analysis for java programs (HX, CJFP, CV), pp. 75–82.
SCAMSCAM-2007-GutzmannLL #points-to #towards
Towards Path-Sensitive Points-to Analysis (TG, JL, WL), pp. 59–68.
SCAMSCAM-2007-Marinescu #design #enterprise #named
DATES: Design Analysis Tool for Enterprise Systems (CM), pp. 157–158.
SCAMSCAM-2007-MoorVHAEOST #source code
Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
WCREWCRE-2007-Staiger #reverse engineering #user interface #using #visual notation
Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
IFMIFM-2007-KongOF #algebra #formal method
Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System (WK, KO, KF), pp. 393–412.
RTARTA-2007-HillsR #logic #named #prototype
KOOL: An Application of Rewriting Logic to Language Prototyping and Analysis (MH, GR), pp. 246–256.
SFMSFM-2007-GribaudoT #modelling #performance
Fluid Models in Performance Analysis (MG, MT), pp. 271–317.
TLCATLCA-2007-Marion
Predicative Analysis of Feasibility and Diagonalization (JYM), pp. 290–304.
TLCATLCA-2007-ShkaravskaKE #first-order #polynomial
Polynomial Size Analysis of First-Order Functions (OS, RvK, MCJDvE), pp. 351–365.
ICFPICFP-2007-HageHM
A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
ICFPICFP-2007-HornM #complexity #control flow #precise
Relating complexity and precision in control flow analysis (DVH, HGM), pp. 85–96.
ICFPICFP-2007-Sereni #functional #graph #higher-order #source code #termination
Termination analysis and call graph construction for higher-order functional programs (DS), pp. 71–84.
LISPILC-2007-GencerGT #lisp #named #network #social
CL-SNA: social network analysis with Lisp (MG, CG, VST), p. 17.
LISPILC-2007-Harmon #lisp #tool support
Computational tools for the analysis of spatial patterns of gene expression in Common Lisp (CLH), p. 18.
AIIDEAIIDE-2007-Magerko #comparative #interactive
A Comparative Analysis of Story Representations for Interactive Narrative Systems (BM), pp. 91–94.
DiGRADiGRA-2007-Calleja #concept #game studies
Revising Immersion: A Conceptual Model for the Analysis of Digital Game Involvement (GC).
DiGRADiGRA-2007-TychsenNBH #experience #game studies #multi
Cross-format analysis of the gaming experience in multi-player role-playing games (AT, KN, TB, MH).
DiGRADiGRA-2007-ZagalM #framework #game studies
Temporal Frames: A Unifying Framework for the Analysis of Game Temporality (JPZ, MM).
AGTIVEAGTIVE-2007-BauerDTW #constraints #ocl #synthesis #verification
Verification and Synthesis of OCL Constraints Via Topology Analysis (JB, WD, TT, BW), pp. 361–376.
AGTIVEAGTIVE-2007-ErmelE #configuration management #simulation #visualisation
Visualization, Simulation and Analysis of Reconfigurable Systems (CE, KE), pp. 265–280.
CHICHI-2007-GuimbretiereDH #interactive #named
ExperiScope: an analysis tool for interaction data (FG, MD, KH), pp. 1333–1342.
CHICHI-2007-IqbalH #case study
Disruption and recovery of computing tasks: field study, analysis, and directions (STI, EH), pp. 677–686.
CHICHI-2007-KunoSKYYK #interactive
Museum guide robot based on sociological interaction analysis (YK, KS, MK, KY, AY, HK), pp. 1191–1194.
HCIDHM-2007-Godil #representation
Advanced Human Body and Head Shape Representation and Analysis (AG), pp. 92–100.
HCIDHM-2007-HaoJZZ #3d #finite
A Finite Element 3D Model of in Vivo Human Knee Joint Based on MRI for the Tibiofemoral Joint Contact Analysis (ZH, DJ, YZ, JZ), pp. 616–622.
HCIDHM-2007-HuWWJJZCZ #component #finite
Finite Element Analysis of a Six-Component Force Sensor for the Trans-Femoral Prosthesis (XH, RW, FW, DJ, XJ, JZ, FC, SZ), pp. 633–639.
HCIDHM-2007-JiangSZLL
Shape Analysis of Human Brain with Cognitive Disorders (TJ, FS, WZ, SL, XL), pp. 409–414.
HCIDHM-2007-MariasDSZGMMT #information management #modelling #multi #validation
Multi-level Analysis and Information Extraction Considerations for Validating 4D Models of Human Function (KM, DDD, GSS, FZ, ECG, TM, TGM, IGT), pp. 703–709.
HCIDHM-2007-MeulenS #named
Ramsis — The Leading Cad Tool for Ergonomic Analysis of Vehicles (PvdM, AS), pp. 1008–1017.
HCIDHM-2007-NiuLS #3d #comparison #overview #perspective
Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
HCIDHM-2007-TianDM #design #interactive
Effecting Validity of Ergonomics Analysis During Virtual Interactive Design (RT, VGD, JM), pp. 988–997.
HCIDHM-2007-WertherMR #petri net #process #simulation
Colored Petri Net Based Formal Airport Control Model for Simulation and Analysis of Airport Control Processes (BW, CM, MR), pp. 1027–1036.
HCIDHM-2007-YangWZJW
Redundant Muscular Force Analysis of Human Lower Limbs During Rising from a Squat (YY, RW, MZ, DJ, FW), pp. 259–267.
HCIDHM-2007-YangWZJW07a
Optimal Control and Synergic Pattern Analysis of Upper Limb Reaching-Grasping Movements (YY, RW, MZ, DJ, FW), pp. 268–275.
HCIDHM-2007-ZhangZPY #linear #multi
Estimating Mental Fatigue Based on Multichannel Linear Descriptors Analysis (CZ, CZ, XmP, XY), pp. 521–529.
HCIHCI-AS-2007-ChoiLU #internet #user interface
Analysis of Internet Users’ Interests Based on Windows GUI Messages (JC, GL, YU), pp. 881–888.
HCIHCI-AS-2007-HeHDZM #design #optimisation #overview #reliability
A Review of Possibilistic Approaches to Reliability Analysis and Optimization in Engineering Design (LPH, HZH, LD, XDZ, QM), pp. 1075–1084.
HCIHCI-AS-2007-HosonoGIT
ATM Advertisement and Financial Preferences with Sensory Analysis (NH, SG, HI, YT), pp. 42–47.
HCIHCI-AS-2007-KimuraTHTAOT #approach #using
The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCIHCI-AS-2007-Song #complexity #segmentation #visual notation #web
Analysis of Web Page Complexity Through Visual Segmentation (GS), pp. 114–123.
HCIHCI-AS-2007-YiJ #approach #online #protocol
The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
HCIHCI-IDU-2007-AnastassovaMB #design #evaluation #prototype
Prototype Evaluation and User-Needs Analysis in the Early Design of Emerging Technologies (MA, CM, JMB), pp. 383–392.
HCIHCI-IDU-2007-Cox #usability
Task Analysis, Usability and Engagement (DC), pp. 1072–1081.
HCIHCI-IDU-2007-HuangLC #usability
The Practices of Usability Analysis to Wireless Facility Controller for Conference Room (DHH, YZL, WKC), pp. 490–498.
HCIHCI-IDU-2007-Karjalainen #why
Why It Is Difficult to Use a Simple Device: An Analysis of a Room Thermostat (SK), pp. 544–548.
HCIHCI-IDU-2007-Nguyen-Ngoc #design #process
Activity Theoretical Analysis and Design Model for Web-Based Experimentation (AVNN), pp. 204–213.
HCIHCI-IDU-2007-YinC #automation #metric #speech #towards
Towards Automatic Cognitive Load Measurement from Speech Analysis (BY, FC), pp. 1011–1020.
HCIHCI-IPT-2007-CowellHBFBJDJF #framework #validation
Construction and Validation of a Neurophysio-technological Framework for Imagery Analysis (AJC, KSH, CB, SF, AB, DJ, GD, RJ, RF), pp. 1096–1105.
HCIHCI-IPT-2007-NishimuraRDCSPDD #functional
Functional Brain Imaging for Analysis of Reading Effort for Computer-Generated Text (EMN, EDR, BAD, JPC, JS, DP, THD, JHD), pp. 1183–1192.
HCIHCI-MIE-2007-HanYYJ #automation #image #mobile #semantics #using
Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCIHCI-MIE-2007-HilligesKPBK #automation #classification #image #quality #sorting #using
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCIHCI-MIE-2007-JenkinsCCS #interactive
Analysis of User Interaction with Service Oriented Chatbot Systems (MCJ, RC, SJC, DS), pp. 76–83.
HCIHCI-MIE-2007-KimLRHH #design #network #performance #quality #speech
Performance Analysis of Perceptual Speech Quality and Modules Design for Management over IP Network (JK, HWL, WR, SHH, MH), pp. 84–93.
HCIHIMI-IIE-2007-HsuCSWY #assessment #game studies #interface #online #using
Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HCIHIMI-IIE-2007-KanekoNATT #generative #mining #using
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-ParkZ #distributed
Requirement Analysis of the Portal Site Serving Distributed Climate Data for e-Science (TP, LZ), pp. 450–456.
HCIHIMI-IIE-2007-SatoA #behaviour
Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
HCIHIMI-IIE-2007-TaguchiAT
Information on the Causal Relationship Between Store kaizen and Store Features That Attract Customers by Covariance Structural Analysis (YT, YA, TT), pp. 973–982.
HCIHIMI-IIE-2007-ZhangC #behaviour #collaboration
A Communicative Behaviour Analysis of Art-Technology Collaboration (YZ, LC), pp. 212–221.
HCIHIMI-IIE-2007-ZhangYIS #case study #development #energy
A Study on Analysis Support System of Energy and Environmental System for Sustainable Development Based on MFM and GIS (QZ, HY, HI, HS), pp. 1148–1157.
HCIHIMI-MTT-2007-BalasuriyaMWO #ubiquitous
Kansei Analysis for Robotic Motions in Ubiquitous Environments (JCB, CAM, KW, MO), pp. 804–813.
HCIHIMI-MTT-2007-KieliszewskiCBLH #identification #visualisation
A Visualization Solution for the Analysis and Identification of Workforce Expertise (CAK, JC, AB, AL, TH), pp. 317–326.
HCIHIMI-MTT-2007-KumeM #web
Construction of Web Application for Cusp Surface Analysis (YK, ZAHM), pp. 669–676.
HCIHIMI-MTT-2007-LeeLKC #correlation #human-computer #mobile
Correlation Analysis of Available Bandwidth Estimators for Mobile HCI (DL, CL, JK, JWC), pp. 687–696.
HCIHIMI-MTT-2007-LehtoPPL
Text Analysis of Consumer Reviews: The Case of Virtual Travel Firms (XL, JKP, OP, MRL), pp. 490–499.
HCIHIMI-MTT-2007-LinL #automation
A Bayesian Methodology for Semi-automated Task Analysis (SCL, MRL), pp. 697–704.
HCIHIMI-MTT-2007-NakayasuNH #communication #metric #performance
Measurement and Analysis of Performance of Human Perception for Information Communication Technology (HN, MN, HH), pp. 126–135.
HCIHIMI-MTT-2007-OrimoKMT #evaluation #recommendation
Analysis and Evaluation of Recommendation Systems (EO, HK, TM, AT), pp. 144–152.
HCIHIMI-MTT-2007-ShinyashikiMHKUN #embedded
A Suggestion for Analysis of Unexpected Obstacles in Embedded System (YS, TM, MH, KK, NU, TN), pp. 755–768.
HCIHIMI-MTT-2007-YonemuraYTO #communication #visual notation
Communication Analysis of Visual Support System That Uses Line Drawing Expression (SY, TY, YT, JO), pp. 359–365.
HCIOCSC-2007-CetinVF #development #distributed #human-computer
An Analysis of Involvement of HCI Experts in Distributed Software Development: Practical Issues (, DV, SF), pp. 32–40.
HCIOCSC-2007-DayF #community #concept #named #network #research
CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
VISSOFTVISSOFT-2007-BohnerGHM #source code #uml #using #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-KienleMM #challenge #dependence
Dependencies Analysis of Azureus with Rigi: Tool Demo Challenge (HMK, HAM, JM), pp. 159–160.
VISSOFTVISSOFT-2007-LangelierD #using #visual notation
Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
EDOCEDOC-2007-BaudryNT #modelling #requirements
Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
EDOCEDOC-2007-GruhnK #automation #framework #mobile
An Analysis Framework for Mobile Workforce Automation (VG, AK), pp. 193–201.
EDOCEDOC-2007-JohnsonJSU #architecture #enterprise
A Tool for Enterprise Architecture Analysis (PJ, EJ, TS, JU), pp. 142–156.
EDOCEDOC-2007-NarmanJN #architecture #enterprise #framework #quality
Enterprise Architecture: A Framework Supporting System Quality Analysis (PN, PJ, LN), pp. 130–141.
ICEISICEIS-AIDSS-2007-Aalst #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-AIDSS-2007-BecksH #industrial #mining
Trend Analysis Based on Explorative Data and Text Mining: A Decision Support System for the European Home Textile Industry (AB, JH), pp. 253–258.
ICEISICEIS-AIDSS-2007-Rodriguez-EliasMFVS #approach #design #identification #information management
Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
ICEISICEIS-AIDSS-2007-SohniusJME #approach #assessment #design #performance #simulation
An Approach for Assessing Design Systems: Design System Simulation and Analysis for Performance Assessment (RS, EJ, WEM, VE), pp. 231–236.
ICEISICEIS-DISI-2007-Aalst #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-EIS-2007-Aalst #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-EIS-2007-HuangZZ #approach #process #workflow
A New Approach for Workflow Process Delta Analysis Based on SYN-NET (XQH, WZ, SZ), pp. 480–488.
ICEISICEIS-EIS-2007-MarquesRFRAAM #aspect-oriented
Aspect-Oriented Analysis Applied to the Space Domain (AM, RR, RF, RAR, SA, JA, AMDM), pp. 71–79.
ICEISICEIS-HCI-2007-Aalst #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-HCI-2007-Godet-BarRDJ #human-computer
Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
ICEISICEIS-J-2007-Aalst07a #challenge #process
Challenges in Business Process Analysis (WMPvdA), pp. 27–42.
ICEISICEIS-SAIC-2007-Aalst #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-SAIC-2007-KirikovaSGO #abstraction #flexibility #process
Analysis of Business Process Flexibility at Different Levels of Abstraction (MK, RS, JG, JO), pp. 389–396.
CIKMCIKM-2007-FortunaRM #classification #network #social
Improving the classification of newsgroup messages through social network analysis (BF, EMR, NMF), pp. 877–880.
CIKMCIKM-2007-JurczykA #community #using
Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKMCIKM-2007-RaoCFB #network #peer-to-peer
Optimal proactive caching in peer-to-peer network: analysis and application (WR, LC, AWCF, YB), pp. 663–672.
CIKMCIKM-2007-TanWTC #novel #problem #sentiment
A novel scheme for domain-transfer problem in the context of sentiment analysis (ST, GW, HT, XC), pp. 979–982.
CIKMCIKM-2007-YangQZGL #graph #using #web
Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKMCIKM-2007-ZhangYGY #adaptation #correlation #representation
Boolean representation based data-adaptive correlation analysis over time series streams (TZ, DY, YG, GY), pp. 203–212.
ECIRECIR-2007-MeenaP #sentiment #using
Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ICMLICML-2007-BusseOB #clustering #rank
Cluster analysis of heterogeneous rank data (LMB, PO, JMB), pp. 113–120.
ICMLICML-2007-CazzantiG #similarity
Local similarity discriminant analysis (LC, MRG), pp. 137–144.
ICMLICML-2007-dAspremontBG #component
Full regularization path for sparse principal component analysis (Ad, FRB, LEG), pp. 177–184.
ICMLICML-2007-DingL #adaptation #clustering #reduction #using
Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICMLICML-2007-DollarRB #algorithm #learning
Non-isometric manifold learning: analysis and an algorithm (PD, VR, SJB), pp. 241–248.
ICMLICML-2007-MaLTK #correlation #similarity
Discriminant analysis in correlation similarity measure space (YM, SL, ET, MK), pp. 577–584.
ICMLICML-2007-Ye #linear
Least squares linear discriminant analysis (JY), pp. 1087–1093.
ICMLICML-2007-ZhangC #component #independence
Nonlinear independent component analysis with minimal nonlinear distortion (KZ, LC), pp. 1127–1134.
KDDKDD-2007-CastanoWCST
On-board analysis of uncalibrated data for a spacecraft at mars (RC, KW, SAC, TMS, BT), pp. 922–930.
KDDKDD-2007-ChiZSTT #community
Structural and temporal analysis of the blogosphere through community factorization (YC, SZ, XS, JT, BLT), pp. 163–172.
KDDKDD-2007-JanssensGM #clustering #hybrid #mining
Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis (FALJ, WG, BDM), pp. 360–369.
KDDKDD-2007-MoserGE #clustering #specification
Joint cluster analysis of attribute and relationship data withouta-priori specification of the number of clusters (FM, RG, ME), pp. 510–519.
KDDKDD-2007-Sandler #modelling #probability
Hierarchical mixture models: a probabilistic analysis (MS), pp. 580–589.
KDDKDD-2007-WangPM #component
Generalized component analysis for text with heterogeneous attributes (XW, CP, AM), pp. 794–803.
KDDKDD-2007-WuWCX #composition
Local decomposition for rare class analysis (JW, HX, PW, JC), pp. 814–823.
KDDKDD-2007-YeJC #kernel #learning #matrix #polynomial #programming
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming (JY, SJ, JC), pp. 854–863.
MLDMMLDM-2007-GrimH #category theory #clustering
Minimum Information Loss Cluster Analysis for Categorical Data (JG, JH), pp. 233–247.
SEKESEKE-2007-AnnoniRT #process #requirements
Data and Process Analyses of Data Warehouse Requirements (EA, FR, OT), pp. 191–196.
SEKESEKE-2007-GaoTHCCF #modelling #testing #towards
Toward Modeling and Analysis for Software Installation Testing (JZG, ST, CPH, YC, AC, TF), pp. 111–116.
SEKESEKE-2007-KanaskarSR #approach #detection #using
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-TagliatiJR #evolution
Requirement Analysis Evolution through Patterns (LVT, RJ, GR), pp. 197–202.
SEKESEKE-2007-VandalGG #middleware #performance
Performance Analysis of the Active Object Pattern in Middleware (PJV, SSG, ASG), pp. 730–735.
SIGIRSIGIR-2007-AzzopardiRB #query #topic #using
Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIRSIGIR-2007-BozzonCFN #modelling #query #web
Lexical analysis for modeling web query reformulation (AB, PAC, CSF, WN), pp. 739–740.
SIGIRSIGIR-2007-FernandezL #detection #using
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-Fujii #retrieval
Enhancing patent retrieval by citation analysis (AF), pp. 793–794.
SIGIRSIGIR-2007-JurczykA #ranking
Hits on question answer portals: exploration of link analysis for author ranking (PJ, EA), pp. 845–846.
SIGIRSIGIR-2007-MizzaroR #evaluation #information retrieval #network
Hits hits TREC: exploring IR evaluation results with network analysis (SM, SR), pp. 479–486.
SIGIRSIGIR-2007-NguyenJYF #peer-to-peer #query
An analysis of peer-to-peer file-sharing system queries (LTN, DJ, WGY, OF), pp. 855–856.
MODELSMoDELS-2007-JayaramanWEG #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-KonradGC #incremental #modelling #process
i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
MODELSMoDELS-2007-WeilMNDB #automation #design #modelling #semantics
Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
SPLCSPLC-2007-Jensen #case study #development #experience #multi #product line
Experiences with Product Line Development of Multi-Discipline Analysis Software at Overwatch Textron Systems (PJ), pp. 35–43.
SPLCSPLC-2007-SchirmeierS #framework #product line
Tailoring Infrastructure Software Product Lines by Static Application Analysis (HS, OS), pp. 255–260.
MODELSMoDELS-2007-JayaramanWEG #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-KonradGC #incremental #modelling #process
i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
MODELSMoDELS-2007-WeilMNDB #automation #design #modelling #semantics
Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
OOPSLAOOPSLA-2007-TanM #c #java #named
Ilea: inter-language analysis across java and c (GT, GM), pp. 39–56.
TOOLSTOOLS-EUROPE-2007-SteimannM #design #interface #towards
Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
AdaEuropeAdaEurope-2007-PanunzioV #metamodelling #modelling #process
A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis (MP, TV), pp. 128–141.
LOPSTRLOPSTR-2007-Mendez-LojoNH #approach #flexibility #object-oriented #source code
A Flexible, (C)LP-Based Approach to the Analysis of Object-Oriented Programs (MML, JAN, MVH), pp. 154–168.
LOPSTRLOPSTR-2007-NguyenGSS #dependence #graph #logic programming #source code #termination
Termination Analysis of Logic Programs Based on Dependency Graphs (MTN, JG, PSK, DDS), pp. 8–22.
PADLPADL-2007-AlbertGHP #bytecode #java #logic programming #source code #using #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADLPADL-2007-EichbergKSMO #automation #prolog
Automatic Incrementalization of Prolog Based Static Analyses (ME, MK, DS, MM, KO), pp. 109–123.
PLDIPLDI-2007-CheremPR #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-GotsmanBCS #thread
Thread-modular shape analysis (AG, JB, BC, MS), pp. 266–277.
PLDIPLDI-2007-GuoVA #induction #recursion #synthesis
Shape analysis with inductive recursion synthesis (BG, NV, DIA), pp. 256–265.
PLDIPLDI-2007-HardekopfL #performance #pointer
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
PLDIPLDI-2007-LattnerLA #points-to
Making context-sensitive points-to analysis with heap cloning practical for the real world (CL, AL, VSA), pp. 278–289.
PLDIPLDI-2007-NarayanasamyWTEC #automation
Automatically classifying benign and harmful data racesallusing replay analysis (SN, ZW, JT, AE, BC), pp. 22–31.
PLDIPLDI-2007-WassermannS #injection #precise #web
Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
POPLPOPL-2007-BerdineCCDO
Variance analyses from invariance analyses (JB, AC, BC, DD, PWO), pp. 211–224.
POPLPOPL-2007-JhalaM #interprocedural #source code
Interprocedural analysis of asynchronous programs (RJ, RM), pp. 339–350.
POPLPOPL-2007-KahlonG #automaton #on the
On the analysis of interacting pushdown systems (VK, AG), pp. 303–314.
POPLPOPL-2007-Might #higher-order #source code
Logic-flow analysis of higher-order programs (MM), pp. 185–198.
PPDPPPDP-2007-HristovaTL #performance #policy #trust
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
QAPLQAPL-2007-PierroHW #data flow #on the #probability
On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
SASSAS-2007-CalcagnoDOY
Footprint Analysis: A Shape Analysis That Discovers Preconditions (CC, DD, PWO, HY), pp. 402–418.
SASSAS-2007-ChangRN #invariant
Shape Analysis with Structural Invariant Checkers (BYEC, XR, GCN), pp. 384–401.
SASSAS-2007-HardekopfL #equivalence #pointer
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
SASSAS-2007-KamilY #distributed #pointer #source code
Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
SASSAS-2007-LerouxS #data flow
Accelerated Data-Flow Analysis (JL, GS), pp. 184–199.
SASSAS-2007-MagillBCC
Arithmetic Strengthening for Shape Analysis (SM, JB, EMC, BC), pp. 419–436.
SASSAS-2007-Mycroft #design #evolution #hardware #motivation #programming language
Programming Language Design and Analysis Motivated by Hardware Evolution (AM), pp. 18–33.
SASSAS-2007-PayetS #bytecode #java
Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
AdaSIGAda-2007-SinghoffP #modelling
AADL modeling and analysis of hierarchical schedulers (FS, AP), pp. 41–50.
RERE-2007-MetzgerHPSS #automation #documentation #formal method #product line #variability
Disambiguating the Documentation of Variability in Software Product Lines: A Separation of Concerns, Formalization and Automated Analysis (AM, PH, KP, PYS, GS), pp. 243–253.
REFSQREFSQ-2007-GuelfiP #approach #flexibility #product line #requirements
A Flexible Requirements Analysis Approach for Software Product Lines (NG, GP), pp. 78–92.
REFSQREFSQ-2007-RegnellHB #mobile #non-functional #performance #quality #requirements
A Quality Performance Model for Cost-Benefit Analysis of Non-functional Requirements Applied to the Mobile Handset Domain (BR, MH, RBS), pp. 277–291.
ASEASE-2007-ArtziKGE
Combined static and dynamic mutability analysis (SA, AK, DG, MDE), pp. 104–113.
ASEASE-2007-ShiriHR #feature model #interactive #maintenance #perspective
Feature interaction analysis: a maintenance perspective (MS, JH, JR), pp. 437–440.
ESEC-FSEESEC-FSE-2007-Coman #automation #developer #low level #using
An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSEESEC-FSE-2007-Diep
Analysis of a deployed software (MD), pp. 595–598.
ESEC-FSEESEC-FSE-2007-DubocRW #framework #scalability
A framework for characterization and analysis of software system scalability (LD, DSR, TW), pp. 375–384.
ESEC-FSEESEC-FSE-2007-KumarSCP #design #framework #optimisation #realtime #statistics
A profile-driven statistical analysis framework for the design optimization of soft real-time applications (TK, JS, RC, SP), pp. 529–532.
ESEC-FSEESEC-FSE-2007-LarssonME #integration #statistics
Product integration improvement based on analysis of build statistics (SL, PM, FE), pp. 505–508.
ESEC-FSEESEC-FSE-2007-RamasubbuB #development #distributed #empirical #performance
Globally distributed software development project performance: an empirical analysis (NR, RKB), pp. 125–134.
ESEC-FSEESEC-FSE-2007-YuBP #automation #ocl
Automated size analysis for OCL (FY, TB, EP), pp. 331–340.
GTTSEGTTSE-2007-WykM #composition #java
Adding Dimension Analysis to Java as a Composable Language Extension (EVW, YM), pp. 442–456.
ICSEICSE-2007-FuR #architecture #exception #java
Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications (CF, BGR), pp. 230–239.
ICSEICSE-2007-Jones #case study #design #implementation #re-engineering
Bringing the Systems Analysis and Design Course into 21^st Century: A Case Study in Implementing Modern Software Engineering Principles (CGJ), pp. 744–747.
ICSEICSE-2007-LivieriHMI #distributed #open source #source code #using #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSEICSE-2007-RajapakseJ #trade-off #using #web
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSEICSE-2007-ZaraketAK #relational
Sequential Circuits for Relational Analysis (FAZ, AA, SK), pp. 13–22.
SACSAC-2007-DistanteRC #framework #modelling #process #web
Modeling business processes in web applications: an analysis framework (DD, GR, GC), pp. 1677–1682.
SACSAC-2007-HwangPJ #implementation #performance
An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix (SYH, HJP, KSJ), pp. 1545–1551.
SACSAC-2007-KassabL #effectiveness #personalisation #towards
Towards a synthetic analysis of user’s information need for more effective personalized filtering services (RK, JCL), pp. 852–859.
SACSAC-2007-Liebrock #integration #re-engineering
Integration of well posedness analysis in software engineering (LML), pp. 1479–1483.
SACSAC-2007-LiebrockMBPCSU #design #forensics #set
A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
SACSAC-2007-PloegerS #automation #documentation #verification
Analysis and verification of an automatic document feeder (BP, LJS), pp. 1499–1505.
SACSAC-2007-ShinH #automation #comparison #difference #process
Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive (JS, PDH), pp. 1323–1329.
SACSAC-2007-YangWK #modelling #partial order
General dominant relationship analysis based on partial order models (ZY, BW, MK), pp. 470–474.
SACSAC-2007-ZengWN #classification
Text classification based on partial least square analysis (XQZ, MWW, JYN), pp. 834–838.
CASECASE-2007-BogdanKFD #design #fuzzy
Fuzzy Arithmetic-based Stability Analysis and Design of Fuzzy Controller (SB, ZK, IF, ID), pp. 968–973.
CASECASE-2007-BraunP
Analysis of the Effects of Truncation on the EWMA Observer (MWB, NSP), pp. 472–477.
CASECASE-2007-ChandrashekarN #coordination #network
A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
CASECASE-2007-LiW #approach #reliability
An Importance Sampling Based Approach for Reliability Analysis (FL, TW), pp. 956–961.
CASECASE-2007-MitaniYH #using
Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASECASE-2007-PanH
Diagnosability Analysis and Sensor Selection in Discrete-Event Systems with Permanent Failures (JP, SHZ), pp. 869–874.
CASECASE-2007-SunFSFCD #overview #paradigm
Decision Paradigms in the Semiconductor Supply Chain: A Survey and Analysis (YS, ALF, DLS, JWF, TEC, BMD), pp. 106–110.
CASECASE-2007-WangL #approximate #modelling #reliability
Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models (CW, JL), pp. 398–403.
CASECASE-2007-YiDZ0 #clustering #linear #throughput #tool support
Throughput Analysis of Linear Cluster Tools (JY, SD, MTZ, PvdM), pp. 1063–1068.
CASECASE-2007-YooG #network #process
Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
CCCC-2007-CheremR #lightweight #summary
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
CCCC-2007-FalconerKIMFB #declarative #framework #optimisation
A Declarative Framework for Analysis and Optimization (HF, PHJK, DMI, MRM, TF, OB), pp. 218–232.
CCCC-2007-ScholzB #composition #data flow #framework #using
A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGOCGO-2007-KotzmannM #optimisation #runtime
Run-Time Support for Optimizations Based on Escape Analysis (TK, HM), pp. 49–60.
COCVCOCV-2007-GallardoJM #data flow #on the fly #verification
On-the-Fly Data Flow Analysis Based on Verification Technology (MdMG, CJ, PM), pp. 33–48.
DACDAC-2007-AmbroseRP #injection #named #random
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
DACDAC-2007-BurnsKMBTD #comparative #design #statistics
Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
DACDAC-2007-ChengXH #statistics
Non-Linear Statistical Static Timing Analysis for Non-Gaussian Variation Sources (LC, JX, LH), pp. 250–255.
DACDAC-2007-DadgourB #design #hybrid #power management
Design and Analysis of Hybrid NEMS-CMOS Circuits for Ultra Low-Power Applications (HFD, KB), pp. 306–311.
DACDAC-2007-FengLZ #higher-order #parametricity #performance #reduction #statistics #using
Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DACDAC-2007-GandikotaCBSB #set
Top-k Aggressors Sets in Delay Noise Analysis (RG, KC, DB, DS, MRB), pp. 174–179.
DACDAC-2007-GhodratLR #estimation #hybrid #using
Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DACDAC-2007-HagiescuBCSGR #network #performance
Performance Analysis of FlexRay-based ECU Networks (AH, UDB, SC, PS, PVVG, SR), pp. 284–289.
DACDAC-2007-HariziHOB #modelling #performance
Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
DACDAC-2007-HuangTKC #case study #flexibility #reliability
Reliability Analysis for Flexible Electronics: Case Study of Integrated a-Si: H TFT Scan Driver (TCH, HYT, CPK, KTC), pp. 966–969.
DACDAC-2007-KirnerS #execution #modelling #worst-case
Modeling the Function Cache for Worst-Case Execution Time Analysis (RK, MS), pp. 471–476.
DACDAC-2007-LiY #power management #statistics
Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage (TL, ZY), pp. 99–102.
DACDAC-2007-Natale #challenge #platform
Virtual Platforms and Timing Analysis: Status, Challenges and Future Directions (MDN), pp. 551–555.
DACDAC-2007-PimentelP
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application (JRP, JP), pp. 290–293.
DACDAC-2007-RamalingamSNOP #composition #modelling #using
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DACDAC-2007-SeokHSB #design #optimisation
Analysis and Optimization of Sleep Modes in Subthreshold Circuit Design (MS, SH, DS, DB), pp. 694–699.
DACDAC-2007-SinghalBSLNC #modelling #simulation
Modeling and Analysis of Non-Rectangular Gate for Post-Lithography Circuit Simulation (RS, AB, ARS, FL, SRN, YC), pp. 823–828.
DACDAC-2007-SundaresanM #distributed
An Analysis of Timing Violations Due to Spatially Distributed Thermal Effects in Global Wires (KS, NRM), pp. 515–520.
DACDAC-2007-VenkataramaniBCG
Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
DACDAC-2007-YuDFL #framework #nondeterminism #process #statistics
A Framework for Accounting for Process Model Uncertainty in Statistical Static Timing Analysis (GY, WD, ZF, PL), pp. 829–834.
DATEDATE-2007-0004XJ #novel #statistics
A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
DATEDATE-2007-AarajRRJ #energy #execution #framework #platform
Energy and execution time analysis of a software-based trusted platform module (NA, AR, SR, NKJ), pp. 1128–1133.
DATEDATE-2007-BauerPT #hybrid #modelling
Tool-support for the analysis of hybrid systems and models (AB, MP, MT), pp. 924–929.
DATEDATE-2007-BondarevCW #component #design #embedded #named #performance #tool support
CARAT: a toolkit for design and performance analysis of component-based embedded systems (ERVB, MRVC, PHNdW), pp. 1024–1029.
DATEDATE-2007-BorremansLWR #multi #using
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATEDATE-2007-BronckersSPVR #interactive #simulation #verification
Interactive presentation: Simulation methodology and experimental verification for the analysis of substrate noise on LC-VCO’s (SB, CS, GVdP, GV, YR), pp. 1520–1525.
DATEDATE-2007-ChenZLC #performance #statistics
Fast statistical circuit analysis with finite-point based transistor model (MC, WZ, FL, YC), pp. 1391–1396.
DATEDATE-2007-ChoudhuryM #logic #reliability #scalability
Accurate and scalable reliability analysis of logic circuits (MRC, KM), pp. 1454–1459.
DATEDATE-2007-DasM
Sensitivity analysis for fault-analysis and tolerance in RF front-end circuitry (TD, PRM), pp. 1277–1282.
DATEDATE-2007-DuboisMAWLW #embedded #quality
Test quality analysis and improvement for an embedded asynchronous FIFO (TD, EJM, MA, PW, EL, CW), pp. 859–864.
DATEDATE-2007-ErdoganO #using
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-GargM #design #interactive #multi #process #throughput
Interactive presentation: System-level process variation driven throughput analysis for single and multiple voltage-frequency island designs (SG, DM), pp. 403–408.
DATEDATE-2007-HuangT #correlation #multi #performance #using
Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATEDATE-2007-JuCR #scheduling
Accounting for cache-related preemption delay in dynamic priority schedulability analysis (LJ, SC, AR), pp. 1623–1628.
DATEDATE-2007-LasbouyguesWAM
Temperature and voltage aware timing analysis: application to voltage drops (BL, RW, NA, PM), pp. 1012–1017.
DATEDATE-2007-Miskov-ZivanovM #fault
Soft error rate analysis for sequential circuits (NMZ, DM), pp. 1436–1441.
DATEDATE-2007-NardiTNAGLS #design #statistics #using
Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATEDATE-2007-NeyGLPVB #fault
Slow write driver faults in 65nm SRAM technology: analysis and March test solution (AN, PG, CL, SP, AV, MB), pp. 528–533.
DATEDATE-2007-OgrasM #modelling #performance
Analytical router modeling for networks-on-chip performance analysis (ÜYO, RM), pp. 1096–1101.
DATEDATE-2007-PanC #component #fault #framework #quality #reliability
A framework for system reliability analysis considering both system error tolerance and component test quality (SJ(RP, KTC), pp. 1581–1586.
DATEDATE-2007-SchlieckerSE #composition #data flow #graph #integration #performance
Performance analysis of complex systems by integration of dataflow graphs and compositional performance analysis (SS, SS, RE), pp. 273–278.
DATEDATE-2007-TadesseSLBG #modelling #satisfiability #using
Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATEDATE-2007-TannirK #performance
Efficient nonlinear distortion analysis of RF circuits (DT, RK), pp. 255–260.
DATEDATE-2007-TiwaryP #named
WAVSTAN: waveform based variational static timing analysis (SKT, JRP), pp. 1000–1005.
DATEDATE-2007-XuRC #interactive #pipes and filters #power management
Interactive presentation: Analysis of power consumption and BER of flip-flop based interconnect pipelining (JX, AR, MHC), pp. 1218–1223.
DATEDATE-2007-ZhangOSFKB #approach #named #parametricity #process
CMCal: an accurate analytical approach for the analysis of process variations with non-gaussian parameters and nonlinear functions (MZ, MO, DS, MF, HK, EB), pp. 243–248.
HPDCHPDC-2007-LeeS #performance #precise
Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
ISMMISMM-2007-AlbertGG #bytecode #java
Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
LCTESLCTES-2007-CoffmanHMW #parametricity
Generalizing parametric timing analysis (JC, CAH, FM, DBW), pp. 152–154.
LCTESLCTES-2007-Kastner #abstract interpretation #execution #worst-case
Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
LCTESLCTES-2007-YanZ
WCET analysis of instruction caches with prefetching (JY, WZ), pp. 175–184.
PDPPDP-2007-AlmeidaGB #clustering #multi #performance #symmetry
Performance analysis for clusters of symmetric multiprocessors (FA, JAG, JMB), pp. 121–128.
PDPPDP-2007-Baz #algorithm #architecture #communication #implementation #message passing #parallel
Communication Study and Implementation Analysis of Parallel Asynchronous Iterative Algorithms on Message Passing Architectures (DEB), pp. 77–83.
PDPPDP-2007-LorenzoMMV #automation #composition #control flow #process #web service
Automatic Analysis of Control Flow inWeb Services Composition Processes (GDL, FM, NM, VV), pp. 299–306.
PDPPDP-2007-NouJCHCLT #framework #grid #middleware #monitoring
Monitoring and Analysis Framework for Grid Middleware (RN, FJ, DC, KH, JC, JL, JT), pp. 129–133.
PPoPPPPoPP-2007-AgarwalBSS #source code
May-happen-in-parallel analysis of X10 programs (SA, RB, VS, RKS), pp. 183–193.
PPoPPPPoPP-2007-KejariwalTGLKBNVP #concurrent #cpu #performance #specification #thread #using
Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
SOSPSOSP-2007-SuAF #configuration management #named #operating system
AutoBash: improving configuration management with operating system causality analysis (YYS, MA, JF), pp. 237–250.
WRLAWRLA-J-2004-MeseguerT07 #encryption #protocol #reachability #using #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
WRLAWRLA-2006-KatelmanM07 #co-evolution #design #hardware #semantics
A Rewriting Semantics for ABEL with Applications to Hardware/Software Co-Design and Analysis (MK, JM), pp. 47–60.
ESOPESOP-2007-GulwaniT #interprocedural #summary
Computing Procedure Summaries for Interprocedural Analysis (SG, AT), pp. 253–267.
ESOPESOP-2007-RinetzkyPRSY #composition #encapsulation #source code
Modular Shape Analysis for Dynamically Encapsulated Programs (NR, APH, GR, MS, EY), pp. 220–236.
ESOPESOP-2007-SuenagaK #calculus #concurrent #type system
Type-Based Analysis of Deadlock for a Concurrent Calculus with Interrupts (KS, NK), pp. 490–504.
ESOPESOP-2007-Versari #calculus #comparative
A Core Calculus for a Comparative Analysis of Bio-inspired Calculi (CV), pp. 411–425.
FASEFASE-2007-CortellessaMI #framework #non-functional #performance #reliability
Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework (VC, ADM, PI), pp. 57–71.
FoSSaCSFoSSaCS-2007-BartolettiDFZ #resource management
Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
FoSSaCSFoSSaCS-2007-HagueO #automaton #higher-order
Symbolic Backwards-Reachability Analysis for Higher-Order Pushdown Systems (MH, CHLO), pp. 213–227.
STOCSTOC-2007-BorgsCDR
First to market is not everything: an analysis of preferential attachment with fitness (CB, JTC, CD, SR), pp. 135–144.
TACASTACAS-2007-AnandOH #execution #program transformation #symbolic computation
Type-Dependence Analysis and Program Transformation for Symbolic Execution (SA, AO, MJH), pp. 117–133.
TACASTACAS-2007-BlomCLOPPDW #case study #distributed
Distributed Analysis with µCRL: A Compendium of Case Studies (SB, JRC, BL, SO, JP, JvdP, MTD, AW), pp. 683–689.
TACASTACAS-2007-CortierKS #automation #security
Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
TACASTACAS-2007-FarzanM #concurrent #data flow #source code
Causal Dataflow Analysis for Concurrent Programs (AF, PM), pp. 102–116.
TACASTACAS-2007-FriasPM #alloy #specification #verification
Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
TACASTACAS-2007-ManevichBCRS #composition #graph
Shape Analysis by Graph Decomposition (RM, JB, BC, GR, MS), pp. 3–18.
AMOSTA-MOST-2007-ChenPU #dependence #generative #modelling #testing #using
Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
CAVCAV-2007-BerdineCCDOWY #data type
Shape Analysis for Composite Data Structures (JB, CC, BC, DD, PWO, TW, HY), pp. 178–192.
CAVCAV-2007-BloemCPRT #formal method #named #requirements
RAT: A Tool for the Formal Analysis of Requirements (RB, RC, IP, MR, AT), pp. 263–267.
CAVCAV-2007-BogudlovLRS #parametricity
Revamping TVLA: Making Parametric Shape Analysis Competitive (IB, TLA, TWR, MS), pp. 221–225.
CAVCAV-2007-BouajjaniFQ #bound #parallel #source code #thread
Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
CAVCAV-2007-CharltonH #model checking #named #plugin
Hector: Software Model Checking with Cooperating Analysis Plugins (NC, MH), pp. 168–172.
CAVCAV-2007-GaravelMLS #distributed #process
CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes (HG, RM, FL, WS), pp. 158–163.
CAVCAV-2007-GopanR #library #low level #summary
Low-Level Library Analysis and Summarization (DG, TWR), pp. 68–81.
CAVCAV-2007-ManoliosSV #named
BAT: The Bit-Level Analysis Tool (PM, SKS, DV), pp. 303–306.
ICLPICLP-2007-Morozov #design #logic programming #visual notation
Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
ICLPICLP-2007-Naish #concurrent
Resource-Oriented Deadlock Analysis (LN), pp. 302–316.
ICLPICLP-2007-NavasMLH #bound #logic programming #source code
User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
ICLPICLP-2007-PhanJ
Static Region Analysis for Mercury (QP, GJ), pp. 317–332.
ISSTAISSTA-2007-ClauseLO #framework #named
Dytan: a generic dynamic taint analysis framework (JAC, WL, AO), pp. 196–206.
ISSTAISSTA-2007-DufourRS #comprehension #performance
Blended analysis for performance understanding of framework-based applications (BD, BGR, GS), pp. 118–128.
ICSTSAT-2007-FuhsGMSTZ #polynomial #satisfiability #termination
SAT Solving for Termination Analysis with Polynomial Interpretations (CF, JG, AM, PSK, RT, HZ), pp. 340–354.
VMCAIVMCAI-2007-BalabanPZ
Shape Analysis of Single-Parent Heaps (IB, AP, LDZ), pp. 91–105.
VMCAIVMCAI-2007-CheremR #invariant #maintenance #reasoning
Maintaining Doubly-Linked List Invariants in Shape Analysis with Local Reasoning (SC, RR), pp. 234–250.
VMCAIVMCAI-2007-Lev-AmiSIR
Constructing Specialized Shape Analyses for Uniform Change (TLA, MS, NI, TWR), pp. 215–233.
VMCAIVMCAI-2007-Logozzo #abstract interpretation #composition #java #named #verification
Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
VMCAIVMCAI-2007-Namjoshi #symmetry
Symmetry and Completeness in the Analysis of Parameterized Systems (KSN), pp. 299–313.
VMCAIVMCAI-2007-Yang #towards
Towards Shape Analysis for Device Drivers (HY), p. 267.
CBSECBSE-2006-GrassiMS #approach #component #model transformation #performance #reliability
A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems (VG, RM, AS), pp. 270–284.
QoSAQoSA-2006-BucchiaroneMP #architecture #process
A Practical Architecture-Centric Analysis Process (AB, HM, PP), pp. 127–144.
QoSAQoSA-2006-FlorentzH #architecture #embedded #evaluation
Embedded Systems Architecture: Evaluation and Analysis (BF, MH), pp. 145–162.
QoSAQoSA-2006-ZullighovenLB #architecture #evaluation
Software Architecture Analysis and Evaluation (HZ, CL, MB), pp. 7–8.
DocEngDocEng-2006-Chao #geometry
Text block geometric shape analysis (HC), pp. 22–24.
HTHT-2006-QiC #development #named #segmentation
CUTS: CUrvature-based development pattern analysis and segmentation for blogs and other Text Streams (YQ, KSC), pp. 1–10.
JCDLJCDL-2006-BollenS #architecture
An architecture for the aggregation and analysis of scholarly usage data (JB, HVdS), pp. 298–307.
JCDLJCDL-2006-CraneJ #challenge #evaluation
The challenge of virginia banks: an evaluation of named entity analysis in a 19th-century newspaper collection (GRC, AJ), pp. 31–40.
JCDLJCDL-2006-CunninghamM #image #information management
Looking for a picture: an analysis of everyday image information searching (SJC, MM), pp. 198–199.
JCDLJCDL-2006-MannMM #metric #topic
Bibliometric impact measures leveraging topic analysis (GSM, DMM, AM), pp. 65–74.
JCDLJCDL-2006-MoenMEPS #learning #metadata
Learning from artifacts: metadata utilization analysis (WEM, SDM, AE, SP, GS), pp. 270–271.
JCDLJCDL-2006-ZouLT #geometry #layout #online #segmentation
Combining DOM tree and geometric layout analysis for online medical journal article segmentation (JZ, DXL, GRT), pp. 119–128.
SIGMODSIGMOD-2006-ChidlovskiiRB #performance #self
Documentum ECI self-repairing wrappers: performance analysis (BC, BR, MB), pp. 708–717.
SIGMODSIGMOD-2006-Hanrahan #named #query #visualisation
VizQL: a language for query, analysis and visualization (PH), p. 721.
SIGMODSIGMOD-2006-LiOTW #named
DADA: a data cube for dominant relationship analysis (CL, BCO, AKHT, SW), pp. 659–670.
SIGMODSIGMOD-2006-PavlouS #database #forensics
Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
VLDBVLDB-2006-ChenRST #predict
Bellwether Analysis: Predicting Global Aggregates from Local Regions (BCC, RR, JWS, PT), pp. 655–666.
VLDBVLDB-2006-GonzalezHL #multi #named
FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
VLDBVLDB-2006-MoerkotteN #algorithm #generative #programming
Analysis of Two Existing and One New Dynamic Programming Algorithm for the Generation of Optimal Bushy Join Trees without Cross Products (GM, TN), pp. 930–941.
CSEETCSEET-2006-Layman #collaboration #development #student
Changing Students’ Perceptions: An Analysis of the Supplementary Benefits of Collaborative Software Development (LL), pp. 159–166.
CSEETCSEET-2006-WallaceWB #problem
Instruction in Problem Structuring and Analysis Through Problem Frames (CW, XW, VB), pp. 185–186.
SCAMSCAM-J-2005-AntoniolKT06 #source code
Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
CSMRCSMR-2006-HerraizRG #comparison #evolution #metric
Comparison between SLOCs and number of files as size metrics for software evolution analysis (IH, GR, JMGB), pp. 206–213.
ICPCICPC-2006-JetleyZI #slicing #using
Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPCICPC-2006-KellyB #taxonomy
A Context-Aware Analysis Scheme for Bloom’s Taxonomy (TK, JB), pp. 275–284.
ICPCICPC-2006-PhengV #data type #java #source code
Dynamic Data Structure Analysis for Java Programs (SP, CV), pp. 191–201.
ICSMEICSM-2006-AlsmadiM #evolution #open source
Open Source Evolution Analysis (IA, KM), pp. 276–278.
MSRMSR-2006-KimN #multi
Program element matching for multi-version program analyses (MK, DN), pp. 58–64.
MSRMSR-2006-TsunodaMYKM #development #enterprise
Productivity analysis of Japanese enterprise software development projects (MT, AM, HY, NK, KiM), pp. 14–17.
MSRMSR-2006-VoineaT #cvs #framework #query #repository #visualisation
An open framework for CVS repository querying, analysis and visualization (LV, ACT), pp. 33–39.
SCAMSCAM-2006-Bruntink #tool support
Linking Analysis and Transformation Tools with Source-Based Mappings (MB), pp. 107–116.
WCREWCRE-2006-FischerG #approach #lightweight #named #scalability
EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems (MF, HG), pp. 179–188.
WCREWCRE-2006-KnieselB #aspect-oriented #correctness #weaving
An Analysis of the Correctness and Completeness of Aspect Weaving (GK, UB), pp. 324–333.
WCREWCRE-2006-MerloLA #injection #php #sql
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
CIAACIAA-2006-ChengWC #bisimulation #branch #composition #on the fly
On-the-Fly Branching Bisimulation Minimization for Compositional Analysis (YPC, HYW, YRC), pp. 219–229.
CIAACIAA-2006-Luttenberger #integer #reachability #source code
Reachability Analysis of Procedural Programs with Affine Integer Arithmetic (ML), pp. 281–282.
ICALPICALP-v2-2006-DelauneLLT #morphism #protocol
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
FMFM-2006-McIver #model checking #probability #refinement
Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems (AM), pp. 131–146.
RTARTA-2006-GieslSST #automation #haskell #programming language #term rewriting #termination
Automated Termination Analysis for Haskell: From Term Rewriting to Programming Languages (JG, SS, PSK, RT), pp. 297–312.
SEFMSEFM-2006-SampathK
Composing Context Sensitive Analysis (PS, SK), pp. 186–195.
FLOPSFLOPS-2006-Avery #bound #termination
Size-Change Termination and Bound Analysis (JA), pp. 192–207.
FLOPSFLOPS-2006-LiKL #lazy evaluation
Lazy Set-Sharing Analysis (XL, AK, LL), pp. 177–191.
FLOPSFLOPS-2006-MarionP
Resource Analysis by Sup-interpretation (JYM, RP), pp. 163–176.
ICFPICFP-2006-MightS #garbage collection
Improving flow analyses via ΓCFA: abstract garbage collection and counting (MM, OS), pp. 13–25.
ICGTICGT-2006-EdelkampJL #graph #heuristic
Heuristic Search for the Analysis of Graph Transition Systems (SE, SJ, ALL), pp. 414–429.
ICGTICGT-2006-EhrigHL #graph transformation
Molecular Analysis of Metabolic Pathway with Graph Transformation (KE, RH, GL), pp. 107–121.
ICGTICGT-2006-MendizabalD #distributed #graph grammar #non-functional #probability #using
Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
ICGTICGT-2006-VarroVEPT #model transformation #petri net #termination
Termination Analysis of Model Transformations by Petri Nets (DV, SVG, HE, UP, GT), pp. 260–274.
CHICHI-2006-LiWL #design #testing
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
CHICHI-2006-MedynskiyDF #community #development #hybrid #network #online #using
Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHICHI-2006-WrightSPSC #concept
The sandbox for analysis: concepts and Eevaluation (WW, DS, PP, AWS, BC), pp. 801–810.
CSCWCSCW-2006-DabbishK #email
Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
CSCWCSCW-2006-JacoviSGUSM #graph
The chasms of CSCW: a citation graph analysis of the CSCW conference (MJ, VS, GGF, SU, ES, NM), pp. 289–298.
CSCWCSCW-2006-Lee #social #what
What goes around comes around: an analysis of del.icio.us as social space (KJL), pp. 191–194.
CSCWCSCW-2006-RanjanBB #collaboration
An exploratory analysis of partner action and camera control in a video-mediated collaborative task (AR, JPB, RB), pp. 403–412.
CSCWCSCW-2006-VoidaM #challenge #multimodal
Challenges in the analysis of multimodal messaging (AV, EDM), pp. 427–430.
CSCWCSCW-2006-WeisethMTL #collaboration #framework #tool support
The wheel of collaboration tools: a typology for analysis within a holistic framework (PEW, BEM, BT, SL), pp. 239–248.
CAiSECAiSE-2006-Franch #modelling #on the
On the Quantitative Analysis of Agent-Oriented Models (XF), pp. 495–509.
CAiSECAiSE-2006-HaggmarkA #logic #principle #why
Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
EDOCEDOC-2006-HauserFKV #workflow
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows (RH, MF, JMK, JV), pp. 129–140.
EDOCEDOC-2006-JohnsonLNS #architecture #diagrams #enterprise
Extended Influence Diagrams for Enterprise Architecture Analysis (PJ, RL, PN, MS), pp. 3–12.
ICEISICEIS-HCI-2006-BadjioP #data mining #mining #process #visual notation
Context of Use Analysis — Activity Checklist for Visual Data Mining (EPFB, FP), pp. 45–50.
ICEISICEIS-ISAS-2006-DubinskyHTK #agile #design #development #scalability
System Analysis and Design in a Large-Scale Software Project: The Case of Transition to Agile Development (YD, OH, DT, AK), pp. 11–18.
ICEISICEIS-J-2006-DubinskyHTK06a #agile #design
Agile System Analysis and Design (YD, OH, DT, AK), pp. 281–292.
CIKMCIKM-2006-ChiTT #named
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
CIKMCIKM-2006-LiuCLS #visual notation
The visual funding navigator: analysis of the NSF funding information (SL, NC, HL, HS), pp. 882–883.
CIKMCIKM-2006-YeXLJBCK #linear #performance
Efficient model selection for regularized linear discriminant analysis (JY, TX, QL, RJ, JB, VC, CK), pp. 532–539.
ICMLICML-2006-DingZHZ #component #invariant #named #robust
R1-PCA: rotational invariant L1-norm principal component analysis for robust subspace factorization (CHQD, DZ, XH, HZ), pp. 281–288.
ICMLICML-2006-Hanneke #graph #learning
An analysis of graph cut size for transductive learning (SH), pp. 393–399.
ICMLICML-2006-KimMB #kernel
Optimal kernel selection in Kernel Fisher discriminant analysis (SJK, AM, SPB), pp. 465–472.
ICMLICML-2006-MaggioniM #evaluation #markov #multi #performance #policy #process #using
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICMLICML-2006-Sugiyama #reduction
Local Fisher discriminant analysis for supervised dimensionality reduction (MS), pp. 905–912.
ICMLICML-2006-TorreK #clustering
Discriminative cluster analysis (FDlT, TK), pp. 241–248.
ICMLICML-2006-YeX #linear #null #orthogonal
Null space versus orthogonal linear discriminant analysis (JY, TX), pp. 1073–1080.
ICPRICPR-v1-2006-AndradeBF06a #markov #modelling
Hidden Markov Models for Optical Flow Analysis in Crowds (ELA, SB, RBF), pp. 460–463.
ICPRICPR-v1-2006-GunesP #automation #behaviour #database #gesture
A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
ICPRICPR-v1-2006-HansenMT #clustering #re-engineering #sorting
Cluster Analysis and Priority Sorting in Huge Point Clouds for Building Reconstruction (WvH, EM, UT), pp. 23–26.
ICPRICPR-v1-2006-LeeE #modelling #synthesis
Nonlinear Shape and Appearance Models for Facial Expression Analysis and Synthesis (CSL, AME), pp. 497–502.
ICPRICPR-v1-2006-LiuD #linear #performance #recognition
Improve Handwritten Character Recognition Performance by Heteroscedastic Linear Discriminant Analysis (HL, XD), pp. 880–883.
ICPRICPR-v1-2006-MillerW #semantics #word
Word Completion with Latent Semantic Analysis (TM, EW), pp. 1252–1255.
ICPRICPR-v1-2006-OnoMKI #image
Space-time Analysis of Spherical Projection Image (SO, TM, HK, KI), pp. 975–979.
ICPRICPR-v1-2006-QiDZ #case study #image #semantics
Semantic Analysis on Medical Images: A Case Study (DQ, ERED, RZ), pp. 1260–1263.
ICPRICPR-v1-2006-ReiterDLB #3d #canonical #correlation #re-engineering #using
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPRICPR-v1-2006-SchrotterZ #image #modelling #multi #robust
Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
ICPRICPR-v1-2006-ShimanukiKW #sketching
Analysis of Overlapping Faces for Constructing Paper-made Objects from Sketches (HS, JK, TW), pp. 247–250.
ICPRICPR-v1-2006-SibiryakovB #multi #realtime
Real-Time Multi-Frame Analysis of Dominant Translation (AS, MB), pp. 55–58.
ICPRICPR-v1-2006-Solem
Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 43–46.
ICPRICPR-v1-2006-Solem06a
Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 852–855.
ICPRICPR-v1-2006-StorkJ #image
Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of the Baroque (DGS, MKJ), pp. 255–258.
ICPRICPR-v1-2006-WangKY #2d #linear #recognition
Bilateral Two Dimensional Linear Discriminant Analysis for Stereo Face Recognition (JGW, HK, WYY), pp. 429–432.
ICPRICPR-v1-2006-YangZJY #feature model
Unsupervised Discriminant Projection Analysis for Feature Extraction (JY, DZ, ZJ, JYY), pp. 904–907.
ICPRICPR-v2-2006-ChenW #component #independence #segmentation #using
Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPRICPR-v2-2006-GanLY #detection
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
ICPRICPR-v2-2006-HuDG #performance #retrieval
Improving Retrieval Performance by Global Analysis (JH, WD, JG), pp. 703–706.
ICPRICPR-v2-2006-InoueNK #feature model #kernel #recognition #string #using
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPRICPR-v2-2006-InoueU #2d #linear
Non-Iterative Two-Dimensional Linear Discriminant Analysis (KI, KU), pp. 540–543.
ICPRICPR-v2-2006-Liang #image
High-dimensional discriminant analysis and its application to color face images (ZL), pp. 917–920.
ICPRICPR-v2-2006-LiuCC #image #layout
Latent Layout Analysis for Discovering Objects in Images (DL, DC, TC), pp. 468–471.
ICPRICPR-v2-2006-Loog #linear
Conditional Linear Discriminant Analysis (ML), pp. 387–390.
ICPRICPR-v2-2006-LuPV #component #multi #recognition
Multilinear Principal Component Analysis of Tensor Objects for Recognition (HL, KNP, ANV), pp. 776–779.
ICPRICPR-v2-2006-PungprasertyingCK #approach #learning #migration #performance
Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
ICPRICPR-v2-2006-QuanHXLL #online #verification
Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
ICPRICPR-v2-2006-SanguansatAJM #2d #component #recognition
Class-Specific Subspace-Based Two-Dimensional Principal Component Analysis for Face Recognition (PS, WA, SJ, SM), pp. 1246–1249.
ICPRICPR-v2-2006-SenerU #component #independence #invariant #normalisation #using
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-TangT #linear #performance #using
Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPRICPR-v2-2006-TongDXTL #recognition #video
Local Motion Analysis and Its Application in Video based Swimming Style Recognition (XT, LYD, CX, QT, HL), pp. 1258–1261.
ICPRICPR-v2-2006-TsaiTCY #component #design #detection #fault #image #independence
Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
ICPRICPR-v2-2006-UekiHK #2d #classification #linear
Two-dimensional Heteroscedastic Linear Discriminant Analysis for Age-group Classification (KU, TH, TK), pp. 585–588.
ICPRICPR-v2-2006-YangL #automation #component
Automatic Physiognomic Analysis by Classifying Facial Component Feature (HDY, SWL), pp. 1212–1215.
ICPRICPR-v2-2006-ZhengL #component #kernel #learning #locality #problem
Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
ICPRICPR-v3-2006-ChenWTG #empirical #image #matrix #statistics
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix (XC, YW, TT, LG), pp. 1107–1110.
ICPRICPR-v3-2006-El-BazFRYEE #detection #image
Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
ICPRICPR-v3-2006-GokberkA #3d #algorithm #comparative #recognition
Comparative Analysis of Decision-level Fusion Algorithms for 3D Face Recognition (BG, LA), pp. 1018–1021.
ICPRICPR-v3-2006-GutmanWLCT #using
Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPRICPR-v3-2006-HaiESYSHAY #adaptation #image #video
Adaptive Control of Video Display for Diagnostic Assistance by Analysis of Capsule Endoscopic Images (HV, TE, RS, KY, MS, KH, TA, YY), pp. 980–983.
ICPRICPR-v3-2006-JaberAM #approach #information retrieval #metric #novel
A Novel Approach for Lexical Noise Analysis and Measurement in Intelligent Information Retrieval (TJ, AA, PM), pp. 370–373.
ICPRICPR-v3-2006-KitasakaNMSMTN #recognition
Recognition of lung lobes and its application to the bronchial structure analysis (TK, YN, KM, YS, MM, HT, HN), pp. 288–291.
ICPRICPR-v3-2006-Levitt #component
Component Analysis of Torah Code Phrases (AL), pp. 412–416.
ICPRICPR-v3-2006-LiuW #algorithm #component #feature model #recognition #search-based
Feature Extraction with Genetic Algorithms Based Nonlinear Principal Component Analysis for Face Recognition (NL, HW), pp. 461–464.
ICPRICPR-v3-2006-LiZSCG #kernel #performance #recognition
Bagging Based Efficient Kernel Fisher Discriminant Analysis for Face Recognition (YL, BZ, SS, XC, WG), pp. 523–526.
ICPRICPR-v3-2006-LoogR
Local Discriminant Analysis (ML, DdR), pp. 328–331.
ICPRICPR-v3-2006-QinSL #feature model #performance
Efficient Feature Extraction Based on Regularized Uncorrelated Chernoff Discriminant Analysis (AKQ, PNS, ML), pp. 125–128.
ICPRICPR-v3-2006-TangkuampienS #component #kernel
Human Motion De-noising via Greedy Kernel Principal Component Analysis Filtering (TT, DS), pp. 457–460.
ICPRICPR-v3-2006-VlietF #clustering #multi
Multi-orientation analysis by decomposing the structure tensor and clustering (LJvV, FGAF), pp. 856–860.
ICPRICPR-v3-2006-Wang06a #using
Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPRICPR-v3-2006-WangG #recognition
Tensor Discriminant Analysis for View-based Object Recognition (YW, SG), pp. 33–36.
ICPRICPR-v3-2006-XuanCZYHSF #classification #component #novel
A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA) (GX, PC, XZ, QY, CH, YQS, DF), pp. 320–323.
ICPRICPR-v3-2006-YamazakiCX #component #image #independence #kernel #using
Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPRICPR-v3-2006-YouCBLT #speech
Emotional Speech Analysis on Nonlinear Manifold (MY, CC, JB, JL, JT), pp. 91–94.
ICPRICPR-v3-2006-ZhangDC #detection #game studies
Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
ICPRICPR-v4-2006-AroraA #image #multi #segmentation
Analysis of Ramp Discontinuity Model for Multiscale Image Segmentation (HA, NA), pp. 99–103.
ICPRICPR-v4-2006-DhandraHHM #image #segmentation #using
Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPRICPR-v4-2006-GhoshB06a #adaptation #video
A Psychological Adaptive Model For Video Analysis (NG, BB), pp. 346–349.
ICPRICPR-v4-2006-GurevichKMSV #automation
Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
ICPRICPR-v4-2006-LiZZB #approach #automation #multi #segmentation #using
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPRICPR-v4-2006-LuC06a #3d #metric #using
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MitaniTKF #mobile #recognition
Environment Recognition Based on Analysis of Human Actions for Mobile Robot (MM, MT, AK, KF), pp. 782–786.
ICPRICPR-v4-2006-WangR #kernel #recognition
Kernel Fisher Discriminant Analysis for Palmprint Recognition (YW, QR), pp. 457–460.
ICPRICPR-v4-2006-WangWLJK #classification #component #independence #using
Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPRICPR-v4-2006-YaoLYZL #algorithm #identification
Analysis and Improvement of An Iris Identification Algorithm (PY, JL, XY, ZZ, BL), pp. 362–365.
KDDKDD-2006-Berger-WolfS #framework #network #social
A framework for analysis of dynamic social networks (TYBW, JS), pp. 523–528.
KDDKDD-2006-LiuCHY #dependence #detection #graph #named
GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
KDDKDD-2006-LiuZBX #using
Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDDKDD-2006-MeiXCHZ #generative #semantics
Generating semantic annotations for frequent patterns with context analysis (QM, DX, HC, JH, CZ), pp. 337–346.
KDDKDD-2006-MessaoudBR #data transformation #multi #performance
Efficient multidimensional data representations based on multiple correspondence analysis (RBM, OB, SLR), pp. 662–667.
KDDKDD-2006-SuchanekIW #documentation #statistics #web
Combining linguistic and statistical analysis to extract relations from web documents (FMS, GI, GW), pp. 712–717.
KDDKDD-2006-SunTF #graph
Beyond streams and graphs: dynamic tensor analysis (JS, DT, CF), pp. 374–383.
KDDKDD-2006-WedigM #personalisation #query #scalability
A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
KDDKDD-2006-YeW
Regularized discriminant analysis for high dimensional, low sample size data (JY, TW), pp. 454–463.
KDDKDD-2006-YuYTKW #component #probability
Supervised probabilistic principal component analysis (SY, KY, VT, HPK, MW), pp. 464–473.
SEKESEKE-2006-BokhariP #modelling #petri net #uml
Translation of UML Models to Object Coloured Petri Nets with a view to Analysis (AB, WFSP), pp. 568–571.
SEKESEKE-2006-GaaloulG #mining #statistics #workflow
A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
SEKESEKE-2006-GokhaleY #architecture #pipes and filters #reliability
Reliability Analysis of Pipe and Filter Architecture Style (SSG, SMY), pp. 625–630.
SEKESEKE-2006-GrauCFN #comparative #modelling
A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
SEKESEKE-2006-PiaoWCC #diagrams #process #uml
An Analysis Model of Activity Diagram in UML 2.0 (WCP, CHW, WCC, LPC), pp. 562–567.
SEKESEKE-2006-SartipiS #concept #evaluation #execution #mining
Application of Execution Pattern Mining and Concept Lattice Analysis on Software Structure Evaluation (KS, HS), pp. 302–308.
SEKESEKE-2006-SteinmacherLH #process #simulation #using #workflow
Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKESEKE-2006-SunSADH #design #formal method #middleware #modelling
Achieving a Better Middleware Design through Formal Modeling and Analysis (WS, TS, GAG, YD, XH), pp. 463–468.
SIGIRSIGIR-2006-CaiHH #documentation
Tensor space model for document analysis (DC, XH, JH), pp. 625–626.
SIGIRSIGIR-2006-JinFM #consistency #feedback #nondeterminism #performance
Quantative analysis of the impact of judging inconsistency on the performance of relevance feedback (XJ, JCF, JM), pp. 655–656.
SIGIRSIGIR-2006-JordanHK #approach #named
Swordfish: an unsupervised Ngram based approach to morphological analysis (CJ, JH, VK), pp. 657–658.
SIGIRSIGIR-2006-NieDQ #topic #web
Topical link analysis for web search (LN, BDD, XQ), pp. 91–98.
SIGIRSIGIR-2006-Olsson #classification #set
An analysis of the coupling between training set and neighborhood sizes for the kNN classifier (JSO), pp. 685–686.
SIGIRSIGIR-2006-WangSCZ #multi #semantics
Latent semantic analysis for multiple-type interrelated data objects (XW, JTS, ZC, CZ), pp. 236–243.
SIGIRSIGIR-2006-YanH #multi #probability #query #retrieval
Probabilistic latent query analysis for combining multiple retrieval sources (RY, AGH), pp. 324–331.
SIGIRSIGIR-2006-ZhangOFM #linear #recommendation
Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
ECMFAECMDA-FA-2006-MottuBT #model transformation #mutation testing #testing
Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
ECMFAECMDA-FA-2006-Perez-MartinezS #architecture
From Analysis Model to Software Architecture: A PIM2PIM Mapping (JEPM, ASA), pp. 25–39.
MODELSMoDELS-2006-BruckerDW #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-GarousiBL #behaviour #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
MODELSMoDELS-2006-GoldsbyCKK #assurance #formal method #framework #modelling #visualisation
A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
MODELSMoDELS-2006-LundellLPM #uml #xmi
UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
MODELSMoDELS-2006-MensSD #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MullerFFHSGJ #modelling #syntax #synthesis
Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
SPLCSPLC-2006-LeeKKP #aspect-oriented #development #feature model #product line #programming
Combining Feature-Oriented Analysis and Aspect-Oriented Programming for Product Line Asset Development (KL, KCK, MK, SP), pp. 103–112.
MODELSMoDELS-2006-BruckerDW #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-GarousiBL #behaviour #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
MODELSMoDELS-2006-GoldsbyCKK #assurance #formal method #framework #modelling #visualisation
A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
MODELSMoDELS-2006-LundellLPM #uml #xmi
UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
MODELSMoDELS-2006-MensSD #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MullerFFHSGJ #modelling #syntax #synthesis
Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
ECOOPECOOP-2006-SiekT #c++ #semantics
A Semantic Analysis of C++ Templates (JGS, WT), pp. 304–327.
OOPSLAOOPSLA-2006-BlackburnGHKMBDFFGHHJLMPSVDW #benchmark #development #java #metric
The DaCapo benchmarks: java benchmarking development and analysis (SMB, RG, CH, AMK, KSM, RB, AD, DF, DF, SZG, MH, ALH, MJ, HBL, JEBM, AP, DS, TV, DvD, BW), pp. 169–190.
OOPSLAOOPSLA-2006-KitMB #requirements #semantics #using
Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
QAPLQAPL-2005-KwiatkowskaNP06 #model checking #probability
Quantitative Analysis With the Probabilistic Model Checker PRISM (MZK, GN, DP), pp. 5–31.
LOPSTRLOPSTR-2006-Schneider-KampGST #automation #logic programming #source code #term rewriting #termination
Automated Termination Analysis for Logic Programs by Term Rewriting (PSK, JG, AS, RT), pp. 177–193.
PADLPADL-2006-NavasBH #clique #performance #top-down #using
Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
PEPMPEPM-2006-Cordy #generative #txl
Source transformation, analysis and generation in TXL (JRC), pp. 1–11.
PEPMPEPM-2006-IwamaIK #exception #functional #resource management
Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
PEPMPEPM-2006-LewisJ #model checking
A dead variable analysis for explicit model checking (ML, MJ), pp. 48–57.
PLDIPLDI-2006-AcarBBT #self
An experimental analysis of self-adjusting computation (UAA, GEB, MB, KT), pp. 96–107.
PLDIPLDI-2006-DhurjatiKA #alias #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
PLDIPLDI-2006-PratikakisFH #concurrent #correlation #detection #named
LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
PLDIPLDI-2006-SridharanB #java #points-to
Refinement-based context-sensitive points-to analysis for Java (MS, RB), pp. 387–400.
POPLPOPL-2006-MeunierFF #composition #contract
Modular set-based analysis from contracts (PM, RBF, MF), pp. 218–231.
POPLPOPL-2006-MightS
Environment analysis via Delta CFA (MM, OS), pp. 127–140.
PPDPPPDP-2006-Miller #horn clause #source code
Collection analysis for Horn clause programs (DM), pp. 179–188.
QAPLQAPL-2006-AdaoMRV #protocol #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
QAPLQAPL-2006-ZhangH #formal method #protocol #streaming
Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
SASSAS-2006-Arnold #logic #refinement #using
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SASSAS-2006-ChangHN #low level #using
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
SASSAS-2006-DhurjatiDY #data flow #refinement
Path-Sensitive Dataflow Analysis with Iterative Refinement (DD, MD, YY), pp. 425–442.
SASSAS-2006-GonnordH #linear
Combining Widening and Acceleration in Linear Relation Analysis (LG, NH), pp. 144–160.
SASSAS-2006-GotsmanBC #abstraction #interprocedural
Interprocedural Shape Analysis with Separated Heap Abstractions (AG, JB, BC), pp. 240–260.
SASSAS-2006-OrlovichR #memory management
Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
SASSAS-2006-Yang #low level
Shape Analysis for Low-Level Code (HY), p. 280.
RERE-2006-ChenZZM #dependence #identification #requirements
Identification of Crosscutting Requirements Based on Feature Dependency Analysis (KC, HZ, WZ, HM), pp. 300–303.
RERE-2006-CornfordFHJ #modelling #requirements
Fusing Quantitative Requirements Analysis with Model-based Systems Engineering (SLC, MSF, VAH, JSJ), pp. 272–277.
RERE-2006-EbnenasirCK #case study #fault tolerance #modelling
Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance (AE, BHCC, SK), pp. 336–337.
RERE-2006-JiangTBM #biology #case study #data transformation #database #design
Incorporating Goal Analysis in Database Design: A Case Study from Biological Data Management (LJ, TT, AB, JM), pp. 196–204.
RERE-2006-LiaskosLYYM #on the #variability
On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
RERE-2006-LiuJ #problem #requirements
Integrating Goals and Problem Frames in Requirements Analysis (LL, ZJ), pp. 342–343.
RERE-2006-MehnerMT #aspect-oriented #interactive #modelling
Interaction Analysis in Aspect-Oriented Models (KM, MM, GT), pp. 66–75.
ASEASE-2006-CaiS #composition #design #logic #modelling
Modularity Analysis of Logical Design Models (YC, KJS), pp. 91–102.
ASEASE-2006-EichbergMKOR #scheduling #set
Integrating and Scheduling an Open Set of Static Analyses (ME, MM, SK, KO, BR), pp. 113–122.
ASEASE-2006-Jurjens #automation #java #proving #security #source code #theorem proving #using
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
FSEFSE-2006-YeCCX #collaboration
Local analysis of atomicity sphere for B2B collaboration (CY, SCC, WKC, CX), pp. 186–196.
ICSEICSE-2006-CeballosG #performance
P2P file sharing analysis for a better performance (MRC, JLG), pp. 941–944.
ICSEICSE-2006-DubocRW #framework #modelling #scalability
A framework for modelling and analysis of software systems scalability (LD, DSR, TW), pp. 949–952.
ICSEICSE-2006-FurusawaCW #design #modelling #overview #performance
Efficiency analysis of model-based review in actual software design (HF, EHC, HW), pp. 604–607.
ICSEICSE-2006-GallL #evolution #visualisation
Software evolution: analysis and visualization (HG, ML), pp. 1055–1056.
ICSEICSE-2006-KitchenhamKJC #database #lessons learnt #scalability
Lessons learnt from the analysis of large-scale corporate databases (BK, CK, DRJ, CC), pp. 439–444.
ICSEICSE-2006-KobayashiKSP #agile #effectiveness #interactive
Analysis of the interaction between practices for introducing XP effectively (OK, MK, MS, EP), pp. 544–550.
ICSEICSE-2006-MartinX #comprehension #interface #string
Understanding software application interfaces via string analysis (EM, TX), pp. 901–904.
ICSEICSE-2006-NakagawaKH #modelling #multi
Analysis of multi-agent systems based on KAOS modeling (HN, TK, SH), pp. 926–929.
ICSEICSE-2006-VerlekarA #distributed #performance
A methodology and tool for performance analysis of distributed server systems (RPV, VA), pp. 913–916.
ICSEICSE-2006-Zhao #approach #testing
A new approach for software testability analysis (LZ), pp. 985–988.
SACSAC-2006-AgostaCPS #bytecode #compilation #performance
Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
SACSAC-2006-BelguidoumD #component #dependence #deployment
Analysis of deployment dependencies in software components (MB, FD), pp. 735–736.
SACSAC-2006-BiermanMPS #array #image #named
MACE: lossless compression and analysis of microarray images (RB, NM, CP, RS), pp. 167–172.
SACSAC-2006-ChengCW #composition #named #scalability
ARCATS: a scalable compositional analysis tool suite (YPC, YRC, HYW), pp. 1852–1853.
SACSAC-2006-CutelloNO #algorithm #heuristic
Analysis of an evolutionary algorithm with HyperMacromutation and stop at first constructive mutation heuristic for solving trap functions (VC, GN, PSO), pp. 945–949.
SACSAC-2006-DattaE #requirements #workflow
Effects of changing requirements: a tracking mechanism for the analysis workflow (SD, RvE), pp. 1739–1744.
SACSAC-2006-DextersPG #algorithm #probability
A probability analysis for candidate-based frequent itemset algorithms (ND, PWP, DVG), pp. 541–545.
SACSAC-2006-FangFHT #geometry #image
Digital geometry image analysis for medical diagnosis (JF, SF, JH, MT), pp. 217–221.
SACSAC-2006-GotoC #logic
A quantitative analysis of implicational paradoxes in classical mathematical logic (YG, JC), pp. 42–43.
SACSAC-2006-HeatherS #infinity #protocol #security
To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
SACSAC-2006-NorguetZS #semantics #web
Semantic analysis of web site audience (JPN, EZ, RS), pp. 525–529.
SACSAC-2006-OrshanskyWCX #robust #statistics
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
SACSAC-2006-OsorioK #behaviour
An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
SACSAC-2006-RuizCCP #algebra #concurrent #e-commerce #process #protocol #set #using
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-WangS
Escape analysis for synchronization removal (LW, XS), pp. 1419–1423.
SACSAC-2006-WuGL #database #modelling #towards
Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
GPCEGPCE-2006-KaminAK #generative #staging
Staging static analyses for program generation (SK, BA, MK), pp. 1–10.
GPCEGPCE-2006-VieraP #multi
A multi-stage language with intensional analysis (MV, AP), pp. 11–20.
LDTALDTA-2006-EichbergKKMS #incremental
Incremental Confined Types Analysis (ME, SK, SK, MM, TS), pp. 81–96.
ASPLOSASPLOS-2006-SilvaS #optimisation #pointer #probability
A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
CASECASE-2006-Bahrami-SamaniAM #design
Design and Analysis of a Welding Robot (MBS, MA, SAAM), pp. 454–459.
CASECASE-2006-BiggsM #evaluation
Evaluation of Dimensional Analysis in Robotics (GB, BAM), pp. 286–291.
CASECASE-2006-ChaoSZJM #automation #information management #using
Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASECASE-2006-CheungC #capacity
Analysis of Capacity Overflow for Manufacturing Systems (KSC, KOC), pp. 331–335.
CASECASE-2006-LengC #implementation #mobile
Velocity Analysis of Omnidirectional Mobile Robot and System Implementation (CL, QC), pp. 81–86.
CASECASE-2006-LiZYC #algorithm #locality #network #novel
A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks (SL, DZ, ZY, NC), pp. 574–579.
CASECASE-2006-RecaldeMS #petri net #simulation
Improving analysis and simulation of continuous Petri Nets (LR, CM, MS), pp. 9–14.
CASECASE-2006-RenWJXY #fault
A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis (JR, JW, IJ, DLX, JBY), pp. 144–149.
CASECASE-2006-SenanayakeSCS
Instrumented Orthopaedics Analysis System (SMNAS, CYS, JC, RGS), pp. 194–199.
CASECASE-2006-ShaoHM #algorithm #component #linear #multi #using
Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASECASE-2006-WuD #multi #network #performance
Performance analysis of complex supply chain networks with multi-product (YW, MD), pp. 630–635.
CASECASE-2006-Zhang #enterprise #modelling #process
Modeling and Analysis of Enterprise Processes (LZ), pp. 393–398.
CCCC-2006-BaconCFGHR #named #online #realtime #visualisation
Demonstration: On-Line Visualization and Analysis of Real-Time Systems with TuningFork (DFB, PC, DF, DG, MH, VTR), pp. 96–100.
CCCC-2006-FangCOW #distance #reuse
Path-Based Reuse Distance Analysis (CF, SC, , ZW), pp. 32–46.
CCCC-2006-LamprechtMS #data flow #model checking
Data-Flow Analysis as Model Checking Within the jABC (ALL, TMS, BS), pp. 101–104.
CCCC-2006-LhotakH #points-to #question
Context-Sensitive Points-to Analysis: Is It Worth It? (OL, LJH), pp. 47–64.
CCCC-2006-RountevKM #data flow #interprocedural #library #scalability
Interprocedural Dataflow Analysis in the Presence of Large Libraries (AR, SK, TJM), pp. 2–16.
CCCC-2006-TokGL #data flow #interprocedural #performance #pointer
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
CGOCGO-2006-ChakrabartiL #heuristic
Inline Analysis: Beyond Selection Heuristics (DRC, SML), pp. 221–232.
CGOCGO-2006-LauPC
Selecting Software Phase Markers with Code Structure Analysis (JL, EP, BC), pp. 135–146.
DACDAC-2006-AgarwalN #statistics
Statistical analysis of SRAM cell stability (KA, SRN), pp. 57–62.
DACDAC-2006-BhardwajVGC #modelling #optimisation #process
Modeling of intra-die process variations for accurate analysis and optimization of nano-scale circuits (SB, SBKV, PG, YC), pp. 791–796.
DACDAC-2006-ChaoCWCW #using
Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DACDAC-2006-FatemiNP #logic #statistics #using
Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DACDAC-2006-GhantaVBP #correlation #power management #probability #scalability
Stochastic variational analysis of large power grids considering intra-die correlations (PG, SBKV, SB, RP), pp. 211–216.
DACDAC-2006-IsseninBDD #memory management #multi #reuse
Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies (II, EB, BD, ND), pp. 49–52.
DACDAC-2006-KanjJN #design
Mixture importance sampling and its application to the analysis of SRAM designs in the presence of rare failure events (RK, RVJ, SRN), pp. 69–72.
DACDAC-2006-KhatibPBBBKJN #architecture #design #monitoring #multi #realtime
A multiprocessor system-on-chip for real-time biomedical monitoring and analysis: architectural design space exploration (IAK, FP, DB, LB, MB, HK, AJ, RN), pp. 125–130.
DACDAC-2006-LeeWA #statistics
Refined statistical static timing analysis through (BNL, LCW, MSA), pp. 149–154.
DACDAC-2006-LiLP #power management #statistics
Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
DACDAC-2006-LiuMM #design #reliability #tool support
Design tools for reliability analysis (ZL, BM, JZM), pp. 182–187.
DACDAC-2006-LoiASLSB #3d #performance
A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy (GLL, BA, NS, SCL, TS, KB), pp. 991–996.
DACDAC-2006-MajumdarCG #validation
Hold time validation on silicon and the relevance of hazards in timing analysis (AM, WYC, JG), pp. 326–331.
DACDAC-2006-MandrekarBSES
System level signal and power integrity analysis methodology for system-in-package applications (RM, KB, KS, EE, MS), pp. 1009–1012.
DACDAC-2006-NassifPRSBR #question
Variation-aware analysis: savior of the nanometer era? (SRN, VP, NR, DS, CB, RR), pp. 411–412.
DACDAC-2006-PakbazniaFP #concept
Charge recycling in MTCMOS circuits: concept and analysis (EP, FF, MP), pp. 97–102.
DACDAC-2006-PaulFOL #modelling #performance
Modeling and analysis of circuit performance of ballistic CNFET (BCP, SF, MO, TL), pp. 717–722.
DACDAC-2006-PillSCRBC #formal method #hardware #requirements
Formal analysis of hardware requirements (IP, SS, RC, MR, RB, AC), pp. 821–826.
DACDAC-2006-PomplSHNS #aspect-oriented #design #reliability
Practical aspects of reliability analysis for IC designs (TP, CS, MH, HN, JS), pp. 193–198.
DACDAC-2006-SinghS #component #correlation #independence #parametricity #statistics #using
Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DACDAC-2006-SuhendraMRC #detection #performance
Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
DACDAC-2006-YuSH #grid #order #performance #power management #reduction
Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
DATEDATE-2006-AbbaspourFP #statistics
Non-gaussian statistical interconnect timing analysis (SA, HF, MP), pp. 533–538.
DATEDATE-2006-AbdollahiP #diagrams #quantum #synthesis #using
Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATEDATE-2006-AsadiSTK
Vulnerability analysis of L2 cache elements to single event upsets (HA, VS, MBT, DRK), pp. 1276–1281.
DATEDATE-2006-BalachandranBCWRNB #grid #modelling #power management
Analysis and modeling of power grid transmission lines (JB, SB, GC, TW, WDR, BN, EB), pp. 33–38.
DATEDATE-2006-BhaduriSCTGG #architecture #design #fault tolerance #framework #hybrid
A hybrid framework for design and analysis of fault-tolerant architectures (DB, SKS, DC, VET, PSG, MG), pp. 335–336.
DATEDATE-2006-DensmoreDS #architecture #performance
FPGA architecture characterization for system level performance analysis (DD, AD, ALSV), pp. 734–739.
DATEDATE-2006-GillPW #fault #logic
Soft delay error analysis in logic circuits (BSG, CAP, FGW), pp. 47–52.
DATEDATE-2006-JinS #satisfiability
Strong conflict analysis for propositional satisfiability (HJ, FS), pp. 818–823.
DATEDATE-2006-Kundu #design
A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
DATEDATE-2006-KunzliPBT #formal method #performance #simulation
Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
DATEDATE-2006-MeiR #performance #using
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-MochockiLC #3d #mobile
Power analysis of mobile 3D graphics (BM, KL, SC), pp. 502–507.
DATEDATE-2006-NazarianP
Cell delay analysis based on rate-of-current change (SN, MP), pp. 539–544.
DATEDATE-2006-RossiSM
Analysis of the impact of bus implemented EDCs on on-chip SSN (DR, CS, CM), pp. 59–64.
DATEDATE-2006-SchirnerD #modelling #transaction
Quantitative analysis of transaction level models for the AMBA bus (GS, RD), pp. 230–235.
DATEDATE-2006-SoffkeZMG #approach #combinator #statistics
A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits (OS, PZ, TM, MG), pp. 632–637.
DATEDATE-2006-TanjiWKA #scalability #using
Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
DATEDATE-2006-ViehlSBR #design #modelling #performance #simulation #uml
Formal performance analysis and simulation of UML/SysML models for ESL design (AV, TS, OB, WR), pp. 242–247.
DATEDATE-2006-WandelerMT #performance #realtime
Performance analysis of greedy shapers in real-time systems (EW, AM, LT), pp. 444–449.
DATEDATE-2006-WangM #algorithm #multi
A logarithmic full-chip thermal analysis algorithm based on multi-layer Green’s function (BW, PM), pp. 39–44.
DATEDATE-2006-WangXVI #optimisation
On-chip bus thermal analysis and optimization (FW, YX, NV, MJI), pp. 850–855.
DATEDATE-2006-YangGZSD #adaptation #design #synthesis
Adaptive chip-package thermal analysis for synthesis and design (YY, Z(G, CZ, LS, RPD), pp. 844–849.
DATEDATE-2006-YangV #evaluation #performance #synthesis
Efficient temperature-dependent symbolic sensitivity analysis and symbolic performance evaluation in analog circuit synthesis (HY, RV), pp. 283–284.
DATEDATE-2006-ZhangHC #correlation #statistics
Statistical timing analysis with path reconvergence and spatial correlations (LZ, YH, CCPC), pp. 528–532.
DATEDATE-2006-ZhouSMS #composition #grid #power management #scalability #using
Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
DATEDATE-DF-2006-BononiC #2d #architecture #network #simulation
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh (LB, NC), pp. 154–159.
HPCAHPCA-2006-JosephVT #linear #modelling #performance #using
Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
LCTESLCTES-2006-Mine #c #embedded #pointer #source code
Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
LCTESLCTES-2006-SandbergEGL #performance #slicing
Faster WCET flow analysis by program slicing (CS, AE, JG, BL), pp. 103–112.
LCTESLCTES-2006-ZhuangP #compilation #concurrent #effectiveness #network #thread
Effective thread management on network processors with compiler analysis (XZ, SP), pp. 72–82.
OSDIOSDI-2006-JoukovTIWZ #latency #operating system #profiling
Operating System Profiling via Latency Analysis (NJ, AT, RI, CPW, EZ), pp. 89–102.
PDPPDP-2006-Barlas #clustering #taxonomy #video
A Taxonomy and DLT-Based Analysis of Cluster-Based Video Trans/En-Coding (GDB), pp. 388–395.
PDPPDP-2006-DortaLR #bound #performance
Performance Analysis of Branch-and-Bound Skeletons (ID, CL, CR), pp. 75–82.
PDPPDP-2006-VaskoD #modelling #workflow
A View Based Analysis of Workflow Modeling Languages (MV, SD), pp. 293–300.
ESOPESOP-2006-CodishLSS #termination
Size-Change Termination Analysis in k-Bits (MC, VL, PS, PJS), pp. 230–245.
ESOPESOP-2006-HofmannJ #type system
Type-Based Amortised Heap-Space Analysis (MH, SJ), pp. 22–37.
FASEFASE-2006-OlveczkyC #algorithm #maude #realtime #scheduling #simulation
Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude (PCÖ, MC), pp. 357–372.
FoSSaCSFoSSaCS-2006-BackesMPV #encryption
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
FoSSaCSFoSSaCS-2006-ZuninoD #protocol
Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
TACASTACAS-2006-DistefanoOY #logic
A Local Shape Analysis Based on Separation Logic (DD, PWO, HY), pp. 287–302.
TACASTACAS-2006-KonigK #abstraction #graph transformation #refinement
Counterexample-Guided Abstraction Refinement for the Analysis of Graph Transformation Systems (BK, VK), pp. 197–211.
CAVCAV-2006-BeyerHT #lazy evaluation
Lazy Shape Analysis (DB, TAH, GT), pp. 532–546.
CAVCAV-2006-Lev-AmiIS #abstraction #performance #precise
Abstraction for Shape Analysis with Fast and Precise Transformers (TLA, NI, SS), pp. 547–561.
CAVCAV-2006-ManoliosV #graph #termination
Termination Analysis with Calling Context Graphs (PM, DV), pp. 401–414.
ISSTAISSTA-2006-CsallnerS #debugging #hybrid #named
DSD-Crasher: a hybrid analysis tool for bug finding (CC, YS), pp. 245–254.
ISSTAISSTA-2006-Wagner #detection #quality
A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
ISSTAISSTA-2006-ZhangKPWJMZ
The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
ICSTSAT-2006-ChaviraD #component #encoding
Encoding CNFs to Empower Component Analysis (MC, AD), pp. 61–74.
ICSTSAT-2006-WatanabeY #problem #satisfiability
Average-Case Analysis for the MAX-2SAT Problem (OW, MY), pp. 277–282.
ICTSSTestCom-2006-CsorbaPDC #concurrent #performance
Performance Analysis of Concurrent PCOs in TTCN-3 (MJC, SP, SD, GC), pp. 149–160.
VMCAIVMCAI-2006-ArnoldMSS #abstraction
Combining Shape Analyses by Intersecting Abstractions (GA, RM, MS, RS), pp. 33–48.
VMCAIVMCAI-2006-KobayashiSW #resource management #π-calculus
Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
VMCAIVMCAI-2006-SankaranarayananCSM #performance #relational
Efficient Strongly Relational Polyhedral Analysis (SS, MC, HBS, ZM), pp. 111–125.
VMCAIVMCAI-2006-WiesKLPR #constraints
Field Constraint Analysis (TW, VK, PL, AP, MCR), pp. 157–173.
CBSECBSE-2005-Rountev #component #data flow
Component-Level Dataflow Analysis (AR), pp. 82–89.
WICSAWICSA-2005-Garlan #architecture #evaluation
Software Architecture Evaluation and Analysis Session Report (DG), pp. 227–228.
WICSAWICSA-2005-SmithS #architecture #automation
Extending SPQR to Architectural Analysis by Semi-Automated Training (JMS, PDS), pp. 239–242.
WICSAWICSA-2005-TekinerdoganSA #architecture #reliability #using
Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
WICSAWICSA-2005-WangSM #architecture #named
ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
HTHT-2005-Henzinger #web
Hyperlink analysis on the world wide web (MRH), pp. 1–3.
HTHT-2005-HorieYK #higher-order #rank #web
Higher-order rank analysis for web structure (IH, KY, KK), pp. 98–106.
HTHT-2005-MantratzisOC #html #navigation #using
Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
ICDARICDAR-2005-AradhyeMH #categorisation #email #image #performance
Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
ICDARICDAR-2005-BerardiACM #layout #process
A color-based layout analysis to process censorship cards of film archives (MB, OA, MC, DM), pp. 1110–1114.
ICDARICDAR-2005-ChenL #algorithm #component #independence #segmentation
Independent Component Analysis Segmentation Algorithm (YC, GL), pp. 680–684.
ICDARICDAR-2005-GarainC #approach #multi #segmentation
Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis (UG, BBC), pp. 177–181.
ICDARICDAR-2005-IshitaniFS #classification #documentation #xml
Table Structure Analysis Based on Cell Classification and Cell Modification for XML Document Transformation (YI, KF, KS), pp. 1247–1252.
ICDARICDAR-2005-LavenLR #approach #documentation #image #learning #statistics
A Statistical Learning Approach To Document Image Analysis (KL, SL, STR), pp. 357–361.
ICDARICDAR-2005-LiSC #matrix #multi
A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
ICDARICDAR-2005-NakamuraK #online
Individuality Analysis of Online Kanji Handwriting (YN, MK), pp. 620–624.
ICDARICDAR-2005-SclaroffBKAALMT #gesture #recognition #video
Tracking, Analysis, and Recognition of Human Gestures in Video (SS, MB, GK, JA, VA, RL, JJM, TPT), pp. 806–810.
ICDARICDAR-2005-SextonS #matrix #semantics
Semantic Analysis of Matrix Structures (APS, VS), pp. 1141–1145.
ICDARICDAR-2005-YingsaereeK #detection #documentation #layout #rule-based
Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
PODSPODS-2005-AbadiW #documentation #encryption #security #xml
Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
PODSPODS-2005-Gehrke #modelling #privacy #tutorial
Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
CSEETCSEET-2005-WangS #architecture #student #using
Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
ITiCSEITiCSE-2005-AhmadzadehEH #debugging #student
An analysis of patterns of debugging among novice computer science students (MA, DE, CH), pp. 84–88.
ITiCSEITiCSE-2005-Dick #assessment #design #learning #student
Student interviews as a tool for assessment and learning in a systems analysis and design course (MD), pp. 24–28.
ITiCSEITiCSE-2005-Hamza #approach #design #object-oriented
Introducing object-oriented analysis and design in lower-level undergraduate courses: a pattern-based approach (HSH), p. 350.
ITiCSEITiCSE-2005-NodelmanH
Complex analysis in computer graphics course (VN, BH), p. 381.
SIGITESIGITE-2005-Backhouse #design #learning
Learning individual group skills for software analysis and design in Africa (JB), pp. 107–112.
SIGITESIGITE-2005-BurnsK #development
A cross-collegiate analysis of software development course content (TB, RK), pp. 333–337.
CSMRCSMR-2005-Al-EkramK #framework #representation #xml
An XML-Based Framework for Language Neutral Program Representation and Generic Analysis (RAE, KK), pp. 42–51.
CSMRCSMR-2005-GreevyD #approach #correlation #using
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
CSMRCSMR-2005-JiangLSS #comparison #uml #web #web service
UML-Level Analysis and Comparison of Web Service Descriptions (JJ, JL, PS, TS), pp. 236–240.
CSMRCSMR-2005-KarailaS #case study #industrial #maintenance #source code #visual notation
Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 158–167.
ICSMEICSM-2005-AlvesCVSDBR #comparative #game studies #migration
Comparative Analysis of Porting Strategies in J2ME Games (VA, IC, HV, PHMS, ALGD, PB, GR), pp. 123–132.
ICSMEICSM-2005-GreevyDG #evolution #semantics
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
ICSMEICSM-2005-HayesZ #evolution #maintenance #metric #predict
Maintainability Prediction: A Regression Analysis of Measures of Evolving Systems (JHH, LZ), pp. 601–604.
ICSMEICSM-2005-JinC #integration #ontology #re-engineering #tool support
Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology (DJ, JRC), pp. 613–616.
ICSMEICSM-2005-Lock #modelling #named
Strider: Configuration Modelling and Analysis of Complex Systems (SL), pp. 495–504.
ICSMEICSM-2005-MilanovaR #constraints #precise
Annotated Inclusion Constraints for Precise Flow Analysis (AM, BGR), pp. 187–196.
ICSMEICSM-2005-StorzerG #aspect-oriented #evolution #using
Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
ICSMEICSM-IT-2005-Pacione #abstraction #named #network #visualisation
VANESSA: Visualisation Abstraction NEtwork for Software Systems Analysis (MJP), pp. 85–88.
IWPCIWPC-2005-FischerOGG #evolution #execution
System Evolution Tracking through Execution Trace Analysis (MF, JO, HCG, TG), pp. 237–246.
IWPCIWPC-2005-Hamou-LhadjLF #named
SEAT: A Usable Trace Analysis Tool (AHL, TCL, LF), pp. 157–160.
MSRMSR-2005-ConklinHC #collaboration #repository #using
Collaboration using OSSmole: a repository of FLOSS data and analyses (MC, JH, KC), pp. 76–80.
MSRMSR-2005-KimWB
Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
PASTEPASTE-2005-BradburyCD #effectiveness #empirical #formal method #framework #testing
An empirical framework for comparing effectiveness of testing and property-based formal analysis (JSB, JRC, JD), pp. 2–5.
PASTEPASTE-2005-ChristodorescuKG #string
String analysis for x86 binaries (MC, NK, WHG), pp. 88–95.
PASTEPASTE-2005-HampapuramYD #data flow #simulation
Symbolic path simulation in path-sensitive dataflow analysis (HH, YY, MD), pp. 52–58.
PASTEPASTE-2005-RountevVR #control flow #diagrams #reverse engineering #sequence chart #uml
Static control-flow analysis for reverse engineering of UML sequence diagrams (AR, OV, MR), pp. 96–102.
SCAMSCAM-2005-BussEYW #pointer #text-to-text
Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
SCAMSCAM-2005-FluriGP #fine-grained
Fine-Grained Analysis of Change Couplings (BF, HG, MP), pp. 66–74.
SCAMSCAM-2005-JonesK #garbage collection #performance #thread
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading (REJ, ACK), pp. 129–138.
ICALPICALP-2005-DonatoLT #algorithm #ranking #similarity
Stability and Similarity of Link Analysis Ranking Algorithms (DD, SL, PT), pp. 717–729.
FMFM-2005-BuchholtzGHM #framework #performance #platform #security
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
FMFM-2005-CacheraJPS #memory management
Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
FMFM-2005-SharyginaCCS #component
Dynamic Component Substitutability Analysis (NS, SC, EMC, NS), pp. 512–528.
IFMIFM-2005-GrunskeLYW #automation #behaviour #design #specification
An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
SEFMSEFM-2005-BarthePS #logic #memory management #precise #using
Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
SEFMSEFM-2005-CeroneLC #formal method #human-computer #interactive #model checking #using
Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
SEFMSEFM-2005-GeorgievaM #logic
Description Logics for Shape Analysis (LG, PM), pp. 321–331.
SEFMSEFM-2005-LanotteMT #automaton #data type #design #distributed
Timed Automata with Data Structures for Distributed Systems Design and Analysis (RL, AMS, AT), pp. 44–53.
SFMSFM-2005-Grassi #mobile #performance
Performance Analysis of Mobile Systems (VG), pp. 107–154.
ICFPICFP-2005-BergerHY #alias #higher-order #imperative #logic
A logical analysis of aliasing in imperative higher-order functions (MB, KH, NY), pp. 280–293.
IFLIFL-2005-GrelckSS #array #source code
A Binding Scope Analysis for Generic Programs on Arrays (CG, SBS, AVS), pp. 212–230.
AIIDEAIIDE-2005-SoutheyXHTB #automation #machine learning
Semi-Automated Gameplay Analysis by Machine Learning (FS, GX, RCH, MT, JWB), pp. 123–128.
DiGRADiGRA-2005-ElverdamA #classification #design #game studies
Game Classification as Game Design: Construction Through Critical Analysis (CE, EA).
DiGRADiGRA-2005-Galarneau05a #community #ecosystem #game studies #learning #multi #online #social
Spontaneous Communities of Learning: A Social Analysis of Learning Ecosystems in Massively Multiplayer Online Gaming (MMOG) Environments (LG).
DiGRADiGRA-2005-Huntemann #game studies #industrial
When Games and Media Collide: A Political Economic Analysis of the Digital Games Industry (NH).
DiGRADiGRA-2005-ThomasH #game studies
Cinematic Camera as Videogame Cliché: Analysis and Software Demonstration (DT, GH).
DiGRADiGRA-2005-Wong #game studies #online
Playing with Heritage: Semiotics and cultural analysis of the online Mahjong game in the global environment (WW).
DiGRADiGRA-2005-ZagalMFHL #game studies #ontology #towards
Towards an Ontological Language for Game Analysis (JPZ, MM, CFV, BH, NL).
CHICHI-2005-HinckleyBRG #design #gesture
Design and analysis of delimiters for selection-action pen gesture phrases in scriboli (KH, PB, GR, FG), pp. 451–460.
CHICHI-2005-LiHGL #user interface
Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
SOFTVISSOFTVIS-2005-JohannesSW #algorithm #animation #using #visualisation
Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
SOFTVISSOFTVIS-2005-KholkarKSV #case study #specification #visual notation
Visual specification and analysis of use cases (DK, GMK, US, RV), pp. 77–85.
VISSOFTVISSOFT-2005-RillingN #3d #comprehension #design pattern
Applying Code Analysis and 3D Design Pattern Grouping to Facilitate Program Comprehension (JR, VLN), pp. 123–124.
CAiSECAiSE-2005-Evermann #concept #modelling #ontology #using
The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
EDOCEDOC-2005-JonkersILS #aspect-oriented #development #integration #modelling #non-functional
Integration and Analysis of Functional and Non-Functional Aspects in Model-Driven E-Service Development (HJ, MEI, MML, PS), pp. 229–238.
ICEISICEIS-v1-2005-AndreouL #parametricity #reliability
Nonparametric Analysis of Software Reliability: Revealing the Nature of Software Failure Dataseries (ASA, CL), pp. 138–145.
ICEISICEIS-v2-2005-MezaNMGC #modelling
Free Software for Decision Analysis: A Software Package for Data Envelopment Models (LAM, LBN, JCCBSdM, EGG, PHGC), pp. 207–212.
ICEISICEIS-v3-2005-Boulanger #named #safety
BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
ICEISICEIS-v3-2005-Liang #information management #modelling #specification
Dialogue Act Modelling for Analysis and Specification of Web-Based Information Systems (YL), pp. 89–97.
ICEISICEIS-v3-2005-MenkhausA #embedded #metric
Metric Suite Directing the Failure Mode Analysis of Embedded Software Systems (GM, BA), pp. 266–273.
ICEISICEIS-v3-2005-MisraKK #modelling
Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects (SCM, VK, UK), pp. 288–293.
ICEISICEIS-v3-2005-PereiraTS #development
Sustainable Development and Investment in Information Technologies: A Socio-Economic Analysis (MJP, LVT, RS), pp. 81–88.
ICEISICEIS-v3-2005-YangLZ #performance #process
A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
ICEISICEIS-v5-2005-RuschelIRF #concept #design #framework #process
Designing Geographic Analysis Processes on the Basis of the Conceptual Framework Geoframe (CR, CI, LVdR, JLF), pp. 91–97.
CIKMCIKM-2005-AlonsoL
Model-guided information discovery for intelligence analysis (RA, HL), pp. 269–270.
CIKMCIKM-2005-AslamY #geometry
A geometric interpretation and analysis of R-precision (JAA, EY), pp. 664–671.
CIKMCIKM-2005-MishneCHRS #automation
Automatic analysis of call-center conversations (GM, DC, RH, AR, AS), pp. 453–459.
CIKMCIKM-2005-WhitelawGA #sentiment #using
Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
ECIRECIR-2005-BalfeS #collaboration #query #similarity #web
An Analysis of Query Similarity in Collaborative Web Search (EB, BS), pp. 330–344.
ECIRECIR-2005-CachedaCPO #architecture #distributed #information retrieval #network
Network Analysis for Distributed Information Retrieval Architectures (FC, VC, VP, IO), pp. 527–529.
ECIRECIR-2005-DingCZ #clustering #concept #detection #video
Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
ECIRECIR-2005-HauffA #documentation
Age Dependent Document Priors in Link Structure Analysis (CH, LA), pp. 552–554.
ICMLICML-2005-HeCM #locality #statistics
Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
ICMLICML-2005-Pietraszek #classification #optimisation #using
Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
ICMLICML-2005-PoczosL #independence #using
Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
ICMLICML-2005-ShaS #reduction
Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
ICMLICML-2005-SinghPGBB #learning
Active learning for sampling in time-series experiments with application to gene expression analysis (RS, NP, DKG, BB, ZBJ), pp. 832–839.
ICMLICML-2005-StrehlL #estimation #modelling
A theoretical analysis of Model-Based Interval Estimation (ALS, MLL), pp. 856–863.
ICMLICML-2005-TorreK #multimodal
Multimodal oriented discriminant analysis (FDlT, TK), pp. 177–184.
KDDKDD-2005-ChenH #classification #image #network
A Bayesian network classifier with inverse tree structure for voxelwise magnetic resonance image analysis (RC, EH), pp. 4–12.
KDDKDD-2005-ItoSKM #kernel
Application of kernels to link analysis (TI, MS, TK, YM), pp. 586–592.
MLDMMLDM-2005-BunkeDIK #graph #learning #predict
Analysis of Time Series of Graphs: Prediction of Node Presence by Means of Decision Tree Learning (HB, PJD, CI, MK), pp. 366–375.
MLDMMLDM-2005-GhoshGYB #algorithm #comparative #network #search-based
Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
MLDMMLDM-2005-HamanoS #semantics
Semantic Analysis of Association Rules via Item Response Theory (SH, MS), pp. 641–650.
MLDMMLDM-2005-HanCY #component #feature model #image #independence #using
Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
MLDMMLDM-2005-OhnishiI #component #detection #independence #using
Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
SEKESEKE-2005-AyalaCCGHSFMQ #comparative #modelling
A Comparative Analysis of i*-Based Agent-Oriented Modeling Languages (CPA, CC, JPC, GG, MH, GS, XF, EM, CQ), pp. 43–50.
SEKESEKE-2005-KongOF #formal method #security #workflow
Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
SEKESEKE-2005-LiCLY #design #evolution #feature model #legacy #using
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
SEKESEKE-2005-LiuCBGROA #approach #component #composition #quality #requirements #two-level grammar
Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
SEKESEKE-2005-LungZ #architecture #combinator #design
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis (CHL, MZ), pp. 418–423.
SEKESEKE-2005-YuLYH #aspect-oriented #modelling
Formal Aspect-Oriented Modeling and Analysis by Aspect (HY, DL, LY, XH), pp. 169–174.
SIGIRSIGIR-2005-AgichteinCB #effectiveness
Analysis of factoid questions for effective relation extraction (EA, SC, EB), pp. 567–568.
SIGIRSIGIR-2005-LiY #recursion
Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
SIGIRSIGIR-2005-TeevanDH #automation #personalisation #process
Personalizing search via automated analysis of interests and activities (JT, STD, EH), pp. 449–456.
SIGIRSIGIR-2005-XueYZYC
Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
SIGIRSIGIR-2005-XuSMK #automation #music #summary #video
Automatic music video summarization based on audio-visual-text analysis and alignment (CX, XS, NCM, MSK), pp. 361–368.
ECMFAECMDA-FA-2005-GarousiBL #control flow #diagrams #sequence chart #uml
Control Flow Analysis of UML 2.0 Sequence Diagrams (VG, LCB, YL), pp. 160–174.
ECMFAECMDA-FA-2005-TabuchiSN #algebra #design #modelling #performance #probability #process #uml
Model-Driven Performance Analysis of UML Design Models Based on Stochastic Process Algebra (NT, NS, HN), pp. 41–58.
MODELSMoDELS-2005-ChengSB #automation #industrial #lessons learnt #modelling #uml
Lessons Learned from Automated Analysis of Industrial UML Class Models (BHCC, RS, BB), pp. 324–338.
MODELSMoDELS-2005-ShenP #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-ChengSB #automation #industrial #lessons learnt #modelling #uml
Lessons Learned from Automated Analysis of Industrial UML Class Models (BHCC, RS, BB), pp. 324–338.
MODELSMoDELS-2005-ShenP #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
ECOOPECOOP-2005-PistoiaFKS #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
OOPSLAOOPSLA-2005-ShankarSBS #runtime
Runtime specialization with optimistic heap analysis (AS, SSS, RB, JES), pp. 327–343.
OOPSLAOOPSLA-2005-SridharanGSB #java #points-to
Demand-driven points-to analysis for Java (MS, DG, LS, RB), pp. 59–76.
QAPLQAPL-2004-AldiniP05 #on the #probability #protocol
On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
QAPLQAPL-2004-LanotteMT05 #automation #protocol
Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
LOPSTRLOPSTR-2005-CorreasPHB #composition #source code
Experiments in Context-Sensitive Analysis of Modular Programs (JC, GP, MVH, FB), pp. 163–178.
POPLPOPL-2005-GopanRS #array #framework
A framework for numeric analysis of array operations (DG, TWR, SS), pp. 338–350.
POPLPOPL-2005-GulwaniN #interprocedural #precise #random #using
Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
POPLPOPL-2005-HackettR
Region-based shape analysis with tracked locations (BH, RR), pp. 310–323.
POPLPOPL-2005-LernerMRC #automation #data flow #proving
Automated soundness proofs for dataflow analyses and transformations via local rules (SL, TDM, ER, CC), pp. 364–377.
PPDPPPDP-2005-Mitchell #logic #network #protocol #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
PPDPPPDP-2005-SahaR #incremental #logic programming #points-to #using
Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
SASSAS-2005-BruynoogheGH #logic programming #source code #termination
Inference of Well-Typings for Logic Programs with Application to Termination Analysis (MB, JPG, WVH), pp. 35–51.
SASSAS-2005-JungKSY #c #statistics
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
SASSAS-2005-KodumalA #constraints #named #scalability #tool support
Banshee: A Scalable Constraint-Based Analysis Toolkit (JK, AA), pp. 218–234.
SASSAS-2005-Muller-OlmS #framework #interprocedural
A Generic Framework for Interprocedural Analysis of Numerical Properties (MMO, HS), pp. 235–250.
SASSAS-2005-RinetzkySY #interprocedural #source code
Interprocedural Shape Analysis for Cutpoint-Free Programs (NR, MS, EY), pp. 284–302.
SASSAS-2005-SecciS #object-oriented #source code
Pair-Sharing Analysis of Object-Oriented Programs (SS, FS), pp. 320–335.
SASSAS-2005-SimonK
Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
AdaSIGAda-2005-AlexandrID #ada #clustering #performance #source code
Experimental performance analysis of ada programs in cluster system (KA, SI, KD), pp. 31–36.
AdaSIGAda-2005-SinghoffLNM #memory management #requirements #scheduling
Scheduling and memory requirements analysis with AADL (FS, JL, LN, LM), pp. 1–10.
RERE-2005-BucchiaroneGP #case study #industrial #quality #requirements
Quality Analysis of NL Requirements: An Industrial Case Study (AB, SG, PP), pp. 390–394.
RERE-2005-CoheneE #design
Contextual Risk Analysis for Interview Design (TC, SME), pp. 95–104.
RERE-2005-Fuji #education #requirements
Finding Competitive Advantage in Requirements Analysis Education (TF), pp. 493–494.
RERE-2005-GrauFM #architecture #named
REDEPEND-REACT: an Architecture Analysis Tool (GG, XF, NAMM), pp. 455–456.
RERE-2005-LutzNPFT #identification #requirements #using
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-Nakamura #integration #project management
Analysis of Project Management Reports of 49 System Integration Projects (TN), pp. 485–486.
RERE-2005-RobinsonWW #design #probability #requirements #using
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
RERE-2005-SvetinovicBG #concept #identification #object-oriented #student #why
Concept Identification in Object-Oriented Domain Analysis: Why Some Students Just Don’t Get It (DS, DMB, MWG), pp. 189–198.
ASEASE-2005-CaiS #design #modelling #named
Simon: modeling and analysis of design space structures (YC, KJS), pp. 329–332.
ASEASE-2005-FredrikssonTC #component #design #development #framework #non-functional
A component-based development framework for supporting functional and non-functional analysis in control system design (JF, MT, IC), pp. 368–371.
ASEASE-2005-FriasGSB #performance #relational #specification #verification
A strategy for efficient verification of relational specifications, based on monotonicity analysis (MFF, RG, GS, LB), pp. 305–308.
ASEASE-2005-HalfondO #injection #monitoring #named
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
ASEASE-2005-HennessyP #generative #grammarware #testing
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software (MH, JFP), pp. 104–113.
ASEASE-2005-JurjensY #security
Code security analysis with assertions (JJ, MY), pp. 392–395.
ASEASE-2005-LangelierSP #quality #scalability #visualisation
Visualization-based analysis of quality for large-scale software systems (GL, HAS, PP), pp. 214–223.
ASEASE-2005-ShepherdPPC #automation #framework #mining #named
Timna: a framework for automatically combining aspect mining analyses (DCS, JP, LLP, MCC), pp. 184–193.
ESEC-FSEESEC-FSE-2005-InverardiMP #architecture #named
CHARMY: an extensible tool for architectural analysis (PI, HM, PP), pp. 111–114.
ESEC-FSEESEC-FSE-2005-KuncakJ #algebra #data type #relational
Relational analysis of algebraic datatypes (VK, DJ), pp. 207–216.
GTTSEGTTSE-2005-BenavidesSMC #automation #csp #feature model #java #modelling #using
Using Java CSP Solvers in the Automated Analyses of Feature Models (DB, SS, PTMA, ARC), pp. 399–408.
GTTSEGTTSE-2005-EkmanH #composition #jastadd #java #using
Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
ICSEICSE-2005-AvotsDLL #c #pointer #security
Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
ICSEICSE-2005-LetierKMU #monitoring #requirements
Monitoring and control in scenario-based requirements analysis (EL, JK, JM, SU), pp. 382–391.
ICSEICSE-2005-RountevC #diagrams #sequence chart
Object naming analysis for reverse-engineered sequence diagrams (AR, BHC), pp. 254–263.
SACSAC-2005-AbbasMG
Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
SACSAC-2005-BleisteinCV #approach #requirements
Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
SACSAC-2005-Casale #mining #network #performance #web
Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
SACSAC-2005-ChenA #approach #comparative #predict #sequence #using
A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
SACSAC-2005-CuiK #documentation #topic
Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
SACSAC-2005-DalkilicS #design #evaluation
Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
SACSAC-2005-DaoudM #mobile #reliability
Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
SACSAC-2005-FernandezS #modelling
An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
SACSAC-2005-HouD #design #detection #search-based
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
SACSAC-2005-JiJC #adaptation #migration
Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
SACSAC-2005-NicolaLM #formal method #mobile #modelling
Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
SACSAC-2005-PervouchineLM #documentation #forensics
Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
SACSAC-2005-Rosso #framework #message passing #paradigm #performance #scalability
Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
SACSAC-2005-ZhangP
Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
LDTALDTA-2005-CassidyCDD #concurrent
Source Transformation for Concurrency Analysis (TC, JRC, TRD, JD), pp. 57–75.
CASECASE-2005-JainR #modelling #using
Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
CASECASE-2005-KoschwanezHCMGM #automation
Automated lifetime analysis of a single yeast cell (JK, MH, RHC, MM, DG, DRM), pp. 13–18.
CASECASE-2005-LeeH #array #design
An integrated system of microcantilever arrays with carbon nanotube tips for bio/nano analysis: design and control (EL, HSH), pp. 113–117.
CASECASE-2005-LeeP #constraints #graph
Steady state analysis of a timed event graph with time window constraints (TEL, SHP), pp. 404–409.
CASECASE-2005-MeldrumHFSMRPMCDW
Sample preparation in glass capillaries for high-throughput biochemical analyses (DRM, MH, CHF, MSS, SKM, TTHR, WHP, SEM, DLC, DAD, PJW), pp. 7–12.
CASECASE-2005-MillerSSLM #using
Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
CCCC-2005-QianH #case study #jit
A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
CCCC-2005-XueN #object-oriented #source code
Completeness Analysis for Incomplete Object-Oriented Programs (JX, PHN), pp. 271–286.
CGOCGO-2005-GuoBTORA #low level #pointer
Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
COCVCOCV-J-2005-SalcianuA #correctness #data flow #proving
Machine-Checkable Correctness Proofs for Intra-procedural Dataflow Analyses (AS, KA), pp. 53–68.
DACDAC-2005-AgarwalCBZ #optimisation #statistics #using
Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
DACDAC-2005-AminMKDCHI #how #question #statistics
Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
DACDAC-2005-ChangS #correlation #power management #process
Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
DACDAC-2005-ChangZNV #parametricity #statistics
Parameterized block-based statistical timing analysis with non-gaussian parameters, nonlinear delay functions (HC, VZ, SN, CV), pp. 71–76.
DACDAC-2005-ChenDHSW #concurrent #design #simulation
Simulation based deadlock analysis for system level designs (XC, AD, HH, ALSV, YW), pp. 260–265.
DACDAC-2005-DililloGPVB #comparison #fault #injection
Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
DACDAC-2005-GuptaKKS
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
DACDAC-2005-HuLWD #integration #novel #using
Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
DACDAC-2005-KhandelwalS #correlation #framework #statistics
A general framework for accurate statistical timing analysis considering correlations (VK, AS), pp. 89–94.
DACDAC-2005-Li #grid #performance #power management #simulation
Power grid simulation via efficient sampling-based sensitivity analysis and hierarchical symbolic relaxation (PL), pp. 664–669.
DACDAC-2005-Najm #on the #statistics
On the need for statistical timing analysis (FNN), pp. 764–765.
DACDAC-2005-SuWKLK #effectiveness #embedded #functional #performance
A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
DACDAC-2005-YangCS
Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
DACDAC-2005-ZhangCHGC #polynomial #statistics
Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
DACDAC-2005-ZhanSLPNS #statistics
Correlation-aware statistical timing analysis with non-gaussian delay distributions (YZ, AJS, XL, LTP, DN, MS), pp. 77–82.
DACDAC-2005-Zhu #pointer #scalability #towards
Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
DATEDATE-2005-Al-ArsHMG #fault #framework #generative #testing
Framework for Fault Analysis and Test Generation in DRAMs (ZAA, SH, GM, AJvdG), pp. 1020–1021.
DATEDATE-2005-AlbersS #performance #realtime #scheduling
Efficient Feasibility Analysis for Real-Time Systems with EDF Scheduling (KA, FS), pp. 492–497.
DATEDATE-2005-ChakrabortyT #scheduling #streaming
A New Task Model for Streaming Applications and Its Schedulability Analysis (SC, LT), pp. 486–491.
DATEDATE-2005-Conti #architecture #power management
SystemC Analysis of a New Dynamic Power Management Architectur (MC), pp. 177–178.
DATEDATE-2005-ContiM #standard
System Level Analysis of the Bluetooth Standard (MC, DM), pp. 118–123.
DATEDATE-2005-DhillonDC #optimisation
Soft-Error Tolerance Analysis and Optimization of Nanometer Circuits (YSD, AUD, AC), pp. 288–293.
DATEDATE-2005-ForzanP #behaviour #library #modelling
Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
DATEDATE-2005-GhantaVPW #grid #power management #probability #process
Stochastic Power Grid Analysis Considering Process Variations (PG, SBKV, RP, JMW), pp. 964–969.
DATEDATE-2005-HeniaE #distributed #scheduling
Context-Aware Scheduling Analysis of Distributed Systems with Tree-Shaped Task-Dependencies (RH, RE), pp. 480–485.
DATEDATE-2005-KangPR #statistics #using
Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
DATEDATE-2005-LiC #clustering #hybrid #sequence
Hybrid BIST Based on Repeating Sequences and Cluster Analysis (LL, KC), pp. 1142–1147.
DATEDATE-2005-LiuFYO #correlation #graph #modelling
Hierarchical Variance Analysis for Analog Circuits Based on Graph Modelling and Correlation Loop Tracing (FL, JJF, DVY, SO), pp. 126–131.
DATEDATE-2005-MangassarianA #on the #statistics
On Statistical Timing Analysis with Inter- and Intra-Die Variations (HM, MA), pp. 132–137.
DATEDATE-2005-MilevB
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems (MM, RB), pp. 204–208.
DATEDATE-2005-MukhopadhyayBR #logic #modelling
Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits (SM, SB, KR), pp. 224–229.
DATEDATE-2005-NazarianPTLA #modelling
Modeling and Propagation of Noisy Waveforms in Static Timing Analysis (SN, MP, ET, TL, AHA), pp. 776–777.
DATEDATE-2005-PomeranzR #detection #testing #worst-case
Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
DATEDATE-2005-SchianoOLPS #fault #on the #reliability
On the Analysis of Reed Solomon Coding for Resilience to Transient/Permanent Faults in Highly Reliable Memories (LS, MO, FL, SP, AS), pp. 580–585.
DATEDATE-2005-ShenQL #algorithm #performance
A Faster Counterexample Minimization Algorithm Based on Refutation Analysis (SS, YQ, SL), pp. 672–677.
DATEDATE-2005-SoensPWD #simulation
Simulation Methodology for Analysis of Substrate Noise Impact on Analog / RF Circuits Including Interconnect Resistance (CS, GVdP, PW, SD), pp. 270–275.
DATEDATE-2005-StaschulatESW #performance
Context Sensitive Performance Analysis of Automotive Applications (JS, RE, AS, FW), pp. 165–170.
DATEDATE-2005-VargheseCY #using
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
DATEDATE-2005-WangMDCM #embedded #energy #process #variability
Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules (HW, MM, WD, FC, KM), pp. 914–919.
DATEDATE-2005-ZhangCHC #pseudo #statistics
Statistical Timing Analysis with Extended Pseudo-Canonical Timing Model (LZ, WC, YH, CCPC), pp. 952–957.
HPDCHPDC-2005-BaudCLN #grid #performance
Performance analysis of a file catalog for the LHC computing grid (JPB, JC, SL, CN), pp. 91–99.
LCTESLCTES-2005-StaschulatE #precise #scalability #scheduling
Scalable precision cache analysis for preemptive scheduling (JS, RE), pp. 157–165.
LCTESLCTES-2005-TanM
WCRT analysis for a uniprocessor with a unified prioritized cache (YT, VJMI), pp. 175–182.
PDPPDP-2005-GuitartCTAL #using #web
Tuning Dynamic Web Applications using Fine-Grain Analysis (JG, DC, JT, EA, JL), pp. 84–91.
PPoPPPPoPP-2005-SasturkarAWS #automation #type system
Automated type-based analysis of data races and atomicity (AS, RA, LW, SDS), pp. 83–94.
WRLAWRLA-2004-MeseguerT05 #encryption #protocol #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-KremerR #protocol #π-calculus
Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
ESOPESOP-2005-LeeYY #automation #grammarware #pointer #source code #using #verification
Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
ESOPESOP-2005-Muller-OlmS #composition
Analysis of Modular Arithmetic (MMO, HS), pp. 46–60.
FASEFASE-2005-JakobacEM #comprehension #interactive #source code
Improving System Understanding via Interactive, Tailorable, Source Code Analysis (VJ, AE, NM), pp. 253–268.
FASEFASE-2005-JurjensS #development #security #tool support #uml
Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
FASEFASE-2005-LeicherS #composition #modelling #uml
Augmenting UML Models for Composition Conflict Analysis (AL, JGS), pp. 127–140.
TACASTACAS-2005-JeannetJRZ #approximate #testing
Symbolic Test Selection Based on Approximate Analysis (BJ, TJ, VR, EZ), pp. 349–364.
TACASTACAS-2005-JinHS #performance
Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit (HJ, HH, FS), pp. 287–300.
TACASTACAS-2005-PnueliPR
Separating Fairness and Well-Foundedness for the Analysis of Fair Discrete Systems (AP, AP, AR), pp. 124–139.
ICSTSAT-J-2004-TangYRM05 #algorithm #problem #quantifier #satisfiability
Analysis of Search Based Algorithms for Satisfiability of Propositional and Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 292–305.
CAVCAV-2005-ConwayNDE #algorithm #incremental #interprocedural #safety
Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
CAVCAV-2005-Monniaux #composition #float #linear
Compositional Analysis of Floating-Point Linear Numerical Filters (DM), pp. 199–212.
CSLCSL-2005-Lambov #complexity #framework
Complexity and Intensionality in a Type-1 Framework for Computable Analysis (BL), pp. 442–461.
ICLPICLP-2005-BrasselH #functional #logic programming #nondeterminism #source code
Nondeterminism Analysis of Functional Logic Programs (BB, MH), pp. 265–279.
ICLPICLP-2005-CorinSE #constraints #protocol #security
PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
ICLPICLP-2005-Fruhwirth #confluence #constraints #using
Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
ICLPICLP-2005-GallagherHB #scalability
Techniques for Scaling Up Analyses Based on Pre-interpretations (JPG, KSH, GB), pp. 280–296.
ICLPICLP-2005-NguyenS #logic programming #polynomial #source code #termination
Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs (MTN, DDS), pp. 311–325.
ICLPICLP-2005-PueblaAH #framework #logic programming #source code
A Generic Framework for the Analysis and Specialization of Logic Programs (GP, EA, MVH), pp. 407–409.
ICLPICLP-2005-Schrijvers #constraints #optimisation #summary
Analyses, Optimizations and Extensions of Constraint Handling Rules: Ph.D. Summary (TS), pp. 435–436.
ICLPICLP-2005-Sneyers #optimisation #source code
Analysis and Optimization of CHR Programs (JS), pp. 450–451.
LICSLICS-2005-EsparzaKM #automaton #probability
Quantitative Analysis of Probabilistic Pushdown Automata: Expectations and Variances (JE, AK, RM), pp. 117–126.
LICSLICS-2005-Hillston #algebra #process
Process Algebras for Quantitative Analysis (JH), pp. 239–248.
ICTSSTestCom-2005-LeeJL #detection #smarttech #using
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
VMCAIVMCAI-2005-BalabanPZ #abstraction
Shape Analysis by Predicate Abstraction (IB, AP, LDZ), pp. 164–180.
VMCAIVMCAI-2005-GenaimS #bytecode #data flow #java
Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
VMCAIVMCAI-2005-Goubault-LarrecqP #c #encryption #protocol
Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
VMCAIVMCAI-2005-SalcianuR #java #source code
Purity and Side Effect Analysis for Java Programs (AS, MCR), pp. 199–215.
VMCAIVMCAI-2005-SankaranarayananSM #linear #programming #scalability #using
Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
CBSECBSE-2004-Maydl #component #design #embedded
Design Accompanying Analysis of Component-Based Embedded Software (WM), pp. 178–193.
WICSAWICSA-2004-MeisterRR #architecture #product line #statistics
Applying Patterns to Develop a Product Line Architecture for Statistical Analysis Software (JM, RHR, MR), pp. 291–294.
WICSAWICSA-2004-Perez-MartinezS #architecture #heuristic
Heuristics for the Transition from Analysis to Software Architecture (JEPM, ASA), pp. 311–314.
WICSAWICSA-2004-Tekinerdogan #architecture #named
ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
DRRDRR-2004-Nishida #adaptation #documentation #image #multi
Adaptive inverse halftoning for scanned document images through multiresolution and multiscale analysis (HN), pp. 192–203.
HTHT-2004-HorieY #documentation #set #using #web
Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
JCDLJCDL-2004-CunninghamBM #how #image #people #query #visual notation
How people describe their image information needs: a grounded theory analysis of visual arts queries (SJC, DB, MM), pp. 47–48.
SIGMODSIGMOD-2004-MiklauS #formal method
A Formal Analysis of Information Disclosure in Data Exchange (GM, DS), pp. 575–586.
VLDBVLDB-2004-XuCOTH #mining #semantics
Semantic Mining and Analysis of Gene Expression Data (XX, GC, BCO, KLT, AKHT), pp. 1261–1264.
ITiCSEITiCSE-2004-BlumensteinGNM #automation #game studies
An experimental analysis of GAME: a generic automated marking environment (MB, SG, AN, VM), pp. 67–71.
CSMRCSMR-2004-AntoniolP #architecture #distributed
A Distributed Architecture for Dynamic Analyses on User-Profile Data (GA, MDP), pp. 319–328.
CSMRCSMR-2004-ItkonenHL #java
Application of Relation Analysis to a Small Java Software (JI, MH, VL), pp. 233–242.
ICSMEICSM-2004-Granja-Alvarez #case study #maintenance #specification
Software Maintenance: Analysis of Estimates Based on Requirement Specification in the Context of New Technologies, a Case Study (JCGA), p. 531.
ICSMEICSM-2004-LuoJZMS #case study #component #graph #object-oriented
An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
ICSMEICSM-2004-MaleticC #difference #source code
Supporting Source Code Difference Analysis (JIM, MLC), pp. 210–219.
ICSMEICSM-2004-MerloAPR #clone detection #complexity #detection #evolution #linear #object-oriented #similarity
Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
ICSMEICSM-2004-Ricca #testing #web
Analysis, Testing and Re-Structuring of Web Applications (FR), pp. 474–478.
ICSMEICSM-2004-RivaSSX #architecture #maintenance #reverse engineering #uml
UML-Based Reverse Engineering and Model Analysis Approaches for Software Architecture Maintenance (CR, PS, TS, JX), pp. 50–59.
ICSMEICSM-2004-SatpathySR #case study #maintenance #object-oriented
Assertions in Object Oriented Software Maintenance: Analysis and a Case Study (MS, NTS, DR), pp. 124–135.
ICSMEICSM-2004-WhiteR #industrial #realtime #testing #using
Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
IWPCIWPC-2004-LuciaFST #re-engineering #web
Reengineering Web Applications Based on Cloned Pattern Analysis (ADL, RF, GS, GT), pp. 132–141.
PASTEPASTE-2004-Ezick #constraints #query
Resolving and applying constraint queries on context-sensitive analyses (JE), pp. 2–7.
PASTEPASTE-2004-NystromKH #pointer
Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
PASTEPASTE-2004-PearceKH #c #performance #pointer
Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
SCAMSCAM-2004-RoblesG #execution #source code
Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
SCAMSCAM-2004-Rothermel #source code #using
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
WCREWCRE-2004-Harrold #control flow #source code
Static and Dynamic Analyses of Programs with Implicit Control Flow (MJH), p. 5.
WCREWCRE-2004-KarailaS #case study #industrial #maintenance #source code #visual notation
Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 294–295.
WCREWCRE-2004-LakhotiaP #research #tool support
Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
WCREWCRE-2004-MarinDM #aspect-oriented #identification #using
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
WCREWCRE-2004-ParkKWY #behaviour #design pattern
A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
ICALPICALP-2004-Toftdal #effectiveness #logic #theorem
A Calibration of Ineffective Theorems of Analysis in a Hierarchy of Semi-classical Logical Principles: (MT), pp. 1188–1200.
RTARTA-2004-JonesB #calculus #termination
Termination Analysis of the Untyped lamba-Calculus (NDJ, NB), pp. 1–23.
SEFMSEFM-2004-BertoliniFFO #automaton #generative #network #probability #testing #using
Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
SEFMSEFM-2004-Fronk #algebra #approach #automation #petri net #using
Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
SEFMSEFM-2004-NguyenM #consistency
A Formalism for Conformance Analysis and Its Applications (TNN, EVM), pp. 330–339.
SFMSFM-2004-KatoenBKH #embedded
Embedded Software Analysis with MOTOR (JPK, HCB, RK, HH), pp. 268–294.
FLOPSFLOPS-2004-BuenoLH #abstract interpretation #multi #standard
Multivariant Non-failure Analysis via Standard Abstract Interpretation (FB, PLG, MVH), pp. 100–116.
FLOPSFLOPS-2004-HagiyaTYS #abstraction #automaton #logic #using
Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
FLOPSFLOPS-2004-LuK
Backward Pair Sharing Analysis (LL, AK), pp. 132–146.
ICGTICGT-2004-RosselloV #graph transformation
Analysis of Metabolic Pathways by Graph Transformation (FR, GV), pp. 70–82.
CHICHI-2004-LawH #combinator #testing #usability
Analysis of combinatorial user effect in international usability tests (ELCL, EÞH), pp. 9–16.
CSCWCSCW-2004-BarrettKMHTP #tool support
Field studies of computer system administrators: analysis of system management tools and practices (RB, EK, PPM, EMH, LT, MP), pp. 388–395.
CSCWCSCW-2004-HornFBMJ #evolution #network #research #social
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research (DBH, TAF, JPB, DM, SJ), pp. 582–591.
CSCWCSCW-2004-SorokaJ #collaboration #framework
The diffusion of reachOut: analysis and framework for the successful diffusion of collaboration technologies (VS, MJ), pp. 314–323.
CAiSECAiSE-2004-GePL #database
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
CAiSECAiSE-2004-SofferW #process
Goal-Driven Analysis of Process Model Validity (PS, YW), pp. 521–535.
ICEISICEIS-v1-2004-Lyytinen #functional #requirements #scalability #source code
Large Scale Requirements Engineering in Action: An Ethnographic Analysis of Functional and Political Ecologies in Situ in Space Mission Programs (KL), p. V.
ICEISICEIS-v2-2004-CamponovoBP
Strategic Analysis of the Environment: A DSS for Assessing Technology Environments (GC, SB, YP), pp. 122–129.
ICEISICEIS-v2-2004-DhoteMR #detection #development #fault
Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
ICEISICEIS-v2-2004-Martinez-OtzetaS #algorithm #nearest neighbour #probability
Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
ICEISICEIS-v2-2004-Turowska #nondeterminism
Application of Uncertain Variables to Stability Analysis and Stabilization for ATM ABR Congestion Control Systems (MT), pp. 523–526.
ICEISICEIS-v3-2004-BonacinBL #design #diagrams #ontology #semantics
From Ontology Charts to Class Diagrams: Semantic Analysis Aiding Systems Design (RB, MCCB, KL), pp. 389–395.
ICEISICEIS-v3-2004-Douglas #enterprise #performance
Founding Enterprise Systems on Enterprise Performance Analysis (ID), pp. 588–591.
ICEISICEIS-v3-2004-Hair #concept #design #named #process
U_VBOOM: Unified Analysis and Design Process Based on the Viewpoint Concept (AH), pp. 217–224.
ICEISICEIS-v3-2004-Martens #re-engineering #web #web service
Analysis and Re-Engineering of Web Services (AM), pp. 419–426.
ICEISICEIS-v3-2004-Ohki #formal method
Formalization of Class Structure Extraction through Lifetime Analysis (MO), pp. 635–642.
ICEISICEIS-v3-2004-PanedaMGGN #monitoring #predict #video
Analysis and Configuration Methodology for Video on Demand Services Based on Monitoring Information and Prediction (XGP, DM, RG, VGG, ÁN), pp. 289–294.
ICEISICEIS-v4-2004-HislopE #education #online
An Analysis of Variation in Teaching Effort Across Tasks in Online and Traditional Courses (GWH, HJCE), pp. 202–207.
ICEISICEIS-v5-2004-MarzalBMC #documentation #perspective #topic
Verbs & Topic Maps: A Proposal for Legal Documentation from the Document Content Analysis Perspective (MÁM, CB, JM, FC), pp. 63–68.
CIKMCIKM-2004-FradkinK #adaptation #approach #design #information retrieval
A design space approach to analysis of information retrieval adaptive filtering systems (DF, PBK), pp. 251–260.
CIKMCIKM-2004-GollapudiS #algorithm #framework #set
Framework and algorithms for trend analysis in massive temporal data sets (SG, DS), pp. 168–177.
CIKMCIKM-2004-LynamBCC #documentation #feedback #multi
A multi-system analysis of document and term selection for blind feedback (TRL, CB, CLAC, GVC), pp. 261–269.
CIKMCIKM-2004-MegalooikonomouLW #database #performance #reduction #similarity
A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
CIKMCIKM-2004-SanoE #categorisation #information management
Circumstance-based categorization analysis of knowledge management systems for the japanese market (MS, DAE), pp. 507–514.
CIKMCIKM-2004-SrinivasanADZ #grammarware #web
Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
CIKMCIKM-2004-TakakiFI #documentation #query #retrieval #topic
Associative document retrieval by query subtopic analysis and its application to invalidity patent search (TT, AF, TI), pp. 399–405.
ECIRECIR-2004-CachedaPO #architecture #distributed #performance
Performance Analysis of Distributed Architectures to Index One Terabyte of Text (FC, VP, IO), pp. 394–408.
ECIRECIR-2004-StokesNCS #using
Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
ICMLICML-2004-BanerjeeDGM #estimation #exponential #product line
An information theoretic analysis of maximum likelihood mixture estimation for exponential families (AB, ISD, JG, SM).
ICMLICML-2004-DingH04a #clustering #component
K-means clustering via principal component analysis (CHQD, XH).
ICMLICML-2004-EspositoS #classification #monte carlo
A Monte Carlo analysis of ensemble classification (RE, LS).
ICMLICML-2004-YeJLP #feature model #linear
Feature extraction via generalized uncorrelated linear discriminant analysis (JY, RJ, QL, HP).
ICPRICPR-v1-2004-BelaidB #approach #documentation
Morphological Tagging Approach in Document Analysis of Invoices (YB, AB), pp. 469–472.
ICPRICPR-v1-2004-Bruce #image #information management #metric
Image Analysis Through Local Information Measures (NB), pp. 616–619.
ICPRICPR-v1-2004-KeysersN #linear #modelling
Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
ICPRICPR-v1-2004-MiasnikovH #rank
Regression Analysis and Automorphic Orbits in Free Groups of Rank 2 (ADM, RMH), pp. 180–183.
ICPRICPR-v1-2004-ShenB #kernel #recognition
Gabor Wavelets and Kernel Direct Discriminant Analysis for Face Recognition (LS, LB), pp. 284–287.
ICPRICPR-v1-2004-SoaresM
Watershed Lines Suppression by Waterfall Marker Improvement and Line-Neighbourhood Analysis (FS, FM), pp. 604–607.
ICPRICPR-v1-2004-VaswaniC #classification #component #null #probability
Classification Probability Analysis of Principal Component Null Space Analysis (NV, RC), pp. 240–243.
ICPRICPR-v1-2004-ZhouT #clustering #coordination #documentation #geometry #re-engineering #visual notation
Coordinate Systems Reconstruction for Graphical Documents by Hough-feature Clustering and Geometric Analysis (YPZ, CLT), pp. 376–379.
ICPRICPR-v2-2004-BevilacquaG #image
Age-related Skin Analysis by Capacitance Images (AB, AG), pp. 703–706.
ICPRICPR-v2-2004-BriassouliA
Fusion of Frequency and Spatial Domain Information for Motion Analysis (AB, NA), pp. 175–178.
ICPRICPR-v2-2004-DaiQJ #kernel #pattern matching #pattern recognition #recognition
A Kernel Fractional-Step Nonlinear Discriminant Analysis for Pattern Recognition (GD, YQ, SJ), pp. 431–434.
ICPRICPR-v2-2004-DeepuMR #component #online #recognition
Principal Component Analysis for Online Handwritten Character Recognition (VD, SM, AGR), pp. 327–330.
ICPRICPR-v2-2004-ErikssonC #2d
Maximizing Validity in 2D Motion Analysis (ME, SC), pp. 179–183.
ICPRICPR-v2-2004-GaoHBW #markov #process #using
Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
ICPRICPR-v2-2004-GritaiSS #invariant #on the #using
On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
ICPRICPR-v2-2004-ImiyaY
Principal Curve Analysis for Temporal Data (AI, NY), pp. 475–478.
ICPRICPR-v2-2004-LinYL #incremental #using
Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
ICPRICPR-v2-2004-LiuTLM #kernel #recognition
Kernel Scatter-Difference Based Discriminant Analysis For Face Recognition (QL, XT, HL, SM), pp. 419–422.
ICPRICPR-v2-2004-PlotzF #biology #feature model #sequence
Feature Extraction for Improved Profile HMM based Biological Sequence Analysis (TP, GAF), pp. 315–318.
ICPRICPR-v2-2004-SaadiTC #kernel
Optimally Regularised Kernel Fisher Discriminant Analysis (KS, NLCT, GCC), pp. 427–430.
ICPRICPR-v2-2004-SantamariaBS #statistics #using
Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
ICPRICPR-v2-2004-SenerG #component #independence #using
Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
ICPRICPR-v2-2004-ShihL #detection #using #video
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
ICPRICPR-v2-2004-SoiferKK #fuzzy
Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
ICPRICPR-v2-2004-TaoT #feedback #image #parametricity #retrieval
Nonparametric Discriminant Analysis in Relevance Feedback for Content-Based Image Retrieval (DT, XT), pp. 1013–1016.
ICPRICPR-v2-2004-ZiouB #finite #image #learning #using
Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
ICPRICPR-v3-2004-AiLZ #automation
Combination of Wavelet Analysis and Color Applied to Automatic Color Grading of Ceramic Tiles (JA, DL, XZ), pp. 235–238.
ICPRICPR-v3-2004-GurevichM #image
Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
ICPRICPR-v3-2004-KaholTP #gesture
Computational Analysis of Mannerism Gestures (KK, PT, SP), pp. 946–949.
ICPRICPR-v3-2004-KolschT #detection #robust
Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
ICPRICPR-v3-2004-McCallT #invariant #using
Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
ICPRICPR-v3-2004-NaganumaTMM #using
Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
ICPRICPR-v3-2004-NishiF #using #video
Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
ICPRICPR-v3-2004-NovakLCMAHA #markov #modelling #using
Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
ICPRICPR-v3-2004-TsujiZHK #correlation
Levels of Detail Control Based on Correlation Analysis Between Surface Position and Direction (TT, HZ, TH, RK), pp. 622–625.
ICPRICPR-v3-2004-WangLL #towards
Tensor Voting Toward Feature Space Analysis (JW, HL, QL), pp. 462–465.
ICPRICPR-v3-2004-YapCLHP #detection
Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
ICPRICPR-v4-2004-HagaSY #detection #using
Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
ICPRICPR-v4-2004-HsiehYCH
A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
ICPRICPR-v4-2004-OtsukaM #multi
A Particle Filter for Tracking Densely Populated Objects Based on Explicit Multiview Occlusion Analysis (KO, NM), pp. 745–750.
ICPRICPR-v4-2004-QinandS #algorithm #clustering #kernel
Kernel Neural Gas Algorithms with Application to Cluster Analysis (AKQ, PNS), pp. 617–620.
ICPRICPR-v4-2004-SangiHS #difference #metric #using
Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
ICPRICPR-v4-2004-SelmaouiRLA #detection #image
Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
ICPRICPR-v4-2004-ShihKG #bound #fault #image
An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
ICPRICPR-v4-2004-XieHTP #multi #video
A Multi-Object Tracking System for Surveillance Video Analysis (DX, WH, TT, JP), pp. 767–770.
ICPRICPR-v4-2004-YazdiAB #process #segmentation
Morphological Analysis of Spatio-Temporal Patterns for the Segmentation of Cyclic Human Activities (MY, ABA, RB), pp. 240–243.
ICPRICPR-v4-2004-ZhangLT #image #recognition #using #word
Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
ICPRICPR-v4-2004-ZhouC #multi #recognition
Multiple-Exemplar Discriminant Analysis for Face Recognition (SKZ, RC), pp. 191–194.
KDDKDD-2004-CaruanaN #data mining #empirical #learning #metric #mining #performance
Data mining in metric space: an empirical analysis of supervised learning performance criteria (RC, ANM), pp. 69–78.
KDDKDD-2004-JinZM #mining #probability #semantics #web
Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
KRKR-2004-BenferhatBN #reasoning
An Experimental Analysis of Possibilistic Default Reasoning (SB, JFB, RDSN), pp. 130–140.
KRKR-2004-Denecker #logic programming #what
What’s in a Model? Epistemological Analysis of Logic Programming (MD), pp. 106–113.
KRKR-2004-FriedlandAWMSMASICPBC #independence #platform #towards
Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems (NSF, PGA, MJW, GM, NS, PM, JA, SS, DJI, VKC, BWP, KB, PC), pp. 507–515.
KRKR-2004-GrootTH #approximate #case study #classification #problem #towards
Towards a Structured Analysis of Approximate Problem Solving: A Case Study in Classification (PG, AtT, FvH), pp. 399–406.
SEKESEKE-2004-CaiGHD #architecture #modelling #performance
Software Architecture Modelling and Performance Analysis with Argo/MTE (YC, JCG, JGH, XD), pp. 276–281.
SEKESEKE-2004-JarzabekSZZ #case study #metaprogramming
Analysis of meta-programs: a case study (SJ, RS, HZ, ZS), pp. 68–73.
SEKESEKE-2004-SmithC #generative #requirements
Commonality and Requirements Analysis for Mesh Generating Software (SS, CHC), pp. 384–387.
SIGIRSIGIR-2004-BeitzelJCGF #query #scalability #topic #web
Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
SIGIRSIGIR-2004-CaiHWM
Block-level link analysis (DC, XH, JRW, WYM), pp. 440–447.
SIGIRSIGIR-2004-GrankaJG #behaviour
Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
SIGIRSIGIR-2004-MontgomerySCE #documentation #empirical #feedback
Effect of varying number of documents in blind feedback: analysis of the 2003 NRRC RIA workshop “bf_numdocs” experiment suite (JM, LS, JC, DAE), pp. 476–477.
SIGIRSIGIR-2004-XuU #mining #ranking #web
A unified model of literal mining and link analysis for ranking web resources (YX, KU), pp. 546–547.
SPLCSPLC-2004-ChastekD #product line
Product Line Analysis (GJC, PD), p. 310.
SPLCSPLC-2004-FritschH #product line
Product Line Potential Analysis (CF, RH), pp. 228–237.
SPLCSPLC-2004-JohnS04a #modelling #product line
Starting Product Lines (II) — Product Line Analysis and Modeling (IJ, KS), p. 320.
UMLUML-2004-Reinhartz-BergerS #approach #behaviour #domain model #modelling
Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
TOOLSTOOLS-USA-2003-EnselmeFL04 #component #contract #dependence #design
Design by Contract: analysis of hidden dependencies in component based application (DE, GF, FLA), pp. 23–45.
TOOLSTOOLS-USA-2003-HamzaE04 #problem
Applying Analysis Patterns Through Analogy: Problems and Solutions (HSH, MEF), pp. 197–208.
ECOOPECOOP-2004-BeersSF
Efficiently Verifiable Escape Analysis (MQB, CHS, MF), pp. 75–95.
ECOOPECOOP-2004-HirzelDH #pointer
Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
LOPSTRLOPSTR-2004-CraigGLH #automation #prolog
Fully Automatic Binding-Time Analysis for Prolog (SJC, JPG, ML, KSH), pp. 53–68.
LOPSTRLOPSTR-2004-Lopez-GarciaBH #logic programming #source code #using
Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
LOPSTRPDCL-2004-PueblaCHBBMS #composition #framework #source code
A Generic Framework for Context-Sensitive Analysis of Modular Programs (GP, JC, MVH, FB, MJGdlB, KM, PJS), pp. 233–260.
LOPSTRPDCL-2004-VanhoofBL
Binding-Time Analysis for Mercury (WV, MB, ML), pp. 189–232.
PLDIPLDI-2004-WangL #adaptation #parametricity
Parametric analysis for adaptive computation offloading (CW, ZL), pp. 119–130.
PLDIPLDI-2004-WhaleyL #alias #diagrams #pointer #using
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
PLDIPLDI-2004-ZhuC #pointer #revisited
Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
POPLPOPL-2004-Benton #correctness #program transformation #proving #relational
Simple relational correctness proofs for static analyses and program transformations (NB), pp. 14–25.
POPLPOPL-2004-Muller-OlmS #algebra #interprocedural #linear #precise
Precise interprocedural analysis through linear algebra (MMO, HS), pp. 330–341.
SASSAS-2004-AmtoftB #data flow #logic
Information Flow Analysis in Logical Form (TA, AB), pp. 100–115.
SASSAS-2004-GulwaniN04a #linear
Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions (SG, GCN), pp. 328–343.
SASSAS-2004-JeannetLRS #approach #interprocedural #relational
A Relational Approach to Interprocedural Shape Analysis (BJ, AL, TWR, SS), pp. 246–264.
SASSAS-2004-NielsonNP
Spatial Analysis of BioAmbients (HRN, FN, HP), pp. 69–83.
SASSAS-2004-NystromKH #bottom-up #pointer #top-down
Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
SASSAS-2004-Rugina
Shape Analysis Quantitative Shape Analysis (RR), pp. 228–245.
SASSAS-2004-SankaranarayananSM #constraints
Constraint-Based Linear-Relations Analysis (SS, HBS, ZM), pp. 53–68.
SASSAS-2004-Venet #embedded #pointer #scalability #source code
A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
SASSAS-2004-YongH
Pointer-Range Analysis (SHY, SH), pp. 133–148.
AdaSIGAda-2004-ChapmanH #data flow #modelling #safety #security
Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
AdaSIGAda-2004-SoriconeN #algorithm #comparative #implementation #search-based
Comparative analysis of genetic algorithm implementations (RS, MN), pp. 35–38.
RERE-2004-Gonzalez-BaixauliLM #modelling #variability #visual notation
Visual Variability Analysis for Goal Models (BGB, JCSdPL, JM), pp. 198–207.
ASEASE-2004-Alzamil #named #performance
RCAT: A Performance Analysis Tool (ZA), pp. 366–370.
ASEASE-2004-Haydar #automation #framework #verification
Formal Framework for Automated Analysis and Verification of Web-Based Applications (MH), pp. 410–413.
ASEASE-2004-KonradCC #automation #diagrams #uml
Automated Analysis of Timing Information in UML Diagrams (SK, LAC, BHCC), pp. 350–353.
FSEFSE-2004-DingelL #automation #concurrent #safety #source code #txl #using
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
FSEFSE-2004-Egyed #nondeterminism
Resolving uncertainties during trace analysis (AE), pp. 3–12.
FSEFSE-2004-RinardSB #aspect-oriented #classification #source code
A classification system and analysis for aspect-oriented programs (MCR, AS, SB), pp. 147–158.
FSEFSE-2004-ZhangYF
Refining code-design mapping with flow analysis (XZ, MY, JHEFL), pp. 231–240.
ICSEICSE-2004-BaniassadC #approach #aspect-oriented #design #named
Theme: An Approach for Aspect-Oriented Analysis and Design (ELAB, SC), pp. 158–167.
ICSEICSE-2004-Berenbach #design #evaluation #scalability #uml
The Evaluation of Large, Complex UML Analysis and Design Model (BB), pp. 232–241.
ICSEICSE-2004-ChatzigeorgiouXS #design #object-oriented
Evaluating Object-Oriented Designs with Link Analysis (AC, SX, GS), pp. 656–665.
ICSEICSE-2004-Kang #approximate #embedded #parametricity #realtime
Parametric Analysis of Real-Time Embedded Systems with Abstract Approximation Interpretation (EYK), pp. 39–41.
ICSEICSE-2004-Keenan #agile #problem #process
Agile Process Tailoring and probLem analYsis (APTLY) (FK), pp. 45–47.
ICSEICSE-2004-Roshandel #architecture #modelling #reliability
Calculating Architectural Reliability via Modeling and Analysis (RR), pp. 69–71.
SACSAC-2004-DincovP #multi
Computational analysis of microwave heating patterns in resonant multimode cavities (DDD, KAP), pp. 215–219.
SACSAC-2004-Granmo #parallel #video
Parallel hypothesis driven video content analysis (OCG), pp. 642–648.
SACSAC-2004-Kavakli #modelling
Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
SACSAC-2004-Kincaid #array #interactive #named #visualisation
VistaClara: an interactive visualization for exploratory analysis of DNA microarrays (RK), pp. 167–174.
SACSAC-2004-MengC #scalability
Bio-sequence analysis with cradle’s 3SoCTM software scalable system on chip (XM, VC), pp. 202–206.
SACSAC-2004-OBrienH #authoring
Training Needs Analysis: the first step in authoring e-learning content (EO, TH), pp. 935–939.
SACSAC-2004-VincentR #framework #using
A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
SACSAC-2004-WebbW #biology #synthesis
Combining analysis and synthesis in a model of a biological cell (KW, TW), pp. 185–190.
ATEMATEM-2003-NaikB04 #framework #programmable #reverse engineering
A Programmable Analysis and Transformation Framework for Reverse Engineering (RN, AB), pp. 39–49.
LDTALDTA-2004-BegelG #ambiguity #tool support
Language Analysis and Tools for Ambiguous Input Streams (AB, SLG), pp. 75–96.
ASPLOSASPLOS-2004-CherHV #garbage collection #hardware
Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign (CYC, ALH, TNV), pp. 199–210.
CCCC-2004-ChowdhuryDCBM #alias #optimisation
The Limits of Alias Analysis for Scalar Optimizations (RAC, PD, BC, JHB, KSM), pp. 24–38.
DACDAC-2004-AgarwalSBLNV #metric
Variational delay metrics for interconnect timing analysis (KA, DS, DB, FL, SRN, SBKV), pp. 381–384.
DACDAC-2004-AsafMZ #functional
Defining coverage views to improve functional coverage analysis (SA, EM, AZ), pp. 41–44.
DACDAC-2004-ContiCVOT #algorithm #performance
Performance analysis of different arbitration algorithms of the AMBA AHB bus (MC, MC, GBV, SO, CT), pp. 618–621.
DACDAC-2004-HungSYYP #logic #quantum #reachability #synthesis
Quantum logic synthesis by symbolic reachability analysis (WNNH, XS, GY, JY, MAP), pp. 838–841.
DACDAC-2004-LeeZB #using
Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
DACDAC-2004-LeLP #correlation #named #statistics
STAC: statistical timing analysis with correlation (JL, XL, LTP), pp. 343–348.
DACDAC-2004-MangH #abstraction #refinement
Abstraction refinement by controllability and cooperativeness analysis (FYCM, PHH), pp. 224–229.
DACDAC-2004-NajmM #statistics
Statistical timing analysis based on a timing yield model (FNN, NM), pp. 460–465.
DACDAC-2004-OrshanskyB #correlation #performance #statistics
Fast statistical timing analysis handling arbitrary delay correlations (MO, AB), pp. 337–342.
DACDAC-2004-PantBZSP #approach #grid #power management #probability
A stochastic approach To power grid analysis (SP, DB, VZ, SS, RP), pp. 171–176.
DACDAC-2004-SchueleS #abstraction #assembly #execution #source code
Abstraction of assembler programs for symbolic worst case execution time analysis (TS, KS), pp. 107–112.
DACDAC-2004-TanGQ #approach #scalability
Hierarchical approach to exact symbolic analysis of large analog circuits (SXDT, WG, ZQ), pp. 860–863.
DACDAC-2004-TanjiA #distributed
Closed-form expressions of distributed RLC interconnects for analysis of on-chip inductance effects (YT, HA), pp. 810–813.
DACDAC-2004-VisweswariahRKWN #first-order #incremental #statistics
First-order incremental block-based statistical timing analysis (CV, KR, KK, SGW, SN), pp. 331–336.
DACDAC-2004-WuC #design #network #performance
Efficient power/ground network analysis for power integrity-driven design methodology (SWW, YWC), pp. 177–180.
DACDAC-2004-ZhangHC #pipes and filters #statistics
Statistical timing analysis in sequential circuit for on-chip global interconnect pipelining (LZ, YH, CCPC), pp. 904–907.
DACDAC-2004-ZhaoBD #scalability
A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits (CZ, XB, SD), pp. 894–899.
DATEDATE-DF-2004-BrandoleseFSS #energy #modelling #program transformation #source code
Analysis and Modeling of Energy Reducing Source Code Transformations (CB, WF, FS, DS), pp. 306–311.
DATEDATE-DF-2004-FummiMMPP #architecture #industrial #modelling #network
Modeling and Analysis of Heterogeneous Industrial Networks Architectures (FF, SM, MM, GP, MP), pp. 342–344.
DATEDATE-v1-2004-BhuniaRR #using
Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
DATEDATE-v1-2004-IsseninBMD #memory management #reuse
Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
DATEDATE-v1-2004-LaurentJSM #approach #functional #modelling #performance #power management
Functional Level Power Analysis: An Efficient Approach for Modeling the Power Consumption of Complex Processors (JL, NJ, ES, EM), pp. 666–667.
DATEDATE-v1-2004-MurgaiRMHT #modelling
Sensitivity-Based Modeling and Methodology for Full-Chip Substrate Noise Analysis (RM, SMR, TM, TH, MBT), pp. 610–615.
DATEDATE-v1-2004-PosadasHSVB #performance
System-Level Performance Analysis in SystemC (HP, FH, PS, EV, FB), pp. 378–383.
DATEDATE-v1-2004-SiebenbornBR #communication #design
Communication Analysis for System-On-Chip Design (AS, OB, WR), pp. 648–655.
DATEDATE-v2-2004-FengZCZF #order #reduction
Direct Nonlinear Order Reduction with Variational Analysis (LF, XZ, CC, DZ, QF), pp. 1316–1321.
DATEDATE-v2-2004-GlebovGZOPB
False-Noise Analysis for Domino Circuits (AG, SG, VZ, CO, RP, MRB), pp. 784–789.
DATEDATE-v2-2004-HuangCHTHH #fault #probability
Intermittent Scan Chain Fault Diagnosis Based on Signal Probability Analysis (YH, WTC, CJH, HYT, AH, YTH), pp. 1072–1077.
DATEDATE-v2-2004-JersakHE #design #embedded #performance
Context-Aware Performance Analysis for Efficient Embedded System Design (MJ, RH, RE), pp. 1046–1051.
DATEDATE-v2-2004-KumarBK #algorithm #array #embedded #memory management #named #reduction #using
MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
DATEDATE-v2-2004-LanD #modelling #synthesis
Synthesized Compact Models (SCM) of Substrate Noise Coupling Analysis and Synthesis in Mixed-Signal ICs (HL, RWD), pp. 836–843.
DATEDATE-v2-2004-MondalCM #approach #logic #using
A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
DATEDATE-v2-2004-RanKWM
Eliminating False Positives in Crosstalk Noise Analysis (YR, AK, YW, MMS), pp. 1192–1197.
DATEDATE-v2-2004-TanM #multi #realtime
Timing Analysis for Preemptive Multi-Tasking Real-Time Systems with Caches (YT, VJMI), pp. 1034–1039.
DATEDATE-v2-2004-ZhangC #embedded #fault tolerance #realtime #scalability
Task Feasibility Analysis and Dynamic Voltage Scaling in Fault-Tolerant Real-Time Embedded Systems (YZ, KC), pp. 1170–1175.
DATEDATE-v2-2004-ZhouZLLZC #using
Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
HPCAHPCA-2004-JosephHM #case study #design #experience
Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization (RJ, ZH, MM), pp. 36–47.
ISMMISMM-2004-ChenKVI #embedded #java #optimisation
Field level analysis for heap space optimization in embedded java environments (GC, MTK, NV, MJI), pp. 131–142.
ISMMISMM-2004-CheremR #java #source code
Region analysis and transformation for Java programs (SC, RR), pp. 85–96.
PDPPDP-2004-BorzemskiLN #data mining #internet #mining #performance
Application of Data Mining for the Analysis of Internet Path Performance (LB, LL, ZN), pp. 54–59.
PDPPDP-2004-BulicG #compilation #dependence #multi #performance
Fast Dependence Analysis in a Multimedia Vectorizing Compiler (PB, VG), pp. 176–183.
PDPPDP-2004-GarzonTGB #multi
Multiprocessing of the Time Domain Analysis of Thin-Wire Antennas and Scatterers (EMG, ST, IG, ARB), pp. 80–87.
PDPPDP-2004-MoscatoMV #distributed #multi #workflow
Workflow Principles Applied to Multi-Solution Analysis of Dependable Distributed Systems (FM, NM, VV), p. 134–?.
ESOPESOP-2004-BugliesiFM #authentication #composition #protocol
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
ESOPESOP-2004-Ghica #approach #logic #semantics #specification
Semantical Analysis of Specification Logic, 3: An Operational Approach (DRG), pp. 264–278.
ESOPESOP-2004-LeviB #control flow
A Control Flow Analysis for Safe and Boxed Ambients (FL, CB), pp. 188–203.
ESOPESOP-2004-Shmatikov #composition #decidability #encryption #protocol
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
FASEFASE-2004-ChildsGRDDHJSS #component #development #ide #named #synthesis #verification
Cadena: An Integrated Development Environment for Analysis, Synthesis, and Verification of Component-Based Systems (AC, JG, VPR, XD, MBD, JH, GJ, PS, GS), pp. 160–164.
FASEFASE-2004-OlveczkyM #maude #realtime #specification #using
Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
FoSSaCSFoSSaCS-2004-RamanathanMST #bisimulation #equivalence #network #probability #protocol #security
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
STOCSTOC-2004-KempeM #algorithm #distributed
A decentralized algorithm for spectral analysis (DK, FM), pp. 561–568.
TACASTACAS-2004-KrcalY #automaton #decidability #problem #scheduling #using
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
TACASTACAS-2004-LingerS #constraints #ml #theorem proving #type inference
Binding-Time Analysis for MetaML via Type Inference and Constraint Solving (NL, TS), pp. 266–279.
TACASTACAS-2004-SenRA #online #parallel #performance #predict #safety #source code #thread
Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
TACASTACAS-2004-SuW #constraints
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings (ZS, DW), pp. 280–295.
TACASTACAS-2004-YorshRS
Symbolically Computing Most-Precise Abstract Operations for Shape Analysis (GY, TWR, SS), pp. 530–545.
CAVCAV-2004-FarzanCMR #formal method #java #source code
Formal Analysis of Java Programs in JavaFAN (AF, FC, JM, GR), pp. 501–505.
CAVCAV-2004-FuBS #formal method #named #web #web service
WSAT: A Tool for Formal Analysis of Web Services (XF, TB, JS), pp. 510–514.
CAVCAV-2004-Metzner #model checking #why
Why Model Checking Can Improve WCET Analysis (AM), pp. 334–347.
CAVCAV-2004-Wang #hybrid #linear #parametricity #safety
Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
FATESFATES-2004-YoonKSC #component #empirical #fault #injection #mutation testing #testing #using
Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
IJCARIJCAR-2004-MeseguerR #formal method #logic #semantics #specification #tool support
Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools (JM, GR), pp. 1–44.
SATSAT-2004-TangYRM #algorithm #problem #quantifier #satisfiability
Analysis of Search Based Algorithms for Satisfiability of Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 214–223.
VMCAIVMCAI-2004-Etessami #data flow #equation #game studies #graph #recursion #using
Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
VMCAIVMCAI-2004-KuncakR #algebra #constraints
Boolean Algebra of Shape Analysis Constraints (VK, MCR), pp. 59–72.
DocEngDocEng-2003-BayerlLGWN #documentation #semantics
Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
DocEngDocEng-2003-SimskeA #image
User-directed analysis of scanned images (SJS, JA), pp. 212–221.
DRRDRR-2003-AradhyeHM #detection #recognition
Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
DRRDRR-2003-MaoRK #algorithm #documentation #overview
Document structure analysis algorithms: a literature survey (SM, AR, TK), pp. 197–207.
HTHT-2003-WuGDB #collaboration
Link analysis for collaborative knowledge building (HW, MDG, KD, NB), pp. 216–217.
ICDARICDAR-2003-AmanoA #documentation #grammarware #graph grammar
Graph Grammar Based Analysis System of Complex Table Form Document (AA, NA), pp. 916–920.
ICDARICDAR-2003-Baird #documentation #image #library
Digital Libraries and Document Image Analysis (HSB), p. 2–?.
ICDARICDAR-2003-Breuel #algorithm #documentation #layout
An Algorithm for Finding Maximal Whitespace Rectangles at Arbitrary Orientations for Document Layout Analysis (TMB), pp. 66–70.
ICDARICDAR-2003-DoermannLL #documentation #image
Progress in Camera-Based Document Image Analysis (DSD, JL, HL), p. 606–?.
ICDARICDAR-2003-FutrelleSCG #classification #diagrams #documentation #layout
Extraction, layout analysis and classification of diagrams in PDF documents (RPF, MS, CC, AEG), pp. 1007–1014.
ICDARICDAR-2003-GattaniMG #approach #documentation #image #multi #performance
A Fast Multifunctional Approach for Document Image Analysis (AG, MM, HG), pp. 1178–1182.
ICDARICDAR-2003-GuestCFP #automation #classification #geometry #sequence #using
Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
ICDARICDAR-2003-HeD #documentation #image #library
User-Assisted Archive Document Image Analysis for Digital Library Construction (JH, ACD), pp. 498–502.
ICDARICDAR-2003-HendersonS #approach
Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis (TH, LS), pp. 180–184.
ICDARICDAR-2003-KleinAB #comprehension #documentation #modelling
Understanding Document Analysis and Understanding (through Modeling) (BK, SA, ADB), pp. 1218–1222.
ICDARICDAR-2003-SimardSP #documentation #network #visual notation
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis (PYS, DS, JCP), pp. 958–962.
ICDARICDAR-2003-SuenMKL #recognition #state of the art
Analysis and Recognition of Asian Scripts — the State of the Art (CYS, SM, SHK, CHL), p. 866–?.
ICDARICDAR-2003-SutantoLP #consistency #documentation
Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter “a” (PJS, GL, VP), pp. 1091–1095.
ICDARICDAR-2003-ZhangS #using #word
Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
ICDARICDAR-2003-ZouTLL #online #using #verification
On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
JCDLJCDL-2003-ChaiV
Structural Analysis of Musical Signals for Indexing and Thumbnailing (WC, BV), p. 27–?.
JCDLJCDL-2003-GoncalvesPRKFJC #deployment #evolution #library #standard #xml
The XML Log Standard for Digital Libraries: Analysis, Evolution, and Deployment (MAG, GP, UR, AK, EAF, FJ, LNC), pp. 312–314.
JCDLJCDL-2003-MostafaB #interface #library #retrieval #visualisation
International Workshop on Information Visualization Interfaces for Retrieval and Analysis (IVIRA) at the Joint Conference on Digital Libraries 2003 (JM, KB), p. 416.
JCDLJCDL-2003-RoweRS #3d #library #query #representation
Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library (JR, AR, AS), pp. 147–158.
JCDLJCDL-2003-Ward #metadata #set
A Quantitative Analysis of Unqualified Dublin Core Metadata Element Set Usage within Data Providers Registered with the Open Archives Initiative (JW), pp. 315–317.
SIGMODSIGMOD-2003-Bierman #query #semantics
Formal semantics and analysis of object queries (GMB), pp. 407–418.
VLDBVLDB-2003-SrinivasaK #framework #multi #platform
A Platform Based on the Multi-dimensional Data Model for Analysis of Bio-Molecular Structures (SS, SK), pp. 975–986.
ITiCSEITiCSE-2003-MoodyS #assurance #education #process #quality #requirements
Incorporating quality assurance processes into requirements analysis education (DLM, GS), pp. 74–78.
ITiCSEITiCSE-2003-Trakhtenbrot #concept #how
Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
CSMRCSMR-2003-MerloAB #fuzzy #performance
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels (EM, GA, PLB), p. 351–?.
ICSMEICSM-2003-Klusener #source code
Source Code Based Function Point Analysis for Enhancement Projects (SK), pp. 373–376.
ICSMEICSM-2003-LandC #architecture #case study #integration
Software Systems Integration and Architectural Analysis — A Case Study (RL, IC), pp. 338–347.
ICSMEICSM-2003-OhstWK #design #difference #documentation #tool support
Difference Tools for Analysis and Design Documents (DO, MW, UK), pp. 13–22.
IWPCIWPC-2003-BeyerL #named #object-oriented #performance #source code
CrocoPat: Efficient Pattern Analysis in Object-Oriented Programs (DB, CL), pp. 294–295.
IWPCIWPC-2003-CoxC #approximate #semiparsing #using
Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
IWPCIWPC-2003-MarcusFM #3d #comprehension #using #visualisation
Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
IWPCIWPC-2003-Reiss #performance
Event-Based Performance Analysis (SPR), pp. 74–83.
SCAMSCAM-2003-AntoniolPMV #abstract syntax tree #named #xml
XOgastan: XML-Oriented gcc AST Analysis and Transformations (GA, MDP, GM, UV), pp. 173–182.
SCAMSCAM-2003-BinkleyH #algorithm #graph #optimisation #performance #reachability #scalability #source code
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
SCAMSCAM-2003-PearceKH #detection #difference #online #pointer
Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
SCAMSCAM-2003-Verhoef #multi #source code #using
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
WCREWCRE-2003-AliasB #algorithm #data flow #recognition
Algorithm Recognition based on Demand-Driven Data-flow Analysis (CA, DB), pp. 296–305.
WCREWCRE-2003-ZouG #detection #using
Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
CIAACIAA-2003-WangHY
TCTL Inevitability Analysis of Dense-Time Systems (FW, GDH, FY), pp. 176–187.
ICALPICALP-2003-Jagerskupper #algorithm
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces (JJ), pp. 1068–1079.
ICALPICALP-2003-Rabinovich #probability
Quantitative Analysis of Probabilistic Lossy Channel Systems (AMR), pp. 1008–1021.
FMFME-2003-ArmandoCG #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-CompareIPS #architecture #lifecycle #model checking #validation
Integrating Model-Checking Architectural Analysis and Validation in a Real Software Life-Cycle (DC, PI, PP, AS), pp. 114–132.
FMFME-2003-Schafer #fault #model checking #realtime
Combining Real-Time Model-Checking and Fault Tree Analysis (AS), pp. 522–541.
RTARTA-2003-ChenRV #rule-based #safety
Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
SEFMSEFM-2003-JinLE #case study #component #design
Component-Based Design and Analysis: A Case Study (YJ, CL, RE), p. 126–?.
SFMSFM-2003-Garlan #architecture #component #formal method #modelling
Formal Modeling and Analysis of Software Architecture: Components, Connectors, and Events (DG), pp. 1–24.
SFMSFM-2003-KramerMU #approach #architecture #modelling
Software Architecture Modeling & Analysis: A Rigorous Approach (JK, JM, SU), pp. 44–51.
SFMSFM-2003-StaffordWC #architecture #dependence
The Application of Dependence Analysis to Software Architecture Descriptions (JAS, ALW, MC), pp. 52–62.
ICFPICFP-2003-Mairson #game studies #semantics
From Hilbert space to Dilbert space: context semantics as a language for games and flow analysis (HGM), p. 125.
IFLIFL-2003-SeguraP #correctness #nondeterminism
Correctness of Non-determinism Analyses in a Parallel-Functional Language (CS, RP), pp. 69–85.
DiGRADiGRA-2003-BrandKM #game studies
The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives (JEB, SK, JM).
AGTIVEAGTIVE-2003-DottiRS #behaviour #fault #graph grammar #specification #using
Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
AGTIVEAGTIVE-2003-LaraGV #graph transformation #hybrid #metamodelling #model checking
Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems (JdL, EG, HV), pp. 292–298.
AGTIVEAGTIVE-2003-MarburgerW #behaviour #graph transformation
Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
SOFTVISSOFTVIS-2003-ZhouSC #graph #visualisation
Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers (CZ, KLS, TPC), pp. 143–149.
VISSOFTVISSOFT-2003-MarcusFM #3d #multi #visualisation
Source Viewer 3D (sv3D): A System for Visualizing Multi Dimensional Software Analysis Data (AM, LF, JIM), pp. 62–63.
CAiSECAiSE-2003-KolpGM #requirements
Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
ICEISICEIS-v2-2003-AzevedoM #capacity #enterprise #network #requirements
Requirements of a Decision Support System for Capacity Analysis and Planning in Enterprise Networks (ALA, AM), pp. 177–184.
ICEISICEIS-v2-2003-NetoCMG #network #simulation #using
Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
ICEISICEIS-v2-2003-SilvaIE #database #identification #information management #using
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v2-2003-TolbaMGA #algorithm #image #multi #segmentation #using
MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
ICEISICEIS-v3-2003-AgerfalkW #concept #development #framework
Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
ICEISICEIS-v3-2003-AkatsuKK #parametricity
Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
ICEISICEIS-v3-2003-NahouraiiWD #information management
Information System Failure: Analysis and Commentary (AN, JAW, AD), pp. 566–572.
ICEISICEIS-v3-2003-SaeedA
Analysis of Level of Involvement of Six Best Practices of RUP in OOSP (MS, FA), pp. 523–526.
ICEISICEIS-v3-2003-SerraoNT #open source #operating system #security
Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
ICEISICEIS-v3-2003-TyrvainenP #communication #how #metric
How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
ICEISICEIS-v3-2003-WohedPDH #modelling
Pattern Based Analysis of Eai Languages — The Case of the Business Modeling Language (PW, EP, MD, AHMtH), pp. 174–184.
ICEISICEIS-v4-2003-CamponovoP #mobile
Business Model Analysis Applied to Mobile Business (GC, YP), pp. 173–183.
ICEISICEIS-v4-2003-Oriogun #case study #online #re-engineering #reliability #using
Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
ICEISICEIS-v4-2003-PierozziGAC #towards #web
Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
ICEISICEIS-v4-2003-Zhao
Analysis of Business to Business Electronic Markets in China: Theoretical and Practical Perspectives (JZ), pp. 377–385.
CIKMCIKM-2003-GloorLDZ #collaboration #communication #network #visualisation
Visualization of Communication Patterns in Collaborative Innovation Networks — Analysis of Some W3C Working Groups (PAG, RL, SBCD, YZ), pp. 56–60.
CIKMCIKM-2003-JiangC #data type #relational
Queueing analysis of relational operators for continuous data streams (QJ, SC), pp. 271–278.
CIKMCIKM-2003-LiZO #categorisation #multi #performance
Efficient multi-way text categorization via generalized discriminant analysis (TL, SZ, MO), pp. 317–324.
ICMLICML-2003-BerardiCEM #layout #learning #logic programming #source code
Learning Logic Programs for Layout Analysis Correction (MB, MC, FE, DM), pp. 27–34.
ICMLICML-2003-FurnkranzF #evaluation #metric
An Analysis of Rule Evaluation Metrics (JF, PAF), pp. 202–209.
ICMLICML-2003-KaskiP
Informative Discriminant Analysis (SK, JP), pp. 329–336.
ICMLICML-2003-KubicaMCS #collaboration #graph #performance #query
Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
ICMLICML-2003-LaudD #learning
The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping (AL, GD), pp. 440–447.
ICMLICML-2003-LiY #categorisation #classification
A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
ICMLICML-2003-Mamitsuka
Hierarchical Latent Knowledge Analysis for Co-occurrence Data (HM), pp. 504–511.
KDDKDD-2003-LauLW #similarity
Similarity analysis on government regulations (GTL, KHL, GW), pp. 711–716.
KDDKDD-2003-RaoSNGR
Clinical and financial outcomes analysis with existing hospital patient records (RBR, SS, RSN, CG, HR), pp. 416–425.
MLDMMLDM-2003-KostersPP #complexity #implementation
Complexity Analysis of Depth First and FP-Growth Implementations of APRIORI (WAK, WP, VP), pp. 284–292.
MLDMMLDM-2003-RodriguesDFVC #algorithm #clustering #comparative #profiling
A Comparative Analysis of Clustering Algorithms Applied to Load Profiling (FR, FJFD, VF, ZAV, MC), pp. 73–85.
MLDMMLDM-2003-TanakaU #component #multi #principle #using
Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
SEKESEKE-2003-CaoLZD #design #information management
Open Giant Intelligent Information Systems and Its Agent-Oriented Analysis and Design (LC, CL, CZ, RD), pp. 85–89.
SEKESEKE-2003-ColeT #concept
Conceptual Analysis of Software Structure (RC, TT), pp. 726–733.
SEKESEKE-2003-MenziesLM #fault
Better Analysis of Defect Data at NASA (TM, RRL, ICM), pp. 607–611.
SIGIRSIGIR-2003-Davison #towards #unification
Toward a unification of text and link analysis (BDD0), pp. 367–368.
SIGIRSIGIR-2003-Dupret #concept #orthogonal #semantics
Latent concepts and the number orthogonal factors in latent semantic analysis (GD), pp. 221–226.
SIGIRSIGIR-2003-EironM #web
Analysis of anchor text for web search (NE, KSM), pp. 459–460.
SIGIRSIGIR-2003-Hofmann #collaboration #probability #semantics
Collaborative filtering via gaussian probabilistic latent semantic analysis (TH), pp. 259–266.
SIGIRSIGIR-2003-HuBZ #fault #topic
Error analysis of difficult TREC topics (XH, SB, CZ), pp. 407–408.
SIGIRSIGIR-2003-TeevanK #development #empirical #exponential #probability #retrieval #using
Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
SIGIRSIGIR-2003-WesterveldV #generative #image #probability #retrieval
Experimental result analysis for a generative probabilistic image retrieval model (TW, APdV), pp. 135–142.
SIGIRSIGIR-2003-XueZCMZL #web
Implicit link analysis for small web search (GRX, HJZ, ZC, WYM, HZ, CJL), pp. 56–63.
SIGIRSIGIR-2003-YangZK #categorisation #classification #scalability
A scalability analysis of classifiers in text categorization (YY, JZ, BK), pp. 96–103.
ECOOPECOOP-2003-LamR #automation #design #type system
A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
AdaEuropeAdaEurope-2003-BliebergerBS
Busy Wait Analysis (JB, BB, BS), pp. 142–152.
AdaEuropeAdaEurope-2003-EvangelistaKPR #ada #concurrent #named #source code
Quasar: A New Tool for Concurrent Ada Programs Analysis (SE, CK, JFPP, PR), pp. 168–181.
LOPSTRLOPSTR-2003-Gallagher #logic programming #program transformation #source code
A Program Transformation for Backwards Analysis of Logic Programs (JPG), pp. 92–105.
LOPSTRLOPSTR-2003-MurakamiHKT #algorithm #performance #staging
An Efficient Staging Algorithm for Binding-Time Analysis (TM, ZH, KK, MT), pp. 106–107.
PADLPADL-2003-FerreiraD
WAM Local Analysis (MF, LD), pp. 286–303.
PEPMPEPM-2003-ChinKX
Extending sized type with collection analysis (WNC, SCK, DNX), pp. 75–84.
PLDIPLDI-2003-BerndlLQHU #points-to #using
Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
PLDIPLDI-2003-DingZ #distance #locality #predict #reuse
Predicting whole-program locality through reuse distance analysis (CD, YZ), pp. 245–257.
PLDIPLDI-2003-LambTA #linear #optimisation #source code
Linear analysis and optimization of stream programs (AAL, WT, SPA), pp. 12–25.
PLDIPLDI-2003-LinCHYJNC #compilation #framework #optimisation
A compiler framework for speculative analysis and optimizations (JL, TC, WCH, PCY, RDCJ, TFN, SC), pp. 289–299.
PLDIPLDI-2003-PraunG #concurrent #multi #object-oriented #source code #thread
Static conflict analysis for multi-threaded object-oriented programs (CvP, TRG), pp. 115–128.
POPLPOPL-2003-Chakaravarthy #complexity
New results on the computability and complexity of points — to analysis (VTC), pp. 115–125.
POPLPOPL-2003-GheorghioiuSR #interprocedural
Interprocedural compatibility analysis for static object preallocation (OG, AS, MCR), pp. 273–284.
SASSAS-2003-BessonJ #composition #datalog
Modular Class Analysis with DATALOG (FB, TPJ), pp. 19–36.
SASSAS-2003-CarlssonSW #concurrent
Message Analysis for Concurrent Languages (RC, KFS, JW), pp. 73–90.
SASSAS-2003-ChatterjeeMMZHP #source code #stack
Stack Size Analysis for Interrupt-Driven Programs (KC, DM, RM, TZ, TAH, JP), pp. 109–126.
SASSAS-2003-ChristensenMS #precise #string
Precise Analysis of String Expressions (ASC, AM, MIS), pp. 1–18.
SASSAS-2003-GuyerL #pointer
Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
SASSAS-2003-HalbwachsMP #linear
Cartesian Factoring of Polyhedra in Linear Relation Analysis (NH, DM, CPV), pp. 355–365.
SASSAS-2003-Logozzo #composition #object-oriented
Class-Level Modular Analysis for Object Oriented Languages (FL), pp. 37–54.
SASSAS-2003-McMillan #reachability
Craig Interpolation and Reachability Analysis (KLM), p. 336.
SASSAS-2003-RepsSJ #automaton #data flow #interprocedural
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
RERE-2003-AlspaughA #case study
Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System (TAA, AIA), pp. 355–356.
RERE-2003-BergmanM #requirements
In Situ Requirements Analysis: A Deeper Examination of the Relationship between Requirements Determination and Project Selection (MB, GM), pp. 11–22.
RERE-2003-BolchiniPR #hypermedia #requirements
Adding Hypermedia Requirements to Goal-Driven Analysis (DB, PP, GR), pp. 127–137.
RERE-2003-HuiLM #framework #requirements
Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework (BH, SL, JM), pp. 117–126.
RERE-2003-KaiyaSMK #java #mobile #policy #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
RERE-2003-LiuYM #privacy #requirements #security #social
Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
RERE-2003-RifautMMPSLV #formal method #named #specification #tool support #using
FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
RERE-2003-SutcliffeCN #requirements
Evolutionary Requirements Analysis (AGS, WCC, RN), p. 264–?.
ASEASE-2003-FischerS #image
Applying AutoBayes to the Analysis of Planetary Nebulae Images (BF, JS), pp. 337–342.
ASEASE-2003-SabetzadehE #approach #consistency #graph #nondeterminism
Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach (MS, SME), pp. 12–21.
ASEASE-2003-SkeneE #approach #architecture #modelling #non-functional
A Model-Driven Approach to Non-Functional Analysis of Software Architectures (JS, WE), pp. 236–239.
ESEC-FSEESEC-FSE-2003-BradburyD #automation
Evaluating and improving the automatic analysis of implicit invocation systems (JSB, JD), pp. 78–87.
ESEC-FSEESEC-FSE-2003-BrylowP
Deadline analysis of interrupt-driven software (DB, JP), pp. 198–207.
ESEC-FSEESEC-FSE-2003-ChengYHP #composition #design #modelling #refactoring #scalability #towards
Towards scalable compositional analysis by refactoring design models (YPC, MY, CLH, CYP), pp. 247–256.
ESEC-FSEESEC-FSE-2003-SenRA #parallel #runtime #safety #source code #thread
Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
ESEC-FSEESEC-FSE-2003-TkachukD #adaptation #composition #model checking
Adapting side effects analysis for modular program model checking (OT, MBD), pp. 188–197.
ESEC-FSEESEC-FSE-2003-XieCE #detection #fault #memory management #named #using
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
ICSEICSE-2003-AbrahamssonWSR #agile #comparative
New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
ICSEICSE-2003-CoppitS #effectiveness #modelling #tool support
Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
ICSEICSE-2003-HatcliffDDJR #component #development #named #verification
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems (JH, XD, MBD, GJ, VPR), pp. 160–173.
ICSEICSE-2003-JohnsonKACMMZD #metric #process
Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined (PMJ, HK, JA, CC, CAM, JM, SZ, WEJD), pp. 641–646.
ICSEICSE-2003-RountevMR #java #morphism #polymorphism #testing
Fragment Class Analysis for Testing of Polymorphism in Java Software (AR, AM, BGR), pp. 210–220.
ICSEICSE-2003-ZageZ #fault #process #scalability
An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model (DMZ, WMZ), pp. 570–577.
SACSAC-2003-BeitzelJCFGG #data fusion #effectiveness #information retrieval
Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies (SMB, ECJ, AC, OF, DAG, NG), pp. 823–827.
SACSAC-2003-BreeseSMGE #array #framework #information management
Labrat LIMS: An Extensible Framework for Developing Laboratory Information Management, Analysis, and Bioinformatics Solutions for Microarrays (MRB, MJS, JNM, MWG, HJE), pp. 103–108.
SACSAC-2003-FurhtGHM #3d #adaptation
An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis (BF, KG, HH, OM), pp. 765–768.
SACSAC-2003-HuaJVT #algebra #approach #data mining #mining #named #performance #using
ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
SACSAC-2003-NandaK #web #web service
Synchronization Analysis for Decentralizing Composite Web Services (MGN, NMK), pp. 407–414.
SACSAC-2003-NandaR #java #parallel #pointer #source code #thread
Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
GPCEGPCE-2003-Kastner #hardware #named #optimisation
TDL: A Hardware Description Language for Retargetable Postpass Optimizations and Analyses (DK), pp. 18–36.
LDTALDTA-2003-CostagliolaDFG #development #visual notation
Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
CCCC-2003-LhotakH #java #points-to #scalability #using
Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
CCCC-2003-Ryder #object-oriented #precise #programming language
Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages (BGR), pp. 126–137.
DACDAC-2003-BeniniMMOPP #design #difference #energy
Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
DACDAC-2003-BergamaschiJ
State-based power analysis for systems-on-chip (RAB, YJ), pp. 638–641.
DACDAC-2003-ChaiKRTWM
Temporofunctional crosstalk noise analysis (DC, AK, YR, KHT, YW, MMS), pp. 860–863.
DACDAC-2003-ChenHBW #automation #constraints #logic
Automatic trace analysis for logic of constraints (XC, HH, FB, YW), pp. 460–465.
DACDAC-2003-CroixW #modelling #using
Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
DACDAC-2003-JersakE #dependence #multi #scheduling
Enabling scheduling analysis of heterogeneous systems with multi-rate data dependencies and rate intervals (MJ, RE), pp. 454–459.
DACDAC-2003-LeeKBS
Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
DACDAC-2003-LiLXP #megamodelling
Analog and RF circuit macromodels for system-level analysis (XL, PL, YX, LTP), pp. 478–483.
DACDAC-2003-LiMR #interactive #modelling
Accurate timing analysis by modeling caches, speculation and their interaction (XL, TM, AR), pp. 466–471.
DACDAC-2003-MaHDCCCG #optimisation
Dynamic global buffer planning optimization based on detail block locating and congestion analysis (YM, XH, SD, SC, YC, CKC, JG), pp. 806–811.
DACDAC-2003-MantheLS
Symbolic analysis of analog circuits with hard nonlinearity (AM, ZL, CJRS), pp. 542–545.
DACDAC-2003-StehrGA #bound #performance #trade-off
Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
DACDAC-2003-TsengK
Static noise analysis with noise windows (KT, VK), pp. 864–868.
DACDAC-2003-ZhuYC #adaptation #algebra #approach #multi #network #using
Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
DATEDATE-2003-AgarwalBZV #bound #statistics #using
Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATEDATE-2003-BrandoleseFSS #library
Library Functions Timing Characterization for Source-Level Analysis (CB, WF, FS, DS), pp. 11132–11133.
DATEDATE-2003-CaldariCCCOPT
System-Level Power Analysis Methodology Applied to the AMBA AHB Bus (MC, MC, MC, PC, SO, LP, CT), pp. 20032–20039.
DATEDATE-2003-ChoLYCZ #communication #design #scheduling
Scheduling and Timing Analysis of HW/SW On-Chip Communication in MP SoC Design (YC, GL, SY, KC, NEZ), pp. 20132–20137.
DATEDATE-2003-DebOJ #embedded #simulation #using
Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, , AJ), pp. 11100–11101.
DATEDATE-2003-DobrovolnyVWD #modelling
Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
DATEDATE-2003-GoelB #functional #reachability #set
Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis (AG, REB), pp. 10816–10821.
DATEDATE-2003-GouraryRUZM #simulation
A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
DATEDATE-2003-LogothetisS #source code
Exact High Level WCET Analysis of Synchronous Programs by Symbolic State Space Exploration (GL, KS), pp. 10196–10203.
DATEDATE-2003-LupeaPJ #named
RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
DATEDATE-2003-MantheLSM
Symbolic Analysis of Nonlinear Analog Circuits (AM, ZL, CJRS, KM), pp. 11108–11109.
DATEDATE-2003-PanBKK #architecture #design #programmable
Design and Analysis of a Programmable Single-Chip Architecture for DVB-T Base-Band Receiver (CP, NB, AHK, AK), pp. 10468–10475.
DATEDATE-2003-PopEP #clustering #distributed #embedded #multi #optimisation #scheduling #synthesis
Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems (PP, PE, ZP), pp. 10184–10189.
DATEDATE-2003-RapakaM #embedded #performance
Pre-Characterization Free, Efficient Power/Performance Analysis of Embedded and General Purpose Software Applications (VSPR, DM), pp. 10504–10509.
DATEDATE-2003-RebaudengoRV #fault #pipes and filters
An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor (MR, MSR, MV), pp. 10602–10607.
DATEDATE-2003-VanasscheGS #detection #domain model #modelling
Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
DATEDATE-2003-WangZ #polynomial
Transistor-Level Static Timing Analysis by Piecewise Quadratic Waveform Matching (ZW, JZ), pp. 11026–11031.
DATEDATE-2003-YeBM #communication
Packetized On-Chip Interconnect Communication Analysis for MPSoC (TTY, LB, GDM), pp. 10344–10349.
HPCAHPCA-2003-SakamotoKIAUMK #architecture #enterprise #performance
Microarchitecture and Performance Analysis of a SPARC-V9 Microprocessor for Enterprise Server Systems (MS, AK, AI, TA, HU, KM, YK), pp. 141–152.
HPDCHPDC-2003-TakefusaTMM #algorithm #architecture #energy #grid #performance #physics #replication #scheduling
Performance Analysis of Scheduling and Replication Algorithms on Grid Datafarm Architecture for High-Energy Physics Applications (AT, OT, SM, YM), pp. 34–47.
LCTESLCTES-2003-AmeurBBPW #embedded #robust
Robustness analysis of avionics embedded systems (YAA, GB, FB, SP, VW), pp. 123–132.
PDPPDP-2003-BulicG #compilation #dependence
Practical Dependence Analysis in a SIMD Vectorizing Compiler (PB, VG), pp. 41–48.
PDPPDP-2003-FahringerMRPVM #modelling #performance #scalability
Performance Modeling of Scientific Applications: Scalability Analysis of LAPW0 (TF, NM, MR, SP, UV, GM), pp. 5–12.
PDPPDP-2003-Tessera #clustering #performance
Performance Analysis of an IBM supercluster (DT), pp. 417–424.
PDPPDP-2003-WolfM #automation #hybrid #performance
Automatic Performance Analysis of Hybrid MPI/OpenMP Applications (FW, BM), pp. 13–22.
PPoPPPPoPP-2003-ChenHHJL #architecture #compilation #multi #points-to #probability #thread
Compiler support for speculative multithreading architecture with probabilistic points-to analysis (PSC, MYH, YSH, RDCJ, JKL), pp. 25–36.
SOSPSOSP-2003-GummadiDSGLZ #metric #modelling #peer-to-peer
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload (PKG, RJD, SS, SDG, HML, JZ), pp. 314–329.
ESOPESOP-2003-GenaimK #independence #logic programming #scheduling #source code
Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling (SG, AK), pp. 84–98.
ESOPESOP-2003-GorrieriLM #encryption #protocol #realtime
A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
ESOPESOP-2003-Laud #data flow #encryption
Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
ESOPESOP-2003-Meadows #encryption #evolution #protocol #requirements #specification #what
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
FASEFASE-2003-JinELJ #composition #data flow #network #process
Modular Analysis of Dataflow Process Networks (YJ, RE, CL, JWJ), pp. 184–199.
TACASTACAS-2003-AmlaKMM #bound #model checking
Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
TACASTACAS-2003-BasuR #composition #verification
Compositional Analysis for Verification of Parameterized Systems (SB, CRR), pp. 315–330.
TACASTACAS-2003-BDSV #encryption #information management #protocol #representation
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
TACASTACAS-2003-BehrmannBFL #automaton #verification
Static Guard Analysis in Timed Automata Verification (GB, PB, EF, KGL), pp. 254–277.
TACASTACAS-2003-BerthomieuV #branch #petri net
State Class Constructions for Branching Analysis of Time Petri Nets (BB, FV), pp. 442–457.
TACASTACAS-2003-BraghinCFFLP #bound #named
BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
TACASTACAS-2003-FersmanMPY #scheduling #using
Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
TACASTACAS-2003-HermannsJ #component #dependence #performance #set
A Set of Performance and Dependability Analysis Components for CADP (HH, CJ), pp. 425–430.
TACASTACAS-2003-SokolskyPLC #modelling #power management
Modeling and Analysis of Power-Aware Systems (OS, AP, IL, KC), pp. 409–425.
TACASTACAS-2003-ZhangCS #concurrent #functional #performance #verification
The Integrated CWB-NC/PIOATool for Functional Verification and Performance Analysis of Concurrent Systems (DZ, RC, EWS), pp. 431–436.
CAVCAV-2003-GrumbergHS #algorithm #distributed #reachability
A Work-Efficient Distributed Algorithm for Reachability Analysis (OG, TH, AS), pp. 54–66.
CSLCSL-2003-Gerhardy #complexity
Refined Complexity Analysis of Cut Elimination (PG), pp. 212–225.
ICLPICLP-2003-LagoonMS #termination
Termination Analysis with Types Is More Accurate (VL, FM, PJS), pp. 254–268.
ICLPICLP-2003-Serebrenik #logic programming #source code #termination
Termination Analysis of Logic Programs: Extended Abstract (AS), pp. 507–508.
ICSTSAT-2003-ArmandoC #protocol #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
VMCAIVMCAI-2003-BraghinCFLP #complexity #mobile
Complexity of Nesting Analysis in Mobile Ambients (CB, AC, RF, FLL, CP), pp. 86–101.
VMCAIVMCAI-2003-DamsN #abstraction #model checking
Shape Analysis through Predicate Abstraction and Model Checking (DD, KSN), pp. 310–324.
VMCAIVMCAI-2003-UnnikrishnanSL #bound
Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
CBSECBSE-2002-Mason #component #composition #probability #reliability
Probabilistic Analysis for Component Reliability Composition (DM), p. 8.
WICSAWICSA-2002-Ramdane-CherifLL #architecture #configuration management #evaluation
Dynamic Reconfigurable Software Architecture: Analysis and Evaluation (ARC, NL, FL), pp. 79–93.
CBSECBSE-2003-BaresiHTV #architecture #graph transformation #modelling
Modeling and Analysis of Architectural Styles Based on Graph Transformation (LB, RH, ST, DV), p. 12.
TPDLECDL-2002-BollenVX #evaluation #library #retrieval
Digital Library Evaluation by Analysis of User Retrieval Patterns (JB, SV, WX), pp. 432–447.
TPDLECDL-2002-GoncalvesLSAF #library #standard #xml
An XML Log Standard and Tool for Digital Library Logging Analysis (MAG, ML, RS, MFA, EAF), pp. 129–143.
TPDLECDL-2002-Takasu #documentation #statistics #string
Statistical Analysis of Bibliographic Strings for Constructing an Integrated Document Space (AT), pp. 75–90.
TPDLECDL-2002-WittenBPB #architecture #documentation #library #metadata #requirements
Importing Documents and Metadata into Digital Libraries: Requirements Analysis and an Extensible Architecture (IHW, DB, GWP, SJB), pp. 390–405.
SIGMODSIGMOD-2002-PhanN #named #tool support
GEA: a toolkit for gene expression analysis (JMP, RTN), p. 628.
VLDBVLDB-2002-ChenHWW #data type #multi
Multi-Dimensional Regression Analysis of Time-Series Data Streams (YC, GD, JH, BWW, JW), pp. 323–334.
VLDBVLDB-2002-Faloutsos #data mining #mining #similarity
Sensor Data Mining: Similarity Search and Pattern Analysis (CF).
VLDBVLDB-2002-SantiniG #geometry #named
GeMBASE: A Geometric Mediator for Brain Analysis with Surface Ensembles (SS, AG), pp. 1075–1078.
CSMRCSMR-2002-LuciaPSP #empirical #maintenance #process
Empirical Analysis of Massive Maintenance Processes (ADL, AP, SS, EP), pp. 5–14.
ICSMEICSM-2002-Barry #evolution #lifecycle #maintenance
Software Evolution, Volatility and Lifecycle Maintenance Patterns: A Longitudinal Analysis (EJB), pp. 474–477.
ICSMEICSM-2002-BinhDR #component #testing
Testability Analysis for Software Components (TBN, MD, CR), pp. 422–429.
ICSMEICSM-2002-ChenZBZY #approach #dependence #novel
A Novel Approach to Measuring Class Cohesion Based on Dependence Analysis (ZC, YZ, BX, JZ, HY), pp. 377–384.
ICSMEICSM-2002-KorelTV #dependence #modelling #reduction #testing #using
Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
ICSMEICSM-2002-OhstK #design #fine-grained
A Fine-Grained Version and Configuration Model in Analysis and Design (DO, UK), pp. 521–527.
ICSMEICSM-2002-RotschkeK #architecture #evolution #industrial #scalability #tool support
Architecture Analysis Tools to Support Evolution of Large Industrial Systems (TR, RLK), pp. 182–191.
ICSMEICSM-2002-SouterP #testing
Putting Escape Analysis to Work for Software Testing (ALS, LLP), pp. 430–439.
ICSMEICSM-2002-TonellaP #c++ #diagrams
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram (PT, AP), pp. 54–63.
IWPCIWPC-2002-Hamou-LhadjL #execution #scalability
Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
IWPCIWPC-2002-Walenstein #comprehension #tool support
Theory-based Analysis of Cognitive Support in Software Comprehension Tools (AW), pp. 75–84.
PASTEPASTE-2002-Morrisett
Analysis issues for cyclone (JGM), p. 26.
PASTEPASTE-2002-Naumovich #data flow #design pattern #implementation #using
Using the observer design pattern for implementation of data flow analyses (GN), pp. 61–68.
SCAMSCAM-2002-Baxter #parallel #source code
Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
SCAMSCAM-2002-HarmanFHHDW #dependence #named
VADA: A Transformation-Based System for Variable Dependence Analysis (MH, CF, RMH, LH, SD, JW), pp. 55–64.
WCREWCRE-2002-ProbstKS #liveness #optimisation
Register Liveness Analysis for Optimizing Dynamic Binary Translation (MP, AK, BS), pp. 35–44.
WCREWCRE-2002-RillingM #3d #on the #source code #using #visual notation
On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
WCREWCRE-2002-TrogerC
Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
FMFME-2002-Fidge #assembly #control flow
Timing Analysis of Assembler Code Control-Flow Paths (CJF), pp. 370–389.
FMFME-2002-Pahl #abstraction #refinement #using
Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
FMFME-2002-RatsabySU
Improvements in Coverability Analysis (GR, BS, SU), pp. 41–56.
RTARTA-2002-Mitchell #multi #protocol #security
Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
ICFPICFP-2002-DubeF #adaptation
A demand-driven adaptive type analysis (DD, MF), pp. 84–97.
ICFPICFP-2002-GlynnSSS #exception #strict
Exception analysis for non-strict languages (KG, PJS, MS, HS), pp. 98–109.
ICFPICFP-2002-JonesG #generative #termination
Program generation, termination, and binding-time analysis (NDJ, AJG), p. 283.
DiGRACGDC-2002-Konzack #game studies
Computer Game Criticism: A Method for Computer Game Analysis (LK).
CHICHI-2002-HinckleyCBM
Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
CHICHI-2002-PiperRI #3d #interface
Illuminating clay: a 3-D tangible interface for landscape analysis (BP, CR, HI), pp. 355–362.
VISSOFTVISSOFT-2002-RillingSB #complexity #concept #source code #visualisation
The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
CAiSECAiSE-2002-CostalST #comprehension #modelling #object-oriented #uml
Understanding Redundancy in UML Models for Object-Oriented Analysis (DC, MRS, ET), pp. 659–674.
ICEISICEIS-2002-Abe #domain model #information management #modelling
Applying Domain Modeling and SECI Theory in Knowledge Management for Information Systems Analysis (AA), pp. 725–731.
ICEISICEIS-2002-Audy #information management
Analysis of the Relation between the Prescriptive and Descriptive Approaches of the Information System Planning (JLNA), pp. 553–561.
ICEISICEIS-2002-BarjisC #database #design #modelling #semantics #using
Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
ICEISICEIS-2002-CastelaTGL #bibliography #modelling #process #validation
Survey, Analysis and Validation of Information for Business Process Modeling (NC, JMT, AG, ERL), pp. 803–806.
ICEISICEIS-2002-IochpeT #aspect-oriented #process #workflow
Inferring Aspects of the Organizational Structure through Workflow Process Analysis (CI, LHT), pp. 758–763.
ICEISICEIS-2002-LiuL #object-oriented #throughput
A Knowledge Object Oriented System for High Throughput Collection and Analysis of Data (HL, TL), pp. 764–769.
ICEISICEIS-2002-SalimifardW #modelling #performance #petri net #using #workflow
Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
ICEISICEIS-2002-SalterL #semantics #using
Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
ICEISICEIS-2002-Vellido #e-commerce #network
Neural Networks for B2C E-Commerce Analysis: Some Elements of Best Practice (AV), pp. 439–445.
CIKMCIKM-2002-BrantsCT #documentation #probability #segmentation #semantics #topic
Topic-based document segmentation with probabilistic latent semantic analysis (TB, FC, IT), pp. 211–218.
CIKMCIKM-2002-KaoCLH #mining #web
Entropy-based link analysis for mining web informative structures (HYK, MSC, SHL, JMH), pp. 574–581.
CIKMCIKM-2002-LohLAL #query
Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
ECIRECIR-2002-BenammarHM #automation #documentation #using
Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
ICMLICML-2002-Gama #functional
An Analysis of Functional Trees (JG), pp. 155–162.
ICMLICML-2002-GlobersonT #novel #reduction
Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
ICMLICML-2002-LangfordZK #trade-off
Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
ICPRICPR-v1-2002-BagdanovW #documentation #image
Granulometric Analysis of Document Images (ADB, MW), pp. 468–471.
ICPRICPR-v1-2002-CarcassoniRH #recognition
Texture Recognition through Modal Analysis of Spectral Peak Patterns (MC, ER, ERH), pp. 243–246.
ICPRICPR-v1-2002-DavisT #recognition
Analysis and Recognition of Walking Movements (JWD, SRT), pp. 315–318.
ICPRICPR-v1-2002-DockstaderBT #feature model
Feature Extraction for the Analysis of Gait and Human Motion (SLD, KAB, AMT), pp. 5–8.
ICPRICPR-v1-2002-HadidKP #learning #linear #using
Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
ICPRICPR-v1-2002-KovalevKC #3d #image #symmetry
Structural Brain Asymmetry as Revealed by 3D Texture Analysis of Anatomical MR Images (VAK, FK, DYvC), p. 808–?.
ICPRICPR-v1-2002-Meas-YedidTO #clustering #image #markov #random #segmentation
Color Image Segmentation Based on Markov Random Field Clustering for Histological Image Analysis (VMY, ST, JCOM), pp. 796–799.
ICPRICPR-v1-2002-MoreauCP #estimation #using
Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
ICPRICPR-v1-2002-OjalaMPVKH #algorithm #empirical #evaluation #framework
Outex- New Framework for Empirical Evaluation of Texture Analysis Algorithms (TO, TM, MP, JV, JK, SH), pp. 701–706.
ICPRICPR-v1-2002-RellierDZF
A Gauss-Markov Model for Hyperspectral Texture Analysis of Urban Areas (GR, XD, JZ, FF), pp. 692–695.
ICPRICPR-v1-2002-SinghMS #dependence #image
Colour Image Texture Analysis: Dependence on Colour Spaces (MS, MM, SS), pp. 672–675.
ICPRICPR-v1-2002-SinghS #case study #comparative
Spatial Texture Analysis: A Comparative Study (MS, SS), pp. 676–679.
ICPRICPR-v1-2002-VegaS
Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
ICPRICPR-v1-2002-WollnyTK #segmentation
Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
ICPRICPR-v2-2002-BaekD
Factor Analysis or Background Suppression (KB, BAD), pp. 643–646.
ICPRICPR-v2-2002-Duncan #geometry #image #modelling #physics
Geometrical and Physical Models for the Recovery of Quantitative Information from Medical Image Analysis (JSD), p. 277.
ICPRICPR-v2-2002-Fasel #network #robust #using
Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
ICPRICPR-v2-2002-Ho #proximity
Exploratory Analysis of Point Proximity in Subspaces (TKH), pp. 196–199.
ICPRICPR-v2-2002-KumanoAAUST #editing #video
Video Editing Support System Based on Video Grammar and Content Analysis (MK, YA, MA, KU, KS, KT), pp. 1031–1036.
ICPRICPR-v2-2002-LiuHLM #kernel #recognition
Kernel-Based Optimized Feature Vectors Selection and Discriminant Analysis for Face Recognition (QL, RH, HL, SM), pp. 362–365.
ICPRICPR-v2-2002-Maloof #machine learning #on the #statistics #testing
On Machine Learning, ROC Analysis, and Statistical Tests of Significance (MAM), pp. 204–207.
ICPRICPR-v2-2002-MiyauchiHBK #collaboration #detection #multi #semantics #video
Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
ICPRICPR-v2-2002-MoghaddamZ #linear #online #pattern matching #pattern recognition #performance #recognition
Fast Linear Discriminant Analysis for On-Line Pattern Recognition Applications (HAM, KAZ), pp. 64–67.
ICPRICPR-v2-2002-PhungDV #education
Narrative Structure Analysis with Education and Training Videos for E-Learning (DQP, CD, SV), p. 835–?.
ICPRICPR-v2-2002-RoliFV #classification #trade-off
Analysis of Error-Reject Trade-off in Linearly Combined Classifiers (FR, GF, GV), pp. 120–125.
ICPRICPR-v2-2002-SeokL #algorithm #approach #difference #learning #probability
The Analysis of a Stochastic Differential Approach for Langevine Comepetitive Learning Algorithm (JS, JWL), pp. 80–83.
ICPRICPR-v2-2002-TweedM #automation #detection
Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
ICPRICPR-v2-2002-VasilescuT #image #multi #recognition
Multilinear Image Analysis for Facial Recognition (MAOV, DT), pp. 511–514.
ICPRICPR-v2-2002-WachsmuthS #image #probability #process #speech
Integrated Analysis of Speech and Images as a Probabilistic Decoding Process (SW, GS), pp. 588–592.
ICPRICPR-v2-2002-YeungB #mobile #towards
Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
ICPRICPR-v3-2002-BhanuH #recognition
Individual Recognition by Kinematic-Based Gait Analysis (BB, JH), pp. 343–346.
ICPRICPR-v3-2002-BoomgaardW #equivalence #estimation #on the #robust
On the Equivalence of Local-Mode Finding, Robust Estimation and Mean-Shift Analysis as Used in Early Vision Tasks (RvdB, JvdW), pp. 927–930.
ICPRICPR-v3-2002-ChenZL #component #detection #independence #segmentation
Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
ICPRICPR-v3-2002-DuongEC #documentation #image
Features for Printed Document Image Analysis (JD, HE, MC), pp. 245–248.
ICPRICPR-v3-2002-FataichaCNS #approach #documentation #image
Content Analysis in Document Images: A Scale Space Approach (YF, MC, JYN, CYS), pp. 335–338.
ICPRICPR-v3-2002-GuestF #approach #clustering #image
A Clustering Approach to Corner Point Analysis in Hand Drawn Images (RMG, MCF), pp. 940–943.
ICPRICPR-v3-2002-KatzMDK #automation #linear #robust #speech
Robustness of Linear Discriminant Analysis in Automatic Speech Recognitio (MK, HGM, HD, DK), pp. 371–374.
ICPRICPR-v3-2002-Kitamoto #component
Fractional Component Analysis (FCA) for Mixed Signals (AK), pp. 383–386.
ICPRICPR-v3-2002-KongZ #authentication #image
Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
ICPRICPR-v3-2002-LuT #documentation #image #layout #word
Word Spotting in Chinese Document Images without Layout Analysis (YL, CLT), pp. 57–60.
ICPRICPR-v3-2002-NishidaS #documentation #image #multi
Correcting Show-Through Effects on Document Images by Multiscale Analysis (HN, TS), pp. 65–68.
ICPRICPR-v3-2002-Vasilescu #recognition #synthesis
Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
ICPRICPR-v4-2002-FengWP #agile #case study #comparative #modelling
A Comparative Study of Two Velocity ProfIle Models for Rapid Stroke Analysis (CF, AW, RP), p. 52–?.
ICPRICPR-v4-2002-IbrahimovSD #clustering #performance #similarity #topic
The Performance Analysis of a Chi-square Similarity Measure for Topic Related Clustering of Noisy Transcripts (OI, IKS, ND), pp. 285–288.
ICPRICPR-v4-2002-NgoPZ #retrieval #slicing
Motion Retrieval by Temporal Slices Analysis (CWN, TCP, HZ), pp. 64–67.
ICPRICPR-v4-2002-SocolinskyS #comparative #performance #recognition
A Comparative Analysis of Face Recognition Performance with Visible and Thermal Infrared Imagery (DAS, AS), p. 217–?.
ICPRICPR-v4-2002-ZhuS #adaptation #detection #feature model #statistics
Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
KDDKDD-2002-RidgewayM #dataset
Bayesian analysis of massive datasets via particle filters (GR, DM), pp. 5–13.
KDDKDD-2002-StolteTH #query #using #visualisation
Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
KDDKDD-2002-TuzhilinA #array #scalability
Handling very large numbers of association rules in the analysis of microarray data (AT, GA), pp. 396–404.
KRKR-2002-Fruhwirth #automation #complexity
As Time Goes by: Automatic Complexity Analysis of Simplified Rules (TWF), pp. 547–557.
SEKESEKE-2002-Fernandez-CondeG #framework #object-oriented
Domain analysis of object-oriented frameworks in FrameDoc (CFC, PAGC), pp. 27–33.
SEKESEKE-2002-RiescoSPPJ #metamodelling #uml
Al analysis patterns as UML meta-model constructs (AMR, GS, DP, SP, JMJ), pp. 237–238.
SEKESEKE-2002-RusBH #development #empirical #process #simulation
Systematically combining process simulation and empirical data in support of decision analysis in software development (IR, SB, MH), pp. 827–833.
SIGIRSIGIR-2002-BinghamKL #documentation
ICA and SOM in text document analysis (EB, JK, KL), pp. 361–362.
SIGIRSIGIR-2002-Canny #collaboration #privacy
Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
SIGIRSIGIR-2002-DingHHZS #framework #rank
PageRank, HITS and a unified framework for link analysis (CHQD, XH, PH, HZ, HDS), pp. 353–354.
SIGIRSIGIR-2002-JonesG #development #topic #visualisation
A visualisation tool for topic tracking analysis and development (GJFJ, SMG), pp. 389–390.
SIGIRSIGIR-2002-LarkeyBC #information retrieval
Improving stemming for Arabic information retrieval: light stemming and co-occurrence analysis (LSL, LB, MEC), pp. 275–282.
SIGIRSIGIR-2002-ParkPGK #documentation
Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
SPLCSPLC-2002-SmithBB #component #mining #product line #re-engineering #using
Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
SPLCSPLC-2002-Yacoub #component #performance
Performance Analysis of Component-Based Applications (SMY), pp. 299–315.
UMLUML-2002-GogollaH #metamodelling #uml
Analysis of UML Stereotypes within the UML Metamodel (MG, BHS), pp. 84–99.
OOPSLAOOPSLA-2002-KovedPK #java
Access rights analysis for Java (LK, MP, AK), pp. 359–372.
AdaEuropeAdaEurope-2002-Amey #design
Closing the Loop: The Influence of Code Analysis on Design (PA), pp. 151–162.
AdaEuropeAdaEurope-2002-ChenBZY #ada #concurrent #dependence #source code
Static Dependency Analysis for Concurrent Ada 95 Programs (ZC, BX, JZ, HY), pp. 219–230.
AdaEuropeAdaEurope-2002-CzarneckiHRVR #ada #approach #data flow #named
DataFAN: A Practical Approach to Data Flow Analysis for Ada 95 (KC, MH, ER, FV, AR), pp. 231–244.
AdaEuropeAdaEurope-2002-MedinaGDH #ada #component #distributed #modelling #realtime #scheduling
Modeling and Schedulability Analysis of Hard Real-Time Distributed Systems Based on Ada Components (JLM, JJG, JMD, MGH), pp. 282–296.
PEPMASIA-PEPM-2002-Heintze #alias #c
Aliasing analysis for a million lines of C (NH), pp. 47–49.
PEPMASIA-PEPM-2002-SheardL #search-based #using
Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
PADLPADL-2002-GallagherP #abstract interpretation #automaton #finite #logic programming #nondeterminism #source code
Abstract Interpretation over Non-deterministic Finite Tree Automata for Set-Based Analysis of Logic Programs (JPG, GP), pp. 243–261.
PADLPADL-2002-Meadows #declarative #using
Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
PEPMPEPM-2002-GomezL #automation #bound #higher-order
Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
PEPMPEPM-2002-Lu #logic programming #source code
Path dependent analysis of logic programs (LL), pp. 63–74.
PLDIPLDI-2002-HallemCXE
A System and Language for Building System-Specific, Static Analyses (SH, BC, YX, DRE), pp. 69–82.
PLDIPLDI-2002-RamalingamWFGS #component #consistency
Deriving Specialized Program Analyses for Certifying Component-Client Conformance (GR, AV, JF, DG, SS), pp. 83–94.
POPLPOPL-2002-IgarashiK #resource management
Resource usage analysis (AI, NK), pp. 331–342.
POPLPOPL-2002-KuncakLR
Role analysis (VK, PL, MCR), pp. 17–32.
POPLPOPL-2002-LernerGC #data flow
Composing dataflow analyses and transformations (SL, DG, CC), pp. 270–282.
PPDPPPDP-2002-Fiore #evaluation #normalisation #semantics #λ-calculus
Semantic analysis of normalisation by evaluation for typed λ calculus (MPF), pp. 26–37.
PPDPPPDP-2002-JonesG #generative #termination
Abstract and conclusions of PLI invited paper: program generation, termination, and binding-time analysis (NDJ, AJG), p. 1.
PPDPPPDP-2002-LagoonS #logic programming #precise #source code
Precise pair-sharing analysis of logic programs (VL, PJS), pp. 99–108.
PPDPPPDP-2002-OvertonSS #constraints
Constraint-based mode analysis of mercury (DO, ZS, PJS), pp. 109–120.
PPDPPPDP-2002-SchrijversD
Combining an improvement to PARMA trailing with trailing analysis (TS, BD), pp. 88–98.
SASSAS-2002-AdamsBDLRSW #data flow #pointer #using
Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
SASSAS-2002-BruynoogheCGV #logic programming #reuse #source code #termination #using
Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
SASSAS-2002-Faxen #representation
Representation Analysis for Coercion Placement (KFF), pp. 278–293.
SASSAS-2002-LangenbachTH #modelling #pipes and filters
Pipeline Modeling for Timing Analysis (ML, ST, RH), pp. 294–309.
SASSAS-2002-Lee #polynomial
Finiteness Analysis in Polynomial Time (CSL), pp. 493–508.
SASSAS-2002-Probst #composition #control flow #library
Modular Control Flow Analysis for Libraries (CWP), pp. 165–179.
SASSAS-2002-Ruf #data flow #precise
Improving the Precision of Equality-Based Dataflow Analyses (ER), pp. 247–262.
SASSAS-2002-Venet #alias #array #data type #recursion
Nonuniform Alias Analysis of Recursive Data Structures and Arrays (AV), pp. 36–51.
SASSAS-2002-WhaleyL #performance #points-to #strict
An Efficient Inclusion-Based Points-To Analysis for Strictly-Typed Languages (JW, MSL), pp. 180–195.
AdaSIGAda-2002-KorochkinK #ada #java #parallel #performance
Experimental performance analysis of the Ada95 and Java parallel program on SMP systems (DK, SK), pp. 53–56.
RERE-2002-Alexander #case study #experience #industrial #trade-off
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
RERE-2002-BergmanM #empirical #requirements
Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program (MB, GM), pp. 247–254.
RERE-2002-FantechiGLM #case study
Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
RERE-2002-JohnMST #evolution #performance
Efficient and Systematic Software Evolution through Domain Analysis (IJ, DM, PS, ET), pp. 237–246.
RERE-2002-KaiyaHS #named #requirements
AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
RERE-2002-StutzSKK #uml
Analysis beyond UML (CS, JS, DK, WK), pp. 215–218.
ASEASE-2002-HeimdahlCW #model checking
Deviation Analysis Through Model Checking (MPEH, YC, MWW), pp. 37–46.
ASEASE-2002-LoerH #interactive #model checking #towards
Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
FSEFSE-2002-BrunsC #points-to
Searching for points-to analysis (GB, SC), pp. 61–70.
SACSAC-2002-BorealeB #automation #protocol #security
Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
SACSAC-2002-El-Ansary #behaviour #representation #requirements #towards
Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
SACSAC-2002-GarcesF #behaviour #distributed
Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
SACSAC-2002-HauglidM #metadata #named
SESAM: searching supported by analysis of metadata (JOH, RM), pp. 418–425.
SACSAC-2002-SmithH #design #reliability
Augmenting descriptive scenario analysis for improvements in human reliability design (SPS, MDH), pp. 739–743.
SACSAC-2002-TourinoBDG #clustering #performance
Performance analysis of MPI-I/O primitives on a PC cluster (JT, JB, RD, VMG), pp. 907–912.
GPCEGPCE-2002-JonesG #generative #termination
Program Generation, Termination, and Binding-Time Analysis (NDJ, AJG), pp. 1–31.
GPCEGPCE-2002-Lee #polynomial #termination
Program Termination Analysis in Polynomial Time (CSL), pp. 218–235.
CCCC-2002-GuptaMZ #optimisation #representation
A Representation for Bit Section Based Analysis and Optimization (RG, EM, YZ), pp. 62–77.
CCCC-2002-Mohnen #approach #data flow
A Graph-Free Approach to Data-Flow Analysis (MM), pp. 46–61.
CCCC-2002-NeculaMRW #c #named #source code #tool support
CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs (GCN, SM, SPR, WW), pp. 213–228.
DACDAC-2002-AttarhaN #fault #modelling #using
Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
DACDAC-2002-BhuniaRS #detection #fault #locality #novel
A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
DACDAC-2002-BodapatiN #megamodelling
High-level current macro-model for power-grid analysis (SB, FNN), pp. 385–390.
DACDAC-2002-Casinovi #algorithm
An algorithm for frequency-domain noise analysis in nonlinear systems (GC), pp. 514–517.
DACDAC-2002-KoukabDD #named #performance
HSpeedEx: a high-speed extractor for substrate noise analysis in complex mixed signal SOC (AK, CD, MJD), pp. 767–770.
DACDAC-2002-KrauterW
Variable frequency crosstalk noise analysis: : a methodology to guarantee functionality from dc to fmax (BK, DW), pp. 665–668.
DACDAC-2002-LachishMUZ #functional
Hole analysis for functional coverage data (OL, EM, SU, AZ), pp. 807–812.
DACDAC-2002-LeeP #design #embedded #performance #simulation
Timed compiled-code simulation of embedded software for performance analysis of SOC design (JYL, ICP), pp. 293–298.
DACDAC-2002-LiouKWC #performance #statistics #testing #validation
False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation (JJL, AK, LCW, KTC), pp. 566–569.
DACDAC-2002-OrshanskyK #framework #probability
A general probabilistic framework for worst case timing analysis (MO, KK), pp. 556–561.
DACDAC-2002-RichterZJE #composition #design #framework #platform #scheduling
Model composition for scheduling analysis in platform design (KR, DZ, MJ, RE), pp. 287–292.
DACDAC-2002-VaratkarM #design #multi #network
Traffic analysis for on-chip networks design of multimedia applications (GV, RM), pp. 795–800.
DACDAC-2002-WolfSE #formal method
Associative caches in formal software timing analysis (FW, JS, RE), pp. 622–627.
DACDAC-2002-YeMB #network #power management
Analysis of power consumption on switch fabrics in network routers (TTY, GDM, LB), pp. 524–529.
DACDAC-2002-ZhengP #modelling #network #symmetry
Modeling and analysis of regular symmetrically structured power/ground distribution networks (HZ, LTP), pp. 395–398.
DATEDATE-2002-BecerZBPH #using
Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
DATEDATE-2002-BhuniaR #detection #fault #using
Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
DATEDATE-2002-GoffioulWVD #approach #architecture #using
Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
DATEDATE-2002-Hieu #design #feedback #linear #optimisation
Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
DATEDATE-2002-IndrusiakGR #comparative #design #distributed #framework #repository
Comparative Analysis and Application of Data Repository Infrastructure for Collaboration-Enabled Distributed Design Environments (LSI, MG, RAdLR), p. 1130.
DATEDATE-2002-IraniGS #multi #power management
Competitive Analysis of Dynamic Power Management Strategies for Systems with Multiple Power Savings States (SI, RKG, SKS), pp. 117–123.
DATEDATE-2002-JerkeL #verification
Hierarchical Current Density Verification for Electromigration Analysis in Arbitrary Shaped Metallization Patterns of Analog Circuits (GJ, JL), pp. 464–469.
DATEDATE-2002-KimKM #algorithm #realtime #scalability #using
A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
DATEDATE-2002-LiP #approach #modelling
A Linear-Centric Modeling Approach to Harmonic Balance Analysis (PL, LTP), pp. 634–639.
DATEDATE-2002-PoppOHB #automation #parametricity
Parameter Controlled Automatic Symbolic Analysis of Nonlinear Analog Circuits (RP, JO, LH, EB), pp. 274–278.
DATEDATE-2002-RichterE #interface
Event Model Interfaces for Heterogeneous System Analysis (KR, RE), pp. 506–513.
DATEDATE-2002-VedulaA #functional #generative #named #testing
FACTOR: A Hierarchical Methodology for Functional Test Generation and Testability Analysis (VMV, JAA), pp. 730–734.
DATEDATE-2002-ZhengPBK #modelling #scalability
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses (HZ, LTP, MWB, BK), pp. 628–633.
HPCAHPCA-2002-KampeSD #branch #fourier #predict #using
The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
OSDIOSDI-2002-DunlapKCBC #named
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
OSDIOSDI-2002-SaroiuGDGL #delivery #internet
An Analysis of Internet Content Delivery Systems (SS, PKG, RJD, SDG, HML), pp. 315–327.
PDPPDP-2002-GerndtSSW #approach #automation #distributed #performance
Performance Analysis for Teraflop Computers: A Distributed Automatic Approach (MG, AS, MS, RW), pp. 23–30.
PDPPDP-2002-Rodriguez #algorithm #design #parallel
The Design and Analysis of Parallel Algorithms (CR), p. 1.
ESOPESOP-2002-Feret #dependence #mobile
Dependency Analysis of Mobile Systems (JF), pp. 314–330.
ESOPESOP-2002-NielsonNS #automation #complexity
Automatic Complexity Analysis (FN, HRN, HS), pp. 243–261.
ESOPESOP-2002-WandW #composition #proving
A Modular, Extensible Proof Method for Small-Step Flow Analyses (MW, GBW), pp. 213–227.
ESOPESOP-2002-Weirich #higher-order
Higher-Order Intensional Type Analysis (SW), pp. 98–114.
STOCSTOC-2002-Bachmat #scheduling #sequence
Average case analysis for batched disk scheduling and increasing subsequences (EB), pp. 277–286.
STOCSTOC-2002-ChanLTW #video
A unified analysis of hot video schedulers (WTC, TWL, HFT, PWHW), pp. 179–188.
STOCSTOC-2002-ScharbrodtSS #scheduling
A new average case analysis for completion time scheduling (MS, TS, AS), pp. 170–178.
TACASTACAS-2002-JinKS #reachability #scheduling
Fine-Grain Conjunction Scheduling for Symbolic Reachability Analysis (HJ, AK, FS), pp. 312–326.
TACASTACAS-2002-Lowry #tool support
Software Construction and Analysis Tools for Future Space Missions (MRL), pp. 1–19.
TACASTACAS-2002-Subramani #scheduling
An Analysis of Zero-Clairvoyant Scheduling (KS), pp. 98–112.
CADECADE-2002-Baaz #proving
Proof Analysis by Resolution (MB), pp. 517–532.
CAVCAV-2002-ArmandoBBCCMRTVV #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAVCAV-2002-BaumgartnerKA
Property Checking via Structural Analysis (JB, AK, JAA), pp. 151–165.
CAVCAV-2002-Holzmann #model checking
Software Analysis and Model Checking (GJH), pp. 1–16.
CAVCAV-2002-YonedaKM #automation #constraints
Automatic Derivation of Timing Constraints by Failure Analysis (TY, TK, CJM), pp. 195–208.
ICLPICLP-2002-DucasseL #automation #execution
Automated Analysis of CLP(FD) Program Execution Traces (MD, LL), pp. 470–471.
ICLPICLP-2002-SchrijversBD
Trailing Analysis for HAL (TS, MJGdlB, BD), pp. 38–53.
ISSTAISSTA-2002-BriandLS #contract #fault #object-oriented #using
Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
ISSTAISSTA-2002-LiangPH #precise #profiling #using
Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
ISSTAISSTA-2002-MilanovaRR #java #points-to
Parameterized object sensitivity for points-to and side-effect analyses for Java (AM, AR, BGR), pp. 1–11.
ISSTAISSTA-2002-VaysburgTK #dependence #reduction #testing
Dependence analysis in reduction of requirement based test suites (BV, LHT, BK), pp. 107–111.
SATSAT-2002-KaporisKL #algorithm #probability #satisfiability
The Probabilistic Analysis of a Greedy Satisfiability Algorithm (ACK, LMK, EGL), p. 5.
SATSAT-2002-MonassonC #algorithm #exponential #random #satisfiability #scalability
Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
ICTSSTestCom-2002-CastanetR #proving #reachability #testing #theorem proving
Generate Certified Test Cases by Combining Theorem Proving and Reachability Analysis (RC, DR), pp. 249–266.
VMCAIVMCAI-2002-CharatonikMP #composition #termination
Compositional Termination Analysis of Symbolic Forward Analysis (WC, SM, AP), pp. 109–125.
VMCAIVMCAI-2002-MurawskiY
Static Monotonicity Analysis for lambda-definable Functions over Lattices (ASM, KY), pp. 139–153.
DocEngDocEng-2001-NaF #authoring #documentation #hypermedia #petri net #using
Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
ICDARICDAR-2001-AmanoAMSS #documentation #grammarware #synthesis
Table Form Document Synthesis by Grammar-Based Structure Analysis (AA, NA, TM, TS, KS), pp. 533–539.
ICDARICDAR-2001-BlumensteinV #benchmark #database #metric #performance #segmentation
Analysis of Segmentation Performance on the CEDAR Benchmark Database (MB, BV), pp. 1142–1146.
ICDARICDAR-2001-ChaS #algorithm #classification
Apriori Algorithm for Sub-category Classification Analysis of Handwriting (SHC, SNS), pp. 1022–1025.
ICDARICDAR-2001-DaWM #classification #fuzzy
Character Preclassification Based on Fuzzy Typographical Analysis (LD, PW, BM), pp. 74–78.
ICDARICDAR-2001-GarainC #fuzzy #multi #segmentation #using
Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
ICDARICDAR-2001-HaritCGVJ #documentation #image
A Model Guided Document Image Analysis Scheme (GH, SC, PG, NV, SDJ), pp. 1137–1141.
ICDARICDAR-2001-KimLSN #encoding #performance
Analysis of Postal Address Fields for Efficient Encoding of Korean Mail Pieces (GK, SL, MS, YSN), pp. 675–679.
ICDARICDAR-2001-LiuLHY #algorithm #component #layout
A New Component Based Algorithm for Newspaper Layout Analysis (FL, YL, DH, MY), pp. 1176–1180.
ICDARICDAR-2001-LoprestiW #documentation #graph
Evaluating Document Analysis Results via Graph Probing (DPL, GTW), pp. 116–120.
ICDARICDAR-2001-MatsumotoFN #online
Collection and Analysis of On-line Handwritten Japanese Character Patterns (KM, TF, MN), pp. 496–500.
ICDARICDAR-2001-MitchellY #documentation #segmentation
Newspaper Document Analysis Featuring Connected Line Segmentation (PEM, HY), pp. 1181–1185.
ICDARICDAR-2001-PennHLM #delivery #documentation #flexibility #web
Flexible Web Document Analysis for Delivery to Narrow-Bandwidth Devices (GP, JH, HL, RTM), pp. 1074–1078.
ICDARICDAR-2001-ShinjoHMSS #recognition #recursion
A Recursive Analysis for Form Cell Recognition (HS, EH, KM, YS, HS), pp. 694–698.
ICDARICDAR-2001-WongSA01a #layout #using
Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
ICDARICDAR-2001-YangZ #html #visual notation
HTML Page Analysis Based on Visual Cues (YY, HZ), pp. 859–864.
ICDARICDAR-2001-ZanibbiBC
Baseline Structure Analysis of Handwritten Mathematics Notation (RZ, DB, JRC), pp. 768–773.
ICDARICDAR-2001-ZhouT #documentation #image #recognition
Chart Analysis and Recognition in Document Images (YPZ, CLT), pp. 1055–1058.
JCDLJCDL-2001-ChauZC #personalisation #web
Personalized spiders for web search and analysis (MC, DDZ, HC), pp. 79–87.
JCDLJCDL-2001-Khoo #community #design #overview #policy
Community design of DLESE’s collections review policy: a technological frames analysis (MK), pp. 157–164.
JCDLJCDL-2001-RauberM #automation #library
Integrating automatic genre analysis into digital libraries (AR, AMK), pp. 1–10.
CSMRCSMR-2001-PodnarM #maintenance #process #simulation #using
Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
ICSMEICSM-2001-AtkinsonG #data flow #implementation #performance #scalability #source code
Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
ICSMEICSM-2001-Chulani #modelling #quality
Bayesian Analysis of Software Cost and Quality Models (SC), p. 565–?.
ICSMEICSM-2001-EisenbarthKS #comprehension
Aiding Program Comprehension by Static and Dynamic Feature Analysis (TE, RK, DS), pp. 602–611.
ICSMEICSM-2001-MalenfantAMD #detection
Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
ICSMEICSM-2001-RotschkeKH #architecture #multi
Multi-View Architecture Trend Analysis for Medical Imaging (TR, RLK, DH), p. 107.
IWPCIWPC-2001-BassilK #overview #tool support #visualisation
Software Visualization Tools: Survey and Analysis (SB, RKK), pp. 7–17.
IWPCIWPC-2001-Stewart #automation #semantics
Automated Analysis of Scientific and Engineering Semantics (MEMS), pp. 113–114.
PASTEPASTE-2001-Hind #pointer #problem #question
Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
PASTEPASTE-2001-LiangPH #java #points-to
Extending and evaluating flow-insenstitive and context-insensitive points-to analyses for Java (DL, MP, MJH), pp. 73–79.
PASTEPASTE-2001-MockDCE #comparison #comprehension #optimisation #points-to #set
Dynamic points-to sets: a comparison with static analyses and potential applications in program understanding and optimization (MM, MD, CC, SJE), pp. 66–72.
PASTEPASTE-2001-Palsberg #type system
Type-based analysis and applications (JP), pp. 20–27.
SCAMSCAM-2001-BurdR #automation #evolution #source code #using
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAMSCAM-2001-DeruelleMBB #distributed #multi
Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
SCAMSCAM-2001-HorganPW #java #metric #profiling #runtime #source code
Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
SCAMSCAM-2001-Knight #exclamation #java #smell
Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
SCAMSCAM-2001-MaggiS #bytecode #data flow #java #using
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
SCAMSCAM-2001-Ward #approach #source code
The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
WCREWCRE-2001-CifuentesWE #debugging #decompiler #security
Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
ICALPICALP-2001-Boreale #encryption #protocol
Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
FMFME-2001-Beyer #automaton #reachability
Improvements in BDD-Based Reachability Analysis of Timed Automata (DB0), pp. 318–343.
FMFME-2001-HelkeS #behaviour #consistency #eiffel #library
Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
FLOPSFLOPS-2001-AmatoS #compilation
Abstract Compilation for Sharing Analysis (GA, FS), pp. 311–325.
FLOPSFLOPS-2001-LagoonS #framework #logic programming #source code
A Framework for Analysis of Typed Logic Programs (VL, PJS), pp. 296–310.
ICFPICFP-2001-NeubauerS #emacs #lisp
Down with Emacs Lisp: Dynamic Scope Analysis (MN, MS), pp. 38–49.
IFLIFL-2001-PenaS01a #nondeterminism
A Polynomial-Cost Non-determinism Analysis (RP, CS), pp. 121–137.
CHICHI-2001-CardPWMRSB #behaviour #graph #protocol #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
CHICHI-2001-Muller
Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
ICEISICEIS-v1-2001-SierraRLG #image #machine learning #mobile #order #recognition
Machine Learning Approaches for Image Analysis: Recognition of Hand Orders by a Mobile Robot (BS, IR, EL, UG), pp. 330–335.
ICEISICEIS-v2-2001-ArevaloCQAV #corba #design #framework #industrial #web
A CORBA and Web Technology Based Framework for the Analysis and Optimal Design of Complex Systems in the Oil Industry (CJA, JAC, NVQ, NA, JV), pp. 953–961.
ICEISICEIS-v2-2001-BohnackerDFR #automation #feedback
Automatic Analysis of Customer Feedback and Inquiries (UB, LD, JF, IR), pp. 1162–1165.
ICEISICEIS-v2-2001-FerreiraL #effectiveness #reuse
Organization of Analysis Patterns for Effective Reuse (MJF, PL), pp. 766–773.
ICEISICEIS-v2-2001-MorilloFD #named
RSHP: A Scheme to Classify Information in a Domain Analysis Environment (JLM, JMF, ID), pp. 686–690.
ICEISICEIS-v2-2001-OmelayenkoF #integration #problem
An Analysis of B2B Catalogue Integration Problems (BO, DF), pp. 945–952.
ICEISICEIS-v2-2001-ShishkovD #case study #diagrams #modelling #process
Analysis of Suitability, Appropriateness and Adequacy of Use Cases Combined with Activity Diagram for Business Systems Modelling (BS, JLGD), pp. 854–858.
CIKMCIKM-2001-Couchot #composition #set #termination
Termination Analysis of Active Rules Modular Sets (AC), pp. 326–333.
KDDKDD-2001-BerkhinBR #interactive #web
Interactive path analysis of web site traffic (PB, JDB, DJR), pp. 414–419.
KDDKDD-2001-HotzGHNW #detection #industrial
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
KDDKDD-2001-SpanglerK #knowledge base #maintenance #using
Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
MLDMMLDM-2001-SyG #approach #data mining #mining #statistics
Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data (BKS, AKG), pp. 128–140.
SEKESEKE-2001-BarrosWT #process #project management #reuse
Scenario Oriented Project Management Knowledge Reuse within a Risk Analysis Process (MdOB, CMLW, GHT), pp. 37–44.
SEKESEKE-2001-GruerHKC #design #framework #multi
A Formal Framework for Multi-Agent Systems Analysis and Design (PG, VH, AK, KC), pp. 276–282.
SEKESEKE-2001-JarzabekZ #abstraction #component #control flow #reuse
Enhacing component reuse with control flow abstraction analysis (SJ, HZ), pp. 171–178.
SEKESEKE-2001-Lopez #architecture #evaluation #framework #trade-off
Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
SIGIRSIGIR-2001-AndoL
Iterative Residual Rescaling: An Analysis and Generalization of LSI (RKA, LL), pp. 154–162.
SIGIRSIGIR-2001-ChowdhuryFGM #multi #retrieval
Analyses of Multiple-Evidence Combinations for Retrieval Strategies (AC, OF, DAG, MCM), pp. 394–395.
SIGIRSIGIR-2001-GongL #semantics #summary #using
Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
SIGIRSIGIR-2001-ZhengNJ #algorithm
Stable Algorithms for Link Analysis (AXZ, AYN, MIJ), pp. 258–266.
UMLUML-2001-DevosS #object-oriented #paradigm
The Message Paradigm in Object-Oriented Analysis (FD, ES), pp. 182–193.
UMLUML-2001-GrassiM #architecture #mobile #modelling #performance #uml
UML Modelling and Performance Analysis of Mobile Software Architectures (VG, RM), pp. 209–224.
UMLUML-2001-XuandongMYJG #diagrams #process #uml
Timing Analysis of UML Activity Diagrams (XL, CM, YP, JZ, GZ), pp. 62–75.
OOPSLAOOPSLA-2001-PechtchanskiS #framework #interprocedural
Dynamic Optimistic Interprocedural Analysis: A Framework and an Application (IP, VS), pp. 195–210.
OOPSLAOOPSLA-2001-RountevMR #constraints #java #points-to #using
Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
TOOLSTOOLS-EUROPE-2001-SevitskyPK #java #performance #source code
An Information Exploration Tool for Performance Analysis of Java Programs (GS, WDP, RK), pp. 85–101.
PADLPADL-2001-BellaB #constraints #protocol #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
PLDIPLDI-2001-AggarwalR
Related Field Analysis (AA, KHR), pp. 214–220.
PLDIPLDI-2001-ChatterjeePHL #behaviour
Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
PLDIPLDI-2001-GhiyaLS #ambiguity #c #memory management #on the #points-to #source code
On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
PLDIPLDI-2001-HeintzeT #pointer
Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
PLDIPLDI-2001-HeintzeT01a #alias #c #using
Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
PLDIPLDI-2001-VivienR #pointer
Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
POPLPOPL-2001-Monniaux #monte carlo #probability #source code
An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
POPLPOPL-2001-RehofF #polymorphism #type system
Type-base flow analysis: from polymorphic subtyping to CFL-reachability (JR, MF), pp. 54–66.
PPDPPPDP-2001-ChangJ #constraints #java
Granularity of Constraint-Based Analysis for Java (BMC, JWJ), pp. 94–102.
QAPLQAPL-2001-ClarkHM
Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
QAPLQAPL-2001-Fruhwirth #automation #complexity #concurrent #source code
As Time Goes By II: More Automatic Complexity Analysis of Concurrent Rule Programs (TWF), pp. 185–206.
SASSAS-2001-BagnaraGHZ #constraints
Finite-Tree Analysis for Constraint Logic-Based Languages (RB, RG, PMH, EZ), pp. 165–184.
SASSAS-2001-DorRS #c #integer #source code #string
Cleanness Checking of String Manipulations in C Programs via Integer Analysis (ND, MR, SS), pp. 194–212.
SASSAS-2001-GlynnSS #constraints #effectiveness #strict
Effective Strictness Analysis with HORN Constraints (KG, PJS, MS), pp. 73–92.
SASSAS-2001-GordonJ #protocol #security
A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
SASSAS-2001-Goubault #float #precise
Static Analyses of the Precision of Floating-Point Operations (EG), pp. 234–259.
SASSAS-2001-LiangH #interprocedural #performance #pointer
Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses (DL, MJH), pp. 279–298.
SASSAS-2001-Lu #logic programming #source code
Parameterizing a Groundness Analysis of Logic Programs (LL), pp. 146–164.
SASSAS-2001-Monniaux #probability #source code #termination
An Abstract Analysis of the Probabilistic Termination of Programs (DM), pp. 111–126.
SASSAS-2001-Rinard #parallel #source code #thread
Analysis of Multithreaded Programs (MCR), pp. 1–19.
SASSAS-2001-Spoto #composition #semantics
Watchpoint Semantics: A Tool for Compositional and Focussed Static Analyses (FS), pp. 127–145.
RERE-2001-ChengC #formal method #modelling #requirements
Integrating Informal and Formal Approaches to Requirements Modeling and Analysis (BHCC, LAC), pp. 294–295.
RERE-2001-FarbeyF
Software Acquisition: A Business Strategy Analysis (BF, AF), pp. 76–83.
RERE-2001-InOR #modelling #multi #requirements
A Requirements Negotiation Model Based on Multi-Criteria Analysis (HI, DO, TR), pp. 312–313.
ASEASE-2001-ZarrasI #automation #enterprise #information management #performance #reliability
Automating the Performance and Reliability Analysis of Enterprise Information Systems (AZ, VI), pp. 350–353.
FSEESEC-FSE-2001-EdvardssonK #constraints #generative #testing #theorem proving
Analysis of the constraint solver in UNA based test data generation (JE, MK), pp. 237–245.
ICSEICSE-2001-Campbell #diagrams #uml #visualisation
Visualizaiton an Interpretation of Analysis Results within the Context of Formalized UML Diagrams (LAC), pp. 785–786.
ICSEICSE-2001-CobleighCO #algorithm #data flow #finite #verification
The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification (JMC, LAC, LJO), pp. 37–46.
ICSEICSE-2001-DickinsonLP #clustering #execution
Finding Failures by Cluster Analysis of Execution Profiles (WD, DL, AP), pp. 339–348.
ICSEICSE-2001-DillonS #graph #specification #using
Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
ICSEICSE-2001-FioravantiMN #object-oriented #re-engineering
Reengineering Analysis of Object-Oriented Systems via Duplication (FF, GM, PN), pp. 577–586.
ICSEICSE-2001-JhaW #network
Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
ICSEICSE-2001-MenziesPH #diagrams #formal method #performance #requirements
Fast Formal Analysis of Requirements via “Topoi Diagrams” (TM, JDP, MEH), pp. 391–400.
ICSEICSE-2001-NordPSH #architecture #design #effectiveness #uml
Effective Software Architecture Design: From Global Analysis to UML Descriptions (RLN, DJP, DS, CH), pp. 741–742.
ICSEICSE-2001-OvermyerLR #concept #modelling #using
Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
ICSEICSE-2001-RiccaT #testing #web
Analysis and Testing of Web Applications (FR, PT), pp. 25–34.
ICSEICSE-2001-SmithOB #architecture #component #mining #product line #re-engineering
Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
ICSEICSE-2001-StirewaltD #approach #component #formal method #tool support
A Component-Based Approach to Building Formal Analysis Tools (KS, LKD), pp. 167–176.
SACSAC-2001-BaroneBVM #algorithm #approximate #problem
An approximation algorithm for the shortest common supersequence problem: an experimental analysis (PB, PB, GDV, GM), pp. 56–60.
SACSAC-2001-ChangJYC #exception #interprocedural #java
Interprocedural exception analysis for Java (BMC, JWJ, KY, KMC), pp. 620–625.
SACSAC-2001-GuPH #data type #database #design #image #query
Design and analysis of data structures for querying image databases (YG, BP, KAH), pp. 236–241.
SACSAC-2001-LiPJ
Analysis of dynamic movement-based location update scheme (JL, YP, XJ), pp. 368–372.
SACSAC-2001-MinFO #adaptation #network
Analysis of adaptive wormhole-routed torus networks with IPP input traffic (GM, JDF, MOK), pp. 494–498.
SACSAC-2001-ShahrabiOM #adaptation
Unicast-based broadcast: an analysis for the hypercube with adaptive routing (AS, MOK, LMM), pp. 489–493.
CCCC-2001-Engelen #compilation #optimisation #performance
Efficient Symbolic Analysis for Optimizing Compilers (RvE), pp. 118–132.
CCCC-2001-MartenaP #alias #model checking
Alias Analysis by Means of a Model Checker (VM, PSP), pp. 3–19.
CCCC-2001-RinetzkyS #interprocedural #recursion #source code
Interprocedural Shape Analysis for Recursive Programs (NR, SS), pp. 133–149.
CCCC-2001-RountevR #library #points-to #source code
Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries (AR, BGR), pp. 20–36.
DACDAC-2001-AjamiBPG #performance
Analysis of Non-Uniform Temperature-Dependent Interconnect Performance in High Performance ICs (AHA, KB, MP, LPPPvG), pp. 567–572.
DACDAC-2001-ArunachalamBP #interactive
False Coupling Interactions in Static Timing Analysis (RA, RDB, LTP), pp. 726–731.
DACDAC-2001-BaiBH #power management
Static Timing Analysis Including Power Supply Noise Effect on Propagation Delay in VLSI Circuits (GB, SB, INH), pp. 295–300.
DACDAC-2001-BanerjeeM #distributed #novel #optimisation #performance #using
Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
DACDAC-2001-ChenC #grid #performance #power management #scalability
Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
DACDAC-2001-DanielSW #performance #using
Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
DACDAC-2001-GalaBWZZ #design
Inductance 101: Analysis and Design Issues (KG, DB, JW, VZ, MZ), pp. 329–334.
DACDAC-2001-GorenSW #novel #pipes and filters #probability
A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
DACDAC-2001-LiouCKK #performance #probability #statistics
Fast Statistical Timing Analysis By Probabilistic Event Propagation (JJL, KTC, SK, AK), pp. 661–666.
DACDAC-2001-MassoudKMW #difference #induction #modelling
Modeling and Analysis of Differential Signaling for Minimizing Inductive Cross-Talk (YM, JK, DM, JW), pp. 804–809.
DACDAC-2001-MathurS #precise #using
Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
DACDAC-2001-McDonaldB #simulation #using
Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
DACDAC-2001-NandiM #design #embedded #performance
System-Level Power/Performance Analysis for Embedded Systems Design (AN, RM), pp. 599–604.
DACDAC-2001-SchenkelPZSGA #optimisation
Mismatch Analysis and Direct Yield Optimization by Spec-Wise Linearization and Feasibility-Guided Search (FS, MP, SZ, RS, HEG, KA), pp. 858–863.
DACDAC-2001-ShinKL #energy #scheduling #using
Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
DACDAC-2001-VerhaegenG #linear #performance #scalability
Efficient DDD-based Symbolic Analysis of Large Linear Analog Circuits (WV, GGEG), pp. 139–144.
DACDAC-2001-XiaoM #correlation #functional #identification
Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
DACDAC-2001-ZhouSN #fixpoint
Timing Analysis with Crosstalk as Fixpoints on Complete Lattice (HZ, NVS, WN), pp. 714–719.
DATEDATE-2001-BensoCNP #distributed #fault #injection #open source
SEU effect analysis in an open-source router via a distributed fault injection environment (AB, SDC, GDN, PP), pp. 219–225.
DATEDATE-2001-DoboliV #network #scalability
A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
DATEDATE-2001-FioriM
Analysis of EME produced by a microcontroller operation (FF, FM), pp. 341–347.
DATEDATE-2001-HsiehCP #simulation
Microprocessor power analysis by labeled simulation (CTH, LC, MP), pp. 182–189.
DATEDATE-2001-JungYC #multi #performance
Performance improvement of multi-processor systems cosimulation based on SW analysis (JJ, SY, KC), pp. 749–753.
DATEDATE-2001-KoranneG #automation #geometry #layout #on the
On automatic analysis of geometrically proximate nets in VSLI layout (SK, OPG), p. 818.
DATEDATE-2001-KralicekJG #modelling
Modeling electromagnetic emission of integrated circuits for system analysis (PK, WJ, HG), pp. 336–340.
DATEDATE-2001-MarculescuN #modelling #probability
Probabilistic application modeling for system-level perfromance analysis (RM, AN), pp. 572–579.
DATEDATE-2001-NayakHCB #automation #fault #hardware #matlab #precise #synthesis
Precision and error analysis of MATLAB applications during automated hardware synthesis for FPGAs (AN, MH, ANC, PB), pp. 722–728.
DATEDATE-2001-OlbrichRB #algorithm #classification
An improved hierarchical classification algorithm for structural analysis of integrated circuits (MO, AR, EB), p. 807.
DATEDATE-2001-Zhu01a #memory management #pointer
Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
HPDCHPDC-2001-WuB #architecture #parallel
Parallel Retrograde Analysis on Different Architecture (RW, DFB), pp. 356–362.
LCTESLCTES-OM-2001-UnnikrishnanSL #automation #garbage collection #memory management
Automatic Accurate Live Memory Analysis for Garbage-Collected Languages (LU, SDS, YAL), pp. 102–111.
LCTESLCTES-OM-2001-VivancosHMW #parametricity
Parametric Timing Analysis (EV, CAH, FM, DBW), pp. 88–93.
LCTESLCTES-OM-2001-ZiegenbeinWRJE #process
Interval-Based Analysis of Software Processes (DZ, FW, KR, MJ, RE), pp. 94–101.
PDPPDP-2001-Appelt #what
What Groupware Functionality Do Users Really Use? Analysis of the Usage of the BSCW System (WA), p. 337–?.
PDPPDP-2001-StuartBW #visualisation
Information Visualisation in Numerical Analysis (EJS, DWB, JSW), pp. 250–257.
PPoPPPPoPP-2001-InoFH #named #parallel
LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
PPoPPPPoPP-2001-KimOEFV #execution #framework #optimisation
Reference idempotency analysis: a framework for optimizing speculative execution (SWK, ClO, RE, BF, TNV), pp. 2–11.
PPoPPPPoPP-2001-SalcianuR #parallel #pointer #source code #thread
Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
PPoPPPPoPP-2001-VetterM #communication #distributed #scalability #statistics
Statistical scalability analysis of communication operations in distributed applications (JSV, MOM), pp. 123–132.
ESOPESOP-2001-GenaimC #approach #dependence
The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
ESOPESOP-2001-Mitchell #calculus #polynomial #probability #process #protocol #security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
ESOPESOP-2001-NielsonS #control flow #polynomial
Control-Flow Analysis in Cubic Time (FN, HS), pp. 252–268.
ESOPESOP-2001-Weirich #encoding
Encoding Intensional Type Analysis (SW), pp. 92–106.
FASEFASE-2001-OlveczkyKMTZ #maude #network #protocol #realtime #specification
Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
FASEFASE-2001-SharyginaBK #design #object-oriented #reliability #verification
A Formal Object-Oriented Analysis for Software Reliability: Design for Verification (NS, JCB, RPK), pp. 318–332.
FoSSaCSFoSSaCS-2001-JensenS #abstract interpretation #object-oriented #source code
Class Analysis of Object-Oriented Programs through Abstract Interpretation (TPJ, FS), pp. 261–275.
STOCSTOC-2001-AzarFKMS
Spectral analysis of data (YA, AF, ARK, FM, JS), pp. 619–626.
STOCSTOC-2001-SpielmanT #algorithm #polynomial #why
Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time (DAS, SHT), pp. 296–305.
TACASTACAS-2001-Castillo #modelling #state machine #tool support #validation
The ASM Workbench — A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models Tool Demonstration (GDC), pp. 578–581.
TACASTACAS-2001-RiccaT #problem #testing #web
Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions (FR, PT), pp. 373–388.
TACASTACAS-2001-RuysLKLM #algebra #partial order #probability #process #using
First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
TACASTACAS-2001-SouterWSP #named #testing
TATOO: Testing and Analysis Tool for Object- Oriented Software (ALS, TMW, SAS, LLP), pp. 389–403.
CAVCAV-2001-AlurEY #recursion #state machine
Analysis of Recursive State Machines (RA, KE, MY), pp. 207–220.
CAVCAV-2001-AnnichiniBS #named #reachability
TReX: A Tool for Reachability Analysis of Complex Systems (AA, AB, MS), pp. 368–372.
CAVCAV-2001-Dang #automaton #reachability
Binary Reachability Analysis of Pushdown Timed Automata with Dense Clocks (ZD), pp. 506–518.
ICLPICLP-2001-CodishGSS
Higher-Precision Groundness Analysis (MC, SG, HS, PJS), pp. 135–149.
IJCARIJCAR-2001-Jones #graph #termination
Program Termination Analysis by Size-Change Graphs (NDJ), pp. 1–4.
LICSLICS-2001-MitchellRST #calculus #probability #process #protocol #security
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
ICSTSAT-2001-CoccoM #backtracking #physics #random #satisfiability #statistics
Statistical physics analysis of the backtrack resolution of random 3-SAT instances (SC, RM), pp. 36–47.
DL-2000-FeketeD #comprehension #documentation #named #social #visualisation
Compus: visualization and analysis of structured documents for understanding social life in the 16th century (JDF, ND), pp. 47–55.
DL-2000-YaoKEN #architecture #using
Asynchronous information space analysis architecture using content and structure-based service brokering (KTY, IYK, RE, RN), pp. 133–142.
TPDLECDL-2000-LeeSBMMO #implementation #interface #video
Implementation and Analysis of Several Keyframe-Based Browsing Interfaces to Digital Video (HL, AFS, CB, NM, SM, NEO), pp. 206–218.
TPDLECDL-2000-MahouiC #comparative #transaction
A Comparative Transaction Log Analysis of Two Computing Collections (MM, SJC), pp. 418–423.
HTHT-2000-Neumuller #tool support
A semiotic analysis of iMarketing tools (MN), pp. 238–239.
HTHT-2000-PohlP #authoring #documentation #hypermedia #process
Analysis of the authoring process of hypertext documents (MP, PP), pp. 240–241.
HTHT-2000-YooB
Finding linking opportunities through relationship-based analysis (JY, MB), pp. 181–190.
PODSPODS-2000-Lynch #adaptation
Analysis and Application of Adaptive Sampling (JFL), pp. 260–267.
VLDBVLDB-2000-CarusoCGLM #database #quality
Telcordia’s Database Reconciliation and Data Quality Analysis Tool (FC, MC, UG, GL, PM), pp. 615–618.
CSEETCSEET-2000-CybulskiL #design #education #multi #using
Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
ITiCSEITiCSE-2000-Abi-Raad #exclamation
Systems analysis with attitude! (MAR), pp. 57–60.
CSMRCSMR-2000-AbreuPS #approach #clustering #composition #object-oriented
A Coupling-Guided Cluster Analysis Approach to Reengineer the Modularity of Object-Oriented Systems (FBeA, GP, PMAS), pp. 13–22.
ICSMEICSM-2000-HuMDL #c #c++ #compilation #execution #symbolic computation #using
C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
ICSMEICSM-2000-KimbleW #source code
An Alternative Source Code Analysis (JEKJ, LJW), pp. 64–75.
ICSMEICSM-2000-RiccaT #evolution #web
Web Site Analysis: Structure and Evolution (FR, PT), p. 76–?.
IWPCIWPC-2000-JahnkeNW #automation #component #embedded #quality
Automated Quality Analysis of Component Software for Embedded Systems (JHJ, JN, JPW), pp. 18–26.
IWPCIWPC-2000-PowerM #context-free grammar
Metric-Based Analysis of Context-Free Grammars (JFP, BAM), pp. 171–178.
WCREWCRE-2000-BurdBD #evolution #process
Studying the Process of Software Change: An Analysis of Software Evolution (EB, SB, JD), pp. 232–239.
ICALPICALP-2000-FocardiGM #encryption #protocol
Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
IFMIFM-2000-BryansBBD #design #specification
Specification and Analysis of Automata-Based Designs (JB, LB, HB, JD), pp. 176–193.
RTARTA-2000-OhlebuschCM #logic programming #named #source code #termination
TALP: A Tool for the Termination Analysis of Logic Programs (EO, CC, CM), pp. 270–273.
ICFPICFP-2000-TrifonovSS #reflexive
Fully reflexive intensional type analysis (VT, BS, ZS), pp. 82–93.
IFLIFL-2000-GustavssonS #bound #morphism #polymorphism #type system
A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
IFLIFL-2000-PenaS #nondeterminism
Non-determinism Analysis in a Parallel-Functional Language (RP, CS), pp. 1–18.
CHICHI-2000-Balter #email
Keystroke level analysis of email message organization (OB), pp. 105–112.
CAiSECAiSE-2000-Wohed #concept #information management #reuse
Conceptual Patterns for Reuse in Information Systems Analysis (PW), pp. 157–175.
ICEISICEIS-2000-Feng
The Need for an “Information Analysis” Stage for ISD (JF), pp. 275–281.
ICEISICEIS-2000-OFlahertyW #bibliography #intranet
Intranet Adoption: A Survey Analysis (BO, HW), pp. 429–434.
ICEISICEIS-2000-Wagner00a #design #enterprise #information management
Agent-Oriented Analysis and Design of Enterprise Information Systems (GW), pp. 85–89.
CIKMCIKM-2000-StojanovicDS #framework #query #visual notation
Visual Query and Analysis Tool of the Object-Relational GIS Framework (ZS, SDK, DS), pp. 328–335.
ICMLICML-2000-NomotoM #automation
Comparing the Minimum Description Length Principle and Boosting in the Automatic Analysis of Discourse (TN, YM), pp. 687–694.
ICMLICML-2000-OkamotoY #algorithm #nearest neighbour
Generalized Average-Case Analyses of the Nearest Neighbor Algorithm (SO, NY), pp. 695–702.
ICPRICPR-v1-2000-Abrantes #algorithm #clustering #multi
A Constrained Clustering Algorithm for Shape Analysis with Multiple Features (AJA), pp. 1912–1919.
ICPRICPR-v1-2000-BasuS
Analysis of Cylindrical Stereo Imaging (AB, HS), pp. 1366–1369.
ICPRICPR-v1-2000-FontaineMP #segmentation
Unsupervised Segmentation Based on Connectivity Analysis (MF, LM, JGP), pp. 1660–1663.
ICPRICPR-v1-2000-Kanatani #3d #re-engineering #reliability
Gauge-Based Reliability Analysis of 3-D Reconstruction from Two Uncalibrated Perspective Views (KiK), pp. 1076–1079.
ICPRICPR-v1-2000-KawasakiIS #image
EPI Analysis of Omni-Camera Image (HK, KI, MS), pp. 1379–1383.
ICPRICPR-v1-2000-KornDH #approach #image #independence
Weather Independent Flight Guidance: Analysis of MMW Radar Images for Approach and Landing (BK, HUD, PH), pp. 1350–1353.
ICPRICPR-v1-2000-KruizingaP
A Nonlinear Texture Operator Specialized in the Analysis of Dot-Patterns (PK, NP), pp. 1197–1201.
ICPRICPR-v1-2000-KuboNEKKMOKNMY #image
Extraction of Pulmonary Fissures from HRCT Images Based on Surface Curvatures Analysis and Morphology Filters (MK, NN, KE, MK, MK, NM, HO, RK, HN, KM, AY), pp. 1490–1493.
ICPRICPR-v1-2000-Louchet #evolution #using
Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
ICPRICPR-v1-2000-Mitchell #documentation #layout #segmentation #using
Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
ICPRICPR-v1-2000-PalettaPP #learning #recognition #using
Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
ICPRICPR-v1-2000-SuzukiSAO #image
Dynamic Shadow Compensation of Aerial Images Based on Color and Spatial Analysis (AS, AS, HA, SO), pp. 1317–1320.
ICPRICPR-v2-2000-ChenW #segmentation #string #using
Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
ICPRICPR-v2-2000-FyfeL #canonical #correlation #network
Canonical Correlation Analysis Neural Networks (CF, PLL), pp. 2977–2980.
ICPRICPR-v2-2000-GhaderiW
Circular ECOC: A Theoretical and Experimental Analysis (RG, TW), pp. 2203–2206.
ICPRICPR-v2-2000-HiraokaHHMMY #algorithm #learning #linear
Successive Learning of Linear Discriminant Analysis: Sanger-Type Algorithm (KH, KiH, MH, HM, TM, SY), pp. 2664–2667.
ICPRICPR-v2-2000-LiLT #cumulative #image
Image Analysis by Accumulative Hopfield Matching (WJL, TL, HTT), pp. 2442–2445.
ICPRICPR-v2-2000-MenardDC #ambiguity #distance #modelling #using
Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
ICPRICPR-v2-2000-PerantonisPV #classification #component #paradigm #using
Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
ICPRICPR-v2-2000-Schulerud #bias #fault #feature model #linear
Bias of Error Rates in Linear Discriminant Analysis Caused by Feature Selection and Sample Size (HS), pp. 2372–2377.
ICPRICPR-v2-2000-UnsalanE #linear
Shapes of Features and a Modified Measure for Linear Discriminant Analysis (, AE), pp. 2410–2413.
ICPRICPR-v2-2000-Zhao00a #performance
Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
ICPRICPR-v2-2000-Zhao00b #component #recognition
Discriminant Component Analysis for Face Recognition (WYZ), pp. 2818–2821.
ICPRICPR-v3-2000-ChoiL #distance
Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
ICPRICPR-v3-2000-DoelVHVYGK #metric
Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis (LRVdD, LJvV, KTH, MJV, ITY, FG, JGK), pp. 3057–3062.
ICPRICPR-v3-2000-FukuiIIW #component #using
Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
ICPRICPR-v3-2000-Garcia-SevillaP #case study #comparative
Analysis of Irregularly Shaped Texture Regions: A Comparative Study (PGS, MP), pp. 7080–7083.
ICPRICPR-v3-2000-HuangCH00a #2d #pseudo
Local Spectra Features Extraction Based-On 2D Pseudo-Wigner Distribution for Texture Analysis (ZH, KLC, YH), pp. 3925–3928.
ICPRICPR-v3-2000-LiK #ambiguity #detection
Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
ICPRICPR-v3-2000-LuM #symmetry
Computer Analysis of Rotational Symmetry in CBED Patterns (QY, HL, SM), pp. 3754–3757.
ICPRICPR-v3-2000-PagetL #markov #parametricity #random #testing
Nonparametric Markov Random Field Model Analysis of the MeasTex Test Suite (RP, IDL), pp. 3939–3942.
ICPRICPR-v3-2000-Rahmann #geometry #image
Polarization Images: A Geometric Interpretation for Shape Analysis (SR), pp. 3542–3546.
ICPRICPR-v3-2000-ValdesME #behaviour #case study #image
Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
ICPRICPR-v3-2000-VassZ #component #fault #image #performance
Enhanced Significance-Linked Connected Component Analysis for High Performance Error Resilient Wavelet Image Coding (JV, XZ), pp. 3075–3078.
ICPRICPR-v3-2000-WilkinsonRDB #using
Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
ICPRICPR-v3-2000-ZhangGST #adaptation #modelling #using
Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
ICPRICPR-v4-2000-KawataNOKKKMMNE
Computerized Analysis of Pulmonary Nodules in Topological and Histogram Feature Spaces (YK, NN, HO, RK, MK, MK, NM, KM, HN, KE), pp. 4332–4335.
ICPRICPR-v4-2000-KopilovicVS #detection #lens
Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
ICPRICPR-v4-2000-Leavers #using
Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
ICPRICPR-v4-2000-OkunP #automation #documentation #evaluation #generative #layout
Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
ICPRICPR-v4-2000-RyuLK #documentation #geometry #independence #layout
Parameter-Independent Geometric Document Layout Analysis (DSR, SWL, SMK), pp. 4397–4400.
ICPRICPR-v4-2000-WatanabeOIK #video
Discourse Structure Analysis for News Video by Checking Surface Information in the Transcript (YW, YO, EI, SK), pp. 4242–4245.
ICPRICPR-v4-2000-WatanabeS #documentation #layout
Layout Analysis of Complex Documents (TW, TS), pp. 4447–4450.
ICPRICPR-v4-2000-XuGMC #performance #retrieval
Performance Analysis in Content-Based Retrieval with Textures (KX, BG, PM, DC), pp. 4275–4278.
ICPRICPR-v4-2000-Zheng #flexibility
A Flexible Laser Range Sensor Based on Spatial-temporal Analysis (JYZ), pp. 4740–4743.
KDDKDD-2000-TalbertF #empirical
An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
SPLCSPLC-2000-KishiN #architecture #aspect-oriented #product line
Aspect-oriented analysis for product line architecture (TK, NN), pp. 135–146.
UMLUML-2000-PickinM #uml
Describing AI Analysis Patterns with UML (SP, AMR), pp. 466–481.
OOPSLAOOPSLA-2000-LujanFG #algebra #design #linear #named #object-oriented
OoLALA: an object oriented analysis and design of numerical linear algebra (ML, TLF, JRG), pp. 229–252.
TOOLSTOOLS-ASIA-2000-YeDD #design #development #object-oriented
Application of Object-Oriented Analysis and Design in CDMA BSS Development (WY, YD, WD), pp. 73–80.
TOOLSTOOLS-ASIA-2000-YuSYM #object-oriented
Improving Object Oriented Analysis by Explicit Change Analysis (LY, CKS, XY, YM), pp. 2–7.
TOOLSTOOLS-USA-2000-LeeOA #algorithm #object-oriented
Algorithmic Analysis of the Impacts of Changes to Object-Oriented Software (ML, AJO, RTA), pp. 61–70.
TOOLSTOOLS-USA-2000-YacoubA #approach #composition #design pattern
Pattern-Oriented Analysis and Design (POAD): A Structural Composition Approach to Glue Design Patterns (SMY, HHA), p. 273–?.
AdaEuropeAdaEurope-2000-BliebergerBS #ada #data flow #detection #source code
Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
AdaEuropeAdaEurope-2000-MauriS #embedded #reliability #safety #using
Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
AdaEuropeAdaEurope-2000-Ringler #execution #source code #worst-case
Static Worst-Case Execution Time Analysis of Synchronous Programs (TR), pp. 56–68.
AdaEuropeAdaEurope-2000-Schmitt #ada #design #framework #implementation #object-oriented
Analysis, Design and Implementation of an Object-Oriented Framework in Ada95 (DS), pp. 196–210.
GPCEGCSE-2000-Bruin #component #composition
Scenario-Based Analysis of Component Compositions (HdB), pp. 129–146.
LOPSTRLOPSTR-2000-BuenoBHMPS #compilation #optimisation
A model for inter-module analysis and optimizing compilation (FB, MJGdlB, MVH, KM, GP, PJS).
LOPSTRLOPSTR-2000-SerebrenikS #logic programming #source code #termination
Non-tranformational termination analysis of logic programs, based on general term-orderings (AS, DDS).
LOPSTRLOPSTR-2000-VanhoofB #composition #higher-order #towards
Towards a modular binding-time analysis for higher-order Mercury (WV, MB).
LOPSTRLOPSTR-J-2000-BuenoBHMPS #compilation #optimisation
A Model for Inter-module Analysis and Optimizing Compilation (FB, MJGdlB, MVH, KM, GP, PJS), pp. 86–102.
LOPSTRLOPSTR-J-2000-SerebrenikS #logic programming #source code #termination
Non-transformational Termination Analysis of Logic Programs, Based on General Term-Orderings (AS, DDS), pp. 69–85.
PADLPADL-2000-HuCT #algorithm #data mining #mining
Calculating a New Data Mining Algorithm for Market Basket Analysis (ZH, WNC, MT), pp. 169–184.
PEPMPEPM-2000-LeviS #linear #refinement
Non Pair-Sharing and Freeness Analysis Through Linear Refinement (GL, FS), pp. 52–61.
PEPMPEPM-2000-ScholzBF #detection #memory management #pointer
Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
PLDIPLDI-2000-ChengH #composition #design #evaluation #implementation #interprocedural #pointer #using
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-Das #pointer
Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
PLDIPLDI-2000-FahndrichRD #constraints #scalability #using
Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
PLDIPLDI-2000-GhemawatRS #interprocedural #low cost
Field analysis: getting useful and low-cost interprocedural information (SG, KHR, DJS), pp. 334–344.
PLDIPLDI-2000-LinP #compilation #memory management
Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
PLDIPLDI-2000-RouhtevC #points-to #scalability
Off-line variable substitution for scaling points-to analysis (AR, SC), pp. 47–56.
PLDIPLDI-2000-RuginaR #array #bound #memory management #pointer
Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
PLDIPLDI-2000-StephensonBA #compilation
Bitwidth analysis with application to silicon compilation (MS, JB, SPA), pp. 108–120.
POPLPOPL-2000-HeintzeJV #framework #verification
A Framework for Combining Analysis and Verification (NH, JJ, RV), pp. 26–39.
POPLPOPL-2000-MuthD #complexity #data flow #on the
On the Complexity of Flow-Sensitive Dataflow Analyses (RM, SKD), pp. 67–80.
POPLPOPL-2000-NielsonN #mobile
Shape Analysis for Mobile Ambients (HRN, FN), pp. 142–154.
PPDPPPDP-2000-BagnaraZH #evaluation
Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
PPDPPPDP-2000-CalcagnoIO #alias #hoare #logic #pointer #semantics
Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
PPDPPPDP-2000-Lu #logic programming #precise #source code
A precise type analysis of logic programs (LL), pp. 214–225.
SASSAS-2000-ClarkHH #graph grammar #safety #strict
Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
SASSAS-2000-Feret #mobile
Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
SASSAS-2000-FinkKS #array
Unified Analysis of Array and Object References in Strongly Typed Languages (SJF, KK, VS), pp. 155–174.
SASSAS-2000-FosterFA #c #points-to #polymorphism
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C (JSF, MF, AA), pp. 175–198.
SASSAS-2000-Lev-AmiS #implementation #named
TVLA: A System for Implementing Static Analyses (TLA, SS), pp. 280–301.
SASSAS-2000-Saidi #abstraction #model checking
Model Checking Guided Abstraction and Analysis (HS), pp. 377–396.
SASSAS-2000-Scozzari #abstract domain #semantics
Abstract Domains for Sharing Analysis by Optimal Semantics (FS), pp. 397–412.
SASSAS-2000-UngureanuJ #concurrent #java
Concurrency Analysis for Java (CU, SJ), pp. 413–432.
REICRE-2000-AlcazarM #framework #process #requirements #specification
A Process Framework for Requirements Analysis and Specification (EGA, AM), p. 27–?.
REICRE-2000-DayJ #framework #multi #requirements #specification
A Framework for Multi-Notation Requirements Specification and Analysis (NAD, JJJ), pp. 39–48.
REICRE-2000-KnottMP #behaviour #modelling #object-oriented #process #using
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
ASEASE-2000-HillL
Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
ASEASE-2000-MorisioTS #uml
Extending UML to Support Domain Analysis (MM, GT, MES), pp. 321–324.
ASEASE-2000-SouzaFGW #design #object-oriented
A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
ICSEFoSE-2000-JacksonR #roadmap
Software analysis: a roadmap (DJ, MCR), pp. 133–145.
ICSEICSE-2000-AndrewsZ
Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
ICSEICSE-2000-GannodL #approach #architecture #product line
An approach to architectural analysis of product lines (GCG, RRL), pp. 548–557.
ICSEICSE-2000-LeszakPS #case study #fault
A case study in root cause defect analysis (ML, DEP, DS), pp. 428–437.
ICSEICSE-2000-LiangH #performance
Light-weight context recovery for efficient and accurate program analyses (DL, MJH), pp. 366–375.
SACSAC-2000-AlhamedL #approach #clustering #multi #using
A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
SACSAC-2000-BaldwinMP #feature model #semantics
Semantic Discrimination Analysis for Feature Selection (JFB, TPM, CP), pp. 519–523.
SACSAC-2000-BodlaenderRS #design #named
TRAnD: Temporal Requirement Analysis and Design Tool (MPB, AHLR, PDVvdS), pp. 882–886.
SACSAC-2000-BoujarwahSA #data flow #java #source code #testing #using
Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
SACSAC-2000-LenartSG #constant
SSA-based Flow-sensitive Type Analysis: Combining Constant and Type Propagation (AL, CS, SKSG), pp. 813–817.
ASPLOSASPLOS-2000-RedstoneEL #architecture #behaviour #operating system #parallel #thread
An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
CCCC-2000-GayS #performance #source code #stack
Fast Escape Analysis and Stack Allocation for Object-Based Programs (DG, BS), pp. 82–93.
CCCC-2000-LinP #array #compilation #optimisation
Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
CCCC-2000-WilhelmSR
Shape Analysis (RW, SS, TWR), pp. 1–17.
DACDAC-2000-ArunachalamRP #named
TACO: timing analysis with coupling (RA, KR, LTP), pp. 266–269.
DACDAC-2000-CarloniS #latency #optimisation #performance
Performance analysis and optimization of latency insensitive systems (LPC, ALSV), pp. 361–367.
DACDAC-2000-ChaudhryBPE
Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
DACDAC-2000-DickLRJ #embedded #operating system
Power analysis of embedded operating systems (RPD, GL, AR, NKJ), pp. 312–315.
DACDAC-2000-FinF #simulation
A Web-CAD methodology for IP-core analysis and simulation (AF, FF), pp. 597–600.
DACDAC-2000-GalaZPYWB #modelling
On-chip inductance modeling and analysis (KG, VZ, RP, BY, JW, DB), pp. 63–68.
DACDAC-2000-Hassoun #bound #using
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-JainMMWL #canonical #complexity #composition #graph #how
Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
DACDAC-2000-KahngMS #on the
On switch factor based analysis of coupled RC interconnects (ABK, SM, ES), pp. 79–84.
DACDAC-2000-LevyBBDGOOSZ #design #named
ClariNet: a noise analysis tool for deep submicron design (RL, DB, GB, AD, AG, CO, BO, SS, VZ), pp. 233–238.
DACDAC-2000-LevySMW #performance
A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
DACDAC-2000-PiS #approach #diagrams #multi
Multi-terminal determinant decision diagrams: a new approach to semi-symbolic analysis of analog integrated circuits (TP, CJRS), pp. 19–22.
DACDAC-2000-ShepardK
Static noise analysis for digital integrated circuits in partially-depleted silicon-on-insulator technology (KLS, DJK), pp. 239–242.
DACDAC-2000-ShinKC #embedded #multi #performance #realtime
Schedulability-driven performance analysis of multiple mode embedded real-time systems (YS, DK, KC), pp. 495–500.
DACDAC-2000-SomasekharCRYD
Dynamic noise analysis in precharge-evaluate circuits (DS, SHC, KR, YY, VD), p. 243.
DACDAC-2000-SouriBMS #design #motivation #multi #performance
Multiple Si layer ICs: motivation, performance analysis, and design implications (SJS, KB, AM, KS), pp. 213–220.
DACDAC-2000-WangN #linear #multi #order
Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
DACDAC-2000-ZhaoPSECB #network
Hierarchical analysis of power distribution networks (MZ, RP, SSS, TE, RC, DB), pp. 150–155.
DATEDATE-2000-Balarin #abstraction #automation #worst-case
Automatic Abstraction for Worst-Case Analysis of Discrete Systems (FB), pp. 494–501.
DATEDATE-2000-CarlettaPN #detection #fault #using
Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
DATEDATE-2000-GuerraRFR #approach #scalability
A Hierarchical Approach for the Symbolic Analysis of Large Analog Integrated Circuits (OG, ER, FVF, ÁRV), pp. 48–52.
DATEDATE-2000-GuptaGMC #program transformation #programmable
Analysis of High-Level Address Code Transformations for Programmable Processors (SG, RKG, MM, FC), pp. 9–13.
DATEDATE-2000-HergenhanR #architecture #embedded
Static Timing Analysis of Embedded Software on Advanced Processor Architectures (AH, WR), pp. 552–559.
DATEDATE-2000-PopEP #distributed #embedded #optimisation #scheduling
Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
DATEDATE-2000-RingeLB
Static Timing Analysis Taking Crosstalk into Account (MR, TL, EB), pp. 451–455.
DATEDATE-2000-SugiharaYD #approach
Analysis and Minimization of Test Time in a Combined BIST and External Test Approach (MS, HY, HD), pp. 134–140.
HPCAHPCA-2000-BoschSSRH #case study #parallel #performance #using #visualisation
Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
HPCAHPCA-2000-HaungsSF #branch #classification #metric
Branch Transition Rate: A New Metric for Improved Branch Classification Analysis (MH, PS, MKF), pp. 241–250.
LCTESLCTES-2000-Kastner #named #optimisation
PROPAN: A Retargetable System for Postpass Optimisations and Analyses (DK), pp. 63–80.
PDPPDP-2000-TambourisS #component #parallel #scalability
Scalability analysis of parallel systems with multiple components of work (ET, PVS), pp. 182–189.
ESOPESOP-2000-HoweK #implementation
Implementing Groundness Analysis with Definite Boolean Functions (JMH, AK), pp. 200–214.
ESOPESOP-2000-NielsonNS #mobile
A Kleene Analysis of Mobile Ambients (FN, HRN, SS), pp. 305–319.
ESOPESOP-2000-SeidlS #constraints #interprocedural #parallel #source code
Constraint-Based Inter-Procedural Analysis of Parallel Programs (HS, BS), pp. 351–365.
ESOPESOP-2000-SmithW
Polyvariant Flow Analysis with Constrained Types (SFS, TW), pp. 382–396.
TACASTACAS-2000-AbdullaBE #reachability
Symbolic Reachability Analysis Based on SAT-Solvers (PAA, PB, NE), pp. 411–425.
TACASTACAS-2000-Schmidt #low level #reachability #symmetry
Integrating Low Level Symmetries into Reachability Analysis (KS0), pp. 315–330.
WRLAWRLA-2000-BasinD #comparison #haskell #maude #protocol #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
WRLAWRLA-2000-Millen #encryption #overview #protocol #term rewriting
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
WRLAWRLA-2000-Rodriguez #case study #maude #protocol #specification
Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
CAVCAV-2000-AlurGM #performance #reachability
Efficient Reachability Analysis of Hierarchical Reactive Machines (RA, RG, MM), pp. 280–295.
CAVCAV-2000-BaierHHK #markov #model checking
Model Checking Continuous-Time Markov Chains by Transient Analysis (CB, BRH, HH, JPK), pp. 358–372.
CAVCAV-2000-DangIBKS #automaton #reachability
Binary Reachability Analysis of Discrete Pushdown Timed Automata (ZD, OHI, TB, RAK, JS), pp. 69–84.
CAVCAV-2000-FraerKZVF #performance #reachability #traversal #verification
Prioritized Traversal: Efficient Reachability Analysis for Verification and Falsification (RF, GK, BZ, MYV, LF), pp. 389–402.
CAVCAV-2000-HeymanGGS #parallel #reachability #scalability
Achieving Scalability in Parallel Reachability Analysis of Very Large Circuits (TH, DG, OG, AS), pp. 20–35.
CAVCAV-2000-Meadows #encryption #formal method #protocol
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
ICLPCL-2000-BraileyPN #approach #database #termination
A Dynamic Approach to Termination Analysis for Active Database Rules (JB, AP, PN), pp. 1106–1120.
ICLPCL-2000-DebrayH #constraints #database #termination
Constraint-Based Termination Analysis for Cyclic Active Database Rules (SKD, TJH), pp. 1121–1136.
ICLPCL-2000-Gervas #logic programming
A Logic Programming Application for the Analysis of Spanish Verse (PG), pp. 1330–1344.
ICLPCL-2000-MancarellaNRT #declarative #named
MuTACLP: A Language for Declarative GIS Analysis (PM, GN, AR, FT), pp. 1002–1016.
ICLPCL-2000-MazurJB #memory management #reuse
A Module Based Analysis for Memory Reuse in Mercury (NM, GJ, MB), pp. 1255–1269.
CSLCSL-2000-Schuster
Elementary Choiceless Constructive Analysis (PS), pp. 512–526.
ISSTAISSTA-2000-BhargavanGKLOSV #formal method #named #network #simulation
Verisim: Formal analysis of network simulations (KB, CAG, MK, IL, DO, OS, MV), pp. 2–13.
ISSTAISSTA-2000-HindP #pointer #question
Which pointer analysis should I use? (MH, AP), pp. 113–123.
ISSTAISSTA-2000-KolanoK #classification #realtime
Classification schemes to aid in the analysis of real-time systems (PZK, RAK), pp. 86–95.
ISSTAISSTA-2000-Pincus #case study #developer #experience #tool support
Analysis is necessary, but far from sufficient: Experiences building and deploying successful tools for developers and testers (JDP), p. 1.
ISSTAISSTA-2000-SchroederK #black box #reduction #using
Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
LICSLICS-2000-AehligS #polynomial
A Syntactical Analysis of Non-Size-Increasing Polynomial Time Computation (KA, HS), pp. 84–91.
WICSAWICSA-1999-JaktmanLL #architecture #assessment #case study #maintenance
Structural Analysis of the Software Architecture — A Maintenance Assessment Case Study (CBJ, JL, ML), pp. 455–470.
WICSAWICSA-1999-MageeKG #architecture #behaviour
Behaviour Analysis of Software Architectures (JM, JK, DG), pp. 35–50.
ADLADL-1999-KleinA #comprehension #distributed #documentation #knowledge-based #parsing
Distributed Knowledge-Based Parsing for Document Analysis and Understanding (BK, AA), pp. 6–15.
DL-1999-HaraTW #integration #web
Workshop on Organizing Web Space: An Integration of Content Search with Structure Analysis (YH, KT, RW), p. 264.
TPDLECDL-1999-TakasuYKA #music
Music Structure Analysis and Its Application to Theme Phrase Extraction (AT, TY, TK, JA), pp. 92–105.
HTHT-1999-ChenC #hypermedia
Trailblazing the Literature of Hypertext: Author Co-Citation Analysis (1989-1998) (CC, LC), pp. 51–60.
HTHT-1999-Lange #hypermedia #tool support
Hypermedia Potentials for Analysis Support Tools (DSL), pp. 165–166.
HTHT-1999-Rety #hypermedia
Structure Analysis for Hypertext with Conditional Linkage (JHR), pp. 135–136.
ICDARICDAR-1999-AltamuraEM #adaptation #documentation #interactive
WISDOM++: An Interactive and Adaptive Document Analysis System (OA, FE, DM), pp. 366–369.
ICDARICDAR-1999-AntonacopoulosB #algorithm #flexibility #performance #segmentation
Methodology for Flexible and Efficient Analysis of the Performance of Page Segmentation Algorithms (AA, AB), pp. 451–454.
ICDARICDAR-1999-AntonacopoulosC #comparative #representation #using
Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
ICDARICDAR-1999-ChangLTH #documentation #image #multi #using
Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
ICDARICDAR-1999-ChaSS #algorithm #approximate #recognition #sequence #string
Approximate Stroke Sequence String Matching Algorithm for Character Recognition and Analysis (SHC, YCS, SNS), pp. 53–56.
ICDARICDAR-1999-CracknellD #agile #comprehension #documentation #prototype #research
A Handwriting Understanding Environment (HUE) for Rapid Prototyping in Handwriting and Document Analysis Research (CC, ACD), pp. 362–365.
ICDARICDAR-1999-Faure #documentation #image
Preattentive Reading and Selective Attention for Document Image Analysis (CF), pp. 577–580.
ICDARICDAR-1999-FukudaSTXS
A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
ICDARICDAR-1999-HitzRI #documentation #image
Analysis of Synthetic Document Images (OH, LR, RI), pp. 374–377.
ICDARICDAR-1999-Ishitani #documentation #image #logic
Logical Structure Analysis of Document Images based on Emergent Computation (YI), pp. 189–192.
ICDARICDAR-1999-JunkerDH #component #documentation #evaluation #on the #precise
On the Evaluation of Document Analysis Components by Recall, Precision, and Accuracy (MJ, AD, RH), pp. 713–716.
ICDARICDAR-1999-LebourgeoisE #documentation #using
Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
ICDARICDAR-1999-SrihariYG #automation
Information Theoretic Analysis of Postal Address Fields for Automatic Address Interpretation (SNS, WjY, VG), pp. 309–312.
ICDARICDAR-1999-SteinherzIR #component #detection
Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
ICDARICDAR-1999-Thoma #automation #database #documentation #image #online
Automating Data Entry for an On-line Biomedical Database: A Document Image Analysis Application (GRT), pp. 370–373.
ICDARICDAR-1999-XingyuanGDO #robust
A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
ICDARICDAR-1999-ZhuTW #recognition
Font Recognition based on Global Texture Analysis (YZ, TT, YW), pp. 349–352.
PODSPODS-1999-KleinbergT #algebra #hypermedia #information retrieval #linear
Applications of Linear Algebra in Information Retrieval and Hypertext Analysis (JMK, AT), pp. 185–193.
CSEETCSEET-1999-Hislop #online
An Online Systems Analysis Course (GWH), pp. 138–144.
CSEETCSEET-1999-MengelU #case study #source code #student
A Case Study of the Analysis of Novice Student Programs (SAM, JVU), pp. 40–49.
CSMRCSMR-1999-JahnkeW #information management #integration #process #re-engineering
Integration of Analysis and Redesign Activities in Information System Reengineering (JHJ, JPW), pp. 160–168.
CSMRCSMR-1999-Tonella #points-to #set
Effects of Different Flow Insensitive Points-to Analyses on DEF/USE Sets (PT), pp. 62–71.
ICSMEICSM-1999-Agrawal #data flow #graph
Simultaneous Demand-Driven Data-Flow and Call Graph Analysis (GA), pp. 453–462.
PASTEPASTE-1999-ChoiGHS #exception #java #modelling #performance #precise #source code
Efficient and Precise Modeling of Exceptions for the Analysis of Java Programs (JDC, DG, MH, VS), pp. 21–31.
PASTEPASTE-1999-LiangH #data flow #equivalence #performance #pointer
Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
PASTEPASTE-1999-NaumovichCC #data flow #partial order #performance #using #verification
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
PASTEPASTE-1999-SouterPH
Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
PASTEPASTE-1999-WhitingH #monitoring #safety
Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
WCREWCRE-1999-BalazinskaMDLK #java
Partial Redesign of Java Software Systems Based on Clone Analysis (MB, EM, MD, BL, KK), pp. 326–336.
CIAAWIA-1999-BergeronC
Analysis of Reactive Systems with n Timers (AB, RC), pp. 27–38.
CIAAWIA-1999-CaludeSY #metric
Metric Lexical Analysis (CC, KS, SY), pp. 48–59.
FMFM-v1-1999-AlurEKKL #case study #coordination #formal method #hybrid #modelling #multi
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multi-robot Coordination (RA, JME, MK, VK, IL), pp. 212–232.
FMFM-v1-1999-KestenKPR #deduction #model checking #verification
A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software (YK, AK, AP, GR), pp. 173–194.
FMFM-v1-1999-LincolnMMS #equivalence #polynomial #probability #security
Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
FMFM-v1-1999-ZhouC #communication #formal method #protocol
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
FMFM-v2-1999-SereT #safety #specification
Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
FLOPSFLOPS-1999-VerbaetenS #logic programming #source code #termination #using
Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
ICFPICFP-1999-CraryW #flexibility
Flexible Type Analysis (KC, SW), pp. 233–248.
AGTIVEAGTIVE-1999-BaresiP #graph grammar #programmable
A Formal Definition of Stuctured Analysis with Programmable Graph Grammars (LB, MP), pp. 193–208.
CHICHI-1999-BruckmanE #fault #programming language
Should we Leverage Natural-Language Knowledge? An Analysis of User Errors in a Natural-Language-Style Programming Language (AB, EE), pp. 207–214.
CHICHI-1999-QuintanaECWS #case study #design #named #process
Symphony: A Case Study in Extending Learner-Centered Design through Process Space Analysis (CQ, JE, AC, HKW, ES), pp. 473–480.
CHICHI-1999-Soto #learning #quality #semantics
Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis (RS), pp. 418–425.
HCIHCI-CCAD-1999-Callantine #performance #visualisation
Visualization and analysis of flight crew procedure performance (TJC), pp. 1281–1285.
HCIHCI-CCAD-1999-MajoeH #gesture #recognition
Human gesture analysis and recognition for medical and dance applications (DM, NH), pp. 818–822.
HCIHCI-CCAD-1999-McNeese #learning #metric #performance #process #protocol #using
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
HCIHCI-CCAD-1999-WatanabeO #communication #interactive #synthesis
Virtual face-to-face communication system for human interaction analysis by synthesis (TW, MO), pp. 182–186.
HCIHCI-EI-1999-KuzniarzP #design #object-oriented #towards
Towards Complex Object Oriented Analysis and Design (LK, MP), pp. 1257–1261.
HCIHCI-EI-1999-NoldusKHD #tool support
Software Tools for Collection and Analysis of Observational Data (LN, AK, WtH, RD), pp. 1114–1118.
HCIHCI-EI-1999-TokudaMTL #development #requirements #user interface
A New Integrated Support Environment for Requirements Analysis of User Interface Development (YT, TM, YT, ESL), pp. 895–899.
HCIHCI-EI-1999-Urokohara #design #usability #user interface #using
Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
CAiSECAiSE-1999-GreenR #modelling #ontology #process
An Ontological Analysis of Integrated Process Modelling (PFG, MR), pp. 225–240.
ICEISICEIS-1999-AbeT #development #process #scheduling
IDEFO-Based Software Process Analysis for Scheduling Systems Development (AA, TT), pp. 361–370.
ICEISICEIS-1999-BarjisD #modelling #network #process #using
Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
ICEISICEIS-1999-Cheng #realtime #verification
Analysis and Verification of Real-Time Systems (AMKC), p. X.
ICEISICEIS-1999-Gustas #approach #enterprise #information management
Integrated Approach for Information System Analysis at the Enterprise Level (RG), pp. 435–442.
ICEISICEIS-1999-KiniSJ #visualisation
A System for Analysis & Visualization of Domain Specific Data (SNK, S, KPJ), pp. 82–90.
ICEISICEIS-1999-LiHCHN #automation #comprehension #documentation
Automatic Document Analysis and Understanding System (XL, JH, ZC, DCDH, PAN), pp. 91–100.
ICEISICEIS-1999-RodriguesRH
An Intelligent Retail Analysis System (MdFR, CR, PRH), pp. 140–147.
ICEISICEIS-1999-Stamper #design #paradigm
Information-Field Paradigm and New Directions for Systems Analysis and Design (RKS), p. VI.
ICMLICML-1999-LangleyS #classification #naive bayes
Tractable Average-Case Analysis of Naive Bayesian Classifiers (PL, SS), pp. 220–228.
ICMLICML-1999-SchefferJ #fault
Expected Error Analysis for Model Selection (TS, TJ), pp. 361–370.
MLDMMLDM-1999-PengB #image #independence #retrieval
Independent Feature Analysis for Image Retrieval (JP, BB), pp. 103–115.
UMLUML-1999-FirleyHDGG #case study #diagrams #sequence chart
Timed Sequence Diagrams and Tool-Based Analysis — A Case Study (TF, MH, KD, TG, UG), pp. 645–660.
UMLUML-1999-LiL #diagrams #sequence chart #uml
Timing Analysis of UML Sequence Diagrams (XL, JL), pp. 661–674.
UMLUML-1999-SendallS #case study #uml
UML Based Fusion Analysis Applied to a Bank Case Study (SS, AS), pp. 278–291.
OOPSLAOOPSLA-1999-Blanchet #java #object-oriented
Escape Analysis for Object-Oriented Languages: Application to Java (BB), pp. 20–34.
OOPSLAOOPSLA-1999-ChoiGSSM #java
Escape Analysis for Java (JDC, MG, MJS, VCS, SPM), pp. 1–19.
OOPSLAOOPSLA-1999-France #concept #modelling #problem #requirements #uml
A Problem-Oriented Analysis of Basic UML Static Requirements Modeling Concepts (RBF), pp. 57–69.
OOPSLAOOPSLA-1999-Madsen #semantics
Semantic Analysis of Virtual Classes and Tested Classes (OLM), pp. 114–131.
OOPSLAOOPSLA-1999-WhaleyR #composition #java #pointer #source code
Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
TOOLSTOOLS-ASIA-1999-Zhou #assessment #object-oriented #using
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
TOOLSTOOLS-EUROPE-1999-Collins-Cope #approach #case study #interface #requirements
The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
TOOLSTOOLS-EUROPE-1999-MayerH #metric #object-oriented
Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
TOOLSTOOLS-EUROPE-1999-Mitchell99a #contract #exclamation #uml
Analysis by Contract: UML with Attitude! (RM), p. 407.
TOOLSTOOLS-USA-1999-AlexanderO #polymorphism #testing
Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
TOOLSTOOLS-USA-1999-Arsanjani #design #distributed #framework #implementation #java #using
Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
TOOLSTOOLS-USA-1999-Mitchell #contract #uml
Analysis by Contract or UML with Attitude (RM), p. 465–?.
TOOLSTOOLS-USA-1999-Parnas #component #documentation #testing #tool support
Tools for Component Documentation, Analysis and Testing (DLP), p. 2.
TOOLSTOOLS-USA-1999-PloschP #c++ #contract #implementation #named
Contracts: From Analysis to C++ Implementation (RP, JP), pp. 248–257.
GPCEGCSE-1999-BayerMW
Customizable Domain Analysis (JB, DM, TW), pp. 178–194.
LOPSTRLOPSTR-1999-SmausHK #logic programming #source code
Mode Analysis Domains for Typed Logic Programs (JGS, PMH, AK), pp. 82–101.
PLDIPLDI-1999-BodikGS #design #evaluation
Load-Reuse Analysis: Design and Evaluation (RB, RG, MLS), pp. 64–76.
PLDIPLDI-1999-RuginaR #parallel #pointer #source code #thread
Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
PLDIPLDI-1999-YongHR #pointer #source code
Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
POPLPOPL-1999-PessauxL #exception #type system
Type-Based Analysis of Uncaught Exceptions (FP, XL), pp. 276–290.
POPLPOPL-1999-SagivRW #logic #parametricity
Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
SASSAS-1999-AldrichCSE #java #source code
Static Analyses for Eliminating Unnecessary Synchronization from Java Programs (JA, CC, EGS, SJE), pp. 19–38.
SASSAS-1999-Asai
Binding-Time Analysis for Both Static and Dynamic Expressions (KA), pp. 117–133.
SASSAS-1999-BessonJT
Polyhedral Analysis for Synchronous Languages (FB, TPJ, JPT), pp. 51–68.
SASSAS-1999-BozgaFG #reduction
State Space Reduction Based on Live Variables Analysis (MB, JCF, LG), pp. 164–178.
SASSAS-1999-HillS #linear #refinement
Freeness Analysis Through Linear Refinement (PMH, FS), pp. 85–100.
SASSAS-1999-JeannetHR #clustering
Dynamic Partitioning in Analyses of Numerical Properties (BJ, NH, PR), pp. 39–50.
SASSAS-1999-McAllester #complexity #on the
On the Complexity Analysis of Static Analyses (DAM), pp. 312–329.
SASSAS-1999-Soffa #data flow #named #precise #scalability #tutorial
Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
AdaSIGAda-1999-Colket #realtime #using
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
RERE-1999-VillerS #process #requirements #social
Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
ASEASE-1999-Brackin #automation #effectiveness #encryption #implementation #protocol
Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
ASEASE-1999-MaleticV #automation #clustering #semantics
Automatic Software Clustering via Latent Semantic Analysis (JIM, NV), pp. 251–254.
ASEASE-1999-Saidi #composition #concurrent #incremental
Modular and Incremental Analysis of Concurrent Software Systems (HS), pp. 92–101.
ESECESEC-FSE-1999-RountevRL #data flow
Data-Flow Analysis of Program Fragments (AR, BGR, WL), pp. 235–252.
ICSEICSE-1999-ArdisC #product line
Defining Families — Commonality Analysis (MAA, DAC), pp. 671–672.
ICSEICSE-1999-KazmanBKCW #architecture #experience #trade-off
Experience with Performing Architecture Tradeoff Analysis (RK, MB, MK, SJC, SGW), pp. 54–63.
ICSEICSE-1999-KeyesDC #framework
Analysis of a Scheduler for a CAD Framework (DSK, LKD, MJC), pp. 152–161.
ICSEICSE-1999-Magee #architecture #behaviour #using
Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
ICSEICSE-1999-Mascolo #mobile #prototype #specification
Specification, Analysis, and Prototyping of Mobile Systems (CM), pp. 724–725.
ICSEICSE-1999-NaumovichAC #concurrent #data flow #java #source code
Data Flow Analysis for Checking Properties of Concurrent Java Programs (GN, GSA, LAC), pp. 399–410.
ICSEICSE-1999-YurRL #alias #incremental #pointer
An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
CCCC-1999-Martin #comparison #functional #interprocedural #string
Experimental Comparison of call string and functional Approaches to Interprocedural Analysis (FM), pp. 63–75.
DACDAC-1999-BeattieP #modelling
IC Analyses Including Extracted Inductance Models (MWB, LTP), pp. 915–920.
DACDAC-1999-DaemsGS #complexity #reduction
Circuit Complexity Reduction for Symbolic Analysis of Analog Integrated Circuits (WD, GGEG, WMCS), pp. 958–963.
DACDAC-1999-JiangC #performance #power management
Analysis of Performance Impact Caused by Power Supply Noise in Deep Submicron Devices (YMJ, KTC), pp. 760–765.
DACDAC-1999-KamonMMSW #3d #modelling
Interconnect Analysis: From 3-D Structures to Circuit Models (MK, NAM, YM, LMS, JW), pp. 910–914.
DACDAC-1999-LiuPS
Model Order-Reduction of RC(L) Interconnect Including Variational Analysis (YL, LTP, AJS), pp. 201–206.
DACDAC-1999-YalcinMPBS #functional
Functional Timing Analysis for IP Characterization (HY, MM, RP, CB, KAS), pp. 731–736.
DATEDATE-1999-Holzheuer #how #process
How to use Knowledge in an Analysis Process (HH), pp. 498–502.
DATEDATE-1999-HongB #finite #reachability #scalability #state machine #using
Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
DATEDATE-1999-JantschKH #case study #concept #modelling #synthesis
The Rugby Model: A Conceptual Frame for the Study of Modelling, Analysis and Synthesis Concepts of Electronic Systems (AJ, SK, AH), pp. 256–262.
DATEDATE-1999-NovakHK #on the
On Analog Signature Analysis (FN, BH, SK), p. 249–?.
DATEDATE-1999-RadetzkiSPN #data type #hardware #modelling #object-oriented #synthesis
Data Type Analysis for Hardware Synthesis from Object-Oriented Models (MR, AS, WPR, WN), p. 491–?.
HPDCHPDC-1999-LeighJDBG #collaboration #set
A Methodology for Supporting Collaborative Exploratory Analysis of Massive Data Sets in Tele-Immersive Environments (JL, AEJ, TAD, SB, RLG), pp. 62–69.
LCTESLCTES-1999-Persson #embedded #garbage collection #memory management
Live Memory Analysis for Garbage Collection in Embedded Systems (PP), pp. 45–54.
PDPPDP-1999-FraboulM #architecture #composition #modelling #performance #realtime
Modeling advanced modular avionics architectures for early real-time performance analysis (CF, FM), pp. 181–188.
PDPPDP-1999-GerndtMPW #performance
Performance analysis on CRAY T3E (MG, BM, MP, FW), pp. 241–248.
PDPPDP-1999-SahuquilloP #multi
The split data cache in multiprocessor systems: an initial hit ratio analysis (JS, AP), pp. 27–34.
PPoPPPPoPP-1999-MoonH #array #automation #data flow #evaluation #parallel
Evaluation of Predicated Array Data-Flow Analysis for Automatic Parallelization (SM, MWH), pp. 84–95.
PPoPPPPoPP-1999-Sundaram-StukelV #predict #using
Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
ESOPESOP-1999-KingSH #dependence
Quotienting Share for Dependency Analysis (AK, JGS, PMH), pp. 59–73.
ESOPESOP-1999-NielsonN #control flow #interprocedural
Interprocedural Control Flow Analysis (FN, HRN), pp. 20–39.
ESOPESOP-1999-PodelskiCM #concurrent #constraints #logic programming #source code
Set-Based Failure Analysis for Logic Programs and Concurrent Constraint Programs (AP, WC, MM), pp. 177–192.
FoSSaCSFoSSaCS-1999-EsparzaK #approach #data flow #interprocedural
An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis (JE, JK), pp. 14–30.
TACASTACAS-1999-BakhmurovKS #design #embedded #named
DYANA: An Environment for Embedded System Design and Analysis (AGB, APK, RLS), pp. 390–404.
TACASTACAS-1999-BergeronM #automation #email #interactive
An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
TACASTACAS-1999-BuchholzK #composition #distributed #tool support
Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
TACASTACAS-1999-MarchignoliM #automation #composition #encryption #protocol #verification
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
TACASTACAS-1999-SpeltE #database #object-oriented #theorem proving
A Theorem Prover-Based Analysis Tool for Object-Oriented Databases (DS, SE), pp. 375–389.
CADECADE-1999-Prost #formal method #system f
A formalization of Static Analyses in System F (FP), pp. 252–266.
CADECADE-1999-Weidenbach #automation #first-order #logic #protocol #security #towards
Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
CAVCAV-1999-AbdullaABBHL #abstraction #infinity #reachability #verification
Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis (PAA, AA, SB, AB, PH, YL), pp. 146–159.
CAVCAV-1999-BehrmannLPWY #diagrams #difference #performance #reachability #using
Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
CAVCAV-1999-BuchholzK
A Toolbox for the Analysis of Discrete Event Dynamic Systems (PB, PK), pp. 483–486.
CAVCAV-1999-HermannsMS #composition #markov #modelling #named #performance #specification
TIPPtool: Compositional Specification and Analysis of Markovian Performance Models (HH, VM, MS), pp. 487–490.
CAVCAV-1999-NamjoshiK #performance
Efficient Analysis of Cyclic Definitions (KSN, RPK), pp. 394–405.
CAVCAV-1999-Schumann #authentication #automation #named #protocol
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
CSLCSL-1999-DelzannoEP #constraints #protocol
Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
CSLCSL-1999-Franzle #hybrid #infinity
Analysis of Hybrid Systems: An Ounce of Realism Can Save an Infinity of States (MF), pp. 126–140.
ICLPICLP-1999-LuC #logic programming #source code
A Regular Type Analysis of Logic Programs (LL, JGC), p. 613.
ICLPICLP-1999-VanhoofB
Binding-time Analysis for Mercury (WV, MB), pp. 500–514.
ICLPICLP-1999-Verbaeten #abduction #logic programming #source code #termination
Termination Analysis for Abductive General Logic Programs (SV), pp. 365–379.
LICSLICS-1999-BanerjeeHR #polymorphism #λ-calculus
Region Analysis and the Polymorphic λ Calculus (AB, NH, JGR), pp. 88–97.
LICSLICS-1999-Hofmann #higher-order #semantics #syntax
Semantical Analysis of Higher-Order Abstract Syntax (MH0), pp. 204–213.
DL-1998-JansenSS #query #scalability #web
Failure Analysis in Query Construction: Data and Analysis from a Large Sample of Web Queries (BJJ, AS, TS), pp. 289–290.
DL-1998-JonesCM #library
Usage Analysis of a Digital Library (SJ, SJC, RJM), pp. 293–294.
TPDLECDL-1998-JonesCM #library
An Analysis of Usage of a Digital Library (SJ, SJC, RJM), pp. 261–277.
PODSPODS-1998-DavulcuKRR #logic #modelling #workflow
Logic Based Modeling and Analysis of Workflows (HD, MK, CRR, IVR), pp. 25–33.
PODSPODS-1998-PapadimitriouRTV #probability #semantics
Latent Semantic Indexing: A Probabilistic Analysis (CHP, PR, HT, SV), pp. 159–168.
SIGMODSIGMOD-1998-ChaudhuriN
AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
VLDBVLDB-1998-Ganguly #algorithm #design #optimisation #parametricity #query
Design and Analysis of Parametric Query Optimization Algorithms (SG), pp. 228–238.
VLDBVLDB-1998-Mihalisin #interactive
A Single Pass Computing Engine for Interactive Analysis of VLDBs (TM), p. 707.
VLDBVLDB-1998-WeberSB #performance
A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
CSEETCSEET-1998-Cowling98a #education #experience #re-engineering #student
Teaching Systems Analysis to Software Engineering Students: Experience with a Structured Methodology (AJC), pp. 102–113.
CSMRCSMR-1998-BorneRS #object-oriented #towards
Towards a Systematic Object-Oriented transformation of a Mrise Analysis (IB, AR, FS), pp. 213–215.
CSMRCSMR-1998-YehL #data flow #metric #testing
Software Testability Measurements Derived from Data Flow Analysis (PLY, JCL), pp. 96–103.
ICSMEICSM-1998-HarmanSD #memory management #slicing #using
Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
ICSMEICSM-1998-SinhaH #source code
Analysis of Programs with Exception-Handling Constructs (SS, MJH), pp. 348–357.
IWPCIWPC-1998-LagueLBMD #architecture #comprehension #framework
An Analysis Framework for Understanding Layered Software Architectures (BL, CL, ALB, EM, MD), pp. 37–44.
PASTEPASTE-1998-ChaseCHY #architecture #multi #source code
Recovering Software Architecture from Multiple Source Code Analyses (MPC, SMC, DRH, ASY), pp. 43–50.
PASTEPASTE-1998-DorRS #detection #experience #fault #memory management #pointer
Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
PASTEPASTE-1998-NaumovichCO #concurrent #data flow #performance #source code
Efficient Composite Data Flow Analysis Applied to Concurrent Programs (GN, LAC, LJO), pp. 51–58.
PASTEPASTE-1998-ZhangRL #alias #pointer
Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
WCREWCRE-1998-CimitileCL #data flow #incremental #migration
Incremental Migration Strategies: Data Flow Analysis For Wrapping (AC, UdC, ADL), pp. 59–68.
WCREWCRE-1998-KoschkeG #representation #reverse engineering
An Intermediate Representation for Reverse Engineering Analyses (RK, JFG), pp. 241–250.
FMFM-1998-Borger #design #state machine #using
High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
ICFPICFP-1998-Gustavsson #optimisation
A Type Based Sharing Analysis for Update Avoidance and Optimisation (JG), pp. 39–50.
ICFPICFP-1998-Russell #design #functional #named
MAP: A Functional Analysis and Design Method (DR), p. 342.
CHICHI-1998-Boy #automation #safety
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
CAiSECAiSE-1998-KavakliL #process
Goal-Driven Business Process Analysis — Application in Electricity Deregulation (VK, PL), pp. 305–324.
CAiSECAiSE-1998-Lam #development #reuse
Change Analysis and Management in a Reuse-Oriented Software Development Setting (WL), pp. 219–236.
EDOCEDOC-1998-SyrbeP
An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
CIKMCIKM-1998-DulleaS #modelling
An Analysis of the Structural Validity of Ternary Relatinships in Entity Relationship Modeling (JD, IYS), pp. 331–339.
ICMLICML-1998-GarciaN #algorithm #learning
A Learning Rate Analysis of Reinforcement Learning Algorithms in Finite-Horizon (FG, SMN), pp. 215–223.
ICMLICML-1998-KimuraK #algorithm #learning #using
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
ICMLICML-1998-PendrithM #learning #markov
An Analysis of Direct Reinforcement Learning in Non-Markovian Domains (MDP, MM), pp. 421–429.
ICPRICPR-1998-AdigaC98a #image #industrial
Analysis of volumetric images of filamentous bacteria in industrial sludge (PSUA, BBC), pp. 1735–1737.
ICPRICPR-1998-Ayache #challenge #image #research
Medical image analysis a challenge for computer vision research (NA), pp. 1255–1256.
ICPRICPR-1998-BamfordL #segmentation
Bayesian analysis of cell nucleus segmentation by a Viterbi search based active contour (PB, BCL), pp. 133–135.
ICPRICPR-1998-ChenHS #email
E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
ICPRICPR-1998-CutlerD #detection
View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
ICPRICPR-1998-Duin #problem #relational #scalability
Relational discriminant analysis and its large sample size problem (RPWD), pp. 445–449.
ICPRICPR-1998-Garcia-SevillaP #image #using
The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
ICPRICPR-1998-GovindanDKP #classification #component #independence
Independent component analysis applied to electrogram classification during atrial fibrillation (AG, GD, JK, JP), pp. 1662–1664.
ICPRICPR-1998-GuoYM #game studies #multi #robust #segmentation #statistics
Unsupervised segmentation based on multi-resolution analysis, robust statistics and majority game theory (GG, SY, SM), pp. 799–801.
ICPRICPR-1998-HatteryL #image #physics
Depth from physics: physics-based image analysis and feature definition (DH, MHL), pp. 711–713.
ICPRICPR-1998-HofmanJ #approach #clustering #performance #robust #using
Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
ICPRICPR-1998-HontaniD #component #detection #image #multi
Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
ICPRICPR-1998-Huynh #image #re-engineering
Euclidean reconstruction from an image triplet: a sensitivity analysis (DQH), pp. 835–837.
ICPRICPR-1998-HyvarinenOHH #component #feature model #image #independence
Image feature extraction by sparse coding and independent component analysis (AH, EO, POH, JH), pp. 1268–1273.
ICPRICPR-1998-KangTH #architecture #image #pattern matching #pattern recognition #recognition
An IRAM architecture for image analysis and pattern recognition (YK, JT, TSH), pp. 1561–1564.
ICPRICPR-1998-KawataNOKMEKM #image #using
Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
ICPRICPR-1998-KogaKSF #segmentation #using
Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
ICPRICPR-1998-LeeHSL #automation #bound #detection #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-LuYI
Intensity modulated moire and its intensity-phase analysis (CL, AY, SI), pp. 1791–1793.
ICPRICPR-1998-MaedaKIZ #multi #using
Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
ICPRICPR-1998-MottlBKKM #image
Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
ICPRICPR-1998-NakaiMI #simulation
Simulation and analysis of spectral distributions of human skin (HN, YM, SI), pp. 1065–1067.
ICPRICPR-1998-OhLS #using
Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
ICPRICPR-1998-OzdemirBMEE #algorithm #comparative #evaluation #fault
Comparative evaluation of texture analysis algorithms for defect inspection of textile products (, AB, RM, AE, AE), pp. 1738–1740.
ICPRICPR-1998-Perner #classification #image
Image analysis and classification of HEp-2 cells in fluorescent images (PP), pp. 1677–1679.
ICPRICPR-1998-Shevlin #problem #using
Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
ICPRICPR-1998-SimonB #clustering #image
WaveStat-cluster analysis of image data and wavelet coefficients (US, MB), pp. 1622–1625.
ICPRICPR-1998-Takasu #documentation #image #probability
Probabilistic interpage analysis for article extraction from document images (AT), pp. 932–935.
ICPRICPR-1998-Tayeb-beySE #documentation
Analysis and conversion of documents (STb, ASS, HE), pp. 1089–1091.
ICPRICPR-1998-WatanabeT #2d #image
An analysis system for two-dimensional gel electrophoresis images of genomic DNA (YW, KT), pp. 368–371.
ICPRICPR-1998-YogesanEB #image
Texture analysis of retinal images to determine nerve fibre loss (KY, RHE, CJB), pp. 1665–1667.
ICPRICPR-1998-ZhaoN #linear #recognition
Linear discriminant analysis of MPF for face recognition (WZ, NN), pp. 185–188.
ICPRICPR-1998-ZhugeTLHD #image #interactive #programming #segmentation
An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
UMLUML-1998-BourdeauLR #case study #diagrams #experience #uml
Hierarchical Context Diagrams with UML: An Experience Report on Satellite Ground System Analysis (EB, PL, PR), pp. 227–239.
ECOOPECOOP-1998-GilI #complexity #object-oriented #source code
The Complexity of Type Analysis of Object Oriented Programs (JYG, AI), pp. 601–634.
TOOLSTOOLS-ASIA-1998-YuanCXMY #c++ #database #information management #tool support
C++ Program Information Database for Analysis Tools (WY, XC, TX, HM, FY), pp. 173–180.
TOOLSTOOLS-USA-1998-Mitchell #constraints #contract #ocl #uml
Analysis by Contract: An Introduction to UML’s Object Constraint Language (OCL) (RM), p. 448–?.
TOOLSTOOLS-USA-1998-Walden #contract #design #named
BON: Seamless, Reversible, Contract-Based Analysis and Design (KW), p. 445.
AdaEuropeAdaEurope-1998-BliebergerB #ada #source code
Symbolic Reaching Definitions Analysis of Ada Programs (JB, BB), pp. 238–250.
PPDPALP-PLILP-1998-CodishS #logic #set
The Boolean Logic of Set Sharing Analysis (MC, HS), pp. 89–101.
PPDPALP-PLILP-1998-HatcliffDL #staging #using
Staging Static Analyses Using Abstraction-Based Program Specialization (JH, MBD, SL), pp. 134–151.
LOPSTRLOPSTR-1998-GabricGS #constraints #strict #theorem proving
Strictness Analysis as Finite-Domain Constraint Solving (TG, KG, HS), pp. 255–270.
PLDIPLDI-1998-AmmonsL #data flow
Improving Data-flow Analysis with Path Profiles (GA, JRL), pp. 72–84.
PLDIPLDI-1998-DiwanMM #alias #type system
Type-Based Alias Analysis (AD, KSM, JEBM), pp. 106–117.
PLDIPLDI-1998-HastiH #pointer #using
Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
POPLPOPL-1998-Blanchet #correctness #implementation #proving
Escape Analysis: Correctness Proof, Implementation and Experimental Results (BB), pp. 25–37.
POPLPOPL-1998-BodikA
Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
POPLPOPL-1998-DebrayMW #alias #execution
Alias Analysis of Executable Code (SKD, RM, MW), pp. 12–24.
POPLPOPL-1998-DeFouwGC #interprocedural #performance
Fast Interprocedural Class Analysis (GD, DG, CC), pp. 222–236.
POPLPOPL-1998-GhiyaH #pointer
Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
POPLPOPL-1998-JagannathanTWW #alias #higher-order
Single and Loving It: Must-Alias Analysis for Higher-Order Languages (SJ, PT, SW, AKW), pp. 329–341.
POPLPOPL-1998-Schmidt #abstract interpretation #data flow #model checking
Data Flow Analysis is Model Checking of Abstract Interpretations (DAS), pp. 38–48.
SASSAS-1998-FagesG #logic programming #source code
Analysis of Normal Logic Programs (FF, RG), pp. 82–98.
SASSAS-1998-HagiyaT #data flow #java #on the #virtual machine
On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
SASSAS-1998-HandjievaT #clustering #control flow #using
Refining Static Analyses by Trace-Based Partitioning Using Control Flow (MH, ST), pp. 200–214.
SASSAS-1998-HindP #alias #pointer
Assessing the Effects of Flow-Sensitivity on Pointer Alias Analyses (MH, AP), pp. 57–81.
SASSAS-1998-PeraltaGS #constraints #imperative #logic programming #source code
Analysis of Imperative Programs through Analysis of Constraint Logic Programs (JCP, JPG, HS), pp. 246–261.
SASSAS-1998-Ruthing #bidirectional #data flow
Bidirectional Data Flow Analysis in Code Motion: Myth and Reality (OR), pp. 1–16.
AdaSIGAda-1998-LaskiSH #ada #dependence #source code
Dependency Analysis of Ada Programs (JWL, WS, JH), pp. 263–275.
AdaSIGAda-1998-MillsP #ada #co-evolution #design #hardware #migration
Hardware/Software Co-Design: VHDL and Ada 95 Code Migration and Integrated Analysis (MM, GP), pp. 18–27.
PLDIBest-of-PLDI-1998-AmmonsL98a #data flow
Improving data-flow analysis with path profiles (with retrospective) (GA, JRL), pp. 568–582.
REICRE-1998-HaglindJR #case study #empirical #experience #requirements
Experiences Integrating Requirements Engineering and Business Analysis An Empirical Study of Operations & Management System Procurement Projects (MH, LJ, MR), pp. 108–117.
REICRE-1998-LutzHMST #product line #requirements #safety
Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
REICRE-1998-SutcliffeR #experience #requirements
Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
REFSQREFSQ-1998-SutcliffeM #non-functional #requirements
Scenario-based Analysis of Non-Functional Requirements (AGS, SM), pp. 219–233.
ASEASE-1998-Andrews #testing #tool support #using
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
ASEASE-1998-CzernyH #automation #requirements
Automated Integrative Analysis of State-based Requirements (BJC, MPEH), p. 125–?.
ASEASE-1998-MorzentiPM #automation #composition #specification
A Tool for Automated System Analysis based on Modular Specifications (AM, PSP, SM), pp. 2–11.
FSEFSE-1998-AllenG #component #formal method #integration #modelling #standard
Formal Modeling and Analysis of the HLA Component Integration Standard (RA, DG), pp. 70–79.
FSEFSE-1998-Jackson #design
An Intermedicate Design Language and Its Analysis (DJ), pp. 121–130.
ICSEICSE-1998-ChanBS #named #specification
Promises: Limited Specifications for Analysis and Manipulation (ECC, JB, WLS), pp. 167–176.
ICSEICSE-1998-MascarenhasKBK #artificial reality #modelling #petri net
Modeling and Analysis of a Virtual Reality System with Time Petri Nets (RM, DK, UAB, RVK), pp. 33–42.
ICSEICSE-1998-TanakaAOY #metric #process #quality
Software Quality Analysis & Measurement Service Activity in the Company (TT, MA, HO, AY), pp. 426–429.
ICSEICSE-1998-YokoyamaK #quality #statistics
Software Cost and Quality Analysis by Statistical Approaches (YY, MK), pp. 465–467.
SACSAC-1998-KimYL #policy
Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
SACSAC-1998-Marchiori
Light analysis of complex systems (MM), pp. 18–22.
ASPLOSASPLOS-1998-GhoshMM #precise #program transformation
Precise Miss Analysis for Program Transformations with Caches of Arbitrary Associativity (SG, MM, SM), pp. 228–239.
ASPLOSASPLOS-1998-SodaniS #empirical
An Empirical Analysis of Instruction Repetition (AS, GSS), pp. 35–45.
CCCC-1998-BraunKK #control flow #generative #named
Cool: A Control-Flow Generator for System Analysis (VB, JK, DK), pp. 306–309.
CCCC-1998-BrouwerGP #automaton #finite #implementation #performance
Myths and Facts about the Efficient Implementation of Finite Automata and Lexical Analysis (KB, WG, EP), pp. 1–15.
CCCC-1998-MalacariaH #approach #control flow
A New Approach to Control Flow Analysis (PM, CH), pp. 95–108.
CCCC-1998-MartinAWF
Analysis of Loops (FM, MA, RW, CF), pp. 80–94.
CCCC-1998-NielsonN #constraints #logic
Flow Logics for Constraint Based Analysis (HRN, FN), pp. 109–127.
DACDAC-1998-ChenOIB #architecture #validation
Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
DACDAC-1998-DartuP #named
TETA: Transistor-Level Engine for Timing Analysis (FD, LTP), pp. 595–598.
DACDAC-1998-DharchoudhuryPBVTB #design #network
Design and Analysis of Power Distribution Networks in PowerPC Microprocessors (AD, RP, DB, RV, BT, DB), pp. 738–743.
DACDAC-1998-GhoshJB #testing
A BIST Scheme for RTL Controller-Data Paths Based on Symbolic Testability Analysis (IG, NKJ, SB), pp. 554–559.
DACDAC-1998-KishinevskyCK #interface #specification #synthesis
Asynchronous Interface Specification, Analysis and Synthesis (MK, JC, AK), pp. 2–7.
DACDAC-1998-KrauterM #layout
Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis (BK, SM), pp. 303–308.
DACDAC-1998-KukimotoB #functional
Hierarchical Functional Timing Analysis (YK, RKB), pp. 580–585.
DACDAC-1998-MalkaZ #debugging #design #estimation #reliability #statistics
Design Reliability — Estimation through Statistical Analysis of Bug Discovery Data (YM, AZ), pp. 644–649.
DACDAC-1998-NagarajCHY #approach
A Practical Approach to Static Signal Electromigration Analysis (NSN, FC, HH, DY), pp. 572–577.
DATEDATE-1998-AllaraFSS #profiling
A Model for System-Level Timed Analysis and Profiling (AA, WF, FS, DS), pp. 204–210.
DATEDATE-1998-BolchiniSS #concurrent #detection #fault #network
Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
DATEDATE-1998-ChandramouliWS #functional #named
AFTA: A Formal Delay Model for Functional Timing Analysis (VC, JW, KAS), pp. 350–355.
DATEDATE-1998-CoppensAR #fault #modelling
VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
DATEDATE-1998-FassnachtS #optimisation
Timing Analysis and Optimization of a High-Performance CMOS Processor Chipset (UF, JS), pp. 325–331.
DATEDATE-1998-KassabCAK #constraints
Propagation of Last-Transition-Time Constraints in Gate-Level Timing Analysis (MK, EC, SA, THK), pp. 796–802.
DATEDATE-1998-KimuraI #design
A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
DATEDATE-1998-KoegstGCW #design #reuse
A Systematic Analysis of Reuse Strategies for Design of Electronic Circuits (MK, DG, PC, MGW), pp. 292–296.
DATEDATE-1998-MirRVH #fault
Switch-Level Fault Coverage Analysis for Switched-Capacitor Systems (SM, AR, DV, JLH), pp. 810–814.
DATEDATE-1998-PastorC #encoding #performance #petri net
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets (EP, JC), pp. 790–795.
DATEDATE-1998-VercauterenVJL #partial order #performance #using #verification
Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
HPDCHPDC-1998-TierneyJCHBG #distributed #performance
The NetLogger Methodology for High Performance Distributed Systems Performance Analysis (BT, WEJ, BC, GH, CXB, DG), pp. 260–267.
LCTESLCTES-1998-LiuG #automation #bound
Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
LCTESLCTES-1998-LundqvistS #simulation #using
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
PDPPDP-1998-AlonsoGEGGM #embedded #parallel #performance #prototype #realtime #tool support #visualisation
A toolset for visualization and analysis of parallel real-time embedded systems based on fast prototyping techniques (FJSA, JG, JE, DFG, SG, PDM), pp. 186–194.
PDPPDP-1998-MontoyaG #algorithm #implementation #parallel
Implementation of parallel thinning algorithms on multicomputers: analysis of the work load balance (MDGM, IG), pp. 257–263.
PDPPDP-1998-MorenoFZCT #biology #memory management #multi #sequence
Biological sequence analysis on distributed-shared memory multiprocessors (ARM, LGdlF, ELZ, JMC, OT), pp. 20–26.
ESOPESOP-1998-BruynoogheLS #deduction
A Polyvariant Binding-Time Analysis for Off-line Partial Deduction (MB, ML, KFS), pp. 27–41.
ESOPESOP-1998-ChinKL
Synchronisation Analysis to Stop Tulping (WNC, SCK, TWL), pp. 75–89.
FASEFASE-1998-NielsonAN #behaviour #case study #safety
Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
FASEFASE-1998-ReedJDR #automation #formal method #modelling #network
Automated Formal Analysis of Networks: FDR Models of Arbitrary Topologies and Flow-Control Mechanisms (JNR, DMJ, BD, GMR), pp. 239–254.
FoSSaCSFoSSaCS-1998-AmadioC #type system
Analysis of a Guard Condition in Type Theory (RMA, SCG), pp. 48–62.
STOCSTOC-1998-BellareCK #approach #authentication #composition #design #protocol
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
STOCSTOC-1998-LubyMSS #design #graph #using
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
TACASTACAS-1998-CharatonikP #infinity
Set-Based Analysis of Reactive Infinite-State Systems (WC, AP), pp. 358–375.
TACASTACAS-1998-Lind-NielsenABHKL #composition #dependence #scalability #using #verification
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
TACASTACAS-1998-LindahlPY #design
Formal Design and Analysis of a Gear Controller (ML, PP, WY), pp. 281–297.
CADECADE-1998-BrauburgerG #evaluation #induction #termination
Termination Analysis by Inductive Evaluation (JB, JG), pp. 254–269.
CADECADE-1998-FleuriotP #geometry #proving #standard #theorem proving
A Combination of Nonstandard Analysis and Geometry Theorem Proving, with Application to Newton’s Principia (JDF, LCP), pp. 3–16.
CAVCAV-1998-AbdullaBJ #bound #on the fly
On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
CAVCAV-1998-ComonJ #automaton #multi #safety
Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
CAVCAV-1998-Mitchell #finite #protocol #security
Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
ISSTAISSTA-1998-Ball #control flow #on the #testing
On the Limit of Control Flow Analysis for Regression Test Selection (TB), pp. 134–142.
ISSTAISSTA-1998-GodefroidHJ #model checking #monitoring #using
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
ICLPJICSLP-1998-DecorteS #termination
Termination Analysis: Some Practical Properties of the Norm and Level Mapping Space (SD, DDS), pp. 235–249.
LICSLICS-1998-StarkS #automaton #composition #network #probability
Compositional Analysis of Expected Delays in Networks of Probabilistic I/O Automata (EWS, SAS), pp. 466–477.
ADLADL-1997-KleinF #documentation #fault
Error Tolerant Document Structure Analysis (BK, PF), pp. 116–127.
DL-1997-SchiffH #comprehension #social
Understanding Complex Information Environments: A Social Analysis of Watershed Planning (LRS, NAVH), pp. 161–168.
HTHT-1997-Chen #similarity #visualisation
Structuring and Visualising the WWW by Generalised Similarity Analysis (CC), pp. 177–186.
ICDARICDAR-1997-Ah-SoonT #architecture
Variations on the Analysis of Architectural Drawing (CAS, KT), pp. 347–351.
ICDARICDAR-1997-AraiO
Form Processing based on Background Region Analysis (HA, KO), pp. 164–169.
ICDARICDAR-1997-BlasiusGJK #documentation #knowledge-based
Knowledge-based Document Analysis (KHB, BG, IJ, NK), pp. 728–731.
ICDARICDAR-1997-ChangCCLLSTWY #documentation #recognition
A Document Analysis and Recognition System (FC, TFC, TRC, MCL, YCL, TYS, TMT, JJW, CSY), pp. 736–739.
ICDARICDAR-1997-ChangLP #algorithm
Line sweep thinning algorithm for feature analysis (FC, YCL, TP), pp. 123–127.
ICDARICDAR-1997-CracknellDD97a #comprehension #documentation #framework #image #named
TABS — A New Software Framework for Document Image Processing, Analysis, and Understanding (CC, ACD, LD), pp. 1001–1005.
ICDARICDAR-1997-CullenHH #database #documentation #image #retrieval #using
Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
ICDARICDAR-1997-Ishitani #documentation #layout
Document Layout Analysis Based on Emergent Computation (YI), pp. 45–50.
ICDARICDAR-1997-JingboXT #segmentation
Segmentation of Stick Text Based on Sub Connected Area Analysis (JG, XL, ZT), p. 417–?.
ICDARICDAR-1997-Kim #documentation #problem
Problems and Approaches for Oriental Document Analysis (JHK), p. 1111.
ICDARICDAR-1997-KoppenLN #documentation #framework #image #internet
An Image Consulting Framework for Document Analysis of Internet Graphics (MK, LL, BN), p. 819–?.
ICDARICDAR-1997-LiangRHP #documentation #image
UW-ISL Document Image Analysis Toolbox: An Experimental Environment (JL, RR, RMH, ITP), pp. 984–988.
ICDARICDAR-1997-LinNN #documentation #image #logic #using
Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
ICDARICDAR-1997-MaergnerKP #benchmark #documentation #metric #on the
On Benchmarking of Document Analysis Systems (VFM, PK, AKP), p. 331–?.
ICDARICDAR-1997-MiyamotoISNT #documentation #requirements
Analysis of required elements for next-generation document reader on the basis of user requirements (TM, YI, KS, TN, YT), pp. 428–432.
ICDARICDAR-1997-OgierMLL #image #reliability #semantics
An Image Interpretation Device cannot be Reliable without any Semantic Coherency Analysis of the Interpretated Objects — Application to French Cadastral Maps (JMO, RM, JL, YL), pp. 532–535.
ICDARICDAR-1997-SauvolaHKSPD #algorithm #distributed #documentation #image #testing
A distributed management system for testing document image analysis algorithms (JJS, SH, HK, TS, MP, DSD), pp. 989–995.
PODSPODS-1997-HellersteinKP #on the
On the Analysis of Indexing Schemes (JMH, EK, CHP), pp. 249–256.
CSEETCSEET-1997-LethbridgeIMG #re-engineering
An Undergraduate Option in Software Engineering: Analysis and Rationale (TCL, DI, AM, DG), pp. 120–131.
CSMRCSMR-1997-FantechiNS #cobol #object-oriented
Object-Oriented Analysis of COBOL (AF, PN, ES), pp. 157–164.
CSMRCSMR-1997-MendoncaK #architecture
A Quality-Based Analysis of Architecture Recovery Environments (NCM, JK), pp. 54–59.
CSMRCSMR-1997-TonellaAFM #maintenance #precise
Variable Precision Reaching Definitions Analysis for Software Maintenance (PT, GA, RF, EM), pp. 60–67.
WCREWCRE-1997-MooreR #reuse
Domain Analysis for Transformational Reuse (MMM, SR), pp. 156–163.
WPCWPC-1997-TonellaAFM #comprehension #points-to
Points-to Analysis for Program Understanding (PT, GA, RF, EM), pp. 90–99.
ICSMEICSM-2000-Basili #maintenance #reuse
Analysis for Reuse and Maintenance: A Program for Experimentation (VRB), p. 296–?.
ICSMEICSM-2000-EmamHM #process #requirements #scalability
Causal Analysis of the Requirements Change Process for a Large System (KEE, DH, NHM), pp. 214–221.
ICSMEICSM-2000-IioFA #maintenance #process
Experimental Analysis of the Cognitive Processes of Program Maintainers during Software Maintenance (KI, TF, YA), pp. 242–249.
ICALPICALP-1997-BouajjaniH #reachability #set
Symbolic Reachability Analysis of FIFO Channel Systems with Nonregular Sets of Configurations (AB, PH), pp. 560–570.
ICALPICALP-1997-HemaspaandraHR #parallel
Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
ICALPICALP-1997-HondaY #call-by #game studies
Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
FMFME-1997-MartinJ #concurrent #network #performance #process #scalability
An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
FMFME-1997-YoungB #memory management #modelling
Mathematical Modeling and Analysis of an External Memory Manager (WDY, WRB), pp. 237–257.
TLCATLCA-1997-BelleM
Typed Intermediate Languages for Shape Analysis (GB, EM), pp. 11–29.
ICFPICFP-1997-Ashley #effectiveness
The Effectiveness of Flow Analysis for Inlining (JMA), pp. 99–111.
ICFPICFP-1997-Banerjee #composition #type system
A Modular, Polyvariant, and Type-Based Closure Analysis (AB), pp. 1–10.
ICFPICFP-1997-GasserNN #control flow
Systematic Realisation of Control Flow Analyses for CML (KLSG, FN, HRN), pp. 38–51.
ICFPICFP-1997-HeintzeM #complexity #on the
On the Complexity of Set-Based Analysis (NH, DAM), pp. 150–163.
ICFPICFP-1997-SabelfeldS #functional #problem #semantics #source code
Simple Semantic Analysis Problems for Functional Programs (VKS, AS), p. 319.
ICFPICFP-1997-Shao #flexibility #representation
Flexible Representation Analysis (ZS), pp. 85–98.
CHICHI-1997-BhavnaniJ #performance
From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
CHICHI-1997-ChinRC #development #requirements
Participatory Analysis: Shared Development of Requirements from Scenarios (GCJ, MBR, JMC), pp. 162–169.
CHICHI-1997-Muller #collaboration #human-computer
Translation in HCI: Formal Representations for Work Analysis and Collaboration (MJM), pp. 544–545.
CHICHI-1997-Ramsay
A Factor Analysis of User Cognition and Emotion (JR), pp. 546–547.
HCIHCI-CC-1997-Angehrn #framework #platform
An Agent-Centered Framework for the Analysis and Diagnosis of Organizational Groupware Platforms (AAA), pp. 289–292.
HCIHCI-CC-1997-FunadaYIN #effectiveness #evaluation #how #human-computer #performance
How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
HCIHCI-CC-1997-KazumaSNGOS #evaluation #process
Evaluation of Mental Stress During Tracking Tasks Based on the Analysis of Electrodermal Activity, Blinks and Blood Pressure (HK, MS, YN, HG, YO, MS), pp. 567–570.
HCIHCI-CC-1997-LeporeMMPTCT
Computer-Aided Analysis in Ophthalmological Imaging (DL, FM, GM, MMP, ST, GC, MT), pp. 753–756.
HCIHCI-CC-1997-StrohmU #concept #people
Sociotechnical Analysis According to the Concept of People, Technology, Organization (OS, EU), pp. 241–244.
HCIHCI-CC-1997-Suzuki #development #evaluation #variability
The Application of Heart Rate Variability Analysis on the Evaluation of Mental Strain and its Future Development (KS), pp. 559–562.
HCIHCI-CC-1997-Venda #communication #performance #predict
Ergodynamics in Analysis and Prediction of Communication Efficiency (VFV), pp. 833–836.
HCIHCI-CC-1997-WhisenandE
Analysis of Cursor Movements with a Mouse (TGW, HHE), pp. 533–536.
HCIHCI-SEC-1997-Brath #3d #experience #guidelines #interactive #visualisation
3D Interactive Information Visualization: Guidelines from Experience and Analysis of Applications (RB), pp. 865–868.
HCIHCI-SEC-1997-EarlYMK #case study #design #usability
The Contribution of Usability Analysis to the Design of Medical Devices: A Case Study (SE, MY, BM, RJK), pp. 601–604.
HCIHCI-SEC-1997-HolstCG #constraints #interface
Transporting Honey Bears: A Cognitive Analysis of the Effects of Interface Manipulation Style on a Constraint-Based Planning Task (SJH, EFC, DJG), pp. 169–172.
HCIHCI-SEC-1997-JackoD #interface #requirements
Interface Requirements: An Analysis of Technologies Designed for Individual and Group Work (JAJ, VGD), pp. 347–350.
HCIHCI-SEC-1997-JungY
Managing Information by a New Compound Noun Analysis (IHJ, SYY), pp. 299–302.
HCIHCI-SEC-1997-MacLeodMK #comprehension #human-computer #requirements
Understanding HCI Requirements: Expertise and Assistance to Imagery Analysis (ISM, AJM, EK), pp. 559–562.
HCIHCI-SEC-1997-Mizuno
Conjoint Analysis of Consumer Preferences in Cyber Space (MM), pp. 475–478.
HCIHCI-SEC-1997-PedraliB #process #question
Can We Trace Back Cognitive Processes in Root Cause Analysis? (MP, RB), pp. 59–62.
HCIHCI-SEC-1997-WatanabeO #communication
Physiological Analysis of Entrainment in Face-to-Face Communication (TW, MO), pp. 411–414.
CAiSECAiSE-1997-CarricoG
Facilitating Analysis and Diagnosis in Organisations (LC, NG), pp. 131–144.
CAiSECAiSE-1997-CastanoA #framework #information management #legacy #multi
A Multi-Perspective Framework for the Analysis of Legacy Information Systems (SC, VDA), pp. 117–130.
CIKMCIKM-1997-DulleaS #constraints
An Analysis of Cardinality Constraints in Redundant Relationships (JD, IYS), pp. 270–277.
CIKMCIKM-1997-GauchW #approach #automation #corpus #query
A Corpus Analysis Approach for Automatic Query Expansion (SG, JW), pp. 278–284.
CIKMCIKM-1997-ZarkeshASSS #design
Analysis and Design of Server Informative WWW-Sites (AMZ, JA, CS, RS, VS), pp. 254–261.
ICMLICML-1997-Joachims #algorithm #categorisation #probability
A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization (TJ), pp. 143–151.
KDDKDD-1997-BergstenSS #data mining #machine learning #mining
Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
KDDKDD-1997-ProvostF #classification #comparison #performance #visualisation
Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
SIGIRSIGIR-1997-Lee #multi
Analyses of Multiple Evidence Combination (JHL), pp. 267–276.
SIGIRSIGIR-1997-Stairmand #information retrieval
Textual Context Analysis for Information Retrieval (MAS), pp. 140–147.
OOPSLAOOPSLA-1997-Haines #design #implementation #lightweight #thread
An Open Implementation Analysis and Design for Lightweight Threads (MH), pp. 229–242.
TOOLSTOOLS-ASIA-1997-Mitchell97a #contract
Analysis by Contract (RM), p. 421.
TOOLSTOOLS-ASIA-1997-PengCC #morphism #multi #performance #polymorphism
The Implement Mechanism and Efficiency Analysis of Multiinheritance and Polymorphism (RP, JC, SC), pp. 389–392.
TOOLSTOOLS-PACIFIC-1997-FrohlichS #architecture #interactive
Interactive Analysis of Object Architectures (JHF, TS), pp. 252–266.
TOOLSTOOLS-PACIFIC-1997-Hoffman #object-oriented
A Practical Notation for Object Oriented Analysis with a Formal Meaning (JH), pp. 225–237.
TOOLSTOOLS-USA-1997-FetckeAN #approach
Mapping the OO-Jacobson Approach into Function Point Analysis (TF, AA, THN), pp. 192–202.
TOOLSTOOLS-USA-1997-Mitchell #contract
Analysis by Contract (RM), p. 372.
TOOLSTOOLS-USA-1997-Walden #design #reuse #usability
The BON Method: Analysis and Design for Reusability (KW), p. 372.
AdaEuropeAdaEurope-1997-Bell #ada #source code #tool support
An Alternative Toolset for Analysis of Ada Programs (AEB), pp. 112–124.
PPDPALP-1997-CodishT #constraints #logic programming #semantics #source code #termination #using
A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
LOPSTRLOPSTR-1997-DecorteSLMS #logic programming #termination
Termination Analysis for Tabled Logic Programming (SD, DDS, ML, BM, KFS), pp. 111–127.
LOPSTRLOPSTR-1997-HeatonHK #logic programming #source code
Analysis of Logic Programs with Delay (AH, PMH, AK), pp. 148–167.
PEPMPEPM-1997-HornofN #imperative
Accurate Binding-Time Analysis For Imperative Languages: Flow, Context, and Return Sensitivity (LH, JN), pp. 63–73.
PLDIPLDI-1997-Collberg #automation #mutation testing
Reverse Interpretation + Mutation Analysis = Automatic Retargeting (CSC), pp. 57–70.
PLDIPLDI-1997-FlanaganF #component
Componential Set-Based Analysis (CF, MF), pp. 235–248.
PLDIPLDI-1997-Goodwin #data flow #execution #interprocedural
Interprocedural Dataflow Analysis in an Executable Optimizer (DWG), pp. 122–133.
PLDIPLDI-1997-HeintzeM #control flow #linear #transitive
Linear-time Subtransitive Control Flow Analysis (NH, DAM), pp. 261–272.
PLDIPLDI-1997-WagnerG #incremental #programming language
Incremental Analysis of real Programming Languages (TAW, SLG), pp. 31–43.
POPLPOPL-1997-Biswas
A Demand-Driven Set-Based Analysis (SKB), pp. 372–385.
POPLPOPL-1997-Deutsch #complexity #on the
On the Complexity of Escape Analysis (AD), pp. 358–371.
POPLPOPL-1997-NielsonN #control flow #semantics
Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis (HRN, FN), pp. 332–345.
POPLPOPL-1997-Ruf #clustering #data flow #using
Partitioning Dataflow Analyses Using Types (ER), pp. 15–26.
POPLPOPL-1997-ShapiroH #performance #points-to
Fast and Accurate Flow-Insensitive Points-To Analysis (MS, SH), pp. 1–14.
SASSAS-1997-Braunburger #automation #order #polynomial #termination #using
Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
SASSAS-1997-CodishLB #algebra #approach #logic programming #source code
An Algebraic Approach to Sharing Analysis of Logic Programs (MC, VL, FB), pp. 68–82.
SASSAS-1997-Granger #congruence
Static Analyses of Congruence Properties on Rational Numbers (PG), pp. 278–292.
SASSAS-1997-IgarashiK #communication #concurrent #programming language #type system
Type-Based Analysis of Communication for Concurrent Programming Languages (AI, NK), pp. 187–201.
SASSAS-1997-JagannathanWW
Type-Directed Flow Analysis for Typed Intermediate Languages (SJ, SW, AKW), pp. 232–249.
SASSAS-1997-Mossin
Exact Flow Analysis (CM), pp. 250–264.
SASSAS-1997-Ryder
Practical Compile-Time Analysis (BGR), pp. 406–412.
SASSAS-1997-Scozzari #logic
Logical Optimality of Groundness Analysis (FS), pp. 83–97.
SASSAS-1997-ShapiroH #pointer #precise
The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
SASSAS-1997-SpeirsSS #termination
Termination Analysis for Mercury (CS, ZS, HS), pp. 160–171.
SASSAS-1997-TalbotTD #automaton #logic programming
Set-Based Analysis for Logic Programming and Tree Automata (JMT, ST, PD), pp. 127–140.
AdaTRI-Ada-1997-Conn #source code
The Source Code Analysis Tool Construction Project (RLC), pp. 141–148.
AdaTRI-Ada-1997-RileyDP #implementation #verification
An Instance of the Application Download Pattern: The SPAIDS Software Loader/Verifier Domain Analysis and Implementation (JDR, SD, WP), pp. 273–278.
RERE-1997-Ben-AbdallahLK #functional #requirements #specification
Integrated Specification and Analysis of Functional, Temporal, and Resource Requirements (HBA, IL, YSK), pp. 198–209.
RERE-1997-DarimontDML #integration #layout #named #requirements
GRAIL/KAOS: An Environment for Goal-Driven Requirements Analysis, Integration and Layout (RD, ED, PM, AvL), p. 140.
RERE-1997-FaulkH #approach #requirements #specification
The SCR Approach to Requirements Specification and Analysis (SRF, CLH), p. 263.
RERE-1997-ModugnoLRPS #requirements #safety #specification
Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
RERE-1997-YenT #requirements #trade-off
A Systematic Tradeoff Analysis for Conflicting Imprecise Requirements (JY, WAT), p. 87–?.
ASEASE-1997-Dwyer #composition #concurrent
Modular Flow Analysis for Concurrent Software (MBD), pp. 264–273.
ASEASE-1997-HarrisonB #data flow #design #information management
Data Flow Analysis within the ITOC Information System Design Recovery Tool (JVH, AB), p. 227–?.
ASEASE-1997-LamJ #requirements #reuse
Mechanising Requirements Engineering: Reuse and the Application of Domain Analysis Technology (WL, SJ), pp. 303–304.
ESECESEC-FSE-1997-AlborghettiGM #automation #deduction
Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
ESECESEC-FSE-1997-ChenGK #c++ #detection #reachability
A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
ESECESEC-FSE-1997-CheungGK #composition #liveness #reachability #using #verification
Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
ESECESEC-FSE-1997-Obbink #architecture #case study #experience #industrial
Analysis of Software Architectures in High and Low Volume Electronic Systems, Industrial Experience Report (JHO), pp. 523–524.
ICSEICSE-1997-ArdisW #product line
Defining Families: The Commonality Analysis (MAA, DMW), pp. 649–650.
ICSEICSE-1997-Damon #design #interactive #named
Nitpick: A Tool for Interactive Design Analysis (CD), pp. 596–597.
ICSEICSE-1997-Fowler #design #object-oriented #overview
A Survey of Object Oriented Analysis and Design Methods (MF), pp. 653–654.
ICSEICSE-1997-PezzeY #modelling #multi #semantics #tool support #using
Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
ICSEICSE-1997-PighinZ #metric #predict #statistics
A Predictive Metric Based on Discriminant Statistical Analysis (MP, RZ), pp. 262–270.
ICSEICSE-1997-ReeseL
Software Deviation Analysis (JDR, NGL), pp. 250–260.
ICSEICSE-1997-TonellaAFM #c++ #morphism #pointer #polymorphism #slicing
Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
ICSEICSE-1997-WilsonRH #automation #specification
Automated Analysis of Requirement Specifications (WMW, LHR, LEH), pp. 161–171.
ICSEICSE-1997-YurRLS #c #incremental
Incremental Analysis of Side Effects for C Software System (JSY, BGR, WL, PS), pp. 422–432.
SACSAC-1997-DamianiT #clustering
Dynamic clustering for technology-based domain analysis (TDA) (ED, ADT), pp. 204–206.
SACSAC-1997-LinXY #parallel #performance #problem
Performance analysis for parallel solutions to generic search problems (WML, WX, BY), pp. 422–430.
ASF+SDFASF+SDF-1997-Moonen #architecture #data flow #reverse engineering
A generic architecture for data flow analysis to support reverse engineering (LM), p. 10.
DACDAC-1997-ChenL #design #power management
Power Supply Noise Analysis Methodology for Deep-Submicron VLSI Chip Design (HHC, DDL), pp. 638–643.
DACDAC-1997-CongHKNSY #2d
Analysis and Justification of a Simple, Practical 2 1/2-D Capacitance Extraction Methodology (JC, LH, ABK, DN, NS, SHCY), pp. 627–632.
DACDAC-1997-KlenkeMAJRG #dependence #design #performance
An Integrated Design Environment for Performance and Dependability Analysis (RHK, MM, JHA, BWJ, RR, AG), pp. 184–189.
DACDAC-1997-KukimotoB #detection
Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
DACDAC-1997-MalikML #embedded
Static Timing Analysis of Embedded Software (SM, MM, YTSL), pp. 147–152.
DACDAC-1997-MarculescuMP #finite #probability #sequence #state machine
Sequence Compaction for Probabilistic Analysis of Finite-State Machines (DM, RM, MP), pp. 12–15.
DACDAC-1997-PasseroneLCS #hardware #performance #prototype #trade-off
Fast Hardware/Software Co-Simulation for Virtual Prototyping and Trade-Off Analysis (CP, LL, MC, ALSV), pp. 389–394.
DACDAC-1997-SudarsanamLD #architecture #evaluation
Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures (AS, SYL, SD), pp. 287–292.
DATEEDTC-1997-DasdanMG #constraints #debugging #embedded #named
RATAN: A tool for rate analysis and rate constraint debugging for embedded systems (AD, AM, RKG), pp. 2–6.
DATEEDTC-1997-FradinMD #3d
Analysis of 3D conjugate heat transfers in electronics (JPF, LM, BD), pp. 190–194.
DATEEDTC-1997-Garcia-VargasGFR #algorithm #generative #scalability
An algorithm for numerical reference generation in symbolic analysis of large analog circuits (IGV, MG, FVF, ÁRV), pp. 395–399.
DATEEDTC-1997-GuLKP #testing
A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
DATEEDTC-1997-KunduG
Inductance analysis of on-chip interconnects [deep submicron CMOS] (SK, UG), pp. 252–255.
DATEEDTC-1997-NouraniP #behaviour #using
Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
DATEEDTC-1997-WalrathVB #partial evaluation #performance #using #verification
Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
PDPPDP-1997-JellyMRSC #concurrent #detection
Detecting deadlock with client-server analysis (IJ, MM, SR, CS, PRC), pp. 351–357.
PPoPPPPoPP-1997-GuLL #array #data flow #experience #performance
Experience with Efficient Array Data-Flow Analysis for Array Privatization (JG, ZL, GL), pp. 157–167.
TACASTACAS-1997-ParashkevovY #performance #pseudo #reachability #using
Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
TACASTACAS-1997-Tofts #composition #performance
Compositional Performance Analysis (CMNT), pp. 290–305.
TAPSOFTTAPSOFT-1997-MuthD #alias #complexity #on the #pointer
On the Complexity of Function Pointer May-Alias Analysis (RM, SKD), pp. 381–392.
TAPSOFTTAPSOFT-1997-Thiemann #framework
A Unified Framework for Binding-Time Analysis (PT), pp. 742–756.
CAVCAV-1997-BoigelotBR #hybrid #linear #reachability
An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (BB, LB, SR), pp. 167–178.
CAVCAV-1997-Godefroid #automation #concurrent #named
VeriSoft: A Tool for the Automatic Analysis of Concurrent Reactive Software (PG), pp. 476–479.
CAVCAV-1997-VarpaaniemiHL #performance #reachability
prod 3.2: An Advanced Tool for Efficient Reachability Analysis (KV, KH, JL), pp. 472–475.
ICLPICLP-1997-BruynoogheJK #logic programming #programming language
Live-Structure Analysis for Logic Programming Languages with Declarations (MB, GJ, AK), pp. 33–47.
ICLPICLP-1997-BuenoCL #logic programming #set #source code #using
Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
ICLPICLP-1997-DebrayGH #logic programming #source code
Non-Failure Analysis for Logic Programs (SKD, PLG, MVH), pp. 48–62.
ICLPICLP-1997-DecorteS #automation #constraints #logic programming #source code
Demand-Driven and Constraint-Based Automatic Left-Termination Analysis for Logic Programs (SD, DDS), pp. 78–92.
ICLPICLP-1997-LindenstraussS #automation #logic programming #source code #termination
Automatic Termination Analysis of Logic Programs (NL, YS), pp. 63–77.
ICLPICLP-1997-SmausHK #logic programming #source code
Domain Construction for Mode Analysis of Typed Logic Programs (JGS, PMH, AK), p. 418.
ICLPILPS-1997-Hermenegildo #programming
Programming with Global Analysis (MVH), pp. 49–50.
ICLPILPS-1997-KingSB #bound #logic programming #source code
Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
ICLPILPS-1997-Podelski #logic programming #source code
Set-Based Analysis of Logic Programs and Reactive Logic Programs (AP), pp. 35–36.
ICLPILPS-1997-TanL #logic programming #precise #recursion #source code
Recursive Modes for Precise Analysis of Logic Programs (JT, IPL), pp. 277–290.
LICSLICS-1997-HeintzeM #on the #polynomial #type system
On the Cubic Bottleneck in Subtyping and Flow Analysis (NH, DAM), pp. 342–351.
LICSLICS-1997-HuthK #model checking
Quantitative Analysis and Model Checking (MH, MZK), pp. 111–122.
DL-1996-PediotakisH #visual notation
Visual Relevance Analysis (NP, MHZ), pp. 54–62.
VLDBVLDB-1996-Cuppens #database #logic #multi #query
Querying a Multilevel Database: A Logical Analysis (FC), pp. 484–494.
VLDBVLDB-1996-FaloutsosG #using
Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
VLDBVLDB-1996-Suciu96a #implementation #parallel #query
Implementation and Analysis of a Parallel Collection Query Language (DS), pp. 366–377.
VLDBVLDB-1996-Sullivan #database #named #network
Tribeca: A Stream Database Manager for Network Traffic Analysis (MS), p. 594.
ITiCSEITiCSE-1996-Krone #algorithm #data type #education #symbolic computation #using
Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
ITiCSEITiCSE-1996-MarsdenO #education #framework #modelling #multi #named #process #tool support
MuPMoTT: a multimedia based tool supporting the teaching of process modelling within a framework of structured system analysis (PM, MO), pp. 116–118.
ITiCSEITiCSE-1996-SanchezV #education #image #lisp
ViLi (Vision LISP): a software environment for teaching image processing and analysis (JS, JV), p. 234.
ICSMEICSM-1996-CanforaCL #specification #tool support
Specifying code analysis tools (GC, AC, ADL), pp. 95–103.
ICSMEICSM-1996-YoungerLBB #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
WCREWCRE-1996-ChaseHRY #architecture
Analysis and Presentation of Recovered Software Architectures (MPC, DRH, SNR, ASY), pp. 153–162.
WCREWCRE-1996-TonellaFAM #architecture #case study
Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic — A Case Study (PT, RF, GA, EM), pp. 198–207.
WCREWCRE-1996-YoungerLBB #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
WPCWPC-1996-BlazyF #comprehension #interprocedural
Interprocedural analysis for program comprehension by specialization (SB, PF), p. 133–?.
ICALPICALP-1996-AlbersM #algorithm
Average Case Analyses of List Update Algorithms, with Applications to Data Compression (SA, MM), pp. 514–525.
ICALPICALP-1996-ChoiG #algorithm
Lopsided Trees: Analyses, Algorithms, and Applications (VSNC, MJG), pp. 538–549.
FMFME-1996-BicarreguiDW #formal method
Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
FMFME-1996-BoigelotG #model checking #protocol #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
ICFPICFP-1996-AbadiLL #dependence
Analysis and Caching of Dependencies (MA, BWL, JJL), pp. 83–91.
ICFPICFP-1996-SerranoF
Storage Use Analysis and its Applications (MS, MF), pp. 50–61.
IFLIFL-1996-DebbabiFT #algorithm #concurrent #control flow #higher-order #source code #type system
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs (MD, AF, NT), pp. 247–266.
CHICHI-1996-Erickson #design #using
The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
CAiSECAiSE-1996-BatesBFL #formal method #guidelines #object-oriented
Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
CAiSECAiSE-1996-CastanoA #process #unification
Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
KDDAKDDM-1996-FayyadDW #automation
Automating the Analysis and Cataloging of Sky Surveys (UMF, SGD, NW), pp. 471–493.
ICMLICML-1996-OkamotoY #classification #nearest neighbour
Theoretical Analysis of the Nearest Neighbor Classifier in Noisy Domains (SO, NY), pp. 355–363.
ICPRICPR-1996-AstromH #detection #modelling #probability
Stochastic modelling and analysis of sub-pixel edge detection (, AH), pp. 86–90.
ICPRICPR-1996-AstromH96a #probability
Stochastic analysis of scale-space smoothing (, AH), pp. 305–309.
ICPRICPR-1996-BatistaAA
Pose view stability analysis for camera look angles computation (JB, HA, ATdA), pp. 171–175.
ICPRICPR-1996-BelloK #using
Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
ICPRICPR-1996-BiancardiM #component #image #source code
Connected component support for image analysis programs (AB, AM), pp. 620–624.
ICPRICPR-1996-ChangH
Ribbon-based motion analysis of human body movements (ICC, CLH), pp. 436–440.
ICPRICPR-1996-ChenL96a #multi
A multiresolution wavelet analysis of digital mammograms (CHC, GGL), pp. 710–714.
ICPRICPR-1996-ChenLC #classification #sequence #using
Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
ICPRICPR-1996-Dzemyda #set #visual notation
Visual analysis of a set of function values (GD), pp. 700–704.
ICPRICPR-1996-GunselT #retrieval #similarity
Similarity analysis for shape retrieval by example (BG, AMT), pp. 330–334.
ICPRICPR-1996-HancockP #correlation #exponential #memory management
An analysis of the exponential correlation associative memory (ERH, MP), pp. 291–295.
ICPRICPR-1996-Hauta-KasariPJL #matrix #multi
Generalized co-occurrence matrix for multispectral texture analysis (MHK, JP, TJ, RL), pp. 785–789.
ICPRICPR-1996-HotterMM #detection #estimation #fault #robust #statistics #using
Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
ICPRICPR-1996-HusseinNO #using
Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
ICPRICPR-1996-KashinoH #integration #music
A music scene analysis system with the MRF-based information integration scheme (KK, NH), pp. 725–729.
ICPRICPR-1996-KasprzakC #component #image #independence
Hidden image separation from incomplete image mixtures by independent component analysis (WK, AC), pp. 394–398.
ICPRICPR-1996-KiaD #documentation
Structural compression for document analysis (OEK, DSD), pp. 664–668.
ICPRICPR-1996-KosibaK #automation
Automatic invoice interpretation: invoice structure analysis (DAK, RK), pp. 721–725.
ICPRICPR-1996-KotcheffRTH
Shape model analysis of THR radiographs (ACWK, ALR, CJT, DWLH), pp. 391–395.
ICPRICPR-1996-KrotkovKZ #invariant #synthesis
Analysis and synthesis of the sounds of impact based on shape-invariant properties of materials (EK, RLK, NBZ), pp. 115–119.
ICPRICPR-1996-LasakulAK #formal method #image #linear #multi #using
A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
ICPRICPR-1996-Marchand-MailletS #approach #image
A minimum spanning tree approach to line image analysis (SMM, YMS), pp. 225–230.
ICPRICPR-1996-MozefWJT #architecture #component #parallel
Parallel architecture dedicated to connected component analysis (EM, SW, JJ, ET), pp. 699–703.
ICPRICPR-1996-NakajimaTKY #layout #process #verification
Analysis of address layout on Japanese handwritten mail-a hierarchical process of hypothesis verification (NN, TT, TK, KY), pp. 726–731.
ICPRICPR-1996-Nishida #modelling #synthesis
Analysis and synthesis of deformed patterns based on structural models (HN), pp. 315–319.
ICPRICPR-1996-OkadaS
A morphological subtraction scheme for form analysis (MO, MS), pp. 190–194.
ICPRICPR-1996-Polikarpova #on the
On the fractal features in fingerprint analysis (NP), pp. 591–595.
ICPRICPR-1996-Roberts #clustering
Scale-space unsupervised cluster analysis (SJR), pp. 106–110.
ICPRICPR-1996-Sablatnig #automation #detection #flexibility #visual notation
Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
ICPRICPR-1996-SawasakiMU #design #implementation #performance #realtime #visual notation
Design and implementation of high-speed visual tracking system for real-time motion analysis (NS, TM, TU), pp. 478–483.
ICPRICPR-1996-ShihHL #estimation #parametricity
Accuracy analysis on the estimation of camera parameters for active vision systems (SWS, YPH, WSL), pp. 930–935.
ICPRICPR-1996-ShiniK #3d #metric
3D measurement strategy based on a projection invariance motion analysis with an artificial retina sensor (CWS, KIK), pp. 369–373.
ICPRICPR-1996-Sinclair96a #clustering
Cluster-based texture analysis (DS), pp. 825–829.
ICPRICPR-1996-Solberg #classification #flexibility
Texture fusion and classification based on flexible discriminant analysis (AHSS), pp. 596–600.
ICPRICPR-1996-SugiyamaA #multi
Edge feature analysis by a vectorized feature extractor and in multiple edges (TS, KA), pp. 280–284.
ICPRICPR-1996-TatsunoSYIT #image #synthesis #using
Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
ICPRICPR-1996-TozakiKNOEM #3d #image #using
Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
ICPRICPR-1996-UhlF #recognition
Spatiotemporal signal analysis: recognition of interacting modes (CU, RF), pp. 55–59.
ICPRICPR-1996-WalkerJ #geometry #statistics
Statistical geometric features-extensions for cytological texture analysis (RFW, PTJ), pp. 790–794.
ICPRICPR-1996-WangF #algorithm #overview #pattern matching #pattern recognition #recognition #search-based
Applying genetic algorithms on pattern recognition: an analysis and survey (YKW, KCF), pp. 740–744.
ICPRICPR-1996-WatanabeTO #recognition
A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
ICPRICPR-1996-WilsonCH
Sensitivity analysis for structural matching (RCW, ADJC, ERH), pp. 62–66.
ICPRICPR-1996-WorringW #using
Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
ICPRICPR-1996-WouwerSD #classification #speech
Wavelet-FILVQ classifier for speech analysis (GVdW, PS, DVD), pp. 214–218.
ICPRICPR-1996-Young #image
Sampling density for image analysis (ITY), pp. 840–843.
ICPRICPR-1996-ZribiFG #3d #invariant #set
Set of invariant features for three-dimensional gray-level objects by harmonic analysis (MZ, HF, FG), pp. 549–553.
SEKESEKE-1996-CiancariniCM #requirements #testing
Engineering Formal Requirements: Analysis and Testing (PC, SC, CM), pp. 385–392.
SEKESEKE-1996-Starks #architecture #development
Development of a Software Architecture for the Analysis of Geographic and Image-Based Data (SAS), pp. 116–120.
SEKESEKE-1996-WangTCR #slicing
The Role of Program Slicing in Ripple Effect Analysis (YW, WTT, XC, SR), pp. 369–376.
SEKESEKE-1996-XuZ #automation #problem #requirements #specification
Requirements Analysis and Specification as a Problem of Software Automation (JX, HZ), pp. 457–464.
SIGIRSIGIR-1996-XuC #documentation #query #using
Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
OOPSLAOOPSLA-1996-DiwanMM #effectiveness #object-oriented #source code #static typing
Simple and Effective Analysis of Statically Typed Object-Oriented Programs (AD, JEBM, KSM), pp. 292–305.
PLDIPLDI-1996-ChakrabartiGC #communication #optimisation
Global Communication Analysis and Optimization (SC, MG, JDC), pp. 68–78.
PLDIPLDI-1996-Ramalingam #data flow
Data Flow Frequency Analysis (GR), pp. 267–277.
PLDIPLDI-1996-RinardD #commutative #compilation #framework
Commutativity Analysis: A New Analysis Framework for Parallelizing Compilers (MCR, PCD), pp. 54–67.
PLDIPLDI-1996-SreedharGL #data flow #framework #graph #incremental #using
A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
PPDPPLILP-1996-WeyerW #graph #prolog
Annotated Structure Shape Graphs for Abstract Analysis of Prolog (GW, WHW), pp. 92–106.
POPLPOPL-1996-Ashley #flexibility #higher-order
A Practical and Flexible Flow Analysis for Higher-Order Languages (JMA), pp. 184–194.
POPLPOPL-1996-DaviesP #staged
A Modal Analysis of Staged Computation (RD, FP), pp. 258–270.
POPLPOPL-1996-GhiyaH #c #graph #pointer
Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
POPLPOPL-1996-Steensgaard #linear #points-to
Points-to Analysis in Almost Linear Time (BS), pp. 32–41.
SASSAS-1996-AndersenH #functional #higher-order #partial evaluation #termination
Termination Analysis for Offline Partial Evaluation of a Higher Order Functional Language (PHA, CKH), pp. 67–82.
SASSAS-1996-BrauburgerG #termination
Termination Analysis for Partial Functions (JB, JG), pp. 113–127.
SASSAS-1996-BruynoogheDBDM #logic programming #source code
A Freeness and Sharing Analysis of Logic Programs Based on a Pre-interpretation (MB, BD, DB, MD, AM), pp. 128–142.
SASSAS-1996-Emeljanov #similarity
Analysis of the Equality Relations for the Program Terms (PGE), pp. 174–188.
SASSAS-1996-KellyMSS #constraints #incremental #logic programming #source code
Two Applications of an Incremental Analysis Engine for (Constraint) Logic Programs (ADK, KM, HS, PJS), pp. 385–386.
SASSAS-1996-PueblaH #algorithm #incremental #logic programming #source code
Optimized Algorithms for Incremental Analysis of Logic Programs (GP, MVH), pp. 270–284.
SASSAS-1996-Venet #alias #source code
Abstract Cofibered Domains: Application to the Alias Analysis of Untyped Programs (AV), pp. 366–382.
REICRE-1996-Anton #requirements
Goal-Based Requirements Analysis (AIA), pp. 136–144.
REICRE-1996-BustardDC #object-oriented
Integrating Soft Systems and Object-Oriented Analysis (DWB, TJD, BNC), pp. 52–59.
REICRE-1996-ChampionM #enterprise #requirements
Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
REICRE-1996-KoestersPS #information management #named #object-oriented
GeoOOA: Object-Oriented Analysis for Geographic Information Systems (GK, BUP, HWS), pp. 245–254.
REICRE-1996-KostersSV #requirements #user interface
Combined Analysis of User Interface and Domain Requirements (GK, HWS, JV), pp. 199–207.
REICRE-1996-LutzW #case study #experience #requirements
Experience Report: Contributions of SFMEA to Requirements Analysis (RRL, RMW), pp. 44–51.
REICRE-1996-NissenJJZH #case study #concept #experience #modelling #multi #requirements
Requirements Analysis from Multiple Perspectives: Experiences with Conceptual Modeling Technology (HWN, MAJ, MJ, GVZ, HH), p. 217.
REICRE-1996-SantosC #assessment #development #information management #object-oriented
An assessment of the applicability of object-oriented analysis to the development of information systems (IS, JAC), pp. 238–244.
REICRE-1996-TakahashiPKOS #collaboration #hypermedia #requirements
Hypermedia Support for Collaboration in Requirements Analysis (KT, CP, VK, KO, JDS), pp. 31–41.
REICRE-1996-Vanwelkenhuysen #development #quality #requirements
Quality Requirements Analysis in Customer-Centered Software Development (JV), pp. 117–125.
FSEFSE-1996-NaumovichCO #communication #data flow #protocol #using #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
FSEFSE-1996-ZhangRL #alias #composition #pointer #towards
Program Decomposition for Pointer Aliasing: A Step Toward Practical Analyses (SZ, BGR, WL), pp. 81–92.
ICSEICSE-1996-CheungK #composition #reachability #safety
Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
ICSEICSE-1996-Forgacs #array #data flow #testing
An Exact Array Reference Analysis for Data Flow Testing (IF), pp. 565–574.
ICSEICSE-1996-WoodsY #approach #comprehension #heuristic #problem
The Program Understanding Problem: Analysis and a Heuristic Approach (SGW, QY), pp. 6–15.
SACSAC-1996-Asgharzadeh #fuzzy #image #rule-based #using
Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
SACSAC-1996-RajePG #named #object-oriented #source code
OFFERS — a tool for hierarchical implicit analysis of sequential object-oriented programs (RRR, DP, ETG), pp. 437–441.
ASPLOSASPLOS-1996-ChenCM #branch #predict
Analysis of Branch Prediction Via Data Compression (ICKC, JTC, TNM), pp. 128–137.
ASPLOSASPLOS-1996-McKinleyT #locality
A Quantitative Analysis of Loop Nest Locality (KSM, OT), pp. 94–104.
CCCC-1996-Steensgaard #points-to #source code #type inference
Points-to Analysis by Type Inference of Programs with Structures and Unions (BS), pp. 136–150.
DACDAC-1996-AluruNW #parallel
A Parallel Precorrected FFT Based Capacitance Extraction Program for Signal Integrity Analysis (NRA, VBN, JW), pp. 363–366.
DACDAC-1996-Bryant
Bit-Level Analysis of an SRT Divider Circuit (REB), pp. 661–665.
DACDAC-1996-Gupta #constraints #embedded #execution
Analysis of Operation Delay and Execution Rate Constraints for Embedded Systems (RKG), pp. 601–604.
DACDAC-1996-HosseiniMK #code generation #functional #verification
Code Generation and Analysis for the Functional Verification of Microprocessors (AH, DM, PK), pp. 305–310.
DACDAC-1996-KahngM
Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
DACDAC-1996-KantrowitzN #correctness #simulation #verification #what
I’m Done Simulating: Now What? Verification Coverage Analysis and Correctness Checking of the DECchip 21164 Alpha Microprocessor (MK, LMN), pp. 325–330.
DACDAC-1996-KernsY #congruence #multi #network #performance #reduction #scalability
Stable and Efficient Reduction of Large, Multiport RC Networks by Pole Analysis via Congruence Transformations (KJK, ATY), pp. 280–285.
DACDAC-1996-MonahanB #concurrent #optimisation
Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
DACDAC-1996-PhilippsCL #performance #reduction
Efficient Full-Wave Electromagnetic Analysis via Model-Order Reduction of Fast Integral Transforms (JRP, EC, DDL), pp. 377–382.
DACDAC-1996-RaghunathanDJ #reduction
Glitch Analysis and Reduction in Register Transfer Level (AR, SD, NKJ), pp. 331–336.
DACDAC-1996-SatyanarayanaP #energy #named
HEAT: Hierarchical Energy Analysis Tool (JHS, KKP), pp. 9–14.
DACDAC-1996-TelicheveskyKW #performance
Efficient AC and Noise Analysis of Two-Tone RF Circuits (RT, KSK, JW), pp. 292–297.
DACDAC-1996-VerlindJL #performance
Efficient Partial Enumeration for Timing Analysis of Asynchronous Systems (EV, GGdJ, BL), pp. 55–58.
PDPPDP-1996-AlcoverLDZ #design #interactive #network #statistics
Interconnection Network Design: A Statistical Analysis of Interactions between Factors (RA, PL, JD, LZ), pp. 211–218.
PDPPDP-1996-BorgeestR #database #relational
Trace Analysis with a Relational Database System (RB, CR), pp. 243–251.
PDPPDP-1996-KimKYMC #multi #network #performance
Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution (BK, BK, HY, SM, JWC), pp. 196–203.
PDPPDP-1996-SchikutaK #evaluation #sorting
Analysis and Evaluation of Sorting on Hypercube-Based Systems (ES, PK), pp. 258–265.
TAPSOFTTAPSOFT-J-1995-SagivRH96 #constant #data flow #interprocedural #precise
Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation (SS, TWR, SH), pp. 131–170.
ESOPESOP-1996-BuenoGHP #prolog #source code #standard
Global Analysis of Standard Prolog Programs (FB, DCG, MVH, GP), pp. 108–124.
ESOPESOP-1996-JensenM #geometry #interactive
Flow Analysis in the Geometry of Interaction (TPJ, IM), pp. 188–203.
STOCSTOC-1996-DimitriouI #algorithm #optimisation #towards
Towards an Analysis of Local Optimization Algorithms (TD, RI), pp. 304–313.
STOCSTOC-1996-Slavik #algorithm #set
A Tight Analysis of the Greedy Algorithm for Set Cover (PS), pp. 435–441.
TACASTACAS-1996-BerghammerKU #algebra #perspective #petri net
Realtion-Algebraic Analysis of Petri Nets with RELVIEW (RB, BvK, CU), pp. 49–69.
TACASTACAS-1996-HermannsMR #algebra #probability #process
A Construction and Analysis Tool Based on the Stochastic Process Algebra TIPP (HH, VM, MR), pp. 427–430.
TACASTACAS-1996-Rauzy #constraints #reduction #specification #using
Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (AR), p. 417.
CAVCAV-1996-CamposG #model checking #verification
Selective Quantitative Analysis and Interval Model Checking: Verifying Different Facets of a System (SVAC, OG), pp. 257–268.
CAVCAV-1996-ClarkeBLXS #bound #named #realtime #specification #tool support #visual notation
XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
CAVCAV-1996-MerinoT #communication #integration #named #protocol #verification
EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
CAVCAV-1996-TripakisY #bisimulation
Analysis of Timed Systems Based on Time-Abstracting Bisimulation (ST, SY), pp. 232–243.
ISSTAISSTA-1996-ChamillardC #concurrent #petri net #source code
Improving the Accuracy of Petri Net-Based Analysis of Concurrent Programs (ATC, LAC), pp. 24–38.
ISSTAISSTA-1996-DaranT #case study #fault
Software Error Analysis: A Real Case Study Involving Real Faults and Mutations (MD, PTF), pp. 158–171.
ISSTAISSTA-1996-Heimdahl #case study #experience #lessons learnt
Experiences and Lessons from the Analysis of TCAS II (MPEH), pp. 79–83.
ISSTAISSTA-1996-HowdenS #linear #sequence
Linear and Structural Event Sequence Analysis (WEH, GMS), pp. 98–106.
ISSTAISSTA-1996-KangL #generative #performance #realtime
An Efficient State Space Generation for Analysis of Real-Time Systems (IK, IL), pp. 4–13.
ISSTAISSTA-1996-MorellM #testing #using
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
ISSTAISSTA-1996-PezzeY #generative #multi #tool support
Generation of Multi-Formalism State-Space Analysis Tools (MP, MY), pp. 172–179.
ISSTAISSTA-1996-PomakisA #feature model #interactive #reachability
Reachability Analysis of Feature Interactions: A Progress Report (KPP, JMA), pp. 216–223.
ISSTAISSTA-1996-Tracz #architecture
Test and Analysis of Software Architectures (WT), pp. 1–3.
ICLPJICSLP-1996-FalaschiHW #concurrent #constraints #source code
Demand Transformation Analysis for Concurrent Constraint Programs (MF, PH, WHW), pp. 333–347.
LICSLICS-1996-BasinG #complexity #order
Complexity Analysis Based on Ordered Resolution (DAB, HG), pp. 456–465.
LICSLICS-1996-Davies #approach
A Temporal-Logic Approach to Binding-Time Analysis (RD), pp. 184–195.
ICDARICDAR-v1-1995-EspositoMS #approach #knowledge-based #layout
A knowledge-based approach to the layout analysis (FE, DM, GS), pp. 466–471.
ICDARICDAR-v1-1995-GarciaDPC #detection #fault #pseudo #recognition #using
Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
ICDARICDAR-v1-1995-GreenK #modelling
Model-based analysis of printed tables (EAG, MSK), pp. 214–217.
ICDARICDAR-v1-1995-HoriD #reasoning #robust
Robust table-form structure analysis based on box-driven reasoning (OH, DSD), pp. 218–221.
ICDARICDAR-v1-1995-LeTW #documentation #image #using
Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
ICDARICDAR-v1-1995-TwaakyondoO #recognition
Structure analysis and recognition of mathematical expressions (HMT, MO), pp. 430–437.
ICDARICDAR-v2-1995-AlimiG #fault #online #recognition
The analysis of error in an on-line recognition system of Arabic handwritten characters (AMA, OAG), pp. 890–893.
ICDARICDAR-v2-1995-CouasnonC #documentation #music #recognition
A way to separate knowledge from program in structured document analysis: application to optical music recognition (BC, JC), pp. 1092–1097.
ICDARICDAR-v2-1995-FutrelleN #constraints #diagrams #parsing #performance #using
Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
ICDARICDAR-v2-1995-Hirayama #using
A method for table structure analysis using DP matching (YH), pp. 583–586.
ICDARICDAR-v2-1995-Hoch #documentation #named #recognition
READLEX: a lexicon for the recognition and analysis of structured documents (RH), pp. 549–552.
ICDARICDAR-v2-1995-Liu-GongDP #documentation #layout #recognition
A general analysis system for document’s layout structure recognition (YHLG, BD, HNP), pp. 597–600.
ICDARICDAR-v2-1995-LuLC #documentation #named #retrieval
TheSys — A comprehensive thesaurus system for intelligent document analysis and text retrieval (CL, KHL, HYC), pp. 1169–1173.
ICDARICDAR-v2-1995-PavlidisSS #graph
Matching graph embeddings for shape analysis (TP, WJS, HS), pp. 729–733.
ICDARICDAR-v2-1995-SauvolaP #classification #feature model #performance #segmentation #using
Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
ICDARICDAR-v2-1995-TangMMLS #approach #documentation
A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
ICDARICDAR-v2-1995-TrierTJ
Data capture from maps based on gray scale topographic analysis (ØDT, TT, AKJ), pp. 923–926.
ICSMEICSM-1995-Williams #case study #design #experience #object-oriented #using
Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
WCREWCRE-1995-LeiteC #specification
Recovering Business Rules from Structured Analysis Specifications (JCSdPL, PMC), pp. 13–21.
FPCAFPCA-1995-JeuringS #functional #problem #source code
Constructing Functional Programs for Grammar Analysis Problems (JJ, SDS), pp. 259–269.
CHICHI-1995-AalstCM #design #framework #learning #user interface
Design Space Analysis as “Training Wheels” in a Framework for Learning User Interface Design (JWvA, TTC, DLM), pp. 154–161.
CAiSECAiSE-1995-DuffyMMM #automation #framework #reasoning #requirements #using
A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
CAiSECAiSE-1995-Herbst #metamodelling
A Meta-Model for Business Rules in Systems Analysis (HH), pp. 186–199.
CAiSECAiSE-1995-OpdahlS #modelling #problem
Facet Models for Problem Analysis (ALO, GS), pp. 54–67.
ICMLICML-1995-Cussens #algorithm #finite #learning
A Bayesian Analysis of Algorithms for Learning Finite Functions (JC), pp. 142–149.
SEKESEKE-1995-Debenham #approach #design #knowledge-based #requirements #specification
A Unified Approach to Requirements Specification and System Analysis in the Design of Knowledge-Based Systems (JKD), p. 144.
SEKESEKE-1995-LuD #distributed #object-oriented #simulation #specification
An Environment for Specification, Simulation and Analysis of Distributed Object-Oriented Systems (SL, YD), pp. 402–410.
SIGIRSIGIR-1995-Dubin #documentation #visualisation
Document Analysis for Visualization (DD), pp. 199–204.
SIGIRSIGIR-1995-Ornager #clustering #database #empirical #image #word
The Newspaper Image Database: Empirical Supported Analysis of Users’ Typology and Word Association Clusters (SO), pp. 212–218.
ECOOPECOOP-1995-DeanGC #object-oriented #optimisation #source code #using
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
AdaEuropeAdaEurope-1995-SchneeweissAV #ada #modelling #object-oriented
Translating Shlaer/Mellor Object-Oriented Analysis Models into Ada 95 (HS, VA, OV), pp. 249–270.
AdaEuropeAdaEurope-1995-Simoens #design #development #lifecycle #metric #object-oriented
The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
PEPMPEPM-1995-Cridlig #concurrent #model checking #semantics #using
Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
PEPMPEPM-1995-DasRH #imperative #semantics #source code
Semantic Foundations of Binding Time Analysis for Imperative Programs (MD, TWR, PVH), pp. 100–110.
PEPMPEPM-1995-Jensen #data flow #source code
Clock Analysis of Synchronous Dataflow Programs (TPJ), pp. 156–167.
PEPMPEPM-1995-Lu #logic programming #source code
Type Analysis of Logic Programs in the Presence of Type Definitions (LL), pp. 241–252.
PEPMPEPM-1995-RamakrishnanRS #constraints #framework #logic programming #source code #theorem proving
A Symbolic Constraint Solving Framework for Analysis of Logic Programs (CRR, IVR, RCS), pp. 12–23.
PEPMPEPM-1995-Reps #problem
Shape Analysis as a Generalized Path Problem (TWR), pp. 1–11.
PLDIPLDI-1995-AikenFL #higher-order #memory management
Better Static Memory Management: Improving Region-Based Analysis of Higher-Order Languages (AA, MF, RL), pp. 174–185.
PLDIPLDI-1995-Ruf #alias
Context-Insensitive Alias Analysis Reconsidered (ER), pp. 13–22.
PLDIPLDI-1995-WilsonL #c #performance #pointer #source code
Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
PPDPPLILP-1995-MasseyT #array #comprehension
Modes of Comprehension: Mode Analysis of Arrays and Array Comprehensions (BCM, ET), pp. 207–222.
PPDPPLILP-1995-MycroftS
Uniform PERs and Comportment Analysis (AM, KLS), pp. 169–187.
POPLPOPL-1995-AltucherL #alias
An Extended Form of Must Alias Analysis for Dynamic Allocation (RA, WL), pp. 74–84.
POPLPOPL-1995-HarperM #compilation #morphism #polymorphism #using
Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
POPLPOPL-1995-JagannathanW #higher-order
A Unified Treatment of Flow Analysis in Higher-Order Languages (SJ, SW), pp. 393–407.
POPLPOPL-1995-PalsbergO #type system
A Type System Equivalent to Flow Analysis (JP, PO), pp. 367–378.
POPLPOPL-1995-RepsHS #data flow #graph #interprocedural #precise #reachability
Precise Interprocedural Dataflow Analysis via Graph Reachability (TWR, SH, SS), pp. 49–61.
SASSAS-1995-DussartHM #polymorphism #polynomial #recursion #type system
Polymorphic Recursion and Subtype Qualifications: Polymorphic Binding-Time Analysis in Polynomial Time (DD, FH, CM), pp. 118–135.
SASSAS-1995-Giesl #functional #order #source code #termination #using
Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
SASSAS-1995-Hannan #functional #stack #type system
A Type-based Analysis for Stack Allocation in Functional Languages (JH), pp. 172–188.
SASSAS-1995-Heintze #control flow #type system
Control-Flow Analysis and Type Systems (NH), pp. 189–206.
SASSAS-1995-JagannathanW #effectiveness #runtime
Effective Flow Analysis for Avoiding Run-Time Checks (SJ, AKW), pp. 207–224.
SASSAS-1995-Mohnen #higher-order #inheritance #performance
Efficient Closure Utilisation by Higher-Order Inheritance Analysis (MM), pp. 261–278.
SASSAS-1995-Seward #haskell #implementation #polymorphism #prototype
Beyond Prototype Implementations: Polymorphic Projection Analysis for Glasgow Haskell (JS), pp. 382–399.
SASSAS-1995-Vedrine #abstract interpretation #strict
Binding-Time Analysis and Strictness Analysis by Abstract Interpretation (FV), pp. 400–417.
AdaTRI-Ada-1995-Shumate95b #design #functional #object-oriented #requirements
BATCES Solution #1: An Object-Oriented Design from Functional Requirements Analysis (KS), pp. 737–739.
RERE-1995-AtleeM #requirements #safety
Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
RERE-1995-BustardL #formal method #modelling
Enhancing soft systems analysis with formal modelling (DWB, PJL), pp. 164–171.
RERE-1995-PottsTSO #evaluation #internet #requirements
An evaluation of inquiry-based requirements analysis for an Internet service (CP, KT, JDS, KO), pp. 172–180.
ESECESEC-1995-Chamillard #case study #metric #performance #predict #reachability
An Exploratory Study of Program Metrics as Predictors of Reachability Analysis Performance (ATC), pp. 343–361.
ESECESEC-1995-GaskellP #ambiguity #execution #semantics
A Structured Analysis Formalism with Execution Semantics to Allow Unambiguous Model Interpretation (CG, RP), pp. 235–253.
ESECESEC-1995-WagnerG #incremental
Integrating Incremental Analysis with Version Management (TAW, SLG), pp. 205–218.
FSEFSE-1995-CheungK #composition #constraints #distributed #finite #reachability
Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints (SCC, JK), pp. 140–150.
FSEFSE-1995-HorwitzRS #data flow #interprocedural
Demand Interprocedural Dataflow Analysis (SH, TWR, SS), pp. 104–115.
ICSEICSE-1995-HeimdahlL #consistency #requirements
Completeness and Consistency Analysis of State-Based Requirements (MPEH, NGL), pp. 3–14.
ICSEICSE-1995-HenningerLR #approach #learning
An Organizational Learning Approach to Domain Analysis (SH, KL, AR), pp. 95–104.
SACSAC-1995-ChenH #algorithm #concurrent #database #performance
Performance analysis of a periodic data reorganization algorithm for concurrent B-trees in database systems (IRC, SH), pp. 40–45.
SACSAC-1995-Serrano #compilation #control flow #functional #paradigm
Control flow analysis: a functional languages compilation paradigm (MS), pp. 118–122.
SACSAC-1995-SmithPN #network #performance
Performance analysis of small FDDI networks (JS, LDP, TN), pp. 401–405.
SACSAC-1995-WongP #design
Design and analysis of fractals in an individual computing environment (KWW, JP), pp. 431–433.
DACDAC-1995-LeeT #algorithm #incremental
An Algorithm for Incremental Timing Analysis (JfL, DTT), pp. 696–701.
DACDAC-1995-LiM #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
DACDAC-1995-Rao #distributed
Delay Analysis of the Distributed RC Line (VBR), pp. 370–375.
DACDAC-1995-Ribas-XirgoC #fault #simulation
Analysis of Switch-Level Faults by Symbolic Simulation (LR, JC), pp. 352–357.
DACDAC-1995-RohfleischWA #logic #optimisation
Logic Clause Analysis for Delay Optimization (BR, BW, KA), pp. 668–672.
DACDAC-1995-TelicheveskyKW #performance
Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
DACDAC-1995-TremblayMIK #architecture #flexibility #performance #trade-off
A Fast and Flexible Performance Simulator for Micro-Architecture Trade-off Analysis on UltraSPARC-I (MT, GM, AI, LK), pp. 2–6.
DACDAC-1995-WempleY #megamodelling #using
Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
LCTESLCT-RTS-1995-CamposCMM #finite #named #realtime
Verus: A Tool for Quantitative Analysis of Finite-State Real-Time Systems (SVAC, EMC, WRM, MM), pp. 70–78.
LCTESLCT-RTS-1995-JourdanM #realtime
Static Timing Analysis of Real-Time Systems (MJ, FM), pp. 79–87.
LCTESLCT-RTS-1995-KoWH #constraints
Supporting User-Friendly Analysis of Timing Constraints (LK, DBW, MGH), pp. 99–107.
LCTESLCT-RTS-1995-LiM #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
LCTESLCT-RTS-1995-NilsenR #execution #worst-case
Worst-Case Execution Time Analysis on Modern Processors (KDN, BR), pp. 20–30.
PDPPDP-1995-EspasaVPJA
Quantitative analysis of vector code (RE, MV, DAP, MJ, EA), pp. 452–463.
PPoPPPPoPP-1995-CollardBF #array #data flow #fuzzy
Fuzzy Array Dataflow Analysis (JFC, DB, PF), pp. 92–101.
STOCSTOC-1995-GhoshLMMPRRTZ #algorithm
Tight analyses of two local load balancing algorithms (BG, FTL, BMM, SM, CGP, RR, AWR, RET, DZ), pp. 548–558.
TACASTACAS-1995-KnoopSV #exclamation #explosion #for free #parallel
Parallelism for Free: Bitvector Analyses -> No State Explosion! (JK, BS, JV), pp. 264–289.
TAPSOFTTAPSOFT-1995-Palsberg
Comparing Flow-Based Binding-Time Analyses (JP), pp. 561–574.
TAPSOFTTAPSOFT-1995-SagivRH #constant #data flow #interprocedural #precise
Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation (SS, TWR, SH), pp. 651–665.
TAPSOFTTAPSOFT-1995-Solberg #strict
Strictness and Totality Analysis with Conjunction (KLS), pp. 501–515.
CAVCAV-1995-EirikssonM #case study #design #using #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
CAVCAV-1995-HenzingerH #algorithm #hybrid
Algorithmic Analysis of Nonlinear Hybrid Systems (TAH, PHH), pp. 225–238.
CAVCAV-1995-HoW #automation #protocol
Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
CAVCAV-1995-HulgaardB #performance #petri net
Efficient Timing Analysis of a Class of Petri Nets (HH, SMB), pp. 423–436.
ICLPICLP-1995-HeintzeJ #algorithm
A Generic Algorithm for CLP Analysis (NH, JJ), pp. 49–63.
ICLPICLP-1995-HermenegildoPMS #incremental #logic programming #source code
Incremental Analysis of Logic Programs (MVH, GP, KM, PJS), pp. 797–811.
ICLPICLP-1995-ZhaoCU #concurrent #dependence #logic programming #source code
Program Dependence Analysis of Concurrent Logic Programs and Its Applications (JZ, JC, KU), p. 825.
ICLPILPS-1995-BandaMS #logic programming #performance #scheduling #source code
Efficient Analysis of Logic Programs with Dynamic Scheduling (MJGdlB, KM, PJS), pp. 417–431.
ICLPILPS-1995-Lindgren #control flow #prolog
Control Flow Analysis of Prolog (TL), pp. 432–446.
LICSLICS-1995-Wang #behaviour #realtime
Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
DLDL-1994-FayyadS #approach #automation #image #library #machine learning
The Automated Analysis, Cataloging, and Searching of Digital Image Libraries: A Machine Learning Approach (UMF, PS), pp. 225–249.
PODSPODS-1994-FaloutsosK #concept #independence #using
Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
VLDBVLDB-1994-BaralisW #algebra #approach #database
An Algebraic Approach to Rule Analysis in Expert Database Systems (EB, JW), pp. 475–486.
CSEETCSEE-1994-HartrumB #education #object-oriented
Teaching Formal Extensions of Informal-Based Object-Oriented Analysis Methodologies (TCH, PDB), pp. 389–409.
ICSMEICSM-1994-BriandBKS #maintenance #process
A Change Analysis Process to Characterize Software Maintenance Projects (LCB, VRB, YMK, DRS), pp. 38–49.
ICSMEICSM-1994-DeBaudMR #reverse engineering
Domain Analysis and Reverse Engineering (JMD, BM, SR), pp. 326–335.
ICSMEICSM-1994-GuptaS #data flow #framework
A Framework for Partial Data Flow Analysis (RG, MLS), pp. 4–13.
ICSMEICSM-1994-MatwinA #automation #composition #reuse #using
Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
ICALPICALP-1994-HoftingW #graph #polynomial
Polynomial Time Analysis of Torodial Periodic Graphs (FH, EW), pp. 544–555.
ICALPICALP-1994-HotzP #context-free grammar #performance
Fast Uniform Analysis of Coupled-Context-Free Languages (GH, GP), pp. 412–423.
ICALPICALP-1994-KanellakisHM #re-engineering
An Analysis of the Core-ML Language: Expressive Power and Type Reconstruction (PCK, GGH, HGM), pp. 83–105.
ICALPICALP-1994-Sanchez-CousoF #pattern matching #probability
Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
FMFME-1994-Cherkaoui #security #specification
Specification and Analysis of a Security Management System (OC), pp. 66–82.
LISPLFP-1994-Heintze #ml #source code
Set-Based Analysis of ML Programs (NH), pp. 306–317.
LISPLFP-1994-StefanescuZ #equation #framework #functional #higher-order #source code
An Equational Framework for the Flow Analysis of Higher Order Functional Programs (DCS, YZ), pp. 318–327.
CHICHI-1994-HaunoldK94a
A keystroke level analysis of a graphics application: manual map digitizing (PH, WK), pp. 337–343.
CHICHI-1994-IrvingPI94a #automation
A GOMS analysis of the advanced automated cockpit (SI, PGP, JEI), pp. 344–350.
CHICHI-1994-Newman94a #human-computer #research #using
A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
CAiSECAiSE-1994-AntonMP #composition #process #re-engineering
Goal Decomposition and Scenario Analysis in Business Process Reengineering (AIA, WMM, CP), pp. 94–104.
CAiSECAiSE-1994-Kurbel #automation #case study #code generation #experience #using
From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
ICMLICML-1994-SchapireW #algorithm #learning #on the #worst-case
On the Worst-Case Analysis of Temporal-Difference Learning Algorithms (RES, MKW), pp. 266–274.
KDDKDD-1994-MatheusPM
An Application of KEFM to the Analysis of Healthcare Information (CJM, GPS, DM), pp. 441–452.
SEKESEKE-1994-AbranDMMS #hypermedia #learning #using
Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
SEKESEKE-1994-FigueiredoPC #fuzzy #petri net #realtime #using
Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
SEKESEKE-1994-LuqiG #certification #synthesis
Suggestions for progress in software analysis, synthesis and certification (L, JAG), pp. 501–507.
SEKESEKE-1994-Meskens #knowledge-based #quality
A knowledge-based system for software quality analysis (NM), pp. 180–187.
SIGIRSIGIR-1994-Hoch #classification #documentation #information retrieval #using
Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
SIGIRSIGIR-1994-MoritaS #behaviour #information management #retrieval
Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval (MM, YS), pp. 272–281.
SIGIRSIGIR-1994-ShoensTG #incremental #performance
Synthetic Workload Performance Analysis of Incremental Updates (KAS, AT, HGM), pp. 329–338.
ECOOPECOOP-1994-BriggsW #design #object-oriented #specification
A Specification Language for Object-Oriented Analysis and Design (TLB, JW), pp. 365–385.
ECOOPECOOP-1994-MoreiraC #object-oriented
Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
TOOLSTOOLS-EUROPE-1994-BaelenLS #constraints #design #object-oriented
Constraints in Object-Oriented Analysis and Design (SVB, JL, ES), pp. 185–199.
TOOLSTOOLS-EUROPE-1994-Firesmith #design #logic #requirements
O-O Requirements Analysis and Logical Design (DF), p. 513.
TOOLSTOOLS-EUROPE-1994-Fowler #comparison #design
Comparison of Analysis and Design Methods (MF), p. 517.
TOOLSTOOLS-EUROPE-1994-Goldberg #c++ #design #object-oriented
Object-Oriented Analysis and Design with C++ (MG), p. 531.
TOOLSTOOLS-EUROPE-1994-Graham #case study #object-oriented #process #re-engineering #requirements
Beyond the Use Case: Combining Task Analysis and Scripts in Object-Oriented Requirements Capture and Business Process Re-engineering (IMG), pp. 203–215.
AdaEuropeAdaEurope-1994-Anderson94a #case study #development #experience #object-oriented
Experiences Integrating Object-Oriented Analysis with Joint Application Development (JAD) (JAA), pp. 509–521.
AdaEuropeAdaEurope-1994-Noseck #reuse
Cost-Benefit Analysis for Software-Reuse — A Decision Procedure (HN), pp. 397–405.
AdaEuropeAdaEurope-1994-ObermayerSSKKL #ada #realtime
Portability Effort Estimates for Real Time Applications Written in Ada Through Static Code Analysis (PEO, JS, GS, AK, PK, RL), pp. 483–488.
PPDPALP-1994-AlpuenteFV #composition #equation #source code
Compositional Analysis for Equational Horn Programs (MA, MF, GV), pp. 77–94.
PPDPALP-1994-FerreiraZ #termination
Syntactical Analysis of Total Termination (MCFF, HZ), pp. 204–222.
LOPSTRLOPSTR-1994-BoulangerB #logic programming #program transformation #using
Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
LOPSTRLOPSTR-1994-CookG #source code #termination
A Transformation System for Definite Programs Based on Termination Analysis (JC, JPG), pp. 51–68.
PEPMPEPM-1994-BirkedalW #ml #standard
Binding-Time Analysis for Standard ML (LB, MW), pp. 61–71.
PEPMPEPM-1994-Davis
PERs from Projections for Binding-Time Analysis (KD), pp. 53–60.
PLDIPLDI-1994-Deutsch #alias #interprocedural #pointer
Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
PLDIPLDI-1994-EmamiGH #interprocedural #pointer #points-to
Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
PLDIPLDI-1994-HentenryckCC #graph #prolog #using
Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
PLDIPLDI-1994-SabryF #continuation #data flow #question
Is Continuation-Passing Useful for Data Flow Analysis? (AS, MF), pp. 1–12.
PLDIPLDI-1994-Wismuller #data flow #debugging #source code #using
Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
PPDPPLILP-1994-Serrano #compilation #control flow #functional #higher-order #using
Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
POPLPOPL-1994-HankinM #algorithm #strict #type inference
Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis (CH, DLM), pp. 202–212.
POPLPOPL-1994-Maslov #array #data flow #dependence #lazy evaluation
Lazy Array Data-Flow Dependence Analysis (VM), pp. 311–325.
SASSAS-1994-ArmstrongMSS #algebra #dependence #performance #representation
Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation (TA, KM, PS, HS), pp. 266–280.
SASSAS-1994-Consel #fixpoint #performance #strict
Fast Strictness Analysis Via Symbolic Fixpoint Iteration (CC), pp. 423–431.
SASSAS-1994-Garza-SalazarB #array
Uniqueness and Completeness Analysis of Array Comprehensions (DAGS, APWB), pp. 193–207.
SASSAS-1994-HanusZ #functional #logic programming #source code
Mode Analysis of Functional Logic Programs (MH, FZ), pp. 26–42.
SASSAS-1994-Henglein #fixpoint #strict #type system
Iterative Fixed Point Computation for Type-Based Strictness Analysis (FH), pp. 395–407.
SASSAS-1994-JensenHR #haskell #performance #strict
Efficient Strictness Analysis of Haskell (KDJ, PH, MR), pp. 246–362.
SASSAS-1994-Jorgensen #finite #fixpoint #using
Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
SASSAS-1994-LisperC
Extended Analysis of Data Fields (BL, JFC), pp. 208–222.
SASSAS-1994-MuellerW #behaviour #on the fly #performance #simulation
Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
SASSAS-1994-Solberg #strict
Strictness and Totality Analysis (KLS), pp. 408–422.
REICRE-1994-DrakeT #bound
System bounding issues for analysis (JMD, WTT), pp. 24–31.
REICRE-1994-Eckert #object-oriented
Types, classes and collections in object-oriented analysis (GE), pp. 32–39.
REICRE-1994-GotelF #problem #requirements #traceability
An analysis of the requirements traceability problem (OCZG, AF), pp. 94–101.
REICRE-1994-HollandSCC #case study #information management
The directorate information system at St Thomas’ hospital: a study in domain analysis (JH, PHS, ERC, BC), pp. 102–109.
REICRE-1994-HughesRS #requirements #taxonomy
Taxonomy for requirements analysis (KJH, RMR, CTS), pp. 176–179.
REICRE-1994-White #comparative #embedded #requirements
Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
FSEFSE-1994-CorbettA #composition #scalability #towards
Towards Scalable Compositional Analysis (JCC, GSA), pp. 53–61.
FSEFSE-1994-DwyerC #concurrent #data flow #source code #verification
Data Flow Analysis for Verifying Properties of Concurrent Programs (MBD, LAC), pp. 62–75.
FSEFSE-1994-VandevoordeG #composition #runtime #using
Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
ICSEICSE-1994-CheungK #behaviour #distributed #effectiveness
An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
ICSEICSE-1994-DevanbuRW #automation #testing #tool support
Automated Construction of Testing and Analysis Tools (PTD, DSR, ALW), pp. 241–250.
ICSEICSE-1994-YuM #comprehension #design #modelling #process #why
Understanding “Why” in Software Process Modelling, Analysis, and Design (ESKY, JM), pp. 159–168.
ASEKBSE-1994-ChilenskiN #specification #test coverage #tool support
Formal Specification Tools for Test Coverage Analysis (JC, PN), pp. 59–68.
SACSAC-1994-Arango
A brief introduction to domain analysis (GA), pp. 42–46.
SACSAC-1994-ChenB #concurrent #database #detection #performance #petri net #transaction
A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
SACSAC-1994-Foster #education #named #using
FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
SACSAC-1994-GabbrielliG #logic programming #source code
Goal independency and call patterns in the analysis of logic programs (MG, RG), pp. 394–399.
SACSAC-1994-LiMC #fuzzy #performance
Performance analysis of fuzzy proportional-derivative control systems (HL, HAM, GC), pp. 115–119.
SACSAC-1994-MerkleL #algorithm #parallel #performance #search-based
An initial analysis of data parallelism in the fast messy genetic algorithm (LDM, GBL), pp. 488–492.
SACSAC-1994-OsborneH #development #interactive
Development of an interactive weather analysis and display system to support agricultural planning (LFO, BCH), pp. 346–350.
CCCC-1994-CheathamGS #interpreter #tool support
A Suite of Analysis Tools Based on a General Purpose Abstract Interpreter (TC, HG, DCS), pp. 188–202.
CCCC-1994-Reps #interprocedural #problem
Solving Demand Versions of Interprocedural Analysis Problems (TWR), pp. 389–403.
CCCC-1994-UhlH
Flow Grammars — a Flow Analysis Methodology (JSU, RNH), pp. 203–217.
DACDAC-1994-BhattacharyaDB94a #optimisation #performance #specification
Performance Analysis and Optimization of Schedules for Conditional and Loop-Intensive Specifications (SB, SD, FB), pp. 491–496.
DACDAC-1994-ChenF #using
Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
DACDAC-1994-HachtelMPS #finite #probability #scalability #state machine
Probabilistic Analysis of Large Finite State Machines (GDH, EM, AP, FS), pp. 270–275.
DACDAC-1994-KahngM #equation #using
Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
DACDAC-1994-LeviaMR #design
Lessons in Language Design: Cost/Benefit analysis of VHDL Features (OL, SM, JR), pp. 447–453.
DACDAC-1994-NielsenK #performance #simulation
Performance Analysis Based on Timing Simulation (CDN, MK), pp. 70–76.
DATEEDAC-1994-BaharCHMS #using
Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
DATEEDAC-1994-BrashearMOPM #performance #predict #statistics #using
Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
DATEEDAC-1994-Rodriguez-MontanesF #fault #testing
Analysis of Bridging Defects in Sequential CMOS Circuits and their Current Testability (RRM, JF), pp. 356–360.
DATEEDAC-1994-SafiniaLS #functional #modelling
Taking Advantage of High Level Functional Information to Refine Timing Analysis and Timing Modeling (CS, RL, GS), pp. 349–353.
DATEEDAC-1994-SivaramanS #parametricity #towards
Towards Incorporating Device Parameter Variations in Timing Analysis (MS, AJS), pp. 338–342.
DATEEDAC-1994-Stroele
Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
DATEEDAC-1994-XueDJ #fault #float #probability
Probability Analysis for CMOS Floating Gate Faults (HX, CD, JAGJ), pp. 443–448.
HPDCHPDC-1994-BurrellMP #capacity #implementation #multi #network #performance #protocol
Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
PDPPDP-1994-McConnellMMM #migration #monitoring #parallel #source code
Monitoring, Analysis And Tuning Of Parallel Programs Within The Fortport Migration Environment (RM, PM, JFM, PM), pp. 479–485.
ESOPESOP-J-1992-NielsonN94
The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 327–354.
ESOPESOP-1994-HankinM #lazy evaluation #strict #type inference
Lazy Type Inference for the Strictness Analysis of Lists (CH, DLM), pp. 257–271.
ESOPESOP-1994-HengleinM #polymorphism
Polymorphic Binding-Time Analysis (FH, CM), pp. 287–301.
ESOPESOP-1994-JeuringS #bottom-up #functional
Bottom-up Grammar Analysis — A Functional Formulation (JJ, SDS), pp. 317–332.
ESOPESOP-1994-King
A Synergistic Analysis for Sharing and Groundness with Traces Linearity (AK), pp. 363–378.
STOCSTOC-1994-BlumFJKMR #fourier #learning #query #statistics #using
Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
STOCSTOC-1994-JacquetS #algorithm #equation #functional
A functional equation often arising in the analysis of algorithms (PJ, WS), pp. 780–789.
ICLPICLP-1994-Kagedal #data flow #prolog
A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
ICLPILPS-1994-BraemCMH #prolog
Cardinality Analysis of Prolog (CB, BLC, SM, PVH), pp. 457–471.
ICLPILPS-1994-BuenoBH #automation #effectiveness #parallel #strict
Effectiveness of Global Analysis in Strict Independence-Based Automatic Parallelization (FB, MJGdlB, MVH), pp. 320–336.
ICLPILPS-1994-Giacobazzi #abduction #composition #logic programming #source code
Abductive Analysis of Modular Logic Programs (RG), pp. 377–391.
ICLPILPS-1994-SwiftW #evaluation #source code
Analysis of SLG-WAM Evaluation of Definite Programs (TS, DSW), pp. 219–235.
ISSTAISSTA-1994-BuyS #petri net #realtime #source code
Analysis of Real-Time Programs with Simple Time Petri Nets (UAB, RHS), pp. 228–239.
ISSTAISSTA-1994-Corbett #ada #concurrent #empirical #evaluation #source code
An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
ISSTAISSTA-1994-FleyshgakkerW #approach #mutation testing #performance
Efficient Mutation Analysis: A New Approach (VNF, SNW), pp. 185–195.
ISSTAISSTA-1994-GoldbergWZ #testing
Applications of Feasible Path Analysis to Program Testing (AG, TCW, DZ), pp. 80–94.
ISSTAISSTA-1994-JasperBWCZ #generative #testing
Test Data Generation and Feasible Path Analysis (RJ, MB, KEW, BC, DZ), pp. 95–107.
ISSTAISSTA-1994-Richardson #named #testing
TAOS: Testing with Analysis and Oracle Support (DJR), pp. 138–153.
ISSTAISSTA-1994-Young #testing
State-Space Analysis as an Aid to Testing (MY), p. 203.
ICDARICDAR-1993-Bayer #comprehension #documentation #modelling
Understanding structured text documents by a model based document analysis system (TAB), pp. 448–453.
ICDARICDAR-1993-CollinTV #documentation
Don’t tell mom I’m doing document analysis; she believes I’m in the computer vision field (SC, KT, PV), pp. 619–622.
ICDARICDAR-1993-Dengel93a #comprehension #documentation #information management #multi
The role of document analysis and understanding in multi-media information systems (AD), pp. 385–390.
ICDARICDAR-1993-DoermannF #documentation #image
Image based typographic analysis of documents (DSD, RF), pp. 769–773.
ICDARICDAR-1993-Hamada #diagrams
A new system for the analysis of schematic diagrams (AHH), pp. 369–372.
ICDARICDAR-1993-HaoWN #approach #classification #documentation #layout #segmentation
Nested segmentation: an approach for layout analysis in document classification (XH, JTLW, PAN), pp. 319–322.
ICDARICDAR-1993-ItoTFHU #evaluation
Pattern analysis and evaluation of printed circuit boards (MI, YT, IF, MH, TU), pp. 798–801.
ICDARICDAR-1993-IttnerB #layout
Language-free layout analysis (DJI, HSB), pp. 336–340.
ICDARICDAR-1993-IwaneYI #approach #classification #documentation #functional #image #layout
A functional classification approach to layout analysis of document images (KI, MY, OI), pp. 778–781.
ICDARICDAR-1993-JainC #locality #using
Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
ICDARICDAR-1993-MadejS #automation #evaluation #statistics #towards
Towards automatic evaluation of drawing analysis performance-A statistical model of cadastral map (DM, AS), pp. 890–893.
ICDARICDAR-1993-RoseE #recognition #scalability #semantics
Semantic analysis for large vocabulary cursive script recognition (TGR, LJE), pp. 236–239.
ICDARICDAR-1993-TungCL #generative #performance
Performance analysis of an OCR system via an artificial handwritten Chinese character generator (CHT, YJC, HJL), pp. 315–318.
ICDARICDAR-1993-Wang #comprehension #documentation #visualisation
Machine visualization, understanding and interpretation of polyhedral line-drawings in document analysis (PSPW), pp. 882–885.
ICDARICDAR-1993-WieserP #image #layout
Layout and analysis: Finding text, titles, and photos in digital images of newspaper pages (JW, AP), pp. 774–777.
PODSPODS-1993-PagelSTW #data type #performance #query #towards
Towards an Analysis of Range Query Performance in Spatial Data Structures (BUP, HWS, HT, PW), pp. 214–221.
VLDBVLDB-1993-AmatoGM #abstract interpretation #database #programming
Data Sharing Analysis for a Database Programming Lanaguage via Abstract Interpretation (GA, FG, GM), pp. 405–415.
VLDBVLDB-1993-RahmM #database #parallel
Analysis of Dynamic Load Balancing Strategies for Parallel Shared Nothing Database Systems (ER, RM), pp. 182–193.
ICSMECSM-1993-KurishimaONAF #fault
Quantitative Analysis of Errors in Telecommunications Software (NK, HO, JiN, KA, MF), pp. 190–198.
ICSMECSM-1993-LoyallM #dependence #maintenance #process #using
Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
WCREWCRE-1993-ReubensteinPR #parsing #reverse engineering #tool support
Separating Parsing and Analysis in Reverse Engineering Tools (HBR, RLP, SNR), pp. 117–125.
ICALPICALP-1993-CodishFMW #concurrent #constraints #logic programming #performance #source code
Efficient Analysis of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 633–644.
FMFME-1993-ValmariKCL #reachability
Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
FPCAFPCA-1993-Nocker #reduction #strict #using
Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
FPCAFPCA-1993-SastryCA #functional #strict
Order-of-evaluation Analysis for Destructive Updates in Strict Functional Languages with Flat Aggregates (AVSS, WDC, ZMA), pp. 266–275.
HCIHCI-ACS-1993-BextenHM #named #simulation
AUCA: A Tool for Presentation and Analysis of Simulation Results (EMzB, DH, CM), pp. 267–272.
HCIHCI-ACS-1993-BrinkmanS #fault
Analysis and Support of Fault Diagnosis Strategies (JAB, TWvdS), pp. 115–120.
HCIHCI-ACS-1993-CarstensenS #requirements
Work Analysis — Perspectives on and Requirements for a Methodology (PHC, KS), pp. 575–580.
HCIHCI-ACS-1993-TakedaHS93a
Analysis of Uric Properties for Stress Caused by VDT Work and Relationship Among CFF, HRV and VEP (MT, YH, KS), pp. 903–908.
HCIHCI-ACS-1993-TsujiMND
New Analysis of HRV Through Wavelet Transform (HT, HM, TN, TD), pp. 920–924.
HCIHCI-ACS-1993-VendaH #complexity
Qualitative and Quantitative Analysis of Human Decision-Making Complexity (VFV, HWH), pp. 636–641.
HCIHCI-SHI-1993-FrascinaS #design #human-computer #interface
Task Analysis in Design of a Human-Computer Interface for a Ward Based System (TF, RAS), pp. 226–230.
HCIHCI-SHI-1993-Gautsch #architecture #difference #hypermedia
An Analysis of Hypermedia Program Architecture with Individual Differences of Learners (SG), pp. 482–487.
HCIHCI-SHI-1993-KatoO #using
Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
HCIHCI-SHI-1993-KirbyH #design
An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
HCIHCI-SHI-1993-MorganHCHQMO #design #implementation #interactive #knowledge base #multi #perspective
Implementation and Design Issues in Interactive Multi-Media Knowledge Based Systems for Criminal Intelligence Analysis: The Mycroft Perspective (KM, PH, JC, LH, TQ, RM, RO), pp. 513–518.
HCIHCI-SHI-1993-TakeguchiTO #information management #representation #scalability
A Knowledge Representation for Large Scale Integrated Circuit Failure Analysis (YT, TT, SO), pp. 92–97.
HCIHCI-SHI-1993-UetakeNTT #using
A Meeting Support System Based on Analyses of Human-Communication — Using the Context and Contents of Meetings (TU, MN, KT, HT), pp. 967–972.
HCIHCI-SHI-1993-UjitaKIK
Cooperative Work Analysis of Plant Operator Crew (HU, RK, KI, RK), pp. 955–960.
CHIINTERCHI-1993-HillLSW #multi
Planning for multiple task work: an analysis of a medical reception worksystem (BH, JL, WS, AW), pp. 314–320.
CHIINTERCHI-1993-MacleodB #metric #music #tool support #usability #video
MUSiC video analysis and context tools for usability measurement (MM, NB), p. 55.
CHIINTERCHI-1993-StaskoBL #algorithm #animation #empirical #learning
Do algorithm animations assist learning?: an empirical study and analysis (JTS, ANB, CL), pp. 61–66.
CAiSECAiSE-1993-BrunetCMS #object-oriented
Object-Oriented Analysis in Practice (JB, CC, DM, FS), pp. 293–308.
CIKMCIKM-1993-FayyadWD #automation #database #image #overview
Automated Cataloging and Analysis of Sky Survey Image Databases: The SKICAT System (UMF, NW, SGD), pp. 527–536.
CIKMCIKM-1993-PearceN #generative #hypermedia #n-gram
Generating a Dynamic Hypertext Environment with n-gram Analysis (CP, CKN), pp. 148–153.
CIKMCIKM-1993-QianFF #database #metric #object-oriented
An Object-Oriented Database for the Display Measurement and Analysis System (YQ, EAF, WWF), pp. 384–392.
ICMLICML-1993-CohenCBA #automation #modelling
Automating Path Analysis for Building Causal Models from Data (PRC, AC, LB, ASA), pp. 57–64.
SEKESEKE-1993-BiebowS #requirements #validation
Acquisition, Analysis and Validation of Informal Requirements (BB, SS), pp. 109–116.
SEKESEKE-1993-BombanaBCFSZ #functional #testing
An Expert Solution to Functional Testability Analysis of VLSI Circuits (MB, GB, PC, FF, DS, GZ), pp. 263–265.
SEKESEKE-1993-JaegerP #information management #named #specification
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems (TJ, AP), pp. 191–198.
SEKESEKE-1993-KomiyaSHKOHOO #process #specification
An Experimental Analysis for Classifying Specification Processes (SK, MS, SH, JK, AO, HH, SO, KO), pp. 231–234.
SIGIRSIGIR-1993-AktugC #multi #query
Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
SIGIRSIGIR-1993-Botafogo #clustering #hypermedia
Cluster Analysis for Hypertext Systems (RAB), pp. 116–125.
ECOOPECOOP-1993-DuboisBP #perspective #requirements
O-O Requirements Analysis: an Agent Perspective (ED, PDB, MP), pp. 458–481.
OOPSLAOOPSLA-1993-Civello #design #object-oriented
Roles for Composite Objects in Object-Oriented Analysis and Design (FC), pp. 376–393.
OOPSLAOOPSLA-1993-HoydalsvikS #object-oriented #on the
On the Purpose of Object-Oriented Analysis (GMH, GS), pp. 240–255.
TOOLSTOOLS-EUROPE-1993-CattaneoCLZ #database #evolution #object-oriented #overview
Overview and Progress Report of the ESSE Project: Supporting Object-Oriented Database Schema Analysis and Evolution (FC, ACP, LL, RZ), pp. 63–74.
TOOLSTOOLS-EUROPE-1993-KetabchiS #automation #documentation #generative #maintenance #using
Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
TOOLSTOOLS-EUROPE-1993-LeeS #object-oriented
Object-Oriented Analysis in the Real World (MML, LS), pp. 127–149.
TOOLSTOOLS-EUROPE-1993-Walden #design #object-oriented
Object-Oriented Analysis & Design (KW), p. 291.
TOOLSTOOLS-PACIFIC-1993-Firesmith93c #design #logic #object-oriented #requirements
Object-Oriented Requirements Analysis and Logical Design (DF), p. 319.
TOOLSTOOLS-PACIFIC-1993-McEwinR #design #object-oriented
Semiotics, Ethnomethodology, and Object-Oriented Analysis and Design Notations (JM, SR), pp. 143–151.
TOOLSTOOLS-USA-1993-Fowler #comparison #design #object-oriented
A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
TOOLSTOOLS-USA-1993-MinginsDS #eiffel #metric
Collection and Analysis of Software Metrics from the Eiffel Class Hierarchy (CM, BD, GS), pp. 427–435.
TOOLSTOOLS-USA-1993-MorabitoS #approach #design #object-oriented
A New Approach to Object-Oriented Analysis and Design (JM, MSS), pp. 45–55.
TOOLSTOOLS-USA-1993-Roberts #design #object-oriented
Object-Oriented Analysis and Design (TR), pp. 509–522.
LOPSTRLOPSTR-1993-Neugebauer #reachability
Reachability Analysis for the Extension Procedure — A Topological Result (GN), pp. 32–44.
PEPMPEPM-1993-Andersen #c #pointer
Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
PEPMPEPM-1993-Bulyonkov
Extracting Polyvariant Binding Time Analysis from Polyvariant Specializer (MAB), pp. 59–65.
PEPMPEPM-1993-CharlierH #evaluation #implementation #prolog
Groundness Analysis for PROLOG: Implementation and Evaluation of the Domain Prop (BLC, PVH), pp. 99–110.
PEPMPEPM-1993-Consel
Polyvariant Binding-Time Analysis For Applicative Languages (CC), pp. 66–77.
PEPMPEPM-1993-Davis #higher-order
Higher-order Binding-time Analysis (KD), pp. 78–87.
PEPMPEPM-1993-Seward #polymorphism #strict #using
Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
PEPMPEPM-1993-Thiemann #functional #safety #source code
A Safety Analysis for Functional Programs (PT), pp. 133–144.
PLDIPLDI-1993-BoydW #fault #optimisation
Isolation and Analysis of Optimization Errors (MRB, DBW), pp. 26–35.
PLDIPLDI-1993-DuesterwaldGS #array #data flow #framework #optimisation
A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations (ED, RG, MLS), pp. 68–77.
PLDIPLDI-1993-KolteH
Load/Store Range Analysis for Global Register Allocation (PK, MJH), pp. 268–277.
PLDIPLDI-1993-LandiRZ #alias #interprocedural #pointer
Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
PPDPPLILP-1993-BurnM #compilation #correctness #optimisation #proving #strict
Proving the Correctness of Compiler Optimizations Based on Strictness Analysis (GLB, DLM), pp. 346–364.
PPDPPLILP-1993-Kagedal #prolog
Improvements in Compile-Time Analysis for Ground Prolog (AK), pp. 92–107.
PPDPPLILP-1993-Moreno-NavarroKMWH #lazy evaluation #performance #using
Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
POPLPOPL-1993-CodishDG #composition #logic programming #source code
Compositional Analysis of Modular Logic Programs (MC, SKD, RG), pp. 451–464.
POPLPOPL-1993-DhamdhereK #bidirectional #complexity #data flow
Complexity of Bidirectional Data Flow Analysis (DMD, UPK), pp. 397–408.
POPLPOPL-1993-MaydanAL #array #data flow
Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
POPLPOPL-1993-Wand #correctness #specification
Specifying the Correctness of Binding-Time Analysis (MW), pp. 137–143.
POPLPOPL-1993-YiH #automation #generative #interprocedural
Automatic Generation and Management of Interprocedural Program Analyses (KY, WLHI), pp. 246–259.
SASWSA-1993-CridligG #semantics
Semantics and Analysis of Linda-Based Languages (RC, EG), pp. 72–86.
SASWSA-1993-NielsonN #strict
Finiteness Conditions for Strictness Analysis (FN, HRN), pp. 194–205.
SASWSA-1993-WrightB #reduction
Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
REICRE-1993-Beeck #execution #precise #realtime #specification
Improving Structured Analysis — Achieving Preciseness, Executability, and Real-Time Specification (MvdB), pp. 227–245.
REICRE-1993-FenselAS #semantics
Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
RERE-1993-LuffJHG #interactive #requirements #social
Tasks and social interaction: the relevance of naturalistic analyses of conduct for requirements engineering (PL, MJ, CH, DG), pp. 187–190.
RERE-1993-TakedaSKO #editing
Requirement analysis by the KJ editor (NT, AS, KK, HO), pp. 98–101.
ESECESEC-1993-Beeck #concurrent #integration #realtime #specification
Integration of Structured Analysis and Timed Statecharts for Real-Time and Concurrency Specification (MvdB), pp. 313–328.
ESECESEC-1993-CheungK #detection #distributed #source code
Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
FSEFSE-1993-CheungK #composition #constraints #reachability
Enhancing Compositional Reachability Analysis with Context Constraints (SCC, JK), pp. 115–125.
FSEFSE-1993-Lutz #fault #requirements
Targeting Safety-Related Errors During Software Requirements Analysis (RRL), pp. 99–106.
FSEFSE-1993-PodgurskiY #clustering #testing
Partition testing, stratified sampling, and cluster analysis (AP, CY), pp. 169–181.
ICSEICSE-1993-DrakeXTZ #approach #case study
Approach and Case Study of Requirement Analysis Where End Users Take an Active Role (JMD, WWX, WTT, IAZ), pp. 177–186.
ICSEICSE-1993-KitsonM #assessment #process
An Analysis of SEI Software Process Assessment Results: 1987-1991 (DHK, SMM), pp. 68–77.
ICSEICSE-1993-LaskiSL #mutation testing #testing
Dynamic Mutation Testing in Integrated Regression Analysis (JWL, WS, PL), pp. 108–117.
ICSEICSE-1993-TamaiI #backtracking #design #development #process #requirements #scalability
Requirements and Design Change in Large-Scale Software Development: Analysis From the Viewpoint of Process Backtracking (TT, AI), pp. 167–176.
SACSAC-1993-AcreeCUGS #adaptation #algorithm #linear #parallel
Parallelization and Analysis of a Linear Adaptive Filtering Algorithm (RKA, DTC, NU, MJG, DMS), pp. 165–172.
SACSAC-1993-HitzW #development #information management #multi
Development and Analysis of a Wide Area Multimedia Information System (MH, HW), pp. 238–246.
SACSAC-1993-Konstam #algorithm #linear #search-based #using
Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
SACSAC-1993-LungU #approach #integration #reuse
Integration of Domain Analysis and Analogical Approach for Software Reuse (CHL, JEU), pp. 48–53.
SACSAC-1993-VaidyanathanL #bound #learning
Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
DACDAC-1993-GraebWA #optimisation #worst-case
Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
DACDAC-1993-HaqueC #design #distributed #reliability
Analysis and Reliable Design of ECL Circuits with Distributed RLC Interconnections (MH, SC), pp. 697–701.
HPDCHPDC-1993-BiswasRTK #distributed #file system #performance
Performance Analysis of Distributed File Systems with Non-Volatile Caches (PB, KKR, DFT, CMK), pp. 252–262.
HPDCHPDC-1993-Coddington #distributed #hardware #physics
An Analysis of Distributed Computing Software and Hardware for Applications in Computational Physics (PDC), pp. 179–186.
HPDCHPDC-1993-DowdBAP #architecture #design #scalability
Design and Analysis of a Hierarchical Scalable Photonic Architecture (PWD, KB, KAA, JAP), pp. 289–296.
PDPPDP-1993-ClematisT #distributed #memory management #message passing
An analysis of message passing systems for distributed memory computers (AC, OT), pp. 299–306.
PDPPDP-1993-GetovH #comparative #distributed #performance
Comparative performance analysis of uniformly distributed applications (VG, RWH), pp. 259–262.
PDPPDP-1993-PrasadW #communication #finite
Communication vs. computation-experiences within a finite element analysis application on transputers (JCP, RW), pp. 3–10.
PDPPDP-1993-RebaudengoR #algorithm #migration #parallel #search-based
An experimental analysis of the effects of migration in parallel genetic algorithms (MR, MSR), pp. 232–238.
PPoPPPPoPP-1993-MasticolaR
Non-concurrency Analysis (SPM, BGR), pp. 129–138.
PPoPPPPoPP-1993-SarukkaiM #source code
Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
STOCSTOC-1993-CoffmanJSW #markov #proving
Markov chains, computer proofs, and average-case analysis of best fit bin packing (EGCJ, DSJ, PWS, RRW), pp. 412–421.
STOCSTOC-1993-RackoffS #encryption
Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
TAPSOFTTAPSOFT-1993-DiehlJR #distributed #reachability
Reachability Analysis on Distributed Executions (CD, CJ, JXR), pp. 629–643.
CAVCAV-1993-Halbwachs #source code
Delay Analysis in Synchronous Programs (NH), pp. 333–346.
CAVCAV-1993-MalerP #multi #reachability
Reachability Analysis of Planar Multi-limear Systems (OM, AP), pp. 194–209.
CSLCSL-1993-Coquand #semantics
From Semantics to Rules: A Machine Assisted Analysis (CC), pp. 91–105.
ICLPICLP-1993-CodishDFB #correctness #logic programming #question #source code
Freeness Analysis for Logic Programs — And Correctness? (MC, DD, GF, MB), pp. 116–131.
ICLPICLP-1993-CorsiniR #fault #safety
Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
ICLPICLP-1993-DumortierJBC #constraints
Freeness Analysis in the Presence of Numerical Constraints (VD, GJ, MB, MC), pp. 100–115.
ICLPICLP-1993-Hanus #constraints
Analysis of Nonlinear Constraints in CLP(R) (MH), pp. 83–99.
ICLPICLP-1993-KempS #constraints #optimisation #query
Analysis Based Constraint Query Optimization (DBK, PJS), pp. 666–682.
ICLPILPS-1993-AlpuenteFV #constraints #equation #incremental
Incremental Equational Constraint Analyses (MA, MF, GV), p. 657.
ICLPILPS-1993-BandaH #approach #source code
A Practical Approach to the Global Analysis of CLP Programs (MJGdlB, MVH), pp. 437–455.
ICLPILPS-1993-DecorteSF #automation #termination
Automatic Inference of Norms: A Missing Link in Automatic Termination Analysis (SD, DDS, MF), pp. 420–436.
ICLPILPS-1993-Sohn #logic programming #relational #source code
Relational Groundness Analysis for Logic Programs (KS), p. 635.
ISSTAISSTA-1993-BelliJ #prolog #source code #testing
Implementation-Based Analysis and Testing of Prolog Programs (FB, OJ), pp. 70–80.
ISSTAISSTA-1993-DuriBDS #ada #concurrent #reduction #using
Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
ISSTAISSTA-1993-Jackson
Abstract Analysis with Aspect (DJ), pp. 19–27.
ISSTAISSTA-1993-LevineT #concurrent #metric #re-engineering
Metric-Driven Reengineering for Static Concurrency Analysis (DLL, RNT), pp. 40–50.
ISSTAISSTA-1993-UntchOH #mutation testing #using
Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
ISSTAISSTA-1993-WeissF #algorithm #mutation testing
Improved Serial Algorithms for Mutation Analysis (SNW, VNF), pp. 149–158.
PODSPODS-1992-Rotem #scalability
Analysis of Disk Arm Movement for Large Sequential Reads (DR), pp. 47–54.
SIGMODSIGMOD-1992-DanY #performance #policy
Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
SIGMODSIGMOD-1992-GhandeharizadehDQ #clustering #multi #performance
A Performance Analysis of Alternative Multi-Attribute Declustering Strategies (SG, DJD, WQ), pp. 29–38.
SIGMODSIGMOD-1992-JhingranK #database #protocol #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
ICALPICALP-1992-Debray #complexity #data flow #logic programming #on the #source code
On the Complexity of Dataflow Analysis of Logic Programs (SKD), pp. 509–520.
ICALPICALP-1992-Flajolet #algorithm
Analytic Analysis of Algorithms (PF), pp. 186–210.
ICALPICALP-1992-KirschenhoferPS #how #probability #problem
How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
LISPLFP-1992-NeubergerM #deduction #power of #precise #strict
A Precise Relationship Between the Deductive Power of Forward and Backward Strictness Analysis (MN, PM), pp. 127–138.
LISPLFP-1992-TraubCS #clustering #source code #strict #thread
Global Analysis for Partitioning Non-Strict Programs into Sequential Threads (KRT, DEC, KES), pp. 324–334.
LISPLFP-1992-WangH #recursion
Analysis of Recursive Types in Lisp-Like Languages (EW, PNH), pp. 216–225.
CHICHI-1992-HammontreeHH #research #testing #tool support #user interface #visual notation
Integrated data capture and analysis tools for research and testing on graphical user interfaces (MLH, JJH, BWH), pp. 431–432.
CHICHI-1992-JohnV #interactive
A GOMS Analysis of a Graphic Machine-Paced, Highly Interactive Task (BEJ, AHV), pp. 251–258.
CAiSECAiSE-1992-Dewal #evaluation #requirements
A Methodology for Requirements Analysis and Evaluation of SDEs (SD), pp. 394–409.
CAiSECAiSE-1992-FouqueV #approach #machine learning
Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
CAiSECAiSE-1992-MacGinnes #how #object-oriented #question
How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
KRKR-1992-BaaderHNPF #empirical #optimisation #representation
An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
ICMLML-1992-Etzioni #learning
An Asymptotic Analysis of Speedup Learning (OE), pp. 129–136.
ICMLML-1992-GratchD #learning #problem
An Analysis of Learning to Plan as a Search Problem (JG, GD), pp. 179–188.
ICMLML-1992-HirschbergP #concept #learning
Average Case Analysis of Learning κ-CNF Concepts (DSH, MJP), pp. 206–211.
SEKESEKE-1992-AbateDNP #query #specification
Querying and Analysis of Software Specifications (AFA, CD, GN, GP), pp. 470–478.
SEKESEKE-1992-Olson #interface #object-oriented
An Object-Oriented Analysis Model of an Iconic Interface to Macsyma (AMO), pp. 253–260.
SEKESEKE-1992-Schaschinger #information management #object-oriented
Expert-Supported Object-Oriented Analysis in Knowledge Engineering (HS), pp. 116–122.
SEKESEKE-1992-WatsonN #development #named
ProTest: A Knowledge Analysis Tool for the Development of Expert Systems (IW, MN), pp. 206–212.
SIGIRSIGIR-1992-BlossevilleHMP #automation #classification #documentation #natural language #statistics
Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
SIGIRSIGIR-1992-WangWY #geometry #modelling
An Analysis of Vector Space Models Based on Computational Geometry (ZW, SKMW, YY), pp. 152–160.
OOPSLAOOPSLA-1992-ClydeEW #object-oriented
Tunable Formalism in Object-Oriented Systems Analysis: Meeting the Needs of Both Theoreticians and Practitioners (SWC, DWE, SNW), pp. 452–465.
TOOLSTOOLS-EUROPE-1992-BuddeCSZ #design #tool support
Tools and Materials: an Analysis and Design Metaphor (RB, MLCN, KHS, HZ), pp. 135–146.
TOOLSTOOLS-EUROPE-1992-FritzsonVHF #algebra #industrial #modelling #object-oriented
Industrial Application of OO Mathematical Modeling and Computer Algebra in Mechanical Analysis (PF, LV, JH, DF), pp. 167–181.
TOOLSTOOLS-EUROPE-1992-Nerson #design #object-oriented
Object-Oriented Analysis and Design (JMN), p. 405.
TOOLSTOOLS-EUROPE-1992-Rubin #behaviour
Object Behavior Analysis (KSR), p. 407.
TOOLSTOOLS-PACIFIC-1992-Henderson-Sellers92a #design
Techniques and Notation for Analysis and Design (BHS), p. 236.
TOOLSTOOLS-PACIFIC-1992-KotakaKH #modelling #object-oriented #process #specification
Specification Process Modelling in Object-Oriented Analysis (NK, YK, SH), pp. 67–81.
TOOLSTOOLS-PACIFIC-1992-Miller #architecture #finite #interactive
A Class Architecture for Interactive Finite Element Analysis (GRM), pp. 101–108.
TOOLSTOOLS-USA-1992-Walden #design #object-oriented
Object-Oriented Analysis and Design (KW), p. 255.
PPDPALP-1992-BundgenE #algorithm #normalisation #performance
A Fast Algorithm for Ground Normal Form Analysis (RB, HE), pp. 291–305.
PPDPALP-1992-KingS #concurrent #logic programming #source code
Serialisation Analysis of Concurrent Logic Programs (AK, PS), pp. 322–334.
LOPSTRLOPSTR-1992-VerschaetseDS #automation #termination
Automatic Termination Analysis (KV, SD, DDS), pp. 168–183.
PEPMPEPM-1992-AndersenG #partial evaluation
Speedup Analysis in Partial Evaluation: Preliminary Results (LOA, CKG), pp. 1–7.
PEPMPEPM-1992-DehboneiJ #evaluation #interprocedural #semantics #symbolic computation
Semantical Interprocedural Analysis by Partial Symbolic Evaluation (BD, PJ), pp. 14–20.
PEPMPEPM-1992-RufW #control flow #higher-order #using
Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
PEPMPEPM-1992-RytzG
A Polyvariant Binding Time Analysis (BR, MG), pp. 21–28.
PLDIPLDI-1992-HendrenHN #abstraction #data type #imperative #pointer #recursion #source code
Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
PLDIPLDI-1992-ParkG
Escape Analysis on Lists (YGP, BG), pp. 116–127.
PLDIPLDI-1992-TanL #compilation #data flow #logic programming #source code
Compiling Dataflow Analysis of Logic Programs (JT, IPL), pp. 106–115.
PPDPPLILP-1992-AlpuenteFM #consistency #equation #incremental #logic programming #nondeterminism
Analyses of Inconsistency for Incremental Equational Logic Programming (MA, MF, FM), pp. 443–457.
PPDPPLILP-1992-GomardS #data type #lazy evaluation
Path Analysis for Lazy Data Structures (CKG, PS), pp. 54–68.
PPDPPLILP-1992-Rosendahl #attribute grammar #strict
Strictness Analysis for Attribute Grammars (MR), pp. 145–157.
POPLPOPL-1992-ChowH #memory management #parallel #source code
Compile-Time Analysis of Parallel Programs that Share Memory (JHC, WLHI), pp. 130–141.
AdaTRI-Ada-C-1992-Frankel #architecture #modelling
Analysis/Architecture Models to ASG Models: Enabling the Transition (MIF), pp. 220–231.
AdaTRI-Ada-T1-1992-Roseman
Rate Monotonic Analysis (TR), pp. 261–376.
SASWSA-1992-AmatoGM #concurrent #database #functional #programming language #transaction
Analysis of Concurrent Transactions in a Functional Database Programming Language (GA, FG, GM), pp. 174–184.
SASWSA-1992-Ayers #performance #reachability
Efficient Closure Analysis with Reachability (AEA), pp. 126–134.
SASWSA-1992-Baker-Finch #logic #strict
Relevant Logic and Strictness Analysis (CABF), pp. 221–228.
SASWSA-1992-CodishFMW #concurrent #constraints #logic programming #performance #source code
Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 35–42.
SASWSA-1992-GenglerR
A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
SASWSA-1992-Hamilton #first-order #functional #lazy evaluation #source code
Sharing Analysis of Lazy First-Order Functional Programs (GWH), pp. 68–78.
SASWSA-1992-ParkG #lazy evaluation
Order-of-Demand Analysis for Lazy Languages (YGP, BG), pp. 91–101.
SASWSA-1992-SolbergNN
Inference Systems for Binding Time Analysis (KLS, HRN, FN), pp. 247–254.
SASWSA-1992-TangJ #control flow
Control-Flow Effects for Escape Analysis (YMT, PJ), pp. 313–321.
ICSEICSE-1992-LubarsMPR #evolution #object-oriented
Object-Oriented Analysis for Evolving Systems (MDL, GM, CP, CR), pp. 173–185.
ICSEICSE-1992-MargonoR #ada #reuse #scalability
Software Reuse Economics: Cost-Benefit Analysis on a Large-Scale Ada Project (JM, TER), pp. 338–348.
ICSEICSE-1992-TsudaMTT #automation #development
Productivity Analysis of Software Development with an Integrated CASE Tool (MT, YM, MT, MT), pp. 49–58.
CCCC-1992-Knopp #lisp #parallel #performance
Improving the Performance of Parallel LISP by Compile Time Analysis (JK), pp. 271–277.
CCCC-1992-SudholtS #data flow #interprocedural #object-oriented #on the
On Interprocedural Data Flow Analysis for Object Oriented Languages (MS, CS), pp. 156–162.
CCCC-1992-VitekHU #object-oriented #source code
Compile-Time Analysis of Object-Oriented Programs (JV, RNH, JSU), pp. 236–250.
DACDAC-1992-ChiproutN #network
Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
DACDAC-1992-LeeR #evaluation #linear #named #using
AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
DACDAC-1992-RuehliH #challenge
Challenges and Advances in Electrical Interconnect Analysis (AER, HH), pp. 460–465.
HPDCHPDC-1992-ParasharHMF #distributed #performance
A Requirement Analysis for High Performance Distributed Computing over LANs (MP, SH, AGM, GF), pp. 142–151.
ESOPESOP-1992-NielsonN
The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 351–370.
CADECADE-1992-Ammon #automation #logic #proving
Automatic Proofs in Mathematical Logic and Analysis (KA), pp. 4–19.
CADECADE-1992-Sutcliffe #set
Linear-Input Subset Analysis (GS), pp. 268–280.
ICLPJICSLP-1992-BigotDM #abstract interpretation #comprehension #using
Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
ICLPJICSLP-1992-Heintze #aspect-oriented #set
Practical Aspects of Set Based Analysis (NH), pp. 765–779.
ICLPJICSLP-1992-KingS #concurrent #logic programming #source code
Schedule Analysis of Concurrent Logic programs (AK, PS), pp. 478–492.
ICLPJICSLP-1992-Overbeek #logic programming #search-based #sequence #tutorial
Logic Programming and Genetic Sequence Analysis: a Tutorial (RAO), pp. 32–34.
ICLPJICSLP-1992-SundararajanST #concurrent #logic programming #source code #thread
Variable Threadedness Analysis for Concurrent Logic Programs (RS, AVSS, ET), pp. 493–508.
LICSLICS-1992-Jensen #strict
Disjunctive Strictness Analysis (TPJ), pp. 174–185.
LICSLICS-1992-Murthy
A Computational Analysis of Girard’s Translation and LC (CRM), pp. 90–101.
HTHT-1991-SamuelsonG #hypermedia #library
Intellectual Property Rights for Digital Library and Hypertext Publishing Systems: An Analysis of Xanadu (PS, RJG), pp. 39–50.
PODSPODS-1991-Matsliach #multi #performance
Performance Analysis of File Organizations that Use Multi-Bucket Data Leaves with Partial Expansions (GM), pp. 164–180.
SIGMODSIGMOD-1991-IoannidisK #optimisation #query
Left-Deep vs. Bushy Trees: An Analysis of Strategy Spaces and its Implications for Query Optimization (YEI, YCK), pp. 168–177.
ICALPICALP-1991-ErnoultM #strict
Uniform Ideals and Strictness Analysis (CE, AM), pp. 47–59.
FMVDME-1991-PlatKP #design
A Case for Structured Analysis/Formal Design (NP, JvK, KP), pp. 81–105.
FPCAFPCA-1991-Henglein #higher-order #performance #type inference
Efficient Type Inference for Higher-Order Binding-Time Analysis (FH), pp. 448–472.
FPCAFPCA-1991-Holst
Finiteness Analysis (CKH), pp. 473–495.
FPCAFPCA-1991-Jensen #logic #strict
Strictness Analysis in Logical Form (TPJ), pp. 352–366.
CHICHI-1991-SiochiH #case study #evaluation #user interface #using
A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
CHICHI-1991-WhittakerBC #interactive #process
Co-ordinating activity: an analysis of interaction in computer-supported co-operative work (SW, SEB, HHC), pp. 361–367.
KDDKDD-1991-Piatetsky
Discovery, Analysis, and Presentation of Strong Rules (GPS), pp. 229–248.
KDDKDD-1991-Ziarko #database #dependence #representation
The Discovery, Analysis, and Representation of Data Dependencies in Databases (WZ), pp. 195–212.
SIGIRSIGIR-1991-Swanson
Analysis of Unintended Connections Between Disjoint Science Literatures (DRS), pp. 280–289.
SIGIRSIGIR-1991-WendlandtD #documentation #retrieval #semantics
Incorporating a Semantic Analysis into a Document Retrieval Strategy (EBW, JRD), pp. 270–279.
ECOOPECOOP-1991-Champeaux #development #object-oriented #top-down
Object-Oriented Analysis and Top-Down Software Development (DdC), pp. 360–376.
OOPSLAOOPSLA-1991-HayesC #modelling #object-oriented
Coherent Models for Object-Oriented Analysis (FH, DC), pp. 171–183.
TOOLSTOOLS-USA-1991-Henderson-Sellers #design
Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
TOOLSTOOLS-USA-1991-Murphy #case study #experience #object-oriented
Experiences in Applying Object-Oriented Analysis (GCM), pp. 249–264.
TOOLSTOOLS-USA-1991-Nerson #design
Analysis and Design Methodologies (JMN), pp. 375–376.
TOOLSTOOLS-USA-1991-Nerson91a #design #eiffel #towards
Associated Paper: Extending Eiffel Toward O-O Analysis and Design (JMN), pp. 377–392.
PEPMPEPM-1991-CortesiF #abstract domain #abstract interpretation #logic programming #source code
Abstract Interpretation of Logic Programs: An Abstract Domain for Groundness, Sharing, Freeness and Compoundness Analysis (AC, GF), pp. 52–61.
PEPMPEPM-1991-HuntS #perspective
Binding Time Analysis: A New PERspective (SH, DS), pp. 154–165.
PEPMPEPM-1991-ParkG #optimisation
Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References (YGP, BG), pp. 178–189.
PEPMPEPM-1991-Sahlin #prolog
Determinacy Analysis for Full Prolog (DS), pp. 23–30.
PEPMPEPM-1991-Shivers #control flow #semantics
The Semantics of Scheme Control-Flow Analysis (OS), pp. 190–198.
PLDIPLDI-1991-Launchbury #strict
Strictness and Binding-Time Analyses: Two for the Price of One (JL), pp. 80–91.
PLDIPLDI-1991-MaydanHL #data flow #dependence #performance
Efficient and Exact Data Dependence Analysis (DEM, JLH, MSL), pp. 1–14.
POPLPOPL-1991-AbramskyJ #approach #higher-order #polymorphism #relational #strict
A Relational Approach to Strictness Analysis for Higher-Order Polymorphic Functions (SA, TPJ), pp. 49–54.
POPLPOPL-1991-SekarMR #abstract interpretation #on the #strict
On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation (RCS, PM, IVR), pp. 37–48.
SASWSA-1991-BoeckC #automation #prolog #type checking
Automatic Construction of Prolog Primitives for Type Checking Analysis (PDB, BLC), pp. 165–172.
SASWSA-1991-Breuer #learning #synthesis
An Analysis/Synthesis Language with Learning Strategies (PTB), pp. 202–209.
RERE-1991-Hruschka #german #standard
Structured Analysis auf dem Weg zum De-facte-Standard (PH), pp. 1–13.
RERE-1991-Wittstadt #german #question
Structured Analysis: Ein Weg aus der Krise? (WW), pp. 191–208.
ESECESEC-1991-RozmanGD #metric #source code
Relation Between Source Code Metrics and Structure Analysis Metrics (IR, JG, TD), pp. 332–342.
ESECESEC-1991-SelbyM #classification #metric
Metric-Driven Classification Analysis (RWS, RKM), pp. 290–307.
ICSEICSE-1991-GorlickR #using
Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
ICSEICSE-1991-SelbyPSB #development #empirical #feedback #metric
Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development (RWS, AAP, DCS, JB), pp. 288–298.
ASPLOSASPLOS-1991-CmelikKDK #benchmark #metric #set #specification
An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
DACDAC-1991-BergamaschiCP #synthesis #using
Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
DACDAC-1991-DeguchiIY #fault #logic #probability
Probabilistic CTSS: Analysis of Timing Error Probability in Asynchronous Logic Circuits (YD, NI, SY), pp. 650–655.
DACDAC-1991-Hwang #named
REX — A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis (JPH), pp. 717–722.
DACDAC-1991-RaghavanR
A New Nonlinear Driver Model for Interconnect Analysis (VR, RAR), pp. 561–566.
DACDAC-1991-SastryM #branch #process
A Branching Process Model for Observability Analysis of Combinational Circuits (SS, AM), pp. 452–457.
TAPSOFTCAAP-1991-NajmS #calculus #concurrent #process
Object-Based Concurrency: A Process Calculus Analysis (EN, JBS), pp. 359–380.
TAPSOFTCCPSD-1991-Wright #strict
A New Technique for Strictness Analysis (DAW), pp. 235–258.
STOCSTOC-1991-CoffmanCGJMSWY #case study
Fundamental Discrepancies between Average-Case Analyses under Discrete and Continuous Distributions: A Bin Packing Case Study (EGCJ, CC, MRG, DSJ, LAM, PWS, RRW, MY), pp. 230–240.
CAVCAV-1991-AvruninBC #concurrent #integer #programming
Integer Programming in the Analysis of Concurrent Systems (GSA, UAB, JCC), pp. 92–102.
ICLPICLP-1991-CharlierMH #abstract interpretation #algorithm #complexity
A Generic Abstract Interpretation Algorithm and its Complexity Analysis (BLC, KM, PVH), pp. 64–78.
ICLPICLP-1991-CodishDY #algorithm #alias #safety #unification
Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
ICLPICLP-1991-CodishFM #concurrent #logic programming #source code
Suspension Analysis for Concurrent Logic Programs (MC, MF, KM), pp. 331–345.
ICLPICLP-1991-DebrayL #automation #complexity #logic programming #source code
Automatic Complexity Analysis of Logic Programs (SKD, NWL), pp. 599–613.
ICLPISLP-1991-FosterW #reuse
Copy Avoidance through Compile-Time Analysis and Local Reuse (ITF, WHW), pp. 455–469.
LICSLICS-1991-CortesiFW #abstract domain
Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis (AC, GF, WHW), pp. 322–327.
ISSTATAV-1991-DuesterwaldS #concurrent #data flow #framework #using
Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
ISSTATAV-1991-LongC #concurrent #data flow
Data Flow Analysis of Concurrent Systems that Use the Rendezvous Model of Synchronization (DLL, LAC), pp. 21–35.
ISSTATAV-1991-OstrandW #data flow #pointer #test coverage #testing
Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
ISSTATAV-1991-YehY #algebra #composition #process #reachability #using
Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
PODSPODS-1990-JohnsonS #algorithm #concurrent #framework #performance
A Framework for the Performance Analysis of Concurrent B-tree Algorithms (TJ, DS), pp. 273–287.
VLDBVLDB-1990-MuntzL #array #performance
Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
LISPLFP-1990-Burn #using
Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
LISPLFP-1990-Consel #functional #higher-order
Binding Time Analysis for High Order Untyped Functional Languages (CC), pp. 264–272.
LISPLFP-1990-DraghicescuP #composition
A Compositional Analysis of Evaluation-Order and Its Application (MD, SP), pp. 242–250.
CHICHI-1990-Campbell #programming #smalltalk
Developmental scenario analysis of Smalltalk programming (RLC), pp. 269–276.
CHICHI-1990-GeorgeVN #implementation #process
The organizational implementation of an electronic meeting system: an analysis of the innovation process (JFG, JSV, JFNJ), pp. 361–368.
CHICHI-1990-HowesP #learning #semantics
Semantic analysis during exploratory learning (AH, SJP), pp. 399–406.
CHICHI-1990-John #performance #visual notation
Extensions of GOMS analyses to expert performance requiring perception of dynamic visual and auditory information (BEJ), pp. 107–116.
CHICHI-1990-YoungW #concept #fault #predict #using
Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
ICMLML-1990-AndersonM #categorisation
A Rational Analysis of Categorization (JRA, MM), pp. 76–84.
ICMLML-1990-ChanW #induction #learning #performance #probability
Performance Analysis of a Probabilistic Inductive Learning System (KCCC, AKCW), pp. 16–23.
ICMLML-1990-Cohen #concept #learning #representation
An Analysis of Representation Shift in Concept Learning (WWC), pp. 104–112.
ICMLML-1990-PazzaniS #algorithm #learning
Average Case Analysis of Conjunctive Learning Algorithms (MJP, WS), pp. 339–347.
SIGIRSIGIR-1990-Sacks-DavisW #documentation #retrieval #using
Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
PLDIPLDI-1990-ChambersU #dynamic typing #object-oriented #optimisation #source code
Iterative Type Analysis and Extended Message Splitting: Optimizing Dynamically-Typed Object-Oriented Programs (CC, DU), pp. 150–164.
PLDIPLDI-1990-ChaseWZ #pointer
Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
PLDIPLDI-1990-DebrayLH #logic programming #source code
Task Granularity Analysis in Logic Programs (SKD, NWL, MVH), pp. 174–188.
PPDPPLILP-1990-BoeckC #correctness #prolog #static typing
Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
PPDPPLILP-1990-SagivFRW #approach #data flow #problem
A Logic-Based Approach to Data Flow Analysis Problem (SS, NF, MR, RW), pp. 277–292.
POPLPOPL-1990-Burn #abstract interpretation
A Relationship Between Abstract Interpretation and Projection Analysis (GLB), pp. 151–156.
POPLPOPL-1990-Field #lazy evaluation #on the #specification #tool support
On Laziness and Optimality in λ Interpreters: Tools for Specification and Analysis (JF), pp. 1–15.
POPLPOPL-1990-MarloweR #algorithm #data flow #hybrid #incremental #performance
An Efficient Hybrid Algorithm for Incremental Data Flow Analysis (TJM, BGR), pp. 184–196.
POPLPOPL-1990-SekarPR #performance #strict
Small Domains Spell Fast Strictness Analysis (RCS, SP, IVR), pp. 169–183.
PLDIBest-of-PLDI-1990-ChaseWZ90a #pointer
Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
DACDAC-1990-KuoLW #fault
A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
DACDAC-1990-McCormickA
Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
DACDAC-1990-McGeerB #network
Timing Analysis in Precharge/Unate Networks (PCM, RKB), pp. 124–129.
DACDAC-1990-SakallahMO #design
Analysis and Design of Latch-Controlled Synchronous Digital Circuits (KAS, TNM, KO), pp. 111–117.
PPoPPPPoPP-1990-CallahanKS #parallel #programming
Analysis of Event Synchronization in A Parallel Programming Tool (DC, KK, JS), pp. 21–30.
PPoPPPPoPP-1990-Nicol #parallel
Analysis of Synchronization in Massively Parallel Discrete-Event Sumulations (DMN), pp. 89–98.
ESOPESOP-1990-GoldbergP #functional #higher-order #implementation #optimisation #stack
Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations (BG, YGP), pp. 152–160.
ESOPESOP-1990-JensenM #garbage collection
A Backwards Analysis for Compile-time Garbage Collection (TPJ, TÆM), pp. 227–239.
ESOPESOP-1990-JourdanP
Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
ESOPESOP-1990-Sands #complexity #higher-order #lazy evaluation
Complexity Analysis for a Lazy Higher-Order Language (DS), pp. 361–376.
STOCSTOC-1990-SchmidtS
The Analysis of Closed Hashing under Limited Randomness (JPS, AS), pp. 224–234.
CAVCAV-1990-BerthelotJP #named #petri net
PAPETRI: Environment for the Analysis of Petri Nets (GB, CJ, LP), pp. 13–22.
CAVCAV-1990-Ness
Issues Arising in the Analysis of L.0 (LAN), pp. 106–115.
ICLPCLP-1990-MulkersWB90 #data type
Analysis of Shared Data Structures for Compile-Time Garbage (AM, WHW, MB), pp. 747–762.
ICLPNACLP-1990-MarriottS #constraints #logic programming #source code
Analysis of Constraint Logic Programs (KM, HS), pp. 531–547.
ICLPNACLP-1990-Pereira #prolog
Prolog and Natural-Language Analysis: Into the Third Decade (FCNP), pp. 813–832.
ICLPNACLP-1990-RoyD #compilation #data flow #optimisation #prolog
The Benefits of Global Dataflow Analysis for an Optimizing Prolog Compiler (PVR, AMD), pp. 501–515.
ICALPICALP-1989-Kenyon-MathieuV #data type
General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (CKM, JSV), pp. 473–487.
ICALPICALP-1989-LouchardRS #algorithm #probability
Dynamic Algorithms in D. E. Knuth’s Model: A Probabilistic Analysis (GL, BR, RS), pp. 521–533.
FPCAFPCA-1989-BjernerH #approach #composition #first-order #functional #lazy evaluation #source code
A Composition Approach to Time Analysis of First Order Lazy Functional Programs (BB, SH), pp. 157–165.
FPCAFPCA-1989-Bloss #functional #implementation #performance
Update Analysis and the Efficient Implementation of Functional Aggregates (AGB), pp. 26–38.
FPCAFPCA-1989-JonesM #garbage collection
Computer-Time Garbage Collection by Sharing Analysis (SBJ, DLM), pp. 54–74.
FPCAFPCA-1989-KuoM #strict #type inference
Strictness Analysis: A New Perspective Based on Type Inference (TMK, PM), pp. 260–272.
FPCAFPCA-1989-Rosendahl #automation #complexity
Automatic Complexity Analysis (MR), pp. 144–156.
CHICHI-1989-EganRLLG #behaviour #evaluation #hypermedia
Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
CAiSECAiSE-1989-HakkarainenIO #embedded #knowledge-based
A Knowledge-Based Support System for Embedded Computer Software Analysis (KH, TI, MO).
CAiSECAiSE-1989-HernbackL #automation #classification #framework #implementation #tool support
A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
KRKR-1989-Nebel
A Knowledge Level Analysis of Belief Revision (BN), pp. 301–311.
ICMLML-1989-Greiner #formal method #towards
Towards a Formal Analysis of EBL (RG), pp. 450–453.
ICMLML-1989-Hsu
A Knowledge-Level Analysis of Informing (JYjH), pp. 485–488.
ICMLML-1989-Shavlik #empirical #learning
An Empirical Analysis of EBL Approaches for Learning Plan Schemata (JWS), pp. 183–187.
SEKESEKE-1989-TsaiYLCH #specification
Knowledge-oriented Specification Analysis and Transformation (STT, CCY, CCL, STC, CHH), pp. 110–115.
SIGIRSIGIR-1989-Pejtersen #information retrieval #interface #library
A Library System for Information Retrieval Based on a Cognitive Task Analysis and Supported by an Icon-Based Interface (AMP), pp. 40–47.
SIGIRSIGIR-1989-SaltonS #automation #on the
On the Application of Syntactic Methodologies in Automatic Text Analysis (GS, MS), pp. 137–150.
PLDIPLDI-1989-HorwitzPR #dependence #pointer
Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
POPLPOPL-1989-CooperK #alias #interprocedural #performance
Fast Interprocedural Alias Analysis (KDC, KK), pp. 49–59.
POPLPOPL-1989-SagivEFR #attribute grammar #data flow
Resolving Circularity in Attribute Grammars with Applications to Data Flow Analysis (SS, OE, NF, MR), pp. 36–48.
ESECESEC-1989-FranceD #specification #using
Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
ESECESEC-1989-Ince #data flow #design #empirical #metric
Martin J. Shepperd: An Empirical and Theoretical Analysis of an Information Flow-Based System Design Metric (DCI), pp. 86–99.
ESECESEC-1989-ManfrediOT #approach #object-oriented
An Object-oriented Approach to the System Analysis (FM, GO, PT), pp. 395–410.
ICSEICSE-1989-BendifallahS #empirical #specification
Work Structures and Shifts: An Empirical Analysis of Software Specification Teamwork (SB, WS), pp. 260–270.
ICSEICSE-1989-Hsieh #concurrent #source code
Timing Analysis of Cyclic Concurrent Programs (CSH), pp. 312–318.
ICSEICSE-1989-LongC #concurrent #graph #interactive
Task Interaction Graphs for Concurrency Analysis (DLL, LAC), pp. 44–52.
ICSEICSE-1989-VernerTJH #case study #dependence #overview #perspective
Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
ASPLOSASPLOS-1989-AdamsZ #set #source code
An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
ASPLOSASPLOS-1989-WeberG #multi
Analysis of Cache Invalidation Patterns in Multiprocessors (WDW, AG), pp. 243–256.
DACDAC-1989-BolsensRCM #behaviour #debugging #logic
Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
DACDAC-1989-Coppola #algorithm #logic
New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
DACDAC-1989-DuYG #on the #problem
On the General False Path Problem in Timing Analysis (DHCD, SHY, SG), pp. 555–560.
DACDAC-1989-PerremansCM
Static Timing Analysis of Dynamically Sensitizable Paths (SP, LJMC, HDM), pp. 568–573.
DACDAC-1989-PillageHR #evaluation #named
AWEsim: Asymptotic Waveform Evaluation for Timing Analysis (LTP, XH, RAR), pp. 634–637.
DACDAC-1989-WeinerS #logic #synthesis
Timing Analysis in a Logic Synthesis Environment (NW, ALSV), pp. 655–661.
DACDAC-1989-YenDG #algorithm #performance
Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
SOSPSOSP-1989-Duchamp #performance #transaction
Analysis of Transaction Management Performance (DD), pp. 177–190.
TAPSOFTCCIPL-1989-Mogensen #higher-order
Binding Time Analysis for Polymorphically Typed Higher Order Languages (TÆM), pp. 298–312.
STOCSTOC-1989-Motwani #algorithm #graph #problem
Expanding Graphs and the Average-case Analysis of Algorithms for Matchings and Related Problems (RM), pp. 550–561.
ICLPNACLP-1989-Mudambi #multi #performance
Performance Analysis of Aurora on a Switch-Based Multiprocessor (SM), pp. 697–712.
ICLPNACLP-1989-Szeredi #performance #prolog
Performance Analysis of the Aurora Or-Parallel Prolog System (PS), pp. 713–732.
ICLPNACLP-1989-Winsborough #multi #reachability
Path-Dependent Reachability Analysis for Multiple Specialization (WHW), pp. 133–153.
ISSTATAV-1989-AvruninWD #automation #concurrent
Experiments in Automated Analysis of Concurrent Software Systems (GSA, JCW, LKD), pp. 124–130.
ISSTATAV-1989-KotikM #automation #program transformation #testing #using
Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
ISSTATAV-1989-YoungTFB #concurrent #development
Integrated Concurrency Analysis in a Software Development Enviornment (MY, RNT, KF, DB), pp. 200–209.
PODSPODS-1988-RamakrishnaM #bound
Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
SIGMODSIGMOD-1988-ChristodoulakisF #performance
Performance Analysis and Fundamental Performance Trade Offs for CLV Optical Disks (SC, DAF), pp. 286–294.
SIGMODSIGMOD-1988-DeWittGS #database #performance
A Performance Analysis of the Gamma Database Machine (DJD, SG, DAS), pp. 350–360.
SIGMODSIGMOD-1988-Hanson #database #performance #query
Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
SIGMODSIGMOD-1988-Ramakrishna
Hashing in Practive, Analysis of Hashing and Universal Hashing (MVR), pp. 191–199.
VLDBVLDB-1988-Bhide #architecture #transaction
An Analysis of Three Transaction Processing Architectures (AB), pp. 339–350.
CSEETSEI-1988-LaviW #embedded #industrial #requirements #specification
Embedded Computer Systems. Requirements Analysis & Specification — An Industrial Course (JZL, MW), pp. 81–105.
ICALPICALP-1988-AlbertF #algorithm #complexity #multi
Average Case Complexity Analysis of the Rete Multi-Pattern Match Algorithm (LA, FF), pp. 18–37.
ICALPICALP-1988-LengauerW #graph #performance
Efficient Analysis of Graph Properties on Context-free Graph Languages (TL, EW), pp. 379–393.
CSCWCSCW-1988-Greenbaum
In Search of Cooperation: An Historical Analysis of Work Organization and Management Strategies (JG), pp. 102–114.
SIGIRSIGIR-1988-BollmannR
A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
OOPSLAOOPSLA-1988-Alabiso #data flow #design #modelling #object-oriented
Transformation of Data Flow Analysis Models to Object-Oriented Design (BA), pp. 335–354.
PLDIPLDI-1988-BallanceBG #abstraction #editing #incremental #syntax
Grammatical Abstraction and Incremental Syntax Analysis in a Language-Based Editor (RAB, JB, SLG), pp. 185–198.
PLDIPLDI-1988-Callahan #data flow #graph #interprocedural #summary
The Program Summary Graph and Flow-Sensitive Interprocedural Data Flow Analysis (DC), pp. 47–56.
PLDIPLDI-1988-CooperK #interprocedural #linear
Interprocedural Side-Effect Analysis in Linear Time (KDC, KK), pp. 57–66.
PLDIPLDI-1988-JainT #approach #data flow #multi #performance
An Efficient Approach to Data Flow Analysis in a Multi Pass Global Optimizer (SJ, CLT), pp. 154–163.
PLDIPLDI-1988-SeshadriWJWYS #compilation #concurrent #semantics
Semantic Analysis in a Concurrent Compiler (VS, DBW, MDJ, SW, CPY, IS), pp. 233–240.
PLDIPLDI-1988-Shivers #control flow
Control-Flow Analysis in Scheme (OS), pp. 164–174.
POPLPOPL-1988-CarrollR #data flow #incremental
Incremental Data Flow Analysis via Dominator and Attribute Updates (MDC, BGR), pp. 274–284.
POPLPOPL-1988-Debray #data flow #logic programming #performance #source code
Efficient Dataflow Analysis of Logic Programs (SKD), pp. 260–273.
POPLPOPL-1988-MontenyohlW #continuation #semantics
Correct Flow Analysis in Continuation Semantics (MM, MW), pp. 204–218.
POPLPOPL-1988-NielsonN #automation #λ-calculus
Automatic Binding Time Analysis for a Typed λ-Calculus (HRN, FN), pp. 98–106.
POPLPOPL-1988-RuggieriM
Lifetime Analysis of Dynamically Allocated Objects (CR, TPM), pp. 285–293.
POPLPOPL-1988-Wadler #strict
Strictness Analysis Aids Time Analysis (PW), pp. 119–132.
PLDIBest-of-PLDI-1988-CooperK88a #interprocedural #linear
Interprocedural side-effect analysis in linear time (with retrospective) (KDC, KK), pp. 217–228.
PLDIBest-of-PLDI-1988-Shivers88a #control flow #higher-order #lessons learnt
Higher-order control-flow analysis in retrospect: lessons learned, lessons abandoned (with retrospective) (OS), pp. 257–269.
ICSEICSE-1988-ChaLS #fault #safety #using #verification
Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
ICSEICSE-1988-Hagemann #automation #realtime #requirements
Requirements Analysis for Real-Time Automation Projects (MH), pp. 122–129.
DACDAC-1988-BeattyB #incremental #performance #using
Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
DACDAC-1988-BurchNYH #estimation #independence #reliability
Pattern-Independent Current Estimation for Reliability Analysis of CMOS Circuits (RB, FNN, PY, DEH), pp. 294–299.
DACDAC-1988-ChiangNL #algorithm #performance
Time Efficient VLSI Artwork Analysis Algorithms in GOALIE2 (KWC, SN, CYL), pp. 471–475.
DACDAC-1988-Cirit #random #testing
Switch Level Random Pattern Testability Analysis (MAC), pp. 587–590.
DACDAC-1988-Sherman #algorithm #generative
Algorithms for Timing Requirement Analysis and Generation (SKS), pp. 724–727.
DACDAC-1988-YenGD #algorithm
A Path Selection Algorithm for Timing Analysis (HCY, SG, DHCD), pp. 720–723.
PPoPPPPEALS-1988-LiY #interprocedural #parallel #performance
Efficient Interprocedural Analysis for Program Parallelization and Restructuring (ZL, PCY), pp. 85–99.
ESOPESOP-1988-Takayama #compilation #named #proving
QPC: QJ-based Proof Compiler — Simple Examples and Analysis (YT), pp. 49–63.
STOCSTOC-1988-HalpernMT #knowledge-based
A Knowledge-Based Analysis of Zero Knowledge (JYH, YM, MRT), pp. 132–147.
STOCSTOC-1988-LuekerM
More Analysis of Double Hashing (GSL, MM), pp. 354–359.
STOCSTOC-1988-PapadimitriouY88b #algorithm #architecture #independence #parallel #towards
Towards an Architecture-Independent Analysis of Parallel Algorithms (CHP, MY), pp. 510–513.
ICLPJICSCP-1988-Docker88 #implementation #named #prolog
SAME — A Structured Analysis Tool and its Implementation in Prolog (TWGD), pp. 82–95.
ICLPJICSCP-1988-GorlickK88 #logic programming #named #performance #source code
Gauge: A Workbench for the Performance Analysis of Logic Programs (MMG, CK), pp. 548–561.
ICLPJICSCP-1988-HuynhL88
A CLP(R) Options Trading Analysis System (TH, CL), pp. 59–69.
ICLPJICSCP-1988-WarrenHD88 #logic programming #on the #source code
On the Practicality of Global Flow Analysis of Logic Programs (RW, MVH, SKD), pp. 684–699.
PODSPODS-1987-Hadzilacos #protocol
A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
PODSPODS-1987-Marchetti-SpaccamelaPS #complexity #implementation #logic #query #worst-case
Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
SIGMODSIGMOD-1987-FaloutsosSR #data access #object-oriented
Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
SIGMODSIGMOD-1987-Hanson #performance
A Performance Analysis of View Materialization Strategies (ENH), pp. 440–453.
SIGMODSIGMOD-1987-NelsonS #data type
A Population Analysis for Hierarchical Data Structures (RCN, HS), pp. 270–277.
VLDBVLDB-1987-DiasIRY #design
Design and Analysis of Integrated Concurrency-Coherence Controls (DMD, BRI, JTR, PSY), pp. 463–471.
ICALPICALP-1987-Dybjer #image
Inverse Image Analysis (PD), pp. 21–30.
FPCAFPCA-1987-WadlerH #strict
Projections for strictness analysis (PW, RJMH), pp. 385–407.
HCIHCI-CE-1987-LuekePB #protocol #requirements
User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
HCIHCI-SES-1987-Malt #approach #human-computer #interface
Skills Analysis in Human-Computer Interface: A Holistic Approach (LGM), pp. 319–326.
HCIHCI-SES-1987-Saito #evaluation #eye tracking
Quantitative Evaluation of VDT Operations Through the Analysis of Spatio-Temporal Characteristics of Eye Movement (SS), pp. 197–202.
SIGIRSIGIR-1987-Harman #online
A Failure Analysis on the Limitations of Suffixing in an Online Environment (DH), pp. 102–107.
SIGIRSIGIR-1987-SmithWF #named #retrieval
MICROARRAS: An Advanced Full-Text Retrieval and Analysis System (JBS, SFW, GJF), pp. 187–195.
OOPSLAOOPSLA-1987-KerrP #object-oriented #programming #using
Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
PLDIPLDI-1987-OffuttK #fortran #interpreter #mutation testing
A Fortran 77 interpreter for mutation analysis (AJO, KNK), pp. 177–188.
POPLPOPL-1987-KuoM #on the #strict
On Strictness and its Analysis (TMK, PM), pp. 144–155.
POPLPOPL-1987-Nielson #abstract interpretation #strict
Strictness Analysis and Denotational Abstract Interpretation (FN), pp. 120–131.
ESECESEC-1987-RobinsonE #database #requirements
Requirements Analysis for a Database Administration Support Environment (HMR, JME), pp. 377–386.
DACDAC-1987-Parks #design #named #tutorial
Tutorial: Reading and Reviewing the Common Schema for Electrical Design and Analysis (CHP), pp. 479–483.
STOCSTOC-1987-Bach #algorithm #random
Realistic Analysis of Some Randomized Algorithms (EB), pp. 453–461.
STOCSTOC-1987-HastadLR #multi #protocol
Analysis of Backoff Protocols for Multiple Access Channels (JH, FTL, BR), pp. 241–253.
ICLPSLP-1987-Debray87 #logic programming #source code
Flow Analysis of a Simple Class of Dynamic Logic Programs (SKD), pp. 307–316.
ICLPSLP-1987-MannilaU87 #prolog #source code
Flow Analysis of Prolog Programs (HM, EU), pp. 205–214.
ICALPICALP-1986-BrzozowskiS #network #simulation
Correspondence between Ternary Simulation and Binary Race Analysis in Gate Networks (JAB, CJHS), pp. 69–78.
LISPLFP-1986-BlossH #strict
Variations on Strictness Analysis (AGB, PH), pp. 132–142.
ICGTGG-1986-MoldovanP #graph grammar #parallel #rule-based #using
Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
CSCWCSCW-1986-ApplegateKN #generative #idea
A group decision support system for idea generation and issue analysis in organization planning (LMA, BRK, JFN), pp. 16–34.
CSCWCSCW-1986-BegemanCEGRS
Project Nick: meetings augmentation and analysis (MLB, PC, CAE, MG, GLR, TS), pp. 1–6.
SIGIRSIGIR-1986-TruckenmullerR #design #perspective #topic
Methodological Issues for the Design of an Office Information Server — Focal Topics for the Analysis from an Office System Perspective (TWT, MR), pp. 39–48.
POPLPOPL-1986-Coutant #alias
Retargetable High-Level Alias Analysis (DSC), pp. 110–118.
POPLPOPL-1986-HudakY #higher-order #strict #λ-calculus
Higher-Order Strictness Analysis in Untyped λ Calculus (PH, JY), pp. 97–109.
POPLPOPL-1986-JonesM #data flow #graph #source code #using
Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
POPLPOPL-1986-SneltingH #algebra #incremental #semantics #unification
Unification in Many-Sorted Algebras as a Device for Incremental Semantic Analysis (GS, WH), pp. 229–235.
PLDIBest-of-PLDI-1986-BurkeC #dependence #interprocedural #parallel
Interprocedural dependence analysis and parallelization (with retrospective) (MGB, RC), pp. 139–154.
DACDAC-1986-BarzilaiBHIS #fault #named #performance #verification
SLS — a fast switch level simulator for verification and fault coverage analysis (ZB, DKB, LMH, VSI, GMS), pp. 164–170.
DACDAC-1986-Hartoog #layout #standard
Analysis of placement procedures for VLSI standard cell layout (MRH), pp. 314–319.
DACDAC-1986-JacobNP #empirical #multi #performance
An empirical analysis of the performance of a multiprocessor-based circuit simulator (GKJ, ARN, DOP), pp. 588–593.
DACDAC-1986-Larsen #clustering #data type #synthesis
Rules-based object clustering: a data structure for symbolic VLSI synthesis and analysis (RPL), pp. 768–777.
DACDAC-1986-ToyoshimaTMHHKT #design #effectiveness #scalability
An effective delay analysis system for a large scale computer design (RT, YT, KM, HH, MH, RK, KT), pp. 398–403.
DACDAC-1986-VidigalND #integration #named #network
CINNAMON: coupled integration and nodal analysis of MOS networks (LMV, SRN, SWD), pp. 179–185.
ESOPESOP-1986-KastensS #parametricity
Lifetime Analysis for Procedure Parameters (UK, MS), pp. 53–69.
STOCSTOC-1986-LeightonS #algorithm #bound #grid
Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
CADECADE-1986-Jager #logic
Some Contributions to the Logical Analysis of Circumscrition (GJ), pp. 154–171.
ICLPICLP-1986-Matsumoto86 #natural language #parallel #parsing
A Parallel Parsing System for Natural Language Analysis (YM), pp. 396–409.
LICSLICS-1986-Coquand
An Analysis of Girard’s Paradox (TC), pp. 227–236.
SIGMODSIGMOD-1985-DemoK #database #dependence
Analysis of the Context Dependency of CODASYL Find-Statements with Application to Database Program Conversion (GBD, SK), pp. 354–361.
SIGMODSIGMOD-1985-KamelK
A Model of Data Distribution Based on Texture Analysis (NK, RK), pp. 319–325.
ICALPICALP-1985-KurtzM #algorithm #distributed #probability #set
A Probabilistic Distributed Algorithm for Set Intersection and Its Analysis (TGK, UM), pp. 356–362.
FPCAFPCA-1985-ClackJ85 #approach #strict
Strictness Analysis — A Practical Approach (CDC, SLPJ), pp. 35–49.
FPCAFPCA-1985-PatelSE85 #algorithm #hardware #multi #named #specification #synthesis
vFP: An Environment for the Multi-level Specification, Analysis, and Synthesis of Hardware Algorithms (DP, MDFS, MDE), pp. 238–255.
ICSEICSE-1985-GirgisW #data flow #testing #using
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
ICSEICSE-1985-StephensW #design
The Analyst — A Workstation for Analysis and Design (MS, KW), pp. 364–371.
DACDAC-1985-Chan #development #multi #network
Development of a timing analysis program for multiple clocked network (EC), pp. 816–819.
DACDAC-1985-MuraokaIKMH #named
ACTAS: an accurate timing analysis system for VLSI (MM, HI, HK, MM, KH), pp. 152–158.
DACDAC-1985-PerryMP #modelling
Yield analysis modeling (SP, MM, DJP), pp. 425–428.
DACDAC-1985-PierroD #design #integration
Mechanical design/analysis integration on Apollo workstations (JAP, GFD), pp. 96–101.
DACDAC-1985-RoseBT #design #performance #probability #tool support
Integrating stochastic performance analysis with system design tools (CWR, MB, YT), pp. 482–488.
DACDAC-1985-SchefferS #abstraction
Hierarchical analysis of IC artwork with user defined abstraction rules (LS, RS), pp. 293–298.
DACDAC-1985-Tendolkar #fault #random
Analysis of timing failures due to random AC defects in VLSI modules (NNT), pp. 709–714.
DACDAC-1985-Wunderlich #named #probability #testing
PROTEST: a tool for probabilistic testability analysis (HJW), pp. 204–211.
SOSPSOSP-1985-OusterhoutCHKKT #file system
A Trace-Driven Analysis of the UNIX 4.2 BSD File System (JKO, HDC, DH, JAK, MDK, JGT), pp. 15–24.
ICLPSLP-1985-ChangD85 #backtracking #dependence #prolog
Semi-Intelligent Backtracking of Prolog Based on Static Data Dependency Analysis (JHC, AMD), pp. 10–21.
VLDBVLDB-1984-BennR #image #relational #retrieval #sequence
Retrieval of Relational Structures for Image Sequence Analysis (WB, BR), pp. 533–536.
ICALPICALP-1984-KirschenhoferP #algorithm #recursion #traversal
Recursion Depth Analysis for Special Tree Traversal Algorithms (PK, HP), pp. 303–311.
ICALPICALP-1984-Lagarias #performance
Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
SIGIRSIGIR-1984-NiedermairTB #named #retrieval
MARS: A Retrieval Tool on the Basis of Morphological Analysis (GTN, GT, IB), pp. 369–381.
SIGIRSIGIR-1984-Tolle #evaluation #information management #monitoring #transaction
Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
PLDISCC-1984-Koskimies #semantics #specification
A specification language for one-pass semantic analysis (KK), pp. 179–189.
PLDISCC-1984-Zadeck #data flow #editing #incremental
Incremental data flow analysis in a structured program editor (FKZ), pp. 132–143.
ICSEICSE-1984-ToriiMSK #functional #logic #problem #programming
Functional Programming and Logical Programming for the Telegram Analysis Problem (KT, YM, YS, TK), pp. 463–472.
DACDAC-1984-GeusRRW #named
IDA: Interconnect delay analysis for integrated circuits (AJdG, JBR, MR, GW), pp. 536–541.
DACDAC-1984-JhonK #concurrent #data flow #design
Deadlock analysis in the design of data-flow circuits (CSJ, RMK), pp. 705–707.
STOCSTOC-1984-KarpLM #multi #probability #problem
A Probabilistic Analysis of Multidimensional Bin Packing Problems (RMK, ML, AMS), pp. 289–298.
CADECADE-1984-Plaisted #dependence #graph #proving #theorem proving #using
Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
SIGIRSIGIR-1983-BrooksB #design #information retrieval #interactive #using
Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
SIGIRSIGIR-1983-Somers #file system #recommendation #user interface
The User View of File Management: Recommendations for a User Interface Based in an Analysis of UNIX File System Use (PS), p. 161.
SIGIRSIGIR-1983-Tolle #online #transaction
Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
POPLPOPL-1983-Ryder #data flow #incremental
Incremental Data Flow Analysis (BGR), pp. 167–176.
DACDAC-1983-Jouppi
Timing analysis for nMOS VLSI (NPJ), pp. 411–418.
DACDAC-1983-SzymanskiW #algorithm #performance
Space efficient algorithms for VLSI artwork analysis (TGS, CJVW), pp. 734–739.
DACDAC-1983-TamuraON #layout
Path delay analysis for hierarchical building block layout system (ET, KO, TN), pp. 403–410.
STOCSTOC-1983-Turner #algorithm #probability
Probabilistic Analysis of Bandwidth Minimization Algorithms (JST), pp. 467–476.
SIGMODSIGMOD-1982-BatesBD #database #framework #research #statistics
A Framework for Research in Database Management for Statistical Analysis (DMB, HB, DJD), pp. 69–78.
SIGMODSIGMOD-1982-Cooper #commit #distributed #protocol
Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
SIGMODSIGMOD-1982-Finkelstein #database
Common Subexpression Analysis in Database Applications (SJF), pp. 235–245.
POPLPOPL-1982-JonesM #approach #data flow #data type #flexibility #interprocedural #recursion #source code
A Flexible Approach to Interprocedural Data Flow Analysis and Programs with Recursive Data Structures (NDJ, SSM), pp. 66–74.
POPLPOPL-1982-Reps #editing #incremental #semantics
Optimal-Time Incremental Semantic Analysis for Syntax-Directed Editors (TWR), pp. 169–176.
ICSEICSE-1982-Forman #composition #data flow
Global Data Flow Analysis by Decomposition into Primes (IRF), pp. 386–392.
ICSEICSE-1982-RappsW #data flow #testing
Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
ASPLOSASPLOS-1982-McDaniel #set #using
An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
ASPLOSASPLOS-1982-SweetS #empirical #set
Empirical Analysis of the Mesa Instruction Set (RES, JGSJ), pp. 158–166.
DACDAC-1982-Agrawal
Synchronous path analysis in MOS circuit simulator (VDA), pp. 629–635.
DACDAC-1982-BeningLAS #logic #network
Developments in logic network path delay analysis (LB, TAL, CRA, JES), pp. 605–615.
DACDAC-1982-GoelM82a #interactive #testing
An interactive testability analysis program — ITTAP (DKG, RMM), pp. 581–586.
DACDAC-1982-Sr #verification
Timing Verification and the Timing Analysis program (RBHS), pp. 594–604.
VLDBVLDB-1981-MenonH #design #relational
Design and Analysis of a Relational Join Operation for VLSI (JM, DKH), pp. 44–55.
VLDBVLDB-1981-MontgomeryR #data-driven #information management
The Active Information System: A Data-Driven System for the Analysis of Imprecise Data (CAM, EHR), pp. 376–384.
ICALPICALP-1981-Jones
Flow Analysis of λ Expressions (NDJ), pp. 114–128.
ICALPICALP-1981-Schnorr #algorithm
Refined Analysis and Improvements on Some Factoring Algorithms (CPS), pp. 1–15.
ICALPICALP-1981-Sharir #data flow #source code
Data Flow Analysis of Applicative Programs (MS), pp. 98–113.
SIGIRSIGIR-1981-Carroll
Content Analysis as a Word-Processing Option (JMC), pp. 126–131.
ICSEICSE-1981-BasiliW #documentation #evaluation #requirements
Evaluation of a Software Requirements Document by Analysis of Change Data (VRB, DMW), pp. 314–324.
ICSEICSE-1981-ChenZ #clustering #re-engineering #using
Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
ICSEICSE-1981-FutamuraKHT #development #diagrams #problem #source code
Development of Computer Programs by Problem Analysis Diagram (PAD) (YF, TK, HH, MT), pp. 325–332.
ICSEICSE-1981-KomodaHKS #approach #modelling #requirements #using
An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
ICSEICSE-1981-RichardsonC #reliability
A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
ICSEICSE-1981-ZeilW #testing
Sufficient Tset Sets for Path Analysis Testing Strategies (SJZ, LJW), pp. 184–194.
DACDAC-1981-DewhirstH #design #modelling
Application of volumetric modeling to mechanical design and analysis (DLD, RCH), pp. 171–178.
DACDAC-1981-HaferP #design #formal method #logic #specification
A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
DACDAC-1981-McDermott #fault #random
Random fault analysis (RMM), pp. 360–364.
DACDAC-1981-Ruehli #logic #modelling #overview #scalability #simulation
Survey of analysis, simulation and modeling for large scale logic circuits (AER), pp. 124–129.
STOCSTOC-1981-GonnetM #linear
A Linear Probing Sort and its Analysis (GHG, JIM), pp. 90–95.
VLDBVLDB-1980-Badal #concurrent #database #distributed #performance
The Analysis of the Effects of Concurrency Control on Distributed Database System Performance (DZB), pp. 376–383.
VLDBVLDB-1980-EpsteinS #database #distributed
Analysis of Distributed Data Base Processing Strategies (RSE, MS), pp. 92–101.
ICALPICALP-1980-CousotC #communication #csp #process #semantics
Semantic Analysis of Communicating Sequential Processes (Shortened Version) (PC, RC), pp. 119–133.
ICALPICALP-1980-FlajoletS #algorithm #on the
On the Analysis of Tree-Matching Algorithms (PF, JMS), pp. 208–219.
ICALPICALP-1980-PapadimitriouB #nearest neighbour #worst-case
A Worst-Case Analysis of Nearest Neighbor Searching by Projection (CHP, JLB), pp. 470–482.
SIGIRSIGIR-1980-KracsonyKM #comparative #hardware
Comparative Analysis of Hardware Versus Software Text Search (PK, GJK, AM), pp. 268–279.
POPLPOPL-1980-Kfoury #set #source code
Analysis of Simple Programs Over Different Sets of Primitives (AJK), pp. 56–61.
POPLPOPL-1980-Suzuki #pointer
Analysis of Pointer Rotation (NS), pp. 1–11.
POPLPOPL-1980-Weihl #data flow #interprocedural #pointer
Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
DACDAC-1980-AbramoviciB #fault
Fault diagnosis based on effect-cause analysis: An introduction (MA, MAB), pp. 69–76.
DACDAC-1980-AltmanP #design
The SLIDE simulator: A facility for the design and analysis of computer interconnections (AHA, ACP), pp. 148–155.
DACDAC-1980-Goel #generative #testing
Test generation costs analysis and projections (PG), pp. 77–84.
DACDAC-1980-GoldsteinT #named
SCOAP: Sandia controllability/observability analysis program (LHG, ELT), pp. 190–196.
DACDAC-1980-LeinwandL #algebra #behaviour #nondeterminism
Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
DACDAC-1980-Miller #automation #design
Inter-active graphic methods for automating mechanical engineering design and analyses (JMM), pp. 114–128.
DACDAC-1980-MitsuhashiCTY
An integrated mask artwork analysis system (TM, TC, MT, KY), pp. 277–284.
DACDAC-1980-Powell
Justification and financial analysis for CAD (REP), pp. 564–571.
DACDAC-1980-Yates #design #metric #process
Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
CADECADE-1980-Bruynooghe #behaviour #dependence #logic programming #source code
Analysis of Dependencies to Improve the Behaviour of Logic Programs (MB), pp. 293–305.
SIGMODSIGMOD-1979-BadalP #performance #semantics #validation
Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
SIGMODSIGMOD-1979-HawthornS #database #performance #relational
Performance Analysis of a Relational Data Base Management System (PBH, MS), pp. 1–12.
SIGMODSIGMOD-1979-YuLSO #performance #problem
Performance Analysis of three Related Assignment Problems (CTY, KL, MKS, ZMÖ), pp. 82–92.
ICALPICALP-1979-Karp #algorithm #graph #probability
Recent Advances in the Probabilistic Analysis of Graph-Theoretic Algorithms (RMK), pp. 338–339.
SIGIRSIGIR-1979-DominickP #automation #evaluation #information management #monitoring
Automated Monitoring to Support the Analysis and Evaluation of Information Systems (WDD, WDP), pp. 2–9.
POPLPOPL-1979-JonesM #optimisation
Flow Analysis and Optimization of Lisp-Like Structures (NDJ, SSM), pp. 244–256.
POPLPOPL-1979-Reif #communication #data flow #process
Data Flow Analysis of Communicating Processes (JHR), pp. 257–268.
ICSEICSE-1979-AbeSA
An Analysis of Software Project Failure (JA, KS, HA), pp. 378–385.
DACDAC-1979-LoslebenT
Topological analysis for VLSI circuits (PL, KT), pp. 461–473.
SOSPSOSP-1979-KumarG #distributed #modelling
Modelling and Analysis of Distributed Software Systems (BK, TAG), pp. 2–8.
VLDBVLDB-1978-Ashany #classification #database #matrix #retrieval #scalability
Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
VLDBVLDB-1978-Mason #architecture
A DBMS Architecture to Support Information Analysis (PJM), p. 332.
VLDBVLDB-1978-NakamuraM
An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
ICGTGG-1978-RosendahlM #reduction #source code
Analysis of Programs by Reduction of Their Structure (MR, KPM), pp. 409–417.
ICGTGG-1978-Wileden #concurrent #design #graph grammar
Relationships Between Graph Grammars and the Design and Analysis of Concurrent Software (JCW), pp. 456–463.
SIGIRSIGIR-1978-Hill #database
Analysis of An Inverted Data Base Structure (EHJ), pp. 37–64.
POPLPOPL-1978-Reif #linear #programming
Symbolic Programming Analysis in Almost Linear Time (JHR), pp. 76–83.
POPLPOPL-1978-Rosen #agile #data flow #monad
Monoids for Rapid Data Flow Analysis (BKR), pp. 47–59.
ICSEICSE-1978-HerndonK #fault #validation
Analysis of Error Remediation Expenditures During Validation (MAH, APK), pp. 202–206.
ICSEICSE-1978-McClure #complexity
A Model for Program Complexity Analysis (CLM), pp. 149–157.
ICSEICSE-1978-Willis #automation #design #named
DAS: An Automated System to Support Design Analysis (RRW), pp. 109–115.
DACDAC-1978-Weste #design
A color graphics system for I.C. mask design and analysis (NW), pp. 199–205.
DACDAC-1978-Willis #automation #design #named
DAS: An automated system to support design analysis (RRW), pp. 359–365.
DACDAC-1978-Wold #design #performance #verification
Design verification and performance analysis (MAW), pp. 264–270.
STOCSTOC-1978-Baudet #algorithm
An Analysis of the Full αβ Pruning Algorithm (GMB), pp. 296–313.
VLDBVLDB-1977-HultenS #database #performance #scalability #simulation
A Simulation Model for Performance Analysis of Large Shared Data Bases (CH, LS), pp. 524–532.
VLDBVLDB-1977-Navathe #database
Schema Analysis for Database Restructuring (SBN), p. 326.
POPLPOPL-1977-Barth #algorithm #data flow #interprocedural
An Interprocedural Data Flow Analysis Algorithm (JMB), pp. 119–131.
POPLPOPL-1977-KennedyZ #control flow #graph grammar
Applications of Graph Grammar for Program Control Flow Analysis (KK, LZ), pp. 72–85.
DACDAC-1977-Baird #algorithm #performance
Fast algorithms for LSI artwork analysis (HSB), pp. 303–311.
DACDAC-1977-Domaszewicz
Flight test analysis of missile control systems (MD), pp. 101–108.
SOSPSOSP-1977-Potier #policy #set
Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
SOSPSOSP-1977-Snyder #on the #synthesis
On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
STOCSTOC-1977-GonnetM
The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
POPLPOPL-1976-Franck #2d #graph grammar #named #precedence
PLAN2D — Syntactic Analysis of Precedence Graph Grammars (RF), pp. 134–139.
ICSEICSE-1976-GoudaM #design #modelling #on the #protocol
On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.
ICSEICSE-1976-PimontR #assessment #behaviour #reliability #source code
A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
ICSEICSE-1976-RossS #requirements
Structured Analysis for Requirements Definition (DTR, KESJ), p. 1.
ICSEICSE-1976-Stephenson #development
An Analysis of the Resources Used in the SAFEGUARD System Software Development (WES), pp. 312–321.
ICSEICSE-1976-TeichroewH #documentation #information management #named
PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (DT, EAHI), p. 2.
ICSEICSE-1976-WensleyGLS #design #fault tolerance #verification
The Design, Analysis, and Verification of the SIFT Fault-Tolerant System (JHW, MWG, KNL, RES), pp. 458–469.
SOSPSOSP-J-1975-ChuO76 #algorithm #markov
Analysis of the PFF Replacement Algorithm via a Semi-Markov Model (WWC, HO), pp. 298–304.
DACDAC-1976-BuntineP #design
Design rule checking and analysis of IC mask designs (WLB, BP), pp. 301–308.
DACDAC-1976-Case #fault #logic
Analysis of actual fault mechanisms in CMOS logic gates (GRC), pp. 265–270.
DACDAC-1976-Ho #preprocessor #source code
A preprocessor for structural analysis programs (PKH), pp. 17–24.
DACDAC-1976-PreasBG #automation
Automatic circuit analysis based on mask information (BP, WLB, CWG), pp. 309–317.
STOCSTOC-1976-GuibasS
The Analysis of Double Hashing (LJG, ES), pp. 187–191.
VLDBVLDB-1975-Chin #behaviour
Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
VLDBVLDB-1975-HofferS #clustering #database #design #physics #using
The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
VLDBVLDB-1975-Miyamoto #database #modelling #performance
Hierarchical Performance Analysis Models for Data Base Systems (IM), pp. 322–352.
POPLPOPL-1975-GrahamW #algorithm #linear #performance
A Fast and Usually Linear Algorithm for Global Flow Analysis (SLG, MNW), pp. 22–34.
POPLPOPL-1975-Kennedy #data flow
Node Listings Applied to Data Flow Analysis (KK), pp. 10–21.
DACDAC-1975-Foster #source code
Prerouting analysis programs (JCF), pp. 306–310.
SOSPSOSP-1975-LamS #algorithm #scheduling
Analysis of a Level Algorithm for Preemptive Scheduling (SL, RS), pp. 178–186.
SOSPSOSP-1975-Sadeh #algorithm #fault #performance
An Analysis of the Performance of the Page Fault Frequency (PFF) Replacement Algorithm (ES), pp. 6–13.
STOCSTOC-1975-Pratt #modelling #optimisation
Four Models for the Analysis of Optimization of Program Control Structures (TWP), pp. 167–176.
SIGMODSIGFIDET-1974-BehymerOM
Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
DACDAC-1974-Garrett #modelling
Transmission line models for transient analysis (SJG), pp. 209–219.
DACDAC-1974-MitchellG #automation #named
MAP: A user-controlled automated Mask Analysis Program (CLM, JMG), pp. 107–118.
DACDAC-1974-ThompsonSBP #fault #simulation #using
Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
SIGIRSIGIR-1973-MartinP #comparative #interactive #retrieval
Comparative Analysis of Interactive Retrieval Systems (THM, EBP), pp. 75–85.
POPLPOPL-1973-HechtU #algorithm #problem
Analysis of a Simple Algorithm for Global Flow Problems (MSH, JDU), pp. 207–217.
STOCSTOC-1973-GentlemanJ #algorithm #case study
Analysis of Algorithms, a Case Study: Determinants of Polynomials (WMG, SCJ), pp. 135–141.
STOCSTOC-1973-Kosaraju #source code
Analysis of Structured Programs (SRK), pp. 240–252.
STOCSTOC-1973-Teitelbaum #algebra #evaluation #fault
Context-Free Error Analysis by Evaluation of Algebraic Power Series (RT), pp. 196–199.
DACDAC-1972-ChangDE #fault #logic #self #simulation
Logic simulation and fault analysis of a self-checking switching processor (HYC, RCD, RAE), pp. 128–137.
DACDAC-1972-UlrichBW #logic #simulation
Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
SOSPSOSP-J-1973-TeoreyP72 #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
STOCSTOC-1972-GareyGU #algorithm #memory management #worst-case
Worst-Case Analysis of Memory Allocation Algorithms (MRG, RLG, JDU), pp. 143–150.
SIGMODSIGFIDET-1971-Engles #database
An Analysis of the April 1971 Data Base Task Group Report (RWE), pp. 69–91.
DACDAC-1971-HarrisonO #logic #simulation
Race analysis of digital systems without logic simulation (RAH, DJO), pp. 82–94.
DACDAC-1971-TsudaKGN #named #network #simulation
NONLISA: Nonlinear network simulation and analysis program (TT, TK, SG, TN), pp. 347–357.
DACDAC-1971-VishnubhotlaC #approach
A path analysis approach to the diagnosis of combinational circuits (SRV, YHC), pp. 222–230.
SOSPSOSP-1971-TeoreyP #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 114–121.
DACDAC-1970-MitchellG #design #monte carlo #simulation
A simulation program for monte carlo analysis and design (EELM, DG), pp. 265–270.
DACDAC-1970-RockwellP #finite
Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
DACDAC-1970-Sr #clustering #graph #logic #reduction
Partitioning of logic graphs: A theoretical analysis of pin reduction (RBHS), pp. 54–63.
STOCSTOC-1970-Chang #2d #using
The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
DACDAC-1969-BoehmLMR #interactive
Interactive trajectory analysis: the graphic rocket system (BWB, VRL, RLM, JER), pp. 205–232.
SOSPSOSP-1969-BryanS #performance
The UTS time-sharing system: performance analysis and instrumentation (GEB, JES), pp. 147–158.
STOCSTOC-1969-PetersR #context-free grammar #revisited
Context-Sensitive Immediate Constituent Analysis — Context-Free Languages Revisited (PSPJ, RWR), pp. 1–8.
DACDAC-1968-Anstiss #named
MDELTA — a digital program for control system analysis (BHA).
DACDAC-1968-Bernstein #graph #online
Electronic circuit analysis with on-line graphs via a time-sharing terminal (SB).
DACDAC-1968-GarrettV #worst-case
Circuit frequency response analysis program with worst-case capabilities (FRWC) (SJG, THV).
DACDAC-1968-Murray-LassoK #online #optimisation
On-line circuit analysis and optimization with commercially available time-shared computer systems (MAML, FJK).
DACDAC-1967-Branin #network
Computer methods of network analysis (FHBJ).
DACDAC-1967-CalvinCEM #design
Design and analysis of electronic circuits (ELC, LCC, JRE, RSM).
DACDAC-1967-Malakoff
Coupling graphics and circuit analysis techniques (JLM).
DACDAC-1967-Pritchard #overview #source code
A survey of transient circuit analysis programs (GKP).
DACDAC-1967-WilliamsMCE
A package of computer subprograms for control system analysis (GJW, RSM, LCC, JPE).
DACSHARE-1965-BitontiCFH
A computer-aided linkage analysis system (FB, DWC, DNF, HHH).
DACSHARE-1964-Branin #network #using
D-C and transient analysis of networks using a digital computer (FHBJ).
DACSHARE-1964-SimpsonA
Space frame analysis and applications to other types of structures (HS, JA).
LISPLISP-1963-Yates #compilation #lisp #source code #word
LISP. Group Analysis programs. Λ LISP Compiler for a variable word machine (Gamma 30 Scientific) (RY), p. 15.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.