BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
analysis
Google analysis

Tag #analysis

7357 papers:

CCCC-2020-FegadeW #data type #modelling #pointer #scalability #semantics #using
Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
CCCC-2020-PuriniBCB #image #pipes and filters #smt #using
Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
CGOCGO-2020-TanejaLR #precise #testing
Testing static analyses for precision and soundness (JT, ZL, JR), pp. 81–93.
CSLCSL-2020-Miquey #algebra #modelling
Revisiting the Duality of Computation: An Algebraic Analysis of Classical Realizability Models (ÉM), p. 18.
ICSAICSA-2019-DajsurenL #safety
Safety Analysis Method for Cooperative Driving Systems (YD, GL), pp. 181–190.
ICSAICSA-2019-TumaSB #data flow #design
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis (KT, RS, MB), pp. 191–200.
EDMEDM-2019-CaoPB #learning #performance
Incorporating Prior Practice Difficulty into Performance Factor Analysis to Model Mandarin Tone Learning (MC, PIPJ, GMB).
EDMEDM-2019-GitinabardBHL #online #platform #sequence #student #what
What will you do next? A sequence analysis on the student transitions between online platforms in blended courses (NG, TB, SH, CFL).
EDMEDM-2019-GuoB #collaboration #detection #using
Collaboration Analysis Using Object Detection (ZG, RB).
EDMEDM-2019-HicksCL #process #student #using
Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
EDMEDM-2019-Ikeda #education #learning #quality #using
Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
EDMEDM-2019-JoYKL #comparative #education #effectiveness #learning #online #word
A Comparative Analysis of Emotional Words for Learning Effectiveness in Online Education (JJ, YY, GK, HL).
EDMEDM-2019-MalekianBKBN #process #student #using
Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
EDMEDM-2019-MbouzaoDS #classification #interactive #student #video
A Methodology for Student Video Interaction Patterns Analysis and Classification (BM, MCD, IS).
EDMEDM-2019-ReillyS #collaboration #predict #problem #quality
Predicting the Quality of Collaborative Problem Solving Through Linguistic Analysis of Discourse (JMR, BS).
ICPCICPC-2019-KuangG0M0ME #feedback #traceability #using
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
ICPCICPC-2019-ZhouW0C0FHC #co-evolution #comprehension #fine-grained
Understanding evolutionary coupling by fine-grained co-change relationship analysis (DZ, YW, LX0, YC, XP0, JF, LH, HC), pp. 271–282.
ICPCICPC-2019-ZyrianovNGCM #framework #implementation #named #pointer
srcPtr: a framework for implementing static pointer analysis approaches (VZ, CDN, DTG, MLC, JIM), pp. 144–147.
ICSMEICSME-2019-DurieuxAMB0
An Analysis of 35+ Million Jobs of Travis CI (TD, RA, MM, TFB, LC0), pp. 291–295.
ICSMEICSME-2019-Imran #design #detection #java #open source #smell
Design Smell Detection and Analysis for Open Source Java Software (AI), pp. 644–648.
ICSMEICSME-2019-KhalilCMDQ #debugging #eclipse
A Longitudinal Analysis of Bug Handling Across Eclipse Releases (ZAK, EC, TM, LD, CQ), pp. 1–12.
ICSMEICSME-2019-Shah #data type #framework #performance
Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive Applications (MDS), pp. 379–381.
MSRMSR-2019-BandeiraMPM #stack overflow
We need to talk about microservices: an analysis from the discussions on StackOverflow (AB, CAM, MP, PHMM), pp. 255–259.
MSRMSR-2019-BiswasVP #re-engineering #sentiment #word
Exploring word embedding techniques to improve sentiment analysis of software engineering texts (EB, KVS, LLP), pp. 68–78.
MSRMSR-2019-ChrenMB0 #automation #named #reliability
STRAIT: a tool for automated software reliability growth analysis (SC, RM, BB, BR0), pp. 105–110.
SANERSANER-2019-MuscedereHAADG #detection #lightweight #using
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SCAMSCAM-2019-0006LBR #android #privacy
Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.
SCAMSCAM-2019-MarcilioFB0 #automation #generative
Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings (DM, CAF, RB, GP0), pp. 34–44.
SCAMSCAM-2019-MondalRS #architecture #automation #case study #natural language #using
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAMSCAM-2019-TiwariPG0 #android #named #scalability #web
LUDroid: A Large Scale Analysis of Android - Web Hybridization (AT, JP, SG, CH0), pp. 256–267.
DLTDLT-2019-GoldwurmLV #component #modelling #statistics
Analysis of Symbol Statistics in Bicomponent Rational Models (MG, JL, MV), pp. 306–318.
FMFM-2019-ComptierDFP
Property-Driven Software Analysis - (Extended Abstract) (MC, DD, PF, JMP), pp. 746–750.
FMFM-2019-TranLMYNXJ #network #reachability
Star-Based Reachability Analysis of Deep Neural Networks (HDT, DML, PM, XY, LVN, WX, TTJ), pp. 670–686.
FSCDFSCD-2019-Bendkowski #towards #λ-calculus
Towards the Average-Case Analysis of Substitution Resolution in Lambda-Calculus (MB), p. 21.
IFM-2019-BeekLLV #configuration management #framework #modelling #summary
Summary of: A Framework for Quantitative Modeling and Analysis of Highly (re)configurable Systems (MHtB, AL, ALL, AV), pp. 547–551.
IFM-2019-BubelHT #dependence #logic
A Program Logic for Dependence Analysis (RB, RH, AHT), pp. 83–100.
IFM-2019-LoharPD #fault #probability
Sound Probabilistic Numerical Error Analysis (DL, MP, ED), pp. 322–340.
SEFMSEFM-2019-FarrellBFDDYM #case study #using #verification
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
SEFMSEFM-2019-PrasetyaK #nondeterminism
Test Model Coverage Analysis Under Uncertainty (ISWBP, RK), pp. 222–239.
AIIDEAIIDE-2019-DemediukYDWB #identification
Role Identification for Accurate Analysis in Dota 2 (SD, PY, AD, JAW, FB), pp. 130–138.
AIIDEAIIDE-2019-LiebanaGDIBL #statistics
Analysis of Statistical Forward Planning Methods in Pommerman (DPL, RDG, OD, EI, MB, SML), pp. 66–72.
AIIDEAIIDE-2019-MoriTS #experience
A Structured Analysis of Experience Management Techniques (GM, DT, SS), pp. 174–180.
CHI-PLAYCHI-PLAY-2019-AhmadBKTNE #behaviour #modelling
Modeling Individual and Team Behavior through Spatio-temporal Analysis (SA, AB, EK, ZT, THDN, MSEN), pp. 601–612.
CHI-PLAYCHI-PLAY-2019-PorterR #game studies #roadmap
An Analysis of Longitudinal Trends in Consumer Thoughts on Presence and Simulator Sickness in VR Games (JPI, AR), pp. 277–285.
CHI-PLAYCHI-PLAY-2019-SchertlerKW #game studies #semantics #using
User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
CoGCoG-2019-CookR #automation #game studies #graph
Hyperstate Space Graphs for Automated Game Analysis (MC0, AR), pp. 1–8.
CoGCoG-2019-KhalifaGT #design
ELIMINATION from Design to Analysis (AK, DG, JT), pp. 1–4.
CoGCoG-2019-MillerPCE #game studies #multi #social
An Analysis of Peer Presence Social Group Dynamics to Enhance Player Engagement in Multiplayer Games (MM, NP, GC, CE), pp. 1–8.
CoGCoG-2019-NumminenVP #game studies #predict
Predicting the monetization percentage with survival analysis in free-to-play games (RN, MV, TP), pp. 1–8.
CoGCoG-2019-ScholtenCHW #statistics
Unconventional Exchange: Methods for Statistical Analysis of Virtual Goods (OJS, PC, KAH, JAW), pp. 1–7.
CoGCoG-2019-SykownikBM #automation #pipes and filters #sentiment #speech
Can You Hear the Player Experienceƒ A Pipeline for Automated Sentiment Analysis of Player Speech (PS, FB, MM), pp. 1–4.
CoGCoG-2019-VolzN #game studies #on the #simulation
On the Effects of Simulating Human Decisions in Game Analysis (VV, BN), pp. 1–8.
CoGCoG-2019-YuS #game studies
Application of Retrograde Analysis on Fighting Games (KY, NRS), pp. 1–8.
DiGRADiGRA-2019-Burkholder
Co-Constructing Virtual Identities: Insights from Linguistic Analysis (RB).
DiGRADiGRA-2019-FromeM #game studies
Describing the Game Studies Canon: A Game Citation Analysis (JF, PM).
DiGRADiGRA-2019-Tavinor #towards
Towards an analysis of virtual realism (GT).
FDGFDG-2019-KaltmanOA #game studies #named #visualisation
S4LVE: shareable videogame analysis and visualization (EK, JCO, JA), p. 5.
FDGFDG-2019-LuPN #communication #developer #game studies
Game postmortems vs. developer Reddit AMAs: computational analysis of developer communication (CL, JP, TN), p. 7.
FDGFDG-2019-OuelletteBC #comprehension #design #education #game studies #using
Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
FDGFDG-2019-TreanorN #game studies
Order-fulfillment games: an analysis of games about serving customers (MT, MJN), p. 7.
CIKMCIKM-2019-AkenWLG #how
How Does BERT Answer Questions?: A Layer-Wise Analysis of Transformer Representations (BvA, BW, AL, FAG), pp. 1823–1832.
CIKMCIKM-2019-GuHDM #learning #named
LinkRadar: Assisting the Analysis of Inter-app Page Links via Transfer Learning (DG, ZH, SD, YM0), pp. 2077–2080.
CIKMCIKM-2019-Jatowt0BD #documentation
Document in Context of its Time (DICT): Providing Temporal Context to Support Analysis of Past Documents (AJ, RC0, SSB, AD), pp. 2869–2872.
CIKMCIKM-2019-KuziLSJZ #adaptation #information retrieval #learning #rank
Analysis of Adaptive Training for Learning to Rank in Information Retrieval (SK, SL, SKKS, PPJ, CZ), pp. 2325–2328.
CIKMCIKM-2019-MiloMY #datalog #named #probability
PODIUM: Probabilistic Datalog Analysis via Contribution Maximization (TM, YM, BY), pp. 2865–2868.
CIKMCIKM-2019-ShiY #network
Recent Developments of Deep Heterogeneous Information Network Analysis (CS, PSY), pp. 2973–2974.
CIKMCIKM-2019-ShiYZ #network
HENA 2019: The 3rd Workshop of Heterogeneous Information Network Analysis and Applications (CS, YY, JZ), pp. 2991–2992.
CIKMCIKM-2019-WuWS #collaboration
Collaborative Analysis for Computational Risk in Urban Water Supply Systems (DW, HW, RS), pp. 2297–2300.
CIKMCIKM-2019-YinLW #interactive #multi #sentiment
Interactive Multi-Grained Joint Model for Targeted Sentiment Analysis (DY, XL, XW0), pp. 1031–1040.
ECIRECIR-p1-2019-DonnellyR #on the #sentiment
On Interpretability and Feature Representations: An Analysis of the Sentiment Neuron (JD, AR), pp. 795–802.
ECIRECIR-p1-2019-WangOM #comparison #recommendation #sentiment
Comparison of Sentiment Analysis and User Ratings in Venue Recommendation (XW, IO, CM), pp. 215–228.
ICMLICML-2019-AntelmiARL #multi #semistructured data
Sparse Multi-Channel Variational Autoencoder for the Joint Analysis of Heterogeneous Data (LA, NA, PR, ML), pp. 302–311.
ICMLICML-2019-AroraDHLW #fine-grained #network #optimisation
Fine-Grained Analysis of Optimization and Generalization for Overparameterized Two-Layer Neural Networks (SA, SSD, WH, ZL0, RW), pp. 322–332.
ICMLICML-2019-CaiLS #normalisation
A Quantitative Analysis of the Effect of Batch Normalization on Gradient Descent (YC, QL, ZS), pp. 882–890.
ICMLICML-2019-Chen #bound #consistency #fault #kernel #nearest neighbour
Nearest Neighbor and Kernel Survival Analysis: Nonasymptotic Error Bounds and Strong Consistency Rates (GHC), pp. 1001–1010.
ICMLICML-2019-CinelliKCPB #linear #modelling
Sensitivity Analysis of Linear Structural Causal Models (CC, DK, BC, JP, EB), pp. 1252–1261.
ICMLICML-2019-CohenB #empirical #modelling #performance #sequence
Empirical Analysis of Beam Search Performance Degradation in Neural Sequence Models (EC, JCB), pp. 1290–1299.
ICMLICML-2019-DereliOG #algorithm #biology #kernel #learning #multi
A Multitask Multiple Kernel Learning Algorithm for Survival Analysis with Application to Cancer Biology (OD, CO, MG), pp. 1576–1585.
ICMLICML-2019-DoanMR #approximate #distributed #finite #learning #linear #multi
Finite-Time Analysis of Distributed TD(0) with Linear Function Approximation on Multi-Agent Reinforcement Learning (TTD, STM, JR), pp. 1626–1635.
ICMLICML-2019-JiWZL #algorithm #optimisation
Improved Zeroth-Order Variance Reduced Algorithms and Analysis for Nonconvex Optimization (KJ, ZW, YZ, YL), pp. 3100–3109.
ICMLICML-2019-LinHJ #algorithm #on the #performance
On Efficient Optimal Transport: An Analysis of Greedy and Accelerated Mirror Descent Algorithms (TL, NH, MIJ), pp. 3982–3991.
ICMLICML-2019-LiTOS #fourier #random #towards
Towards a Unified Analysis of Random Fourier Features (ZL, JFT, DO, DS), pp. 3905–3914.
ICMLICML-2019-NguyenSR #monte carlo #optimisation
Non-Asymptotic Analysis of Fractional Langevin Monte Carlo for Non-Convex Optimization (THN, US, GR), pp. 4810–4819.
ICMLICML-2019-QianRGSLS
SGD with Arbitrary Sampling: General Analysis and Improved Rates (XQ, PR, RMG, AS, NL, ES), pp. 5200–5209.
ICMLICML-2019-SaunshiPAKK #learning #representation
A Theoretical Analysis of Contrastive Unsupervised Representation Learning (NS, OP, SA, MK, HK), pp. 5628–5637.
ICMLICML-2019-SimsekliSG #network #probability
A Tail-Index Analysis of Stochastic Gradient Noise in Deep Neural Networks (US, LS, MG), pp. 5827–5837.
ICMLICML-2019-TianMGSCPZ
ELF OpenGo: an analysis and open reimplementation of AlphaZero (YT, JM, QG, SS, ZC, JP, LZ), pp. 6244–6253.
ICMLICML-2019-UurtioBR #canonical #correlation #kernel #scalability
Large-Scale Sparse Kernel Canonical Correlation Analysis (VU, SB, JR), pp. 6383–6391.
ICMLICML-2019-WilkinsonARSS #probability
End-to-End Probabilistic Inference for Nonstationary Audio Analysis (WJW, MRA, JDR, DS, AS), pp. 6776–6785.
ICMLICML-2019-YuanL #adaptation #component #online
Online Adaptive Principal Component Analysis and Its extensions (JY, AGL), pp. 7213–7221.
ICMLICML-2019-YuJY #communication #distributed #linear #on the #optimisation #performance
On the Linear Speedup Analysis of Communication Efficient Momentum SGD for Distributed Non-Convex Optimization (HY, RJ, SY), pp. 7184–7193.
ICMLICML-2019-YunZYLA #learning #optimisation #statistics
Trimming the l₁ Regularizer: Statistical Analysis, Optimization, and Applications to Deep Learning (JY, PZ, EY, ACL, AYA), pp. 7242–7251.
KDDKDD-2019-ChengSHZ #modelling #performance
Incorporating Interpretability into Latent Factor Models via Fast Influence Analysis (WC, YS, LH, YZ), pp. 885–893.
KDDKDD-2019-WuZ #ambiguity #linear #reduction
Disambiguation Enabled Linear Discriminant Analysis for Partial Label Dimensionality Reduction (JHW, MLZ), pp. 416–424.
KDDKDD-2019-Xia #graph #platform
Roll of Unified Graph Analysis Platforms (YX), p. 3179.
KDDKDD-2019-YinH #estimation #identification #testing
The Identification and Estimation of Direct and Indirect Effects in A/B Tests through Causal Mediation Analysis (XY, LH), pp. 2989–2999.
MoDELSMoDELS-2019-DeVriesC #modelling #non-functional #requirements
Goal-Based Modeling and Analysis of Non-Functional Requirements (BD, BHCC), pp. 261–271.
MoDELSMoDELS-2019-PhilippSE #architecture #modelling #synthesis
Model-Based Resource Analysis and Synthesis of Service-Oriented Automotive Software Architectures (PO, SK, ES), pp. 128–138.
ECOOPECOOP-2019-Bastani0CAA #points-to #specification
Eventually Sound Points-To Analysis with Specifications (OB, RS0, LC, SA, AA), p. 28.
ECOOPECOOP-2019-LuoDB #approach #editing #ide #named
MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
OOPSLAOOPSLA-2019-LuX #context-sensitive grammar #performance #pointer
Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity (JL, JX), p. 29.
OOPSLAOOPSLA-2019-ZhangYTWK0 #abstract interpretation #bytecode #dependence #named
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation (ZZ0, WY, GT, GW, YK, XZ0), p. 31.
PLDIPLDI-2019-FuS #effectiveness #float
Effective floating-point analysis via weak-distance minimization (ZF, ZS), pp. 439–452.
PLDIPLDI-2019-YogaN #difference
Parallelism-centric what-if and differential analyses (AY, SN), pp. 485–501.
POPLPOPL-2019-AndreescuJLM #correlation
Inferring frame conditions with static correlation analysis (OFA, TPJ, SL, BM), p. 29.
POPLPOPL-2019-HoushmandL #coordination #named #replication #synthesis
Hamsaz: replication coordination analysis and synthesis (FH, ML), p. 32.
POPLPOPL-2019-HungHZYHW #quantum #robust #source code
Quantitative robustness analysis of quantum programs (SHH, KH, SZ, MY, MH0, XW), p. 29.
POPLPOPL-2019-SpathAB #automaton #data flow #using
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
POPLPOPL-2019-TouzeauMMR #performance
Fast and exact analysis for LRU caches (VT, CM, DM, JR), p. 29.
QAPLQAPL-2019-Kirkeby #probability #reuse #source code
Probabilistic Output Analyses for Deterministic Programs - Reusing Existing Non-probabilistic Analyses (MHK), pp. 43–57.
SASSAS-2019-BecchiZ #hybrid
Revisiting Polyhedral Analysis for Hybrid Systems (AB, EZ), pp. 183–202.
SASSAS-2019-Cousot #data flow #semantics
Syntactic and Semantic Soundness of Structural Dataflow Analysis (PC), pp. 96–117.
SASSAS-2019-DelmasM #abstract interpretation #using
Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
SASSAS-2019-DengC #abstract interpretation
Responsibility Analysis by Abstract Interpretation (CD, PC), pp. 368–388.
SASSAS-2019-LeiS #performance #pointer #precise
Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis (YL, YS), pp. 27–47.
SASSAS-2019-YanCSZZX #adaptation #safety #verification
Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis (HY, SC0, YS, YZ, CZ, JX), pp. 48–72.
ASEASE-2019-CelikPPAG #coq #mutation testing
Mutation Analysis for Coq (, KP, MP, EJGA, MG), pp. 539–551.
ASEASE-2019-DuX000Z #framework #network
A Quantitative Analysis Framework for Recurrent Neural Network (XD, XX, YL0, LM0, YL0, JZ), pp. 1062–1065.
ASEASE-2019-HeLWMZLHLX #algorithm
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis (DH, HL, LW, HM, HZ, JL0, SH, LL, JX), pp. 267–279.
ASEASE-2019-HuangFZZWJMP #editing #modelling #named #precise #requirements
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis (YH, JF, HZ, JZ, SW, SJ, WM, GP), pp. 1166–1169.
ASEASE-2019-Jiang #commit #generative #semantics
Boosting Neural Commit Message Generation with Code Semantic Analysis (SJ), pp. 1280–1282.
ASEASE-2019-LuoBS #android
A Qualitative Analysis of Android Taint-Analysis Results (LL, EB, JS), pp. 102–114.
ASEASE-2019-MuGCCGXMS #alias #execution #named #performance
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis (DM, WG, AC, YC, JG, XX, BM, CS), pp. 924–935.
ASEASE-2019-RenLXJX #locality
Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing (ZR, CL, XX, HJ, TX), pp. 527–538.
ASEASE-2019-ReulingKRL #configuration management
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich Software (DR, UK, SR, ML), pp. 1134–1137.
ASEASE-2019-VeduradaN #alias
Batch Alias Analysis (JV, VKN), pp. 936–948.
ASEASE-2019-WangC00S #fault #memory management #named #pointer
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis (YW, GC, MZ0, MG0, JS), pp. 1170–1173.
ASEASE-2019-WuLZYZ0 #mobile #named #performance
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis (YW, XL, DZ, WY0, XZ, HJ0), pp. 139–150.
ESEC-FSEESEC-FSE-2019-ChenCLML #approach #learning #named #re-engineering #sentiment
SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineering (ZC, YC, XL, QM, XL), pp. 841–852.
ESEC-FSEESEC-FSE-2019-CotroneoSLNB #debugging #empirical #framework #how #in the cloud #platform
How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform (DC, LDS, PL, RN, NB), pp. 200–211.
ESEC-FSEESEC-FSE-2019-DuXLM0Z #learning #modelling #named
DeepStellar: model-based quantitative analysis of stateful deep learning systems (XD, XX, YL0, LM0, YL0, JZ), pp. 477–487.
ESEC-FSEESEC-FSE-2019-Fu #distributed #on the #scalability
On the scalable dynamic taint analysis for distributed systems (XF), pp. 1247–1249.
ESEC-FSEESEC-FSE-2019-Pan #network #robust
Static deep neural network analysis for robustness (RP), pp. 1238–1240.
ESEC-FSEESEC-FSE-2019-PauckW #android
Together strong: cooperative Android app analysis (FP, HW), pp. 374–384.
ESEC-FSEESEC-FSE-2019-ShahinCS #product line
Lifting Datalog-based analyses to software product lines (RS, MC, RS), pp. 39–49.
ESEC-FSEESEC-FSE-2019-SuiZZZX #android #debugging #difference #effectiveness #reduction #user interface
Event trace reduction for effective bug replay of Android apps via differential GUI state analysis (YS, YZ0, WZ, MZ, JX), pp. 1095–1099.
ICSE-2019-AryaWGC #detection #open source
Analysis and detection of information types of open source software issue discussions (DA, WW, JLCG, JC), pp. 454–464.
ICSE-2019-FanLLWNZL #android #graph #learning #using
Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
ICSE-2019-HeradioFME #modelling #statistics #variability
Supporting the statistical analysis of variability models (RH, DFA, CMD, AE), pp. 843–853.
ICSE-2019-KristensenM #javascript #library
Reasonably-most-general clients for JavaScript library analysis (EKK, AM), pp. 83–93.
ICSE-2019-LazregCCH0 #automation #embedded #multi #variability
Multifaceted automated analyses for variability-intensive embedded systems (SL, MC, PC, PH, SM0), pp. 854–865.
ICSE-2019-NilizadehNP #difference #fuzzing #named
DifFuzz: differential fuzzing for side-channel analysis (SN, YN, CSP), pp. 176–187.
ICSE-2019-WenLWXCS #api #library #mutation testing
Exposing library API misuses via mutation analysis (MW, YL, RW, XX, SCC, ZS), pp. 866–877.
GPCEGPCE-2019-FeichtingerHLPG #constraints #dependence #evolution #feature model
Supporting feature model evolution by suggesting constraints from code-level dependency analyses (KF, DH, LL, HP, PG), pp. 129–142.
SLESLE-2019-IzquierdoC #modelling #programming language
Analysis and modeling of the governance in general programming languages (JLCI, JC), pp. 179–183.
ASPLOSASPLOS-2019-LustigSG #consistency #formal method #memory management
A Formal Analysis of the NVIDIA PTX Memory Consistency Model (DL, SS, OG), pp. 257–270.
CASECASE-2019-ChenJD #flexibility #geometry #performance #realtime
Real-Time Performance Analysis of Batch-Based Serial Flexible Production Lines With Geometric Machines (JC, ZJ, YD), pp. 97–102.
CASECASE-2019-ImaniCT0 #modelling #random
Random Forest Modeling for Survival Analysis of Cancer Recurrences (FI, RC, CT, HY0), pp. 399–404.
CASECASE-2019-KomasDKT0
Data-and Expert-Driven Analysis of Cause-Effect Relationships in the Production of Lithium-Ion Batteries (TK, RD, MZK, ST, CH0), pp. 380–385.
CASECASE-2019-PengZZZ #component #detection #fault #kernel #markov #multi #process
Hidden Markov Model Combined with Kernel Principal Component Analysis for Nonlinear Multimode Process Fault Detection (PP, JZ, YZ, HZ), pp. 1586–1591.
CASECASE-2019-PirehgalinTOV #automation #image #using #video #visual notation
Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
CASECASE-2019-RoselliBA #flexibility #problem #scheduling #smt
SMT Solvers for Flexible Job-Shop Scheduling Problems: A Computational Analysis (SFR, KB, ), pp. 673–678.
CASECASE-2019-SchulerS #automation #modelling #process #towards #using
Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
CASECASE-2019-XieX0C #semantics
The Analysis of Haze Effect on Dense Semantic Mapping (HX, QX, DZ0, ZC), pp. 1118–1123.
CCCC-2019-BlassP #algorithm #compilation #fixpoint #performance
GPU-accelerated fixpoint algorithms for faster compiler analyses (TB, MP), pp. 122–134.
CCCC-2019-ThakurN #scalability
Compare less, defer more: scaling value-contexts based whole-program heap analyses (MT, VKN), pp. 135–146.
CGOCGO-2019-ZhouM #performance
A Tool for Performance Analysis of GPU-Accelerated Applications (KZ, JMMC), p. 282.
FASEFASE-2019-TootsTYDGLMPPPT #privacy #process
Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.
FASEFASE-2019-ZhangSMC #bound #constraints #scheduling #smt #specification
SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language (MZ0, FS, FM, XC0), pp. 61–78.
CADECADE-2019-HirokawaNOO #confluence #revisited
Confluence by Critical Pair Analysis Revisited (NH, JN, VvO, MO), pp. 319–336.
CAVCAV-2019-CeskaK #abstraction #network
Semi-quantitative Abstraction and Analysis of Chemical Reaction Networks (MC0, JK), pp. 475–496.
CAVCAV-2019-DreossiFGKRVS #design #named #tool support
VerifAI: A Toolkit for the Formal Design and Analysis of Artificial Intelligence-Based Systems (TD, DJF, SG, EK, HR, MVC, SAS), pp. 432–442.
CAVCAV-2019-GavrilenkoLFHM #encoding #memory management #modelling #smt
BMC for Weak Memory Models: Relation Analysis for Compact SMT Encodings (NG, HPdL, FF, KH, RM0), pp. 355–365.
CAVCAV-2019-KatzHIJLLSTWZDK #framework #network #verification
The Marabou Framework for Verification and Analysis of Deep Neural Networks (GK, DAH, DI, KJ, CL, RL, PS, ST, HW0, AZ, DLD, MJK, CWB), pp. 443–452.
CAVCAV-2019-NeupaneMM00 #approximate #infinity #model checking #named #probability
STAMINA: STochastic Approximate Model-Checker for INfinite-State Analysis (TN, CJM, CM, HZ0, ZZ0), pp. 540–549.
CAVCAV-2019-BackesBCDGHKKKK #network #reachability
Reachability Analysis for AWS-Based Networks (JB, SB, BC, CD, AG, AJH, TK, BK, EK, JK, SM, JR0, NR, JS, MAS, PS, PS, CV, BW), pp. 231–241.
CAVCAV-2019-GuoLLRS #kernel #scheduling
Integrating Formal Schedulability Analysis into a Verified OS Kernel (XG, ML, ML0, LR, ZS), pp. 496–514.
ICSTICST-2019-KahlesTHJ #agile #automation #machine learning #testing
Automating Root Cause Analysis via Machine Learning in Agile Software Testing Environments (JK, JT, TH, AJ), pp. 379–390.
ICSTICST-2019-Wei #safety
AADL-Based Safety Analysis Approaches for Safety-Critical Systems (XW), pp. 481–482.
ICSTICST-2019-WuLSCX #android #detection #order #precise
Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android (DW, JL0, YS, SC0, JX), pp. 276–287.
VMCAIVMCAI-2019-BouillaguetBSY #deduction #in memory #memory management #modelling #pointer #verification
Exploiting Pointer Analysis in Memory Models for Deductive Verification (QB, FB, MS, BY), pp. 160–182.
VMCAIVMCAI-2019-GermaneM #automaton #continuation
Relatively Complete Pushdown Analysis of Escape Continuations (KG, MM), pp. 205–225.
VMCAIVMCAI-2019-GermaneM0M #control flow
Demand Control-Flow Analysis (KG, JM, MDA0, MM), pp. 226–246.
VMCAIVMCAI-2019-NicolaySMR
Effect-Driven Flow Analysis (JN, QS, WDM, CDR), pp. 247–274.
ECSAECSA-2018-TumaS #architecture
Two Architectural Threat Analysis Techniques Compared (KT, RS), pp. 347–363.
ICSAICSA-2018-SzvetitsZ #architecture #design #modelling #multi #runtime
Architectural Design Decisions for Systems Supporting Model-Based Analysis of Runtime Events: A Qualitative Multi-method Study (MS, UZ), pp. 115–124.
JCDLJCDL-2018-TayehS
An Analysis of Cross-Document Linking Mechanisms (AAOT, BS), pp. 69–78.
EDMEDM-2018-AungRW #automation #video
Who are they looking at? Automatic Eye Gaze Following for Classroom Observation Video Analysis (AMA, AR, JW).
EDMEDM-2018-ChenLCBC #behaviour #learning #scalability
Behavioral Analysis at Scale: Learning Course Prerequisite Structures from Learner Clickstreams (WC, ASL, DC, CGB, MC).
EDMEDM-2018-CrossleyOLBDB #modelling #sentiment
Modeling Math Identity and Math Success through Sentiment Analysis and Linguistic Features (SAC, JO, MJL, FB, MD, RSB).
EDMEDM-2018-DuDP #behaviour #learning #named
ELBA: Exceptional Learning Behavior Analysis (XD, WD, MP).
EDMEDM-2018-SawyerRAL #behaviour #game studies #learning #problem #student
Filtered Time Series Analyses of Student Problem-Solving Behaviors in Game-based Learning (RS, JPR, RA, JCL).
ICPCICPC-2018-CastroS #interactive #visualisation
Analysis of test log information through interactive visualizations (DC, MS), pp. 156–166.
ICSMEICSME-2018-0008ZOPLB #dataset #re-engineering #sentiment
Two Datasets for Sentiment Analysis in Software Engineering (BL0, FZ, RO, MDP, ML, GB), p. 712.
ICSMEICSME-2018-BagheriWAM #android #performance #security
Efficient, Evolutionary Security Analysis of Interacting Android Apps (HB, JW, JA, SM), pp. 357–368.
ICSMEICSME-2018-HuZLWLG #approach #hybrid #named #semantics
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis (YH, YZ0, JL, HW, BL, DG), pp. 104–114.
ICSMEICSME-2018-JimenezCTP #n-gram #on the #parametricity
On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis (MJ, MC, YLT, MP), pp. 437–448.
ICSMEICSME-2018-JimenezCTP18a #named
TUNA: TUning Naturalness-Based Analysis (MJ, MC, YLT, MP), p. 715.
ICSMEICSME-2018-LeemansABSL #legacy #lessons learnt #process
Software Process Analysis Methodology - A Methodology Based on Lessons Learned in Embracing Legacy Software (ML, WMPvdA, MGJvdB, RRHS, LL), pp. 665–674.
ICSMEICSME-2018-PontaPS #metadata #open source
Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software (SEP, HP, AS), pp. 449–460.
ICSMEICSME-2018-SchlieSS #matlab #matrix #modelling #multi #using
Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
MSRMSR-2018-BellmanSB #debugging #developer #ide #timeline #visual notation
Studying developer build issues and debugger usage via timeline analysis in visual studio IDE (CB, AS, OB), pp. 106–109.
MSRMSR-2018-CaiJ #android #performance #precise
Leveraging historical versions of Android apps for efficient and precise taint analysis (HC, JJ), pp. 265–269.
MSRMSR-2018-CohenC08 #developer #git #repository #scalability
Large-scale analysis of the co-commit patterns of the active developers in github's top repositories (EC, MPC), pp. 426–436.
MSRMSR-2018-MantylaCC08 #natural language #pipes and filters #re-engineering
Natural language or not (NLON): a package for software engineering text analysis pipeline (MVM, FC, MC), pp. 387–391.
MSRMSR-2018-NovielliGL08 #benchmark #metric #re-engineering #research #sentiment
A benchmark study on sentiment analysis for software engineering research (NN, DG, FL), pp. 364–375.
MSRMSR-2018-Soto-ValeroBB #behaviour #debugging #detection #process
Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
SANERSANER-2018-IslamZ #comparison #re-engineering #sentiment #tool support
A comparison of software engineering domain specific sentiment analysis tools (MRI, MFZ), pp. 487–491.
SANERSANER-2018-Jurgens #lessons learnt #quality
A decade of software quality analysis in practice: Surprises, anecdotes, and lessons learned (keynote) (EJ), p. 1.
SANERSANER-2018-LeemansAB #modelling #recursion
Recursion aware modeling and discovery for hierarchical software event log analysis (ML, WMPvdA, MGJvdB), pp. 185–196.
SANERSANER-2018-LeemansAB18a #mining #process #scalability #statechart #using
The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
SANERSANER-2018-Vogel-HeuserFFU #architecture #automation #composition #industrial
Modularity and architecture of PLC-based software for automated production systems: An analysis in industrial companies (journal-first abstract) (BVH, JF, SF, SU, SR), p. 473.
SANERSANER-2018-XuLLZ #component #fault #hybrid #kernel #learning #predict
Cross-version defect prediction via hybrid active learning with kernel principal component analysis (ZX, JL0, XL, TZ0), pp. 209–220.
SCAMSCAM-2018-HorvathSGKP #challenge #implementation
[Engineering Paper] Challenges of Implementing Cross Translation Unit Analysis in Clang Static Analyzer (GH, PS, ZG, DK, NP), pp. 171–176.
SCAMSCAM-2018-JimenezTP #security
[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7 (MJ, YLT, MP), pp. 56–61.
CIAACIAA-2018-Condon #algorithm #design #network #on the
On Design and Analysis of Chemical Reaction Network Algorithms (AC), pp. 1–3.
FMFM-2018-AvgustinovBM
Variant Analysis with QL (PA, KB, MYM), pp. 666–670.
FMFM-2018-BeckerPDT #float #optimisation #tool support
Combining Tools for Optimization and Analysis of Floating-Point Computations (HB, PP, ED, ZT), pp. 355–363.
FMFM-2018-Laneve #concurrent #lightweight #source code #thread
A Lightweight Deadlock Analysis for Programs with Threads and Reentrant Locks (CL), pp. 608–624.
FMFM-2018-PutterW #composition #generative
To Compose, or Not to Compose, That Is the Question: An Analysis of Compositional State Space Generation (SdP, AW), pp. 485–504.
FMFM-2018-VandinBLL #configuration management #named
QFLan: A Tool for the Quantitative Analysis of Highly Reconfigurable Systems (AV, MHtB, AL, ALL), pp. 329–337.
IFM-2018-DoughertyGR #protocol #security #smt #using
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
SEFMSEFM-2018-ArndtJMN #graph
Graph-Based Shape Analysis Beyond Context-Freeness (HA, CJ, CM, TN0), pp. 271–286.
SEFMSEFM-2018-SchulzeCL #automation #specification
Automated Specification Extraction and Analysis with Specstractor (CS0, RC, ML), pp. 37–53.
SEFMSEFM-2018-SchuppA #concurrent #hybrid #multi #safety #thread
Spread the Work: Multi-threaded Safety Analysis for Hybrid Systems (SS, ), pp. 89–104.
ICFP-2018-Das0P #complexity #parallel
Parallel complexity analysis with temporal session types (AD, JH0, FP), p. 30.
AIIDEAIIDE-2018-PartlanCSKSHE #automation #interactive
Exploratory Automated Analysis of Structural Features of Interactive Narrative (NP, EC, SS, EK, GS, CH, MSEN), pp. 88–94.
AIIDEAIIDE-2018-SummervilleMSOW #bidirectional #game studies #generative #named
Gemini: Bidirectional Generation and Analysis of Games via ASP (AS, CM, BS, JCO, NWF, MM), pp. 123–129.
CHI-PLAYCHI-PLAY-2018-RoohiTKH #network
Neural Network Based Facial Expression Analysis of GameEvents: A Cautionary Tale (SR, JT, JMK, PH), pp. 429–437.
CoGCIG-2018-BraviLL0 #game studies #video
Shallow Decision-Making Analysis in General Video Game Playing (IB, DPL, SML, JL0), pp. 1–8.
CoGCIG-2018-CookCR #constraints #design #game studies
Inferring Design Constraints From Game Ruleset Analysis (MC0, SC, AR), pp. 1–8.
CoGCIG-2018-GreenwoodAP #game studies
A Critical Analysis of Punishment in Public Goods Games (GWG, HAA, EP), pp. 1–5.
CoGCIG-2018-SironiW #adaptation #game studies #monte carlo #self #video
Analysis of Self-Adaptive Monte Carlo Tree Search in General Video Game Playing (CFS, MHMW), pp. 1–4.
CoGCIG-2018-VariaTKK #3d #dataset #game studies
A Refined 3D Dataset for the Analysis of Player Actions in Exertion Games (CV, GT, KK, SDK), pp. 1–4.
DiGRADiGRA-2018-GaoS #design #framework #game studies #matter #platform
Does Platform Matter? A Game Design Analysis of Female Engagement in MOBA Games (GG, PCS).
FDGFDG-2018-BothenFN #artificial reality #case study #comparative #game studies #interactive #mobile #user study
An analysis and comparative user study on interactions in mobile virtual reality games (SB, JAF, PN), p. 8.
FDGFDG-2018-KosaS #game studies #what
What tabletop players think about augmented tabletop games: a content analysis (MK, PS), p. 8.
FDGFDG-2018-ZhuWZ #game studies #generative #similarity
Exploring the similarity between game events for game level analysis and generation (TZ0, BW, MZ), p. 7.
CoGVS-Games-2018-RallisLGVDD #artificial reality #game studies #learning #using #visualisation
An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
CIKMCIKM-2018-BaiCLKX #modelling #relational #topic
Neural Relational Topic Models for Scientific Article Analysis (HB, ZC, MRL, IK, ZX), pp. 27–36.
CIKMCIKM-2018-BonchiGMR #probability #social
Probabilistic Causal Analysis of Social Influence (FB, FG, BM, DR), pp. 1003–1012.
CIKMCIKM-2018-ChenKBRKKB #behaviour #predict
Predictive Analysis by Leveraging Temporal User Behavior and User Embeddings (CC, SK, HB, RAR, EK, BK, RCB), pp. 2175–2182.
ECIRECIR-2018-ZangerleTWS #multimodal #music #named #towards
ALF-200k: Towards Extensive Multimodal Analyses of Music Tracks and Playlists (EZ, MT, SW, GS), pp. 584–590.
ECIRECIR-2018-Zhang0LZ #matrix #representation #sentiment #twitter #using
Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
ICMLICML-2018-AinsworthFLF #named
oi-VAE: Output Interpretable VAEs for Nonlinear Group Factor Analysis (SKA, NJF, AKCL, EBF), pp. 119–128.
ICMLICML-2018-HuWL #probability #reduction #source code #using
Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
ICMLICML-2018-ImamuraSS #clustering #crowdsourcing #fault
Analysis of Minimax Error Rate for Crowdsourcing and Its Application to Worker Clustering Model (HI, IS, MS), pp. 2152–2161.
ICMLICML-2018-KasaiSM #algorithm #convergence #probability #recursion
Riemannian Stochastic Recursive Gradient Algorithm with Retraction and Vector Transport and Its Convergence Analysis (HK, HS, BM), pp. 2521–2529.
ICMLICML-2018-LanCS #estimation #framework
An Estimation and Analysis Framework for the Rasch Model (ASL, MC, CS), pp. 2889–2897.
ICMLICML-2018-MarinovMA #component #streaming
Streaming Principal Component Analysis in Noisy Settings (TVM, PM, RA), pp. 3410–3419.
ICMLICML-2018-PangDZ #linear #network
Max-Mahalanobis Linear Discriminant Analysis Networks (TP, CD, JZ0), pp. 4013–4022.
ICMLICML-2018-PanZD #learning
Theoretical Analysis of Image-to-Image Translation with Adversarial Learning (XP, MZ, DD), pp. 4003–4012.
ICMLICML-2018-TsakirisV #clustering
Theoretical Analysis of Sparse Subspace Clustering with Missing Entries (MCT, RV), pp. 4982–4991.
ICMLICML-2018-XieWZX #distance #learning #metric
Orthogonality-Promoting Distance Metric Learning: Convex Relaxation and Theoretical Analysis (PX, WW, YZ, EPX), pp. 5399–5408.
ICMLICML-2018-ZhangWYG #matrix #rank
A Primal-Dual Analysis of Global Optimality in Nonconvex Low-Rank Matrix Recovery (XZ, LW, YY, QG), pp. 5857–5866.
ICPRICPR-2018-0001ZZWL
Convolutional Discriminant Analysis (GZ0, YZ, XYZ, HW, XL), pp. 1456–1461.
ICPRICPR-2018-BaiHA #correlation #kernel #recognition
Kernel Discriminant Correlation Analysis: Feature Level Fusion for Nonlinear Biometric Recognition (YB, MH, MAM), pp. 3198–3203.
ICPRICPR-2018-Chen18a #feature model #robust
Improved Robust Discriminant Analysis for Feature Extraction (XC), pp. 1444–1449.
ICPRICPR-2018-ChenHZLQ #detection #multi #video
Video Salient Object Detection via Multiple Time-scale Analysis (YC, LH, WZ, XL, GQ), pp. 2184–2189.
ICPRICPR-2018-DehzangiS #process #recognition #reduction #robust #using
IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
ICPRICPR-2018-EladawiEFPGARKS #image
Early Diagnosis of Diabetic Retinopathy in OCTA Images Based on Local Analysis of Retinal Blood Vessels and Foveal Avascular Zone (NE, ME, LF, FP, MG, AA, AEMR, RK, SS, AEB), pp. 3886–3891.
ICPRICPR-2018-FariaS #approach #graph #image
A Graph-based Approach for Static Ensemble Selection in Remote Sensing Image Analysis (FAF, SS), pp. 344–349.
ICPRICPR-2018-FaulaBE #image #performance
A Fast Local Analysis by Thresholding applied to image matching (YF, SB, VE), pp. 3055–3060.
ICPRICPR-2018-JiangL18a #reduction
Generalized Fisher Discriminant Analysis as A Dimensionality Reduction Technique (YJ, FHFL), pp. 994–999.
ICPRICPR-2018-KurzendorferBSB #classification #random #segmentation #using
Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
ICPRICPR-2018-ShiL #segmentation #video
A New Foreground Segmentation Method for Video Analysis in Different Color Spaces (HS, CL), pp. 2899–2904.
ICPRICPR-2018-SinhaNGG #hybrid #navigation #network #performance
Hybrid Path Planner for Efficient Navigation in Urban Road Networks through Analysis of Trajectory Traces (SS, MKN, SG, SKG), pp. 3250–3255.
ICPRICPR-2018-SuHK #classification #component #multi #performance #using
Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
ICPRICPR-2018-SuJ #image #multi #using
Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
ICPRICPR-2018-TranLPHKTNP #dataset #multi
A multi-modal multi-view dataset for human fall analysis and preliminary investigation on modality (THT, TLL, DTP, VNH, VMK, QTT, TSN, CP), pp. 1947–1952.
ICPRICPR-2018-Windeatt #classification #optimisation #using
Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
ICPRICPR-2018-Yang0CF #canonical #correlation #detection #image #using
Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPRICPR-2018-YangZWQ #classification #detection #image #quality #recognition
Quality Classified Image Analysis with Application to Face Detection and Recognition (FY, QZ0, MW, GQ), pp. 2863–2868.
ICPRICPR-2018-ZhangZDD #network #online #recognition
Trajectory-based Radical Analysis Network for Online Handwritten Chinese Character Recognition (JZ, YZ, JD, LD), pp. 3681–3686.
ICPRICPR-2018-ZhaoLZTNM #automation #component #image #multi #robust #segmentation #using
Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
ICPRICPR-2018-ZhongD #difference #recognition
Deep Difference Analysis in Similar-looking Face recognition (YZ, WD), pp. 3353–3358.
ICPRICPR-2018-ZuninoMCAPBVBM #detection #gesture #video
Video Gesture Analysis for Autism Spectrum Disorder Detection (AZ, PM, AC, CA, JP, FB, EV, CB, VM), pp. 3421–3426.
KDDKDD-2018-GongW #behaviour #modelling #network #sentiment #social
When Sentiment Analysis Meets Social Network: A Holistic User Behavior Modeling in Opinionated Data (LG, HW), pp. 1455–1464.
KDDKDD-2018-HuDZ0X #e-commerce #formal method #learning #rank
Reinforcement Learning to Rank in E-Commerce Search Engine: Formalization, Analysis, and Application (YH, QD, AZ, YY0, YX), pp. 368–377.
KDDKDD-2018-HuF #multimodal #sentiment
Multimodal Sentiment Analysis To Explore the Structure of Emotions (AH, SRF), pp. 350–358.
KDDKDD-2018-SunZZGH #online #query
Exploring the Urban Region-of-Interest through the Analysis of Online Map Search Queries (YS, HZ, FZ, JG, QH), pp. 2269–2278.
KDDKDD-2018-WangFZWZA #behaviour #how #learning #representation
You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
KDDKDD-2018-WangWLW #composition #multi #network
Multilevel Wavelet Decomposition Network for Interpretable Time Series Analysis (JW, ZW, JL, JW), pp. 2437–2446.
ECMFAECMFA-2018-HinkelB #design #metamodelling #on the
On the Influence of Metamodel Design to Analyses and Transformations (GH, EB), pp. 63–79.
MoDELSMoDELS-2018-ShinCNSBZ #framework #named #physics #testing #uml
HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems (SYS, KC, SN, MS, LCB, FZ), pp. 357–367.
MoDELSMoDELS-2018-WeckesserLRS #modelling #programming
Mathematical Programming for Anomaly Analysis of Clafer Models (MW, ML, MR, AS), pp. 34–44.
ECOOPECOOP-2018-GrechKS #graph #performance #string
Efficient Reflection String Analysis via Graph Coloring (NG, GK, YS), p. 25.
ECOOPECOOP-2018-SmaragdakisK #effectiveness #lazy evaluation #points-to
Defensive Points-To Analysis: Effective Soundness via Laziness (YS, GK), p. 28.
ECOOPECOOP-2018-TomanG #named
Legato: An At-Most-Once Analysis with Applications to Dynamic Configuration Updates (JT, DG), p. 32.
OOPSLAOOPSLA-2018-JeonJO #data-driven #points-to #precise #scalability
Precise and scalable points-to analysis via data-driven context tunneling (MJ, SJ, HO), p. 29.
OOPSLAOOPSLA-2018-LiTMS #context-sensitive grammar #pointer
Precision-guided context sensitivity for pointer analysis (YL0, TT0, AM, YS), p. 29.
OOPSLAOOPSLA-2018-RamaKS #points-to #refinement #slicing
Refinement in object-sensitivity points-to analysis via slicing (GMR, RK, HS), p. 27.
OOPSLAOOPSLA-2018-SzaboBEV #datalog
Incrementalizing lattice-based program analyses in Datalog (TS, GB, SE, MV), p. 29.
AdaEuropeAdaEurope-2018-RoyuelaMQP #ada #compilation #parallel
Safe Parallelism: Compiler Analysis Techniques for Ada and OpenMP (SR, XM, EQ, LMP), pp. 141–157.
PLDIPLDI-2018-BrutschyD0V #consistency
Static serializability analysis for causal consistency (LB, DD, PM0, MTV), pp. 90–104.
PLDIPLDI-2018-ChenLDP #locality #parallel
Locality analysis through static parallel sampling (DC, FL, CD, SP), pp. 557–570.
PLDIPLDI-2018-HongSKRKPRS #gpu #kernel #optimisation #using
GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
PLDIPLDI-2018-LiuH #concurrent #debugging #difference #named #parallel #performance
D4: fast concurrency debugging with parallel differential analysis (BL, JH0), pp. 359–373.
PLDIPLDI-2018-LiuW #bound #concurrent #interprocedural #named #source code
CUBA: interprocedural Context-UnBounded Analysis of concurrent programs (PL, TW), pp. 105–119.
PLDIPLDI-2018-NgoC0 #bound #probability #source code
Bounded expectations: resource analysis for probabilistic programs (VCN, QC, JH0), pp. 496–512.
PLDIPLDI-2018-ShiXWZFZ #named #performance #precise
Pinpoint: fast and precise sparse value flow analysis for million lines of code (QS, XX0, RW, JZ, GF, CZ), pp. 693–706.
POPLPOPL-2018-ChatterjeeCP #alias #data flow #reachability
Optimal Dyck reachability for data-dependence and alias analysis (KC, BC, AP), p. 30.
POPLPOPL-2018-LiY #algorithm #problem #quantum #source code #termination
Algorithmic analysis of termination problems for quantum programs (YL, MY), p. 29.
SASSAS-2018-BagnaraBH #c #development #embedded #standard
The MISRA C Coding Standard and its Role in the Development and Analysis of Safety- and Security-Critical Embedded Software (RB, AB, PMH), pp. 5–23.
SASSAS-2018-JacqueminPV #bound #fault #float
A Reduced Product of Absolute and Relative Error Bounds for Floating-Point Analysis (MJ, SP, FV), pp. 223–242.
SASSAS-2018-OHearn #concurrent #experience #facebook
Experience Developing and Deploying Concurrency Analysis at Facebook (PWO), pp. 56–70.
ASEASE-2018-HassanRW #named #recommendation
RUDSEA: recommending updates of Dockerfiles via software environment analysis (FH, RR, XW), pp. 796–801.
ASEASE-2018-HelmKERM #framework
A unified lattice model and framework for purity analyses (DH, FK, ME, MR, MM), pp. 340–350.
ASEASE-2018-MoSCRKN #architecture #automation #case study #experience
Experiences applying automated architecture analysis tool suites (RM, WS, YC, SR, RK, MN), pp. 779–789.
ASEASE-2018-SungPW #framework #named
CANAL: a cache timing analysis framework via LLVM transformation (CS, BP, CW0), pp. 904–907.
ASEASE-2018-WangCYJ #approach #constraints #model checking #string
A symbolic model checking approach to the analysis of string and length constraints (HEW, SYC, FY, JHRJ), pp. 623–633.
ESEC-FSEESEC-FSE-2018-ChenLZZWH0 #optimisation
Optimizing test prioritization via test distribution analysis (JC0, YL, LZ, JZ, XW, DH, LZ0), pp. 656–667.
ESEC-FSEESEC-FSE-2018-HeLLZLZ #identification #problem
Identifying impactful service system problems via log analysis (SH, QL, JGL, HZ0, MRL, DZ), pp. 60–70.
ESEC-FSEESEC-FSE-2018-LiTMS #context-sensitive grammar #pointer #self
Scalability-first pointer analysis with self-tuning context-sensitivity (YL0, TT0, AM, YS), pp. 129–140.
ESEC-FSEESEC-FSE-2018-MaLLZG #automation #debugging #difference #named #network
MODE: automated neural network model debugging via state differential analysis and input selection (SM, YL, WCL, XZ, AG), pp. 175–186.
ESEC-FSEESEC-FSE-2018-PauckBW #android #question #tool support
Do Android taint analysis tools keep their promises? (FP, EB, HW), pp. 331–341.
ICSE-2018-0008ZBPLO #how #question #re-engineering #sentiment
Sentiment analysis for software engineering: how far can we go? (BL0, FZ, GB, MDP, ML, RO), pp. 94–104.
ICSE-2018-0013P0 #mobile #named
EnMobile: entity-based characterization and analysis of mobile malware (WY0, MRP, TX0), pp. 384–394.
ICSE-2018-FanSCMLXPS #android #exception #scalability
Large-scale analysis of framework-specific exceptions in Android apps (LF, TS, SC, GM, YL0, LX, GP, ZS), pp. 408–419.
ICSE-2018-GaoZLK #identification #online #overview
Online app review analysis for identifying emerging issues (CG, JZ, MRL, IK), pp. 48–58.
ICSE-2018-Lambers0TBH #dependence #graph transformation #multi #re-engineering
Multi-granular conflict and dependency analysis in software engineering based on graph transformation (LL, DS0, GT, KB, JH), pp. 716–727.
ICSE-2018-LaraG #concept #modelling #type system
A posteriori typing for model-driven engineering: concepts, analysis, and applications (JdL, EG), p. 1136.
ICSE-2018-SadeghiJGBM #android #framework
A temporal permission analysis and enforcement framework for Android (AS, RJ, NG, HB, SM), pp. 846–857.
ICSE-2018-ZhangSX #process
Launch-mode-aware context-sensitive activity transition analysis (YZ0, YS, JX), pp. 598–608.
GPCEGPCE-2018-ChristopheRBM #distributed #javascript #process #source code
Orchestrating dynamic analyses of distributed processes for full-stack JavaScript programs (LC, CDR, EGB, WDM), pp. 107–118.
GPCEGPCE-2018-NiekeMSTYF #evolution
Anomaly analyses for feature-model evolution (MN, JM, CS, TT, ICY, FF), pp. 188–201.
GPCEGPCE-2018-Peldszus0J #feature model #modelling #product line #security
Model-based security analysis of feature-oriented software product lines (SP, DS0, JJ), pp. 93–106.
CASECASE-2018-HaouasDL #parallel
Analysis of an Integrated 4-DoF Parallel Wrist for Dexterous Gripping (WH, RD, GJL), pp. 1448–1453.
CASECASE-2018-KangYJ #performance #realtime #using
Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
CASECASE-2018-MarussyM #configuration management #dependence #modelling
Constructing Dependability Analysis Models of Reconfigurable Production Systems (KM, IM), pp. 1158–1163.
CASECASE-2018-MatsubaraNOC #component #policy #simulation
Policy Transfer from Simulations to Real World by Transfer Component Analysis (TM, YN, YO, YC), pp. 264–269.
CASECASE-2018-OutafraoutAN #approach #hybrid #modelling #multi #performance #petri net
A colored hybrid Petri net-based modeling approach for performance analysis of a multi-modal transportation system (KO, EhCEA, ANSM), pp. 1568–1573.
CASECASE-2018-SchedlerFBJT #automation #evaluation
Evaluation of an Automated Sample Preparation System for Analysis of Methacrylates in Saliva (MS, HF, JB, SJ, KT), pp. 1101–1105.
CASECASE-2018-TanCPP #automation #design #learning #visual notation
Transfer Learning with PipNet: For Automated Visual Analysis of Piping Design (WCT, IMC, DP, SJP), pp. 1296–1301.
CASECASE-2018-TanGCC #automation #learning
Learning with Corrosion Feature: For Automated Quantitative Risk Analysis of Corrosion Mechanism (WCT, PCG, KHC, IMC), pp. 1290–1295.
CASECASE-2018-YangWSQ #clustering #constraints #scheduling #tool support
Cyclic Scheduling Analysis of Single-arm Cluster Tools with Wafer Residency Time Constraint and Chamber Cleaning Operations (FY, NW, RS, YQ), pp. 241–246.
CASECASE-2018-Zou0HAX #performance
Analysis of End-of-State Impact on Manufacturing System Production Performance (JZ, QC0, JH0, JA, GX), pp. 823–828.
CCCC-2018-GinsbachCO #compilation #domain-specific language #named
CAnDL: a domain specific language for compiler analysis (PG, LC, MFPO), pp. 151–162.
CCCC-2018-KastrinisBFPS #alias #data type #performance
An efficient data structure for must-alias analysis (GK, GB, KF, NPK, YS), pp. 48–58.
CCCC-2018-KochMVCF #algorithm #compilation #parallel #towards
Towards a compiler analysis for parallel algorithmic skeletons (TJKEvK, SM, CV, MC, BF), pp. 174–184.
CCCC-2018-PathadeK #data flow
Computing partially path-sensitive MFP solutions in data flow analyses (KP, UPK), pp. 37–47.
CCCC-2018-ZhaoBS #parallel #points-to
Parallel sparse flow-sensitive points-to analysis (JZ, MGB, VS), pp. 59–70.
CGOCGO-2018-ZhouLWX0
May-happen-in-parallel analysis with static vector clocks (QZ, LL0, LW, JX, XF0), pp. 228–240.
ESOPESOP-2018-AbdullaJT #abstraction #concurrent
Fragment Abstraction for Concurrent Shape Analysis (PAA, BJ, CQT), pp. 442–471.
ESOPESOP-2018-ChatterjeeGV #contract
Quantitative Analysis of Smart Contracts (KC, AKG, YV), pp. 739–767.
FASEFASE-2018-0012SRYHBRS #approach #effectiveness #modelling
Effective Analysis of Attack Trees: A Model-Driven Approach (RK0, SS, ER, BMY, DH, JB, AR, MS), pp. 56–73.
FASEFASE-2018-ChechikSDR #commutative #named #performance
FPH: Efficient Non-commutativity Analysis of Feature-Based Systems (MC, IS, CD, JR), pp. 319–336.
FASEFASE-2018-LiuOSWGM #distributed #formal method #named #protocol #transaction
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis (SL0, PCÖ, KS, QW0, IG, JM), pp. 77–93.
FASEFASE-2018-ParkSR #framework #using #web
EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
CAVCAV-2018-BlondinEJ #named #protocol
Peregrine: A Tool for the Analysis of Population Protocols (MB, JE, SJ), pp. 604–611.
CAVCAV-2018-FedyukovichZG #termination
Syntax-Guided Termination Analysis (GF, YZ, AG), pp. 124–143.
CAVCAV-2018-SchemmelBDNW #liveness
Symbolic Liveness Analysis of Real-World Software (DS, JB, OSD, TN0, KW), pp. 447–466.
ICSTICST-2018-Suarez-Otero #consistency #logic
Analysis of the Logical Consistency in Cassandra (PSO), pp. 430–431.
VMCAIVMCAI-2018-KranzS #bytecode #composition #on-demand #using
Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
VMCAIVMCAI-2018-TitoloFMM #abstract interpretation #fault #float #framework #source code
An Abstract Interpretation Framework for the Round-Off Error Analysis of Floating-Point Programs (LT, MAF, MMM, CAM), pp. 516–537.
ECSAECSA-2017-NguyenOG #design #performance #process #repository
PARAD Repository: On the Capitalization of the Performance Analysis Process for AADL Designs (TDN, YO, EG), pp. 22–39.
ECSAECSA-2017-TrubianiM #architecture #collaboration #modelling #nondeterminism #reduction
Continuous Rearchitecting of QoS Models: Collaborative Analysis for Uncertainty Reduction (CT, RM), pp. 40–48.
ICSAICSA-2017-BangBM #collaboration #design
Continuous Analysis of Collaborative Design (JYB, YB, NM), pp. 97–106.
ICSAICSA-2017-HauptLSV #api #framework #rest
A Framework for the Structural Analysis of REST APIs (FH, FL, AS, KVH), pp. 55–58.
ICSAICSA-2017-PatersonC #markov #quality #refinement
Accurate Analysis of Quality Properties of Software with Observation-Based Markov Chain Refinement (CP, RC), pp. 121–130.
ICSAICSA-2017-RoyMRSW #architecture #framework #towards
Towards a Reference Architecture for Cloud-Based Plant Genotyping and Phenotyping Analysis Frameworks (BR, AKM, CKR, KAS, KW), pp. 41–50.
JCDLJCDL-2017-MurdockJCMDP #towards
Towards Publishing Secure Capsule-Based Analysis (JM, JJ, TWC, YM, JSD, BP), pp. 261–264.
JCDLJCDL-2017-PageBFWW #library #linked data #music #open data
Realising a Layered Digital Library: Exploration and Analysis of the Live Music Archive through Linked Data (KRP, SB, GF, DMW, TW), pp. 89–98.
EDMEDM-2017-BauerFP #behaviour #challenge #game studies #problem
Analysis of problem-solving behavior in open-ended scientific-discovery game challenges (AB, JF, ZP).
EDMEDM-2017-CaiEDPGS #chat #collaboration #learning #modelling #network #topic
Epistemic Network Analysis and Topic Modeling for Chat Data from Collaborative Learning Environment (ZC, BRE, ND, JWP, ACG, DWS).
EDMEDM-2017-CaoTH #student
An Analysis of Students' Questions in MOOCs Forums (MC, YT, XH).
EDMEDM-2017-KuangCHN #framework #network #platform #social #topic
A Topic Model and Social Network Analysis of a School Blogging Platform (XK, HSC, BH, GN).
EDMEDM-2017-LiTSH
Text analysis with LIWC and Coh-Metrix: Portraying MOOCs Instructors (JL, YT, LS, XH).
EDMEDM-2017-Ortiz-VazquezLL #clustering #modelling #realtime
Cluster Analysis of Real Time Location Data - An Application of Gaussian Mixture Models (AOV, XL, CFL, HSC, GN).
EDMEDM-2017-ShiPG #learning #performance #using
Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
EDMEDM-2017-VillamorR #collaboration #debugging #empirical
Characterizing Collaboration in the Pair Program Tracing and Debugging Eye-Tracking Experiment: A Preliminary Analysis (MV, MMTR).
EDMEDM-2017-WangLGB
A Latent Factor Model For Instructor Content Preference Analysis (JZW, ASL, PG, RGB).
ICSMEICSME-2017-HigoK #metric
Flattening Code for Metrics Measurement and Analysis (YH, SK), pp. 494–498.
ICSMEICSME-2017-HuangVGSS #assembly #execution #named #scalability #visualisation
Atlantis: Improving the Analysis and Visualization of Large Assembly Execution Traces (HNH, EV0, DMG, MADS, MS), pp. 623–627.
MSRMSR-2017-AtchisonBBSL
A time series analysis of TravisTorrent builds: to everything there is a season (AA, CB, NB, ES, EL), pp. 463–466.
MSRMSR-2017-BellerGZ #git #testing
Oops, my tests broke the build: an explorative analysis of Travis CI with GitHub (MB, GG, AZ), pp. 356–367.
MSRMSR-2017-BrandauerW #interactive #named
Spencer: interactive heap analysis for the masses (SB, TW), pp. 113–123.
MSRMSR-2017-CitoSWLZG #ecosystem #empirical #git
An empirical analysis of the docker container ecosystem on GitHub (JC, GS, JEW, PL, SZ, HCG), pp. 323–333.
MSRMSR-2017-IshioSII #reuse #set
Source file set search for clone-and-own reuse analysis (TI, YS, KI, KI), pp. 257–268.
MSRMSR-2017-IslamZ #automation #re-engineering #sentiment
Leveraging automated sentiment analysis in software engineering (MRI, MFZ), pp. 203–214.
MSRMSR-2017-RauschHL0 #empirical #integration #open source #workflow
An empirical analysis of build failures in the continuous integration workflows of Java-based open-source software (TR, WH, PL, SS0), pp. 345–355.
MSRMSR-2017-SouzaS #sentiment
Sentiment analysis of Travis CI builds (RRGS, BS), pp. 459–462.
MSRMSR-2017-ZampettiSOCP #how #integration #open source #pipes and filters #tool support
How open source projects use static code analysis tools in continuous integration pipelines (FZ, SS, RO, GC, MDP), pp. 334–344.
SANERSANER-2017-AlexandruPG #multi
Reducing redundancies in multi-revision code analysis (CVA, SP, HCG), pp. 148–159.
SANERSANER-2017-KandaGHM #comprehension #open source #towards
Towards understanding an open-source bounty: Analysis of Bountysource (TK0, MG, HH, KiM), pp. 577–578.
SANERSANER-2017-MercierCJ #automation #memory management #named #reverse engineering
dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis (DM, AC, RJ), pp. 497–501.
SANERSANER-2017-MoonSLK #behaviour #generative #how #what
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
SANERSANER-2017-YounangL #array #javascript
Conventionality analysis of array objects in JavaScript (AY, LL), pp. 561–562.
SCAMSCAM-2017-0008SMOBL #consistency #identifier #using
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
SCAMSCAM-2017-Anderson0 #php #query #sql
Supporting Analysis of SQL Queries in PHP AiR (DA, MH0), pp. 153–158.
SCAMSCAM-2017-PaduaS #exception
Revisiting Exception Handling Practices with Exception Flow Analysis (GBdP, WS), pp. 11–20.
FSCDFSCD-2017-Moser
Uniform Resource Analysis by Rewriting: Strenghts and Weaknesses (Invited Talk) (GM), p. 10.
IFM-2017-FrohnG #complexity #java
Complexity Analysis for Java with AProVE (FF, JG), pp. 85–101.
IFM-2017-GilmoreRV #statistics
Transient and Steady-State Statistical Analysis for Discrete Event Simulators (SG, DR, AV), pp. 145–160.
IFM-2017-HenrioLM
Analysis of Synchronisations in Stateful Active Objects (LH, CL, VM), pp. 195–210.
IFM-2017-SteinhofelW #control flow #invariant #standard
A New Invariant Rule for the Analysis of Loops with Non-standard Control Flows (DS, NW), pp. 279–294.
SEFMSEFM-2017-Jakobs #proving
PART_PW : From Partial Analysis Results to a Proof Witness (MCJ), pp. 120–135.
SEFMSEFM-2017-MahmudSL #embedded #logic #requirements #semantics #specification
Specification and Semantic Analysis of Embedded Systems Requirements: From Description Logic to Temporal Logic (NM, CS, OL), pp. 332–348.
SEFMSEFM-2017-MasciZJC #identification #requirements #safety #user interface
A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
ICFP-2017-AvanziniL #automation #complexity #type inference
Automating sized-type inference for complexity analysis (MA, UDL), p. 29.
CHI-PLAYCHI-PLAY-2017-BarinDT #comprehension #game studies
Understanding Dangerous Play: A Grounded Theory Analysis of High-Performance Drone Racing Crashes (AB, ID, ZOT), pp. 485–496.
CHI-PLAYCHI-PLAY-2017-HornCD #adaptation #elicitation #game studies
Adapting Cognitive Task Analysis to Elicit the Skill Chain of a Game (BH, SC, SD), pp. 277–289.
DiGRADiGRA-2017-VughtG #game studies
Considering play: From method to analysis (JvV, RG).
FDGFDG-2017-AllartLPGN #game studies #motivation #using #video
Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
FDGFDG-2017-HornHFBHS #game studies
AI-assisted analysis of player strategy across level progressions in a puzzle game (BH, AKH, YF, JB, CH, GS), p. 10.
FDGFDG-2017-KaltmanOWM #game studies #tool support
Getting the GISST: a toolkit for the creation, analysis and reference of game studies resources (EK, JCO, NWF, MM), p. 10.
FDGFDG-2017-MachadoNT #design #game studies
SeekWhence a retrospective analysis tool for general game design (TM, AN, JT), p. 6.
FDGFDG-2017-Valls-VargasZO17a #generative #overview #perspective
From computational narrative analysis to generation: a preliminary review (JVV, JZ, SO), p. 4.
ICGJICGJ-2017-PirkerKG #game studies #network #social
Social network analysis of the global game jam network (JP, FK, CG), pp. 10–14.
CIKMCIKM-2017-An0WY #clustering #feature model
Unsupervised Feature Selection with Joint Clustering Analysis (SA, JW0, JW, ZY), pp. 1639–1648.
CIKMCIKM-2017-ChenAS #bias #empirical #performance
An Empirical Analysis of Pruning Techniques: Performance, Retrievability and Bias (RCC, LA, FS), pp. 2023–2026.
CIKMCIKM-2017-ChenLL #modelling #sentiment
Modeling Language Discrepancy for Cross-Lingual Sentiment Analysis (QC, CL, WL0), pp. 117–126.
CIKMCIKM-2017-CuiLZZ #network
Text Coherence Analysis Based on Deep Neural Network (BC, YL, YZ, ZZ), pp. 2027–2030.
CIKMCIKM-2017-FeigenblatBRK #named #summary
SummIt: A Tool for Extractive Summarization, Discovery and Analysis (GF, OB, HR, DK), pp. 2459–2462.
CIKMCIKM-2017-FreitasTCX #agile #network
Rapid Analysis of Network Connectivity (SF, HT, NC, YX), pp. 2463–2466.
CIKMCIKM-2017-KhoaAW #framework #incremental #maintenance #using
Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
CIKMCIKM-2017-LeL17a #interactive #named #semantics #topic #visualisation
SemVis: Semantic Visualization for Interactive Topical Analysis (TMVL, HWL), pp. 2487–2490.
CIKMCIKM-2017-MaHLSYLR #clustering #graph #multi
Multi-view Clustering with Graph Embedding for Connectome Analysis (GM, LH0, CTL, WS, PSY, ADL, ABR), pp. 127–136.
CIKMCIKM-2017-MeleBC #multi
Linking News across Multiple Streams for Timeliness Analysis (IM, SAB, FC), pp. 767–776.
CIKMCIKM-2017-NguyenH
Differentially Private Regression for Discrete-Time Survival Analysis (TTN, SCH), pp. 1199–1208.
CIKMCIKM-2017-NobariRN
Analysis of Telegram, An Instant Messaging Service (ADN, NR, MN), pp. 2035–2038.
CIKMCIKM-2017-PangCWL #recognition #robust
Robust Heterogeneous Discriminative Analysis for Single Sample Per Person Face Recognition (MP, YmC, BW, RL), pp. 2251–2254.
CIKMCIKM-2017-ShaikhK #framework #named
StreamingCube: A Unified Framework for Stream Processing and OLAP Analysis (SAS, HK), pp. 2527–2530.
CIKMCIKM-2017-TayTH #memory management #network #sentiment
Dyadic Memory Networks for Aspect-based Sentiment Analysis (YT, LAT, SCH), pp. 107–116.
CIKMCIKM-2017-XuM #multimodal #named #network #semantics #sentiment
MultiSentiNet: A Deep Semantic Network for Multimodal Sentiment Analysis (NX, WM), pp. 2399–2402.
CIKMCIKM-2017-ZhangYEALL #predict #social
Predicting Startup Crowdfunding Success through Longitudinal Social Engagement Analysis (QZ, TY, ME, SA0, VL, BTL), pp. 1937–1946.
ECIRECIR-2017-Chehreghani #feature model #problem
Feature-Oriented Analysis of User Profile Completion Problem (MHC), pp. 304–316.
ECIRECIR-2017-ChenLLLLH #sentiment
Cross-Lingual Sentiment Relation Capturing for Cross-Lingual Sentiment Analysis (QC, WL0, YL, XL, CL, YH), pp. 54–67.
ECIRECIR-2017-GarbaceaK #detection #summary
A Systematic Analysis of Sentence Update Detection for Temporal Summarization (CG, EK), pp. 424–436.
ECIRECIR-2017-NarducciBLGS #semantics
Temporal Semantic Analysis of Conference Proceedings (FN, PB, PL, MdG, GS), pp. 762–765.
ICMLICML-2017-0001JZ #geometry #problem #rank
No Spurious Local Minima in Nonconvex Low Rank Problems: A Unified Geometric Analysis (RG0, CJ, YZ), pp. 1233–1242.
ICMLICML-2017-DembczynskiKKN #classification #consistency #revisited
Consistency Analysis for Binary Classification Revisited (KD, WK, OK, NN), pp. 961–969.
ICMLICML-2017-GarberSS #algorithm #component #distributed #probability
Communication-efficient Algorithms for Distributed Stochastic Principal Component Analysis (DG, OS, NS), pp. 1203–1212.
ICMLICML-2017-HornakovaLA #graph #multi #optimisation
Analysis and Optimization of Graph Decompositions by Lifted Multicuts (AH, JHL, BA), pp. 1539–1548.
ICMLICML-2017-LiZLV #convergence #optimisation
Convergence Analysis of Proximal Gradient with Momentum for Nonconvex Optimization (QL, YZ, YL, PKV), pp. 2111–2119.
ICMLICML-2017-Tian #convergence #network
An Analytical Formula of Population Gradient for two-layered ReLU network and its Applications in Convergence and Critical Point Analysis (YT), pp. 3404–3413.
KDDKDD-2017-HuangZ #named
SPOT: Sparse Optimal Transformations for High Dimensional Variable Selection and Exploratory Regression Analysis (QH, MZ), pp. 857–865.
KDDKDD-2017-LiGZXZ #development #perspective
Prospecting the Career Development of Talents: A Survival Analysis Perspective (HL, YG, HZ, HX, HZ), pp. 917–925.
KDDKDD-2017-LiJZXLZZWZWXB #framework #named #platform
FLAP: An End-to-End Event Log Analysis Platform for System Management (TL0, YJ, CZ, BX0, ZL0, WZ, XZ, WW0, LZ, JW, LX, DB), pp. 1547–1556.
KDDKDD-2017-LiuFMRSX #effectiveness #internet #process #realtime
Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams (JL, YF, JM, YR, LS, HX), pp. 335–344.
KDDKDD-2017-PaulLTYF #exclamation #named #sentiment #twitter #what
Compass: Spatio Temporal Sentiment Analysis of US Election What Twitter Says! (DP, FL0, MKT, XY, RF), pp. 1585–1594.
KDDKDD-2017-ZhouXBWZLXLSG #named
STAR: A System for Ticket Analysis and Resolution (WZ, WX, RB, QW, CZ, TL0, JX0, ZL0, LS, GYG), pp. 2181–2190.
ECMFAECMFA-2017-AhmadianSRJ #ecosystem #industrial #modelling #privacy
Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
ECMFAECMFA-2017-Debbi #formal method #modelling #probability
Modeling and Formal Analysis of Probabilistic Complex Event Processing (CEP) Applications (HD), pp. 248–263.
ECOOPECOOP-2017-Huang0 #dependence #reduction
Speeding Up Maximal Causality Reduction with Static Dependency Analysis (SH, JH0), p. 22.
OOPSLAOOPSLA-2017-GrechS #named #points-to
P/Taint: unified points-to and taint analysis (NG, YS), p. 28.
OOPSLAOOPSLA-2017-JeongJCO #context-sensitive grammar #data-driven #points-to
Data-driven context-sensitivity for points-to analysis (SJ, MJ, SDC, HO), p. 28.
OOPSLAOOPSLA-2017-SpathAB #alias #data flow #named #performance #precise
IDEal: efficient and precise alias-aware dataflow analysis (JS, KA0, EB), p. 27.
OOPSLAOOPSLA-2017-WangWC #complexity #functional #invariant #named
TiML: a functional language for practical complexity analysis with invariants (PW0, DW, AC), p. 26.
AdaEuropeAdaEurope-2017-DiazFKMHAC #bound #manycore #named #probability
MC2: Multicore and Cache Analysis via Deterministic and Probabilistic Jitter Bounding (ED, MF, LK, EM, CH, JA, FJC), pp. 102–118.
LOPSTRLOPSTR-2017-AlbertiS #c #generative #specification #tool support
Context Generation from Formal Specifications for C Analysis Tools (MA, JS), pp. 93–111.
LOPSTRLOPSTR-2017-Lucas #first-order
Analysis of Rewriting-Based Systems as First-Order Theories (SL), pp. 180–197.
LOPSTRLOPSTR-2017-NguyenT #parallel #source code #thread
CARET Analysis of Multithreaded Programs (HVN, TT), pp. 73–90.
PLDIPLDI-2017-AbdullaACDHRR #constraints #framework #performance #string
Flatten and conquer: a framework for efficient analysis of string constraints (PAA, MFA, YFC, BPD, LH, AR, PR), pp. 602–617.
PLDIPLDI-2017-BillesMP #black box #collaboration #web
Systematic black-box analysis of collaborative web applications (MB, AM, MP), pp. 171–184.
PLDIPLDI-2017-DoychevK
Rigorous analysis of software countermeasures against cache attacks (GD, BK), pp. 406–421.
PLDIPLDI-2017-EizenbergPPMD #named #runtime #source code
BARRACUDA: binary-level analysis of runtime RAces in CUDA programs (AE, YP, TP, WM, JD), pp. 126–140.
PLDIPLDI-2017-KincaidBBR #composition #revisited
Compositional recurrence analysis revisited (ZK, JB, AFB, TWR), pp. 248–262.
PLDIPLDI-2017-TanLX #automaton #modelling #performance #points-to #precise
Efficient and precise points-to analysis: modeling the heap by merging equivalent automata (TT0, YL0, JX), pp. 278–291.
PLDIPLDI-2017-ThiessenL #pointer
Context transformations for pointer analysis (RT, OL), pp. 263–277.
POPLPOPL-2017-BrutschyD0V #consistency
Serializability for eventual consistency: criterion, analysis, and applications (LB, DD, PM0, MTV), pp. 458–472.
POPLPOPL-2017-GermaneM #automaton
A posteriori environment analysis with Pushdown Delta CFA (KG, MM), pp. 19–31.
POPLPOPL-2017-HoffmannDW #automation #bound #ml #towards
Towards automatic resource bound analysis for OCaml (JH0, AD, SCW), pp. 359–373.
POPLPOPL-2017-ZhangS #data flow #linear #reachability
Context-sensitive data-dependence analysis via linear conjunctive language reachability (QZ, ZS), pp. 344–358.
QAPLQAPL-2017-KoenigKM #named
PAWS: A Tool for the Analysis of Weighted Systems (BK, SK, CM), pp. 75–91.
QAPLQAPL-2017-SchuppNA #divide and conquer #hybrid #reachability #set
Divide and Conquer: Variable Set Separation in Hybrid Systems Reachability Analysis (SS, JN, ), pp. 1–14.
SASSAS-2017-BrockschmidtCKK #learning
Learning Shape Analysis (MB, YC, PK, SK, DT), pp. 66–87.
SASSAS-2017-Guernic #towards
Toward a Sound Analysis of Guarded LTI Loops with Inputs by Abstract Acceleration (CLG), pp. 192–211.
SASSAS-2017-HolikMVW #heuristic #summary #thread
Effect Summaries for Thread-Modular Analysis - Sound Analysis Despite an Unsound Heuristic (LH, RM0, TV, SW), pp. 169–191.
SASSAS-2017-LeonFHM #memory management #modelling
Portability Analysis for Weak Memory Models. PORTHOS: One Tool for all Models (HPdL, FF, KH, RM0), pp. 299–320.
SASSAS-2017-TrostanetskiGK #composition #difference #semantics
Modular Demand-Driven Analysis of Semantic Difference for Program Versions (AT, OG, DK), pp. 405–427.
SASSAS-2017-ZhangSX #incremental #probability #source code
Incremental Analysis for Probabilistic Programs (JZ, YS, JX), pp. 450–472.
ASEASE-2017-AhmedBIR #code review #interactive #named #overview #sentiment
SentiCR: a customized sentiment analysis tool for code review interactions (TA, AB, AI, SR), pp. 106–111.
ASEASE-2017-Busari #architecture #modelling #requirements #search-based #towards
Towards search-based modelling and analysis of requirements and architecture decisions (SAB), pp. 1026–1029.
ASEASE-2017-JamshidiSVKPA #configuration management #learning #modelling #performance
Transfer learning for performance modeling of configurable systems: an exploratory analysis (PJ, NS, MV, CK, AP, YA), pp. 497–508.
ASEASE-2017-KimFJJOLC #testing
Testing intermediate representations for binary analysis (SK0, MF, MJ, SJ, DO, JL, SKC), pp. 353–364.
ASEASE-2017-ShiCWLB #comprehension #feature model #fuzzy
Understanding feature requests by leveraging fuzzy method and linguistic analysis (LS, CC, QW0, SL, BWB), pp. 440–450.
ASEASE-2017-WangW #fuzzing #in memory #similarity
In-memory fuzzing for binary code similarity analysis (SW0, DW), pp. 319–330.
ESEC-FSEESEC-FSE-2017-AhmadianPRJ #modelling #privacy #security
Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
ESEC-FSEESEC-FSE-2017-RegisCBPRPAGF #alloy #behaviour #modelling #specification
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour (GR, CC, SGB, MP, FR, PP, NA, JPG, MFF), pp. 969–973.
ESEC-FSEESEC-FSE-2017-XieCZLLL #named #termination
Loopster: static loop termination analysis (XX, BC0, LZ, SWL, YL0, XL), pp. 84–94.
ICSE-2017-0006R #android #testing
Analysis and testing of notifications in Android wear applications (HZ0, AR), pp. 347–357.
ICSE-2017-BusariL #architecture #lightweight #named #requirements
RADAR: a lightweight tool for requirements and architecture decision analysis (SAB, EL), pp. 552–562.
ICSE-2017-JiangLYX #automation #integration #testing #what
What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing (HJ, XL, ZY, JX), pp. 712–723.
ICSE-2017-ServantJ #fine-grained #fuzzy
Fuzzy fine-grained code-history analysis (FS, JAJ), pp. 746–757.
ICSE-2017-XuCCLS #comprehension #named #security #towards
SPAIN: security patch analysis for binaries towards understanding the pain and pills (ZX, BC0, MC, YL0, FS), pp. 462–472.
SLESLE-2017-SmitsV #data flow #declarative #named #specification
FlowSpec: declarative dataflow analysis specification (JS, EV), pp. 221–231.
ASPLOSASPLOS-2017-AjaySRZX #3d #energy #named #optimisation
3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers (JA, CS0, ASR, CZ, WX), pp. 419–433.
ASPLOSASPLOS-2017-FerraiuoloXZMS #architecture #data flow #hardware #security #verification
Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis (AF, RX, DZ, ACM, GES), pp. 555–568.
ASPLOSASPLOS-2017-McMahanCNRGHS #architecture #composition
An Architecture Supporting Formal and Compositional Binary Analysis (JM, MC, LN, JR, SYG, BH, TS), pp. 177–191.
ASPLOSASPLOS-2017-NalliHHSVK #memory management #persistent
An Analysis of Persistent Memory Use with WHISPER (SN, SH, MDH, MMS, HV0, KK), pp. 135–148.
ASPLOSASPLOS-2017-WangHZXS #graph #interprocedural #named #scalability
Graspan: A Single-machine Disk-based Graph System for Interprocedural Static Analyses of Large-scale Systems Code (KW0, AH0, ZZ0, G(X, AAS), pp. 389–404.
CASECASE-2017-AziziKBK #geometry #reachability
Geometric reachability analysis for grasp planning in cluttered scenes for varying end-effectors (VA0, AK, KEB, MK), pp. 764–769.
CASECASE-2017-ChenGL #identification #markov #online #performance
Load identification based on Factorial Hidden Markov Model and online performance analysis (SC, FG, TL0), pp. 1249–1253.
CASECASE-2017-KangMPJ #modelling #multi
Multi-fidelity modeling for analysis of serial production lines (YK, LM, GP, FJ), pp. 30–35.
CASECASE-2017-LeeJFBGBL #modelling #process #simulation #using
Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
CASECASE-2017-LiLHTCLW #using
The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
CASECASE-2017-LiuH #convergence #protocol
The convergence analysis of bat-inspired consensus protocols with nonlinear dynamics (QL, QH), pp. 1560–1565.
CASECASE-2017-LiuH17a #cyber-physical #hybrid #theorem
Hybrid stability analysis via extended small-gain theorem for networked cyber-physical systems with transmission delay (QL, QH), pp. 1598–1603.
CASECASE-2017-LiuMR #cyber-physical #security
Security analysis of continuous-time cyber-physical system against sensor attacks (XL, YM, XR), pp. 1586–1591.
CASECASE-2017-LiuWQWZ #fault #geometry
A geometric errors analysis method integrated clamping error and wear out error over working space (XL, CW, LQ, YW, SZ), pp. 656–661.
CASECASE-2017-LiuZ17a #monitoring #robust
Intelligent robust milling tool wear monitoring via fractal analysis of cutting force (TL, KZ), pp. 1254–1259.
CASECASE-2017-LiXZ #complexity #learning
Complexity analysis of reinforcement learning and its application to robotics (BL, LX, QZ), pp. 1425–1426.
CASECASE-2017-SaezMBT #cyber-physical #detection
Anomaly detection and productivity analysis for cyber-physical systems in manufacturing (MS, FPM, KB, DMT), pp. 23–29.
CASECASE-2017-YangZL #reliability
Reliability analysis based on weibull distribution model for spreaders (SY, YZ, LL), pp. 531–535.
CASECASE-2017-YanZ #performance
Efficiency analysis of series machines under operation-dependent-failures (CBY, QZ), pp. 476–481.
CASECASE-2017-ZhangWLL #string
Analysis string stability of a new car-following model considering response time (JZ0, YW, GL, WL), pp. 853–857.
CASECASE-2017-ZhaoLHD #flexibility #performance #problem
Optimal planning of plant flexibility: Problem formulation and performance analysis (CZ, JL, NH, GAD), p. 986.
CASECASE-2017-ZhongPPJ #case study #health #modelling #process
Modeling and analysis of primary care to specialty care referral process: A case study at the university of florida health Jacksonville (XZ, AMP, LP, RJ), pp. 819–824.
CASECASE-2017-ZhuangCG #parametricity
Parameters analysis of hierarchical evolutionary method with an application of HVAC system (LZ, XC0, XG), pp. 858–863.
CASECASE-2017-ZouZ #detection
Occupancy detection in elevator car by fusing analysis of dual videos (JZ, QZ), pp. 906–911.
CCCC-2017-FedericoPA #bound #framework
rev.ng: a unified binary analysis framework to recover CFGs and function boundaries (ADF, MP, GA), pp. 131–141.
CGOCGO-2017-JohnsonFBOJA #collaboration #dependence #framework
A collaborative dependence analysis framework (NPJ, JF, SRB, TO, TBJ, DIA), pp. 148–159.
ESOPESOP-2017-DArgenioBBFH #formal method #source code
Is Your Software on Dope? - Formal Analysis of Surreptitiously “enhanced” Programs (PRD, GB, SB, BF, HH), pp. 83–110.
ESOPESOP-2017-TangWXZW0 #library #performance #reachability #summary
Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization (HT, DW, YX, LZ, XW, LZ0), pp. 880–908.
FASEFASE-2017-Henda0LNSS #named #security
OpenSAW: Open Security Analysis Workbench (NBH, BJ0, PL, KN, PS, OS), pp. 321–337.
FASEFASE-2017-PhamKRR #testing
Bucketing Failing Tests via Symbolic Analysis (VTP, SK, SR, AR), pp. 43–59.
CAVCAV-2017-ChatterjeeFM #automation #bound
Automated Recurrence Analysis for Almost-Linear Expected-Runtime Bounds (KC, HF0, AM), pp. 118–139.
CAVCAV-2017-SiZGN #satisfiability
Maximum Satisfiability in Software Analysis: Applications and Techniques (XS, XZ, RG, MN), pp. 68–94.
CAVCAV-2017-Carbonneaux0RS #automation #coq #proving
Automated Resource Analysis with Coq Proof Objects (QC, JH0, TWR, ZS), pp. 64–85.
CAVCAV-2017-ChatterjeeFG #recursion #source code #worst-case
Non-polynomial Worst-Case Analysis of Recursive Programs (KC, HF0, AKG), pp. 41–63.
CAVCAV-2017-DanS0JV
Finding Fix Locations for CFL-Reachability Analyses via Minimum Cuts (AMD, MS, SC0, JBJ, MTV), pp. 521–541.
CAVCAV-2017-TouzeauMMR #nondeterminism #performance
Ascertaining Uncertainty for Efficient Exact Cache Analysis (VT, CM, DM, JR), pp. 22–40.
ICSTICST-2017-ChanWSPS #concurrent #fault #invariant #multi #named #source code #thread #using
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
ICSTICST-2017-HollandSK #benchmark #metric #state of the art
Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark (BH, GRS, SK), pp. 484–491.
ICSTICST-2017-LuckowKP #complexity #using
Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
TAPTAP-2017-BaranyS #c #data flow #hybrid
Hybrid Information Flow Analysis for Real-World C Code (GB, JS), pp. 23–40.
TAPTAP-2017-DamianiHL #abstraction #product line #refinement
Abstraction Refinement for the Analysis of Software Product Lines (FD, RH, ML), pp. 3–20.
VMCAIVMCAI-2017-GuW #float #source code #using
Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
VMCAIVMCAI-2017-Seladji #component
Finding Relevant Templates via the Principal Component Analysis (YS), pp. 483–499.
ECSAECSA-2016-AbukwaikAR #api #automation #concept #constraints #documentation #identification #towards
Towards Seamless Analysis of Software Interoperability: Automatic Identification of Conceptual Constraints in API Documentation (HA, MA, HDR), pp. 67–83.
ECSAECSA-2016-KaptoEKT #approach #architecture #detection #evolution #source code
Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
ECSAECSA-2016-SchmerlGSBMCG #android #architecture #modelling #security
Architecture Modeling and Analysis of Security in Android Systems (BRS, JG, AS, HB, SM, JC, DG), pp. 274–290.
QoSAQoSA-2016-StierK #adaptation #modelling #performance #self
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses (CS, AK), pp. 80–89.
WICSAWICSA-2016-FengKCMX #approach #architecture #security #towards
Towards an Architecture-Centric Approach to Security Analysis (QF, RK, YC, RM, LX0), pp. 221–230.
WICSAWICSA-2016-GerlitzK16a #architecture #matlab #modelling
Architectural Analysis of MATLAB/Simulink Models with Artshop (TG, SK), pp. 307–310.
WICSAWICSA-2016-Hofig #architecture #component #dependence #summary #tutorial
Tutorial Summary for Dependability Analysis in the Context of Component-Based System Architectures (KH), p. 255.
WICSAWICSA-2016-MubeenN #abstraction #component #distributed #embedded #on the
On Timing Analysis of Component-Based Vehicular Distributed Embedded Systems at Various Abstraction Levels (SM, TN), pp. 277–278.
WICSAWICSA-2016-Seifermann #architecture #data flow
Architectural Data Flow Analysis (SS), pp. 270–271.
WICSAWICSA-2016-TaspolatogluH #architecture #security
Context-Based Architectural Security Analysis (ET, RH), pp. 281–282.
JCDLJCDL-2016-FuF #community #music #social
Music Information Seeking via Social Q&A: An Analysis of Questions in Music StackExchange Community (HF, YF), pp. 139–142.
CSEETCSEET-2016-KungL #design #object-oriented
An Object-Oriented Analysis and Design Environment (DK, JL), pp. 91–100.
CSEETCSEET-2016-PriesterSS #development #invariant
Tool-Assisted Loop Invariant Development and Analysis (CP, YSS, MS), pp. 66–70.
EDMEDM-2016-AllenJDRKLM #process
{ENTER}ing the Time Series {SPACE}: Uncovering the Writing Process through Keystroke Analyses (LKA, MEJ, MD, RDR, KK, ADL, DSM), pp. 22–29.
EDMEDM-2016-BaikadiELS #what
Redefining “What” in Analyses of Who Does What in MOOCs (AB, CDE, YL, CS), pp. 569–570.
EDMEDM-2016-Bydzovska #comparative #performance #predict #student
A Comparative Analysis of Techniques for Predicting Student Performance (HB), pp. 306–311.
EDMEDM-2016-DaiAY #learning #recommendation #towards
Course Content Analysis: An Initiative Step toward Learning Object Recommendation Systems for MOOC Learners (YD, YA, MY), pp. 347–352.
EDMEDM-2016-HaoLDKK #collaboration #data mining #mining #problem #statistics
Collaborative Problem Solving Skills versus Collaboration Outcomes: Findings from Statistical Analysis and Data Mining (JH, LL, AvD, PCK, CK), pp. 382–387.
EDMEDM-2016-KoedingerM
Closing the Loop with Quantitative Cognitive Task Analysis (KRK, EAM), pp. 412–417.
EDMEDM-2016-LeeRBY #approach #clustering #heatmap #interactive #learning #visualisation
Hierarchical Cluster Analysis Heatmaps and Pattern Analysis: An Approach for Visualizing Learning Management System Interaction Data (JEL, MR, AB, MY), pp. 603–604.
EDMEDM-2016-LiuBLBBBM #behaviour
MOOC Learner Behaviors by Country and Culture; an Exploratory Analysis (ZL, RB, CL, TB, RSB, YB, DSM), pp. 127–134.
EDMEDM-2016-MlynarskaCG #process
Time Series Analysis of VLE Activity Data (EM, PC, DG), pp. 613–614.
EDMEDM-2016-Sande16a #component #learning #problem
Learning curves versus problem difficulty: an analysis of the Knowledge Component picture for a given context (BvdS), pp. 646–647.
ICPCICPC-2016-KhatiwadaKM #named
STAC: A tool for Static Textual Analysis of Code (SK, MK, AM), pp. 1–3.
ICPCICPC-2016-ZhangT0 #android #dependence
Android build dependency analysis (BZ0, VLT, MB0), pp. 1–4.
ICSMEICSME-2016-HallW
Data and Analysis Code for GP EFSM Inference (MH, NW), p. 611.
ICSMEICSME-2016-KirchmayrMNPT #comprehension #integration #legacy #source code
Integration of Static and Dynamic Code Analysis for Understanding Legacy Source Code (WK, MM, LN, JP, RT), pp. 543–552.
MSRMSR-2016-BlazB #sentiment
Sentiment analysis in tickets for IT support (CCAB, KB), pp. 235–246.
MSRMSR-2016-NakshatriHT #empirical #exception #java
Analysis of exception handling patterns in Java projects: an empirical study (SN, MH, ST), pp. 500–503.
MSRMSR-2016-YangHL #query #stack overflow
From query to usable code: an analysis of stack overflow code snippets (DY, AH0, CVL), pp. 391–402.
SANERSANER-2016-BritoHVR #api #developer #java #scalability
Do Developers Deprecate APIs with Replacement Messages? A Large-Scale Analysis on Java Systems (GB, ACH, MTV, RR), pp. 360–369.
SANERSANER-2016-DavidBTMFPM #execution #named #symbolic computation #tool support
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis (RD, SB, TDT, LM, JF, MLP, JYM), pp. 653–656.
SANERSANER-2016-DecanMCG #dependence #git #problem
When GitHub Meets CRAN: An Analysis of Inter-Repository Package Dependency Problems (AD, TM, MC, PG), pp. 493–504.
SANERSANER-2016-ZhengRSLSJBCQB #hybrid #named #using
AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
FMFM-2016-AntoninoGR #reachability
Tighter Reachability Criteria for Deadlock-Freedom Analysis (PRGA, TGR, AWR), pp. 43–59.
FMFM-2016-BeckerCGHHKNSTT #formal method #modelling #proving #testing
Combining Mechanized Proofs and Model-Based Testing in the Formal Analysis of a Hypervisor (HB, JMC, JG, UH, YH, CK, KN0, JLS, HT, TT), pp. 69–84.
FMFM-2016-BenesBDPS #approach #model checking
A Model Checking Approach to Discrete Bifurcation Analysis (NB, LB, MD, SP, DS), pp. 85–101.
FMFM-2016-DimovskiBW #abstraction #variability
Finding Suitable Variability Abstractions for Family-Based Analysis (ASD, CB, AW), pp. 217–234.
FMFM-2016-StoenescuSPI #execution #framework #named #symbolic computation #using
RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
FSCDFSCD-2016-Nipkow #data type #functional
Verified Analysis of Functional Data Structures (TN), p. 2.
IFM-2016-AndreiCCMR #formal method #probability
Probabilistic Formal Analysis of App Usage to Inform Redesign (OA, MC, MC, AM, MR), pp. 115–129.
IFM-2016-AntoninoGR #performance #satisfiability #using
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
IFM-2016-BendispostoKLMP #reachability
Symbolic Reachability Analysis of B Through ProB and LTSmin (JB, PK, ML, JM, JvdP, HT, JW), pp. 275–291.
SEFMSEFM-2016-Agha #abstraction #concurrent #modelling #problem #semantics #tool support
Abstractions, Semantic Models and Analysis Tools for Concurrent Systems: Progress and Open Problems - (Extended Abstract) (GA), pp. 3–8.
SEFMSEFM-2016-BendikBBC #bound #order #requirements #safety #set
Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (JB, NB, JB, IC), pp. 121–136.
SEFMSEFM-2016-Cerone #framework #interactive #logic
A Cognitive Framework Based on Rewriting Logic for the Analysis of Interactive Systems (AC), pp. 287–303.
SEFMSEFM-2016-DernehlHK #abstract interpretation #diagrams #execution #symbolic computation
Combining Abstract Interpretation with Symbolic Execution for a Static Value Range Analysis of Block Diagrams (CD, NH, SK), pp. 137–152.
ICFP-2016-Gilray0M #control flow
Allocation characterizes polyvariance: a unified methodology for polyvariant control-flow analysis (TG, MDA0, MM), pp. 407–420.
AIIDEAIIDE-2016-SinghV #2d
Staying Hidden: An Analysis of Hiding Strategies in a 2D Level with Occlusions (NS, CV), pp. 72–78.
CHI-PLAYCHI-PLAY-2016-HornHBFSH #black box #education #game studies
Opening the Black Box of Play: Strategy Analysis of an Educational Game (BH, AKH, JB, YF, GS, CH), pp. 142–153.
CHI-PLAYCHI-PLAY-2016-WallnerK #case study #game studies #user study #visualisation
Visualizations for Retrospective Analysis of Battles in Team-based Combat Games: A User Study (GW, SK), pp. 22–32.
CoGCIG-2016-AllartLPGN #design
Design influence on player retention: A method based on time varying survival analysis (TA, GL, MP, AG, SN), pp. 1–8.
CoGCIG-2016-DrachenGGHLSK #behaviour #clustering #comparative #profiling
Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny (AD, JG, CG, EH, PL, RS, DK), pp. 1–8.
DiGRADiGRA-FDG-2016-IsaksenN #statistics
A Statistical Analysis of Player Improvement and Single-Player High Scores (AI, AN).
DiGRADiGRA-FDG-2016-Willumsen #formal method #source code
Source Code and Formal Analysis: A Hermeneutic Reading of Passage (ECW).
CoGVS-Games-2016-GodinhoE #game studies
Open Device Lab: An Analysis of Available Devices in the Gaming Market (RPG, RSCE), pp. 1–4.
CoGVS-Games-2016-PatinoRP #game studies #learning
Analysis of Game and Learning Mechanics According to the Learning Theories (AP, MR, JNP), pp. 1–4.
CIKMCIKM-2016-AmeriFCR #framework #predict #student
Survival Analysis based Framework for Early Prediction of Student Dropouts (SA, MJF, RBC, CKR), pp. 903–912.
CIKMCIKM-2016-CheemaKALWCR #health #monitoring #on the #using
On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
CIKMCIKM-2016-FanWL #metric #mobile #network #on the #optimisation
On Backup Battery Data in Base Stations of Mobile Networks: Measurement, Analysis, and Optimization (XF, FW0, JL), pp. 1513–1522.
CIKMCIKM-2016-GuoS #behaviour #mobile #scalability #towards
Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems (QG, YS), pp. 579–588.
CIKMCIKM-2016-KraviGMCMPT #multi #query
One Query, Many Clicks: Analysis of Queries with Multiple Clicks by the Same User (EK, IG, AM, DC, YM, DP, GT), pp. 1423–1432.
CIKMCIKM-2016-LiuLWT #information management #named #visualisation
FIN10K: A Web-based Information System for Financial Report Analysis and Visualization (YWL, LCL, CJW, MFT), pp. 2441–2444.
CIKMCIKM-2016-LiZZWZWXHWZLCR #delivery #framework #named #performance #platform
DI-DAP: An Efficient Disaster Information Delivery and Analysis Platform in Disaster Management (TL0, WZ, CZ, QW, QZ, DW0, JX0, YH, WW0, MZ, SL, SCC, NR), pp. 1593–1602.
CIKMCIKM-2016-MaxwellA #behaviour #performance
Agents, Simulated Users and Humans: An Analysis of Performance and Behaviour (DM, LA), pp. 731–740.
CIKMCIKM-2016-YuSHCH #data-driven #multi #quantifier #sentiment
Data-Driven Contextual Valence Shifter Quantification for Multi-Theme Sentiment Analysis (HY, JS, MH, MC, JH0), pp. 939–948.
ECIRECIR-2016-FlaesRW #multi #sentiment #what
What Multimedia Sentiment Analysis Says About City Liveability (JBF, SR, MW), pp. 824–829.
ECIRECIR-2016-FoleyA
Retrieving Hierarchical Syllabus Items for Exam Question Analysis (JF, JA), pp. 575–586.
ECIRECIR-2016-LiWPA #empirical #learning #sentiment
An Empirical Study of Skip-Gram Features and Regularization for Learning on Sentiment Analysis (CL, BW, VP, JAA), pp. 72–87.
ECIRECIR-2016-ShariffSZ #correlation #twitter
Correlation Analysis of Reader's Demographics and Tweet Credibility Perception (SMS, MS, XZ), pp. 453–465.
ECIRECIR-2016-WakelingC #library #online #transaction
Determining the Optimal Session Interval for Transaction Log Analysis of an Online Library Catalogue (SW, PDC), pp. 703–708.
ICMLICML-2016-AchimSE #constraints #fourier
Beyond Parity Constraints: Fourier Analysis of Hash Functions for Inference (TA, AS, SE), pp. 2254–2262.
ICMLICML-2016-ChiangHD #component #robust
Robust Principal Component Analysis with Side Information (KYC, CJH, ISD), pp. 2291–2299.
ICMLICML-2016-ElhoseinyEBE #categorisation #comparative #estimation #modelling #multi
A Comparative Analysis and Study of Multiview CNN Models for Joint Object Categorization and Pose Estimation (ME, TEG, AB, AME), pp. 888–897.
ICMLICML-2016-FrostigMMS #component
Principal Component Projection Without Principal Component Analysis (RF, CM, CM, AS), pp. 2349–2357.
ICMLICML-2016-GeJKNS #algorithm #canonical #correlation #performance #scalability
Efficient Algorithms for Large-scale Generalized Eigenvector Computation and Canonical Correlation Analysis (RG0, CJ, SMK, PN, AS), pp. 2741–2750.
ICMLICML-2016-GeZ #component
Rich Component Analysis (RG0, JZ), pp. 1502–1510.
ICMLICML-2016-KhandelwalLNS #monte carlo #on the
On the Analysis of Complex Backup Strategies in Monte Carlo Tree Search (PK, EL, SN, PS), pp. 1319–1328.
ICMLICML-2016-MandtHB #algorithm #probability
A Variational Analysis of Stochastic Gradient Algorithms (SM, MDH, DMB), pp. 354–363.
ICMLICML-2016-MichaeliWL #canonical #correlation #parametricity
Nonparametric Canonical Correlation Analysis (TM, WW, KL), pp. 1967–1976.
ICMLICML-2016-QuXO #algorithm #optimisation #performance #probability
Fast Rate Analysis of Some Stochastic Optimization Algorithms (CQ, HX, CJO), pp. 662–670.
ICMLICML-2016-WangMCBPRGUA #matrix #network
Analysis of Deep Neural Networks with Extended Data Jacobian Matrix (SW, ArM, RC, JAB, MP, MR, KG, GU, ÖA), pp. 718–726.
ICMLICML-2016-Wipf #estimation #rank
Analysis of Variational Bayesian Factorizations for Sparse and Low-Rank Estimation (DPW), pp. 926–935.
ICMLICML-2016-XieGF #clustering
Unsupervised Deep Embedding for Clustering Analysis (JX, RBG, AF), pp. 478–487.
ICPRICPR-2016-AugereauFK #automation #estimation #towards
Towards an automated estimation of English skill via TOEIC score based on reading analysis (OA, HF, KK), pp. 1285–1290.
ICPRICPR-2016-BillingsAB #detection #image
Ultrasound image analysis for myopathy detection (SB, JA, PB), pp. 1461–1465.
ICPRICPR-2016-Brandtberg #classification #fourier #fuzzy #multi #order #rank #using
Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
ICPRICPR-2016-CardosoMA #performance #problem
Plücker correction problem: Analysis and improvements in efficiency (JRC, PM, HA), pp. 2795–2800.
ICPRICPR-2016-CorbelliBGC #classification #documentation #layout
Historical document digitization through layout analysis and deep content classification (AC, LB, CG, RC), pp. 4077–4082.
ICPRICPR-2016-CoteA #documentation #evaluation #image #statistics
Layered ground truth: Conveying structural and statistical information for document image analysis and evaluation (MC, ABA), pp. 3258–3263.
ICPRICPR-2016-DesrosiersDD #generative #novel #statistics
Novel generative model for facial expressions based on statistical shape analysis of landmarks trajectories (PAD, MD, MD), pp. 961–966.
ICPRICPR-2016-DevanneWDBBP #learning
Learning shape variations of motion trajectories for gait analysis (MD, HW, MD, SB, ADB, PP), pp. 895–900.
ICPRICPR-2016-EscalanteP0RCCE #challenge #contest #multi #overview #perspective #visual notation
ChaLearn Joint Contest on Multimedia Challenges Beyond Visual Analysis: An overview (HJE, VPL, JW0, MAR, BC, AC, SE, IG, XB, PH, HM, MAL), pp. 67–73.
ICPRICPR-2016-HanSG #image
A hyperspectral image restoration method based on analysis sparse filter (CH, NS, CG), pp. 769–774.
ICPRICPR-2016-JermanPLSC #automation #identification
Automatic cutting plane identification for computer-aided analysis of intracranial aneurysms (TJ, FP, BL, ZS, AC), pp. 1484–1489.
ICPRICPR-2016-KatsageorgiouZH #behaviour #data-driven #interactive
Unsupervised mouse behavior analysis: A data-driven study of mice interactions (VMK, MZ, HH, VF0, FP, DS, VM), pp. 925–930.
ICPRICPR-2016-LovellPSVW #contest #image #pattern matching #pattern recognition #recognition
International Contest on Pattern Recognition techniques for indirect immunofluorescence images analysis (BCL, GP, AS, MV, AW), pp. 74–76.
ICPRICPR-2016-LuoLQ #bound #optimisation #probability
Bound analysis of natural gradient descent in stochastic optimization setting (ZL, DL, YQ), pp. 4166–4171.
ICPRICPR-2016-MinciulloC #automation #detection
Fully automated shape analysis for detection of Osteoarthritis from lateral knee radiographs (LM, TFC), pp. 3787–3791.
ICPRICPR-2016-MinematsuST #bidirectional
Background initialization based on bidirectional analysis and consensus voting (TM, AS, RiT), pp. 126–131.
ICPRICPR-2016-MoralesROOOI #estimation #video
Outdoor omnidirectional video completion via depth estimation by motion analysis (CM, MR, YO, SO, TO, KI), pp. 3945–3950.
ICPRICPR-2016-NgoSMXC
Quantitative analysis of facial paralysis based on limited-orientation modified circular Gabor filters (THN, MS, NM, WX0, YWC), pp. 349–354.
ICPRICPR-2016-OsmanliogluOHS #approximate #performance #problem
Efficient approximation of labeling problems with applications to immune repertoire analysis (YO, SO, UH, AS), pp. 2410–2415.
ICPRICPR-2016-RotaSCP #education #forensics #image #learning #question #student
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? (PR, ES, VC, CP), pp. 2503–2508.
ICPRICPR-2016-SaikiaSSKG #kernel #learning #multi #using
Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
ICPRICPR-2016-SukS #detection #retrieval
Solar flare retrieval, detection and analysis (TS, SS), pp. 1183–1188.
ICPRICPR-2016-SuzuuchiK #behaviour #multi
Location-associated indoor behavior analysis of multiple persons (SS, MK), pp. 2079–2084.
ICPRICPR-2016-Troya-GalvisGB #classification #collaboration #image #segmentation
Collaborative segmentation and classification for remote sensing image analysis (ATG, PG, LBÉ), pp. 829–834.
ICPRICPR-2016-WangWH #network #using
Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
ICPRICPR-2016-ZamzamiPGKAS #approach #automation #multimodal
An approach for automated multimodal analysis of infants' pain (GZ, CYP, DBG, RK, TA, YS0), pp. 4148–4153.
ICPRICPR-2016-ZhangHMCP #3d #detection #image
Face spoofing detection based on 3D lighting environment analysis of image pair (XZ, XH, MM, CC0, SP), pp. 2995–3000.
KDDKDD-2016-BalcanLSW0 #communication #component #distributed #kernel #performance
Communication Efficient Distributed Kernel Principal Component Analysis (MFB, YL, LS, DPW, BX0), pp. 725–734.
KDDKDD-2016-ChengZCJCW #correlation #ranking
Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations (WC, KZ0, HC, GJ, ZC, WW0), pp. 805–814.
KDDKDD-2016-KangLSB #component
Subjectively Interesting Component Analysis: Data Projections that Contrast with Prior Expectations (BK, JL, RSR, TDB), pp. 1615–1624.
KDDKDD-2016-LiWYR #learning #multi
A Multi-Task Learning Formulation for Survival Analysis (YL, JW0, JY, CKR), pp. 1715–1724.
KDDKDD-2016-WangCF0E #modelling #topic
Targeted Topic Modeling for Focused Analysis (SW, ZC0, GF, BL0, SE), pp. 1235–1244.
KDDKDD-2016-XuZZLZCX #behaviour #network #perspective #social
Taxi Driving Behavior Analysis in Latent Vehicle-to-Vehicle Networks: A Social Influence Perspective (TX, HZ, XZ, QL0, HZ, EC, HX), pp. 1285–1294.
KDDKDD-2016-ZhuZXDX #modelling
Recruitment Market Trend Analysis with Sequential Latent Variable Models (CZ, HZ, HX, PD, FX), pp. 383–392.
SKYSKY-2016-ExmanK #concept #named
Modulaser: A Tool for Conceptual Analysis of Software Systems (IE, PK), pp. 19–26.
ECMFAECMFA-2016-BaburCB #clustering #comparative #metamodelling #visualisation
Hierarchical Clustering of Metamodels for Comparative Analysis and Visualization (ÖB, LC, MvdB), pp. 3–18.
MoDELSMoDELS-2016-DeVriesC #automation #detection #requirements
Automatic detection of incomplete requirements via symbolic analysis (BD, BHCC), pp. 385–395.
MoDELSMoDELS-2016-KahaniBDC #eclipse #modelling #problem #tool support #topic
The problems with eclipse modeling tools: a topic analysis of eclipse forums (NK, MB, JD, JRC), pp. 227–237.
MoDELSMoDELS-2016-ZhangYAL #case study #mutation testing #towards
Towards mutation analysis for use cases (HZ, TY, SA, CL), pp. 363–373.
ECOOPECOOP-2016-Chevalier-Boisvert #interprocedural #javascript #source code
Interprocedural Type Specialization of JavaScript Programs Without Type Analysis (MCB, MF), p. 24.
ECOOPECOOP-2016-SpathDAB #java #named #pointer
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
OOPSLAOOPSLA-2016-DanLHV #memory management #modelling #programming
Modeling and analysis of remote memory access programming (AMD, PL0, TH, MTV), pp. 129–144.
OOPSLAOOPSLA-2016-KulkarniMZN
Accelerating program analyses by cross-program training (SK, RM, XZ, MN), pp. 359–377.
AdaEuropeAdaEurope-2016-MohaqeqiAY #data flow #graph #modelling #realtime #using
Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
LOPSTRLOPSTR-2016-FangS #abstraction #memory management
Hierarchical Shape Abstraction for Analysis of Free List Memory Allocators (BF0, MS), pp. 151–167.
PEPMPEPM-2016-AntwerpenNTVW #constraints #graph #semantics
A constraint language for static semantic analysis based on scope graphs (HvA, PN, APT, EV, GW), pp. 49–60.
PEPMPEPM-2016-Asai #towards
Toward introducing binding-time analysis to MetaOCaml (KA), pp. 97–102.
PLDIPLDI-2016-El-HassanyMBVV #concurrent #named #network
SDNRacer: concurrency analysis for software-defined networks (AEH, JM, PB, LV, MTV), pp. 402–415.
POPLPOPL-2016-ChatterjeeFNH #algorithm #probability #problem #source code #termination
Algorithmic analysis of qualitative and quantitative termination problems for affine probabilistic programs (KC, HF0, PN0, RH), pp. 327–342.
POPLPOPL-2016-GilrayL0MH #automaton #control flow #for free
Pushdown control-flow analysis for free (TG, SL, MDA0, MM, DVH), pp. 691–704.
PPDPPPDP-2016-BertolissiTV #data access #policy
Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
PPDPPPDP-2016-MidtgaardNN #process #regular expression
Iterated process analysis over lattice-valued regular expressions (JM, FN, HRN), pp. 132–145.
SASSAS-2016-BalatsourasS #c #c++ #points-to
Structure-Sensitive Points-To Analysis for C and C++ (GB, YS), pp. 84–104.
SASSAS-2016-FrielinghausSV #interprocedural #termination
Enforcing Termination of Interprocedural Analysis (SSF, HS, RV), pp. 447–468.
SASSAS-2016-GharatKM #graph #points-to #using
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
SASSAS-2016-TanLX #pointer #precise
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting (TT0, YL0, JX), pp. 489–510.
ASEASE-2016-Babur #modelling #scalability #set #statistics
Statistical analysis of large sets of models (ÖB), pp. 888–891.
ASEASE-2016-KroeningPSW #concurrent #thread
Sound static deadlock analysis for C/Pthreads (DK, DP, PS, BW), pp. 379–390.
ASEASE-2016-MingWWXL #named
StraightTaint: decoupled offline symbolic taint analysis (JM, DW, JW, GX, PL), pp. 308–319.
ASEASE-2016-OgnawalaOPL #composition #execution #low level #named #symbolic computation
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution (SO, MO, AP, TL), pp. 780–785.
ASEASE-2016-RazaF #automation #development #named #performance #recommendation
ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software development (MR, JPF), pp. 798–803.
ASEASE-2016-SzaboAVE #data flow #framework
An extensible framework for variable-precision data-flow analyses in MPS (TS, SA, MV, SE), pp. 870–875.
ASEASE-2016-SzaboEV #domain-specific language #incremental #named
IncA: a DSL for the definition of incremental program analyses (TS, SE, MV), pp. 320–331.
FSEFSE-2016-BagheriM #alloy #evolution #named #performance #specification
Titanium: efficient analysis of evolving alloy specifications (HB, SM), pp. 27–38.
FSEFSE-2016-BangAPPB #string
String analysis for side channels with segmented oracles (LB, AA, QSP, CSP, TB), pp. 193–204.
FSEFSE-2016-Cheng #fault #integer #named
RABIEF: range analysis based integer error fixing (XC), pp. 1094–1096.
FSEFSE-2016-HuangZT #correlation #detection
Detecting sensitive data disclosure via bi-directional text correlation analysis (JH0, XZ0, LT0), pp. 169–180.
FSEFSE-2016-KangMJ #multi #security
Multi-representational security analysis (EK, AM, DJ0), pp. 181–192.
FSEFSE-2016-MacedoBCCK #lightweight #specification
Lightweight specification and analysis of dynamic systems with rich configurations (NM, JB, DC, AC, DK), pp. 373–383.
FSEFSE-2016-SuiX #on-demand #refinement
On-demand strong update analysis via value-flow refinement (YS, JX), pp. 460–473.
FSEFSE-2016-SungKS0 #dependence #testing #web
Static DOM event dependency analysis for testing web applications (CS, MK, NS0, CW0), pp. 447–459.
FSEFSE-2016-Xiaofei
Static loop analysis and its applications (XX), pp. 1130–1132.
FSEFSE-2016-XieCLLL #dependence #named #summary
Proteus: computing disjunctive loop summary via path dependency analysis (XX, BC0, YL0, WL, XL), pp. 61–72.
FSEFSE-2016-Xu0ZX #debugging #detection #predict #python
Python predictive analysis for bug detection (ZX, PL0, XZ0, BX), pp. 121–132.
FSEFSE-2016-ZalmanoviciRT #clustering #functional #testing
Cluster-based test suite functional analysis (MZ, OR, RTB), pp. 962–967.
FSEFSE-2016-ZhouW #api #detection #web
API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
ICSE-2016-BusanyM #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 877–887.
ICSE-2016-DevroeyPPLSH #modelling #mutation testing
Featured model-based mutation analysis (XD, GP, MP, AL, PYS, PH), pp. 655–666.
ICSE-2016-Huang #concurrent #scalability #thread
Scalable thread sharing analysis (JH0), pp. 1097–1108.
ICSE-2016-LongR #generative #validation
An analysis of the search spaces for generate and validate patch generation systems (FL, MCR), pp. 702–713.
ICSE-2016-MechtaevYR #multi #named #scalability #synthesis
Angelix: scalable multiline program patch synthesis via symbolic analysis (SM, JY, AR), pp. 691–701.
ICSE-2016-Rubio-Gonzalez0 #float #precise #using
Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
ICSE-2016-SchroterKTBS #composition #configuration management #interface
Feature-model interfaces: the highway to compositional analyses of highly-configurable systems (RS, SK, TT, FB, GS), pp. 667–678.
ICSE-2016-XieLSCXX #automation #debugging
Revisit of automatic debugging via human focus-tracking analysis (XX, ZL, SS, ZC0, JX, BX), pp. 808–819.
CASECASE-2016-AntunesCB #performance #petri net #probability
A stochastic Petri net model for simulation-based performance analysis of public bicycle sharing systems (IA, LKC, JCB), pp. 433–439.
CASECASE-2016-FengZLF
Analysis of closed loop production lines in automotive body shops (YF, XZ, JL, WF), pp. 849–854.
CASECASE-2016-HsuYL #process #using
Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
CASECASE-2016-JiLSWLSCJ #behaviour #smarttech
A human-centered smart home system with wearable-sensor behavior analysis (JJ, TL0, CS0, HW, WL, MS, SC, ZJ), pp. 1112–1117.
CASECASE-2016-KangJ #geometry
Integrated analysis of productivity and machine condition degradation: A geometric-machine case (YK, FJ), pp. 1128–1133.
CASECASE-2016-LioulemesTM
Quantitative analysis of the human upper-limp kinematic model for robot-based rehabilitation applications (AL, MT, FM), pp. 1061–1066.
CASECASE-2016-YangWBZ #clustering #multi #scheduling #tool support
Optimal one-wafer cyclic scheduling analysis of transport-dominant single-arm multi-cluster tools (FY, NW, LB, MZ), pp. 1405–1410.
CASECASE-2016-YangWQZ #clustering #hybrid #multi #scheduling #tool support
Optimal scheduling analysis of treelike hybrid multi-cluster tools (FY, NW, YQ, MZ), pp. 1400–1404.
CASECASE-2016-ZhangSMLZF #design #parametricity #process #simulation #towards
Robotic additive manufacturing process simulation - towards design and analysis with building parameter in consideration (GQZ, AS, CM, DTL, BZ, TAF), pp. 609–613.
CCCC-2016-SankarCN
Improved MHP Analysis (AS, SC, VKN), pp. 207–217.
CCCC-2016-SuiX #interprocedural #named
SVF: interprocedural static value-flow analysis in LLVM (YS, JX), pp. 265–266.
CGOCGO-2016-PaisanteMBGP #pointer
Symbolic range analysis of pointers (VP, MM, LBeO, LG, FMQP), pp. 171–181.
CGOCGO-2016-SuiDX #parallel #pointer #source code #thread
Sparse flow-sensitive pointer analysis for multithreaded programs (YS, PD, JX), pp. 160–170.
CGOCGO-2016-VassiliadisRDPA #approximate #automation #towards
Towards automatic significance analysis for approximate computing (VV, JR, JD, KP, CDA, NB, SL, UN), pp. 182–193.
FASEFASE-2016-ChrszonDKB #modelling #probability
Family-Based Modeling and Analysis for Probabilistic Systems - Featuring ProFeat (PC, CD, SK, CB), pp. 287–304.
CAVCAV-2016-ChatterjeeFG #probability #source code #termination
Termination Analysis of Probabilistic Programs Through Positivstellensatz's (KC, HF0, AKG), pp. 3–22.
CAVCAV-2016-FanQM0D #automation #hybrid #modelling #reachability
Automatic Reachability Analysis for Nonlinear Hybrid Models with C2E2 (CF, BQ, SM, MV0, PSD), pp. 531–538.
CAVCAV-2016-ManevichDR #linear #termination
From Shape Analysis to Termination Analysis in Linear Time (RM, BD, NR), pp. 426–446.
CAVCAV-2016-PrabhakarS #abstraction #refinement
Counterexample Guided Abstraction Refinement for Stability Analysis (PP, MGS), pp. 495–512.
CAVCAV-2016-WangTLYJ #automaton #logic #representation #string
String Analysis via Automata Manipulation with Logic Circuit Representation (HEW, TLT, CHL, FY, JHRJ), pp. 241–260.
CAVCAV-2016-SevegnaniC #graph #named
BigraphER: Rewriting and Analysis Engine for Bigraphs (MS, MC), pp. 494–501.
ICSTICST-2016-GaoJBL #effectiveness #framework #testing
A Framework to Evaluate the Effectiveness of Different Load Testing Analysis Techniques (RG, ZMJ, CB, ML), pp. 22–32.
ICSTICST-2016-TokumotoYSH #c #higher-order #mutation testing #named #virtual machine
MuVM: Higher Order Mutation Analysis Virtual Machine for C (ST, HY, KS, SH), pp. 320–329.
ICTSSICTSS-2016-SuzukiPKT #behaviour #network #visualisation
Distribution Visualization for User Behavior Analysis on LTE Network (MS, QP, TK, MT), pp. 249–255.
VMCAIVMCAI-2016-Parizek #array #hybrid #partial order #reduction #source code
Hybrid Analysis for Partial Order Reduction of Programs with Arrays (PP), pp. 291–310.
CBSECBSE-2015-KimBNMLSLP #probability #scheduling
Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
ECSAECSA-2015-StierKGR #architecture #energy #modelling #performance
Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
ECSAECSA-2015-TrubianiGE #architecture #modelling #nondeterminism #performance #traceability
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
WICSAWICSA-2015-AbukwaikNR #concept
A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
DocEngDocEng-2015-NicholasB #documentation
Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
DRRDRR-2015-ChenSWLHI #dataset #documentation #layout
Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
HTHT-2015-ApaolazaHJ #behaviour #interactive #low level #web
Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HTHT-2015-Baeza-YatesS #generative
Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
HTHT-2015-BurnapCS #classification #communication #twitter
Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
HTHT-2015-MishraDBS #incremental #learning #sentiment
Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
JCDLJCDL-2015-NielsenG #interactive #library #multi #named #transaction #visual notation
PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data (MN, KG), pp. 139–142.
SIGMODSIGMOD-2015-ElgamalYAMH #big data #component #distributed #named #platform #scalability
sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
SIGMODSIGMOD-2015-ZengADAS #big data #interactive #named #online
G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
VLDBVLDB-2015-BrancotteYBBDH #rank
Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
VLDBVLDB-2015-YangCLW #nearest neighbour #query
Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
EDMEDM-2015-AnayaGLH #approach #collaboration #diagrams #network #social #using
An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDMEDM-2015-BergnerKP #challenge #learning
Methodological Challenges in the Analysis of MOOC Data for Exploring the Relationship between Discussion Forum Views and Learning Outcomes (YB, DK, DEP), pp. 234–241.
EDMEDM-2015-BhatnagarDWLDLC #learning
An Analysis of Peer-submitted and Peer-reviewed Answer Rationales in a Web-based Peer Instruction Based Learning Environment (SB, MCD, CW, NL, MD, KL, ESC), pp. 456–459.
EDMEDM-2015-BlanchardDON #automation #education #speech #towards
Classifying Q&A from Teachers' Speech: Moving Toward an Automated System of Dialogic Analysis (NB, SKD, AO, MN), pp. 282–288.
EDMEDM-2015-BoubekkiKGSB #data-driven #towards
Toward Data-Driven Analyses of Electronic Text Books (AB, UK, FG, WS, UB), pp. 592–593.
EDMEDM-2015-GoldinG #convergence #student
Convergent Validity of a Student Model: Recent-Performance Factors Analysis (IMG, AG), pp. 548–551.
EDMEDM-2015-Hayashi #feedback #network #online #process
Psychological Effects of In-Group Activity Feedback in an Online Explanation Task: Lexical Network Analysis (YH), pp. 484–487.
EDMEDM-2015-JiangZLL #network #question #what
Influence Analysis by Heterogeneous Network in MOOC Forums: What can We Discover? (ZJ, YZ, CL, XL), pp. 242–249.
EDMEDM-2015-MorettiMS #education #evaluation #policy #sentiment #topic
Application of Sentiment and Topic Analysis to Teacher Evaluation Policy in the U.S (AM, KM, ASA), pp. 628–629.
EDMEDM-2015-PapousekPRS #adaptation
An Analysis of Response Times in Adaptive Practice of Geography Facts (JP, RP, JR, VS), pp. 562–563.
ITiCSEITiCSE-2015-BellettiniLMMMT #how #performance #student
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
ITiCSEITiCSE-2015-Rubio #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-UraiUO #distributed #programming
Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
ICPCICPC-2015-MartinCAA #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaeidiHKJ #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICSMEICSME-2015-GoeminneM #database #framework #java #towards
Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
ICSMEICSME-2015-JongelingDS #re-engineering #research #sentiment #tool support
Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
ICSMEICSME-2015-KhadkaSKSHJDB #case study #delivery #legacy #what
Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
ICSMEICSME-2015-XiaLWY #overview #recommendation
Who should review this change?: Putting text and file location analyses together for more accurate recommendations (XX, DL, XW, XY), pp. 261–270.
ICSMEICSME-2015-Yamashita #assessment #benchmark #case study #experience #metric #quality #visualisation
Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
ICSMEICSME-2015-YamashitaZFW #comparative #industrial #open source #replication #smell
Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
MSRMSR-2015-ClaesMCV
A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
MSRMSR-2015-MalikZG #energy
Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
MSRMSR-2015-ZouXGYYZ #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-AlawnehHH #metamodelling #performance #towards
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
SANERSANER-2015-CaiS15a #dependence #fine-grained #named
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
SANERSANER-2015-KoboriMI #evolution #java
Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
SANERSANER-2015-LaverdiereBM #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-Martin #framework #towards
Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
SANERSANER-2015-MattsenWS #abstract domain
A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SANERSANER-2015-MedicherlaK #approximate #precise #scalability
Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
SANERSANER-2015-NairJNH
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-SilvaCMS #fine-grained
Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
SCAMSCAM-2015-DarizRS #programmable
A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAMSCAM-2015-PintoKT #automation #multi #performance
Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
DLTDLT-2015-BrandlS #automaton #complexity #finite #monad
Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
ICALPICALP-v2-2015-Boreale #approximate #generative #probability
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
FMFM-2015-AlbertACGGMPR #concurrent #distributed #source code
Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
FMFM-2015-Damm #automation #lessons learnt #named #verification
AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
FMFM-2015-LiuH #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
RTARTA-2015-GenetS #reachability
Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
RTARTA-2015-NageleFM #automation #confluence #term rewriting
Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
SEFMSEFM-2015-KamaliHKP #distributed #formal method
Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
TLCATLCA-2015-HofmannM #multi #term rewriting
Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
AIIDEAIIDE-2015-SifaDB #behaviour #scalability
Large-Scale Cross-Game Player Behavior Analysis on Steam (RS, AD, CB), pp. 198–204.
CHI-PLAYCHI-PLAY-2015-BaskinZ #behaviour #exclamation #interactive #tablet #towards
The Player is Chewing the Tablet!: Towards a Systematic Analysis of User Behavior in Animal-Computer Interaction (SB, AZ), pp. 463–468.
CHI-PLAYCHI-PLAY-2015-FodorMG #difference
Agents and Avatars: Event based analysis of competitive differences (MF, PMB, JG), pp. 511–516.
CHI-PLAYCHI-PLAY-2015-HarpsteadA #design #education #empirical #game studies #learning #using
Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
CHI-PLAYCHI-PLAY-2015-Wallner #behaviour
Sequential Analysis of Player Behavior (GW), pp. 349–358.
CoGCIG-2015-ChangHH #algorithm #case study #convergence #correctness #monte carlo
Convergence and correctness analysis of Monte-Carlo tree search algorithms: A case study of 2 by 4 Chinese dark chess (HJC, CWH, TsH), pp. 260–266.
CoGCIG-2015-MasuiUYP #development #game studies #towards
Toward curling informatics - Digital scorebook development and game information analysis (FM, HU, HY, MP), pp. 481–488.
CoGCIG-2015-PaliyawanSCT #design #game studies #interface
Body motion design and analysis for fighting game interface (PP, KS, WC, RT), pp. 360–367.
DiGRADiGRA-2015-ShibuyaTS #game studies #mobile #social
Systematic Analysis of In-Game Purchases and Social Features of Mobile Social Games in Japan (AS, MT, AS).
FDGFDG-2015-IsaksenGN #game studies #using
Exploring Game Space Using Survival Analysis (AI, DG, AN).
FDGFDG-2015-MuellerKFKMSSG #behaviour #statistics
Statistical Analysis of Player Behavior in Minecraft (SM0, MK, SF, SK, RPM, BS, RWS, MHG).
FDGFDG-2015-RyanKMW15a #game studies #semantics #tool support #using
Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
FDGFDG-2015-ZookHR #game studies #monte carlo
Monte-Carlo Tree Search for Simulation-based Play Strategy Analysis (AZ, BH, MR).
CoGVS-Games-2015-BevilacquaBE #game studies #multimodal
Proposal for Non-Contact Analysis of Multimodal Inputs to Measure Stress Level in Serious Games (FB, PB, HE), pp. 1–4.
ICGTICGT-2015-Stuckrath #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-TaentzerG #confluence #graph transformation #towards
Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
CHICHI-2015-AmershiCDLSS #machine learning #named #performance #tool support
ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
CHICHI-2015-AsthanaSG #assessment #human-computer
Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
CHICHI-2015-ButlerASGP #automation #design #game studies
Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
CHICHI-2015-DerbovenMS #case study #design #multimodal
Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
CHICHI-2015-HourcadeMWP #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HoyleTACK #privacy #smarttech
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHICHI-2015-HuangSHH #how
How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHICHI-2015-LesselAK #people
Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
CHICHI-2015-OskampBHG #design #evaluation #multi #named
TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
CHICHI-2015-PandeyRSNB #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-VatavuW #elicitation #formal method #metric #tool support
Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
CHICHI-2015-Wacharamanotham #named #statistics
Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
CSCWCSCW-2015-MacLeanGLMH #health #named #online
Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
CSCWCSCW-2015-SavageM #online
Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
HCIDHM-EH-2015-Hu0LZY #3d #development #finite
Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
HCIDHM-EH-2015-HuDLZY
Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
HCIDHM-EH-2015-HuZZRL #correlation
Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
HCIDHM-EH-2015-KanazawaOWWTGH15a #experience
Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
HCIDHM-EH-2015-TianLYJCS #scalability #video
Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
HCIDHM-EH-2015-UchidaHKEMOUG #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhouYLXZ
Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
HCIDHM-HM-2015-BoringJM #modelling #performance #reliability
Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
HCIDHM-HM-2015-GotoLTYH #eye tracking
Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
HCIDHM-HM-2015-IkaiMKIH
Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
HCIDHM-HM-2015-KitajimaKMMMH #comprehension #process
Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
HCIDHM-HM-2015-KurataniHHKUGH #comparison #process
Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
HCIDHM-HM-2015-SendaSKST #process
Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
HCIDHM-HM-2015-ShodaYSS #behaviour #how #people
Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
HCIDHM-HM-2015-SudaTHYGH #process
Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
HCIDHM-HM-2015-SugimotoYNG #process
EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
HCIDHM-HM-2015-WangTTITGH
Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
HCIDHM-HM-2015-WangTTTGH #process
Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
HCIDHM-HM-2015-WangTTTGH15a #process
Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
HCIDUXU-DD-2015-EmanuelRM #interactive
Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
HCIDUXU-DD-2015-Fernandez #health #human-computer #interactive
Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
HCIDUXU-DD-2015-OliveiraMMM #behaviour #design
Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
HCIDUXU-DD-2015-TarkkanenHR #problem #testing #usability
Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
HCIDUXU-IXD-2015-IwamotoKM #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-KoshiyamaPR #architecture #repository #usability
Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
HCIDUXU-IXD-2015-Naskova #usability
Usability Analysis of IxDA.org (JN), pp. 63–73.
HCIDUXU-IXD-2015-OliveiraVSBRS #interactive #usability
Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
HCIDUXU-IXD-2015-RaffaeleAJCPCS #game studies #legacy #multi #platform #usability
Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
HCIDUXU-UI-2015-DaggeFR #comparative #named #process
HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
HCIDUXU-UI-2015-KronbauerMS #evaluation #experience #interactive #mobile #user interface
Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
HCIDUXU-UI-2015-LeeKK #case study #experience #user interface
A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
HCIDUXU-UI-2015-MarcusB #design
Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
HCIDUXU-UI-2015-MarczalJ #behaviour #mobile
Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
HCIDUXU-UI-2015-RodriguesEM #collaboration #platform
Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
HCIHCI-DE-2015-GrobelnyM #algorithm #comparative #design #grid #visual notation
Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
HCIHCI-DE-2015-HashizumeK #smarttech #usability
Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
HCIHCI-IT-2015-MurataM #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-MutoM #development #interactive
Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
HCIHCI-IT-2015-SarsharNR #human-computer #on the #smarttech #usability
On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
HCIHCI-IT-2015-SatoAOO #automation #classification #image
Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
HCIHCI-IT-2015-ZhuF #game studies #online
A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
HCIHCI-UC-2015-Ujita #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-HayashiH #concept #learning #process
Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
HCIHIMI-IKC-2015-MakhtarI #evaluation
An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
HCIHIMI-IKC-2015-MatsudaOHT #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-WangN #identification #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCIHIMI-IKC-2015-YamadaAY #internet
An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
HCIHIMI-IKD-2015-MorizumiA #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCILCT-2015-AltanC #animation #education
An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, ), pp. 3–13.
HCILCT-2015-DalipiYK #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCISCSM-2015-GerritsenB #predict
Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
HCISCSM-2015-KastratiIYD #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-KinclNPS #independence #sentiment
Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
ICEISICEIS-v2-2015-BandyszakRWP #information management #specification #validation
Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEISICEIS-v2-2015-Judrups #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEISICEIS-v2-2015-PerezNGD #development #process
A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEISICEIS-v2-2015-SariK #debugging #monitoring #predict #using
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-SouzaVS #semantics
Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEISICEIS-v2-2015-ZoglaMS #problem #quality #taxonomy
Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEISICEIS-v3-2015-BauerBTR #flexibility #maintenance #repository
A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
ICEISICEIS-v3-2015-ThabetGG #mining #petri net #process
Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
ICEISICEIS-v3-2015-ValentimCM #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
CIKMCIKM-2015-ChenSJ #data type #infinity
Private Analysis of Infinite Data Streams via Retroactive Grouping (RC, YS, HJ), pp. 1061–1070.
CIKMCIKM-2015-JoKB #gpu #matrix #multi #network #performance #scalability #social
Efficient Sparse Matrix Multiplication on GPU for Large Social Network Analysis (YYJ, SWK, DHB), pp. 1261–1270.
CIKMCIKM-2015-JoLR #predict #topic
Time Series Analysis of Nursing Notes for Mortality Prediction via a State Transition Topic Model (YJ, NL, CPR), pp. 1171–1180.
CIKMCIKM-2015-KimCLYK #semantics
Deep Semantic Frame-Based Deceptive Opinion Spam Analysis (SK, HC, SL, MY, JK), pp. 1131–1140.
CIKMCIKM-2015-MaxwellAJK
Searching and Stopping: An Analysis of Stopping Rules and Strategies (DM, LA, KJ, HK), pp. 313–322.
CIKMCIKM-2015-MukherjeeW #community #interactive
Leveraging Joint Interactions for Credibility Analysis in News Communities (SM, GW), pp. 353–362.
CIKMCIKM-2015-Paul #canonical #correlation
Core-Sets For Canonical Correlation Analysis (SP), pp. 1887–1890.
CIKMCIKM-2015-TehraniAT #interactive
Interactive User Group Analysis (BOT, SAY, AT), pp. 403–412.
CIKMCIKM-2015-Tomkins #scalability
Large-Scale Analysis of Dynamics of Choice Among Discrete Alternatives (AT), p. 1349.
CIKMCIKM-2015-ZhaoZK #game studies #network #recommendation #social
Exploiting Game Theoretic Analysis for Link Recommendation in Social Networks (TZ, HVZ, IK), pp. 851–860.
ECIRECIR-2015-BansalBV #semantics #towards
Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
ECIRECIR-2015-BiyaniBCM #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-CaoC #behaviour #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-HienertHWK #named
WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
ECIRECIR-2015-HuynhHR #learning #sentiment #strict
Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
ECIRECIR-2015-Kelly #estimation #information retrieval #statistics
Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
ECIRECIR-2015-KoolenBBK #social #social media
Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
ECIRECIR-2015-Moghaddam #fault #feedback #mining #sentiment
Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
ECIRECIR-2015-SabetghadamLBR #graph #reachability
Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
ICMLICML-2015-GanCHCC #modelling #scalability #topic
Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
ICMLICML-2015-GongY #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-HuangGS #component #independence
Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
ICMLICML-2015-KomiyamaHN #multi #probability #problem
Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
ICMLICML-2015-MaLF #canonical #correlation #dataset #linear #scalability
Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
ICMLICML-2015-NishiharaLRPJ #convergence
A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
ICMLICML-2015-PerrotH #learning #metric
A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
ICMLICML-2015-PrasadPR #axiom #rank
Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
ICMLICML-2015-WangWS #clustering
A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
ICMLICML-2015-YangX15a #component #streaming
Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
ICMLICML-2015-ZhouZS #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-ChaoHZ #kernel
Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
KDDKDD-2015-EmbarBPV #online #social #topic
Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
KDDKDD-2015-NagarajanWBNBHT #predict
Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
KDDKDD-2015-OkumuraST #classification #incremental #linear #problem
Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
KDDKDD-2015-ZhangLZSKYJ #biology #image #learning #modelling #multi
Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
KDDKDD-2015-ZhouLB #clustering #graph
Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
MLDMMLDM-2015-CoralloFMACCGS #approach #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-KarkkainenS #component #robust
Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
MLDMMLDM-2015-KrasotkinaM15a #approach
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
MLDMMLDM-2015-MojahedBWI #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-ShaluntsB #named #sentiment
SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
RecSysRecSys-2015-SifaOB #migration
User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
RecSysRecSys-2015-SousaDBM #named #network #recommendation
CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
SEKESEKE-2015-BarchetSF #collaboration #dependence #risk management
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
SEKESEKE-2015-GokhaleE #network #social
Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
SEKESEKE-2015-RamosCRSAP #architecture #recommendation
Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
SEKESEKE-2015-SaputriL #machine learning #perspective
Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
SEKESEKE-2015-SunSWZ #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-Tasse #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-ValeSSA #agile #evaluation #industrial #named #process
RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
SEKESEKE-2015-ZhangGAU #mobile
Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
SIGIRSIGIR-2015-Dori-Hacohen #detection
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #corpus #detection #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
SIGIRSIGIR-2015-KrstovskiSK #modelling #retrieval
Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
SIGIRSIGIR-2015-SeverynM15a #network #sentiment #twitter
Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
SKYSKY-2015-FragaMRM #assessment #automation #generative #health #natural language
Natural Language Processing System Applied in Public Health for Assessment of an Automatic Analysis of Patterns Generator (AF, JLM, VR, VM), pp. 31–38.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
AMTAMT-2015-GholizadehDKM #model transformation
Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
BXBX-2015-HidakaBTM #approach #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BerardinelliMPP #design #energy
Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
MoDELSMoDELS-2015-Rodriguez-Echeverria #approach #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
SPLCSPLC-2015-BeekFG #adaptation #paradigm #product line
Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
SPLCSPLC-2015-BeekFGM #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeekLLV #constraints #modelling #probability #product line #statistics
Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
SPLCSPLC-2015-DomisAB #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-LiangGCR #feature model #modelling #satisfiability #scalability
SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
SPLCSPLC-2015-YueAS #case study #cyber-physical #experience #product line
Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
ECOOPECOOP-2015-CentonzePT
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ECOOPECOOP-2015-DimovskiBW #abstraction #precise #variability
Variability Abstractions: Trading Precision for Speed in Family-Based Analyses (ASD, CB, AW), pp. 247–270.
ECOOPECOOP-2015-WeiR #adaptation #javascript
Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
OOPSLAOOPSLA-2015-DietrichHS #java #points-to
Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
OOPSLAOOPSLA-2015-FuBS #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
AdaEuropeAdaEurope-2015-JaradatBP #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEuropeAdaEurope-2015-ZamoranoG #scheduling
Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
LOPSTRLOPSTR-2015-BodeiBGHL #calculus
A Global Occurrence Counting Analysis for Brane Calculi (CB, LB, RG, DH, FL), pp. 179–200.
LOPSTRLOPSTR-2015-CominiGTV
Abstract Analysis of Universal Properties for tccp (MC, MdMG, LT, AV), pp. 163–178.
LOPSTRLOPSTR-2015-MantelMPW #automaton #composition #data flow #network #using
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
LOPSTRLOPSTR-2015-RiescoAA #maude #memory management #policy #semantics #specification
Memory Policy Analysis for Semantics Specifications in Maude (AR0, IMA, MA), pp. 293–310.
PEPMPEPM-2015-HoekH #php
Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
PEPMPEPM-2015-KootH #exception #functional #higher-order #semantics #strict #type system
Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
PEPMPEPM-2015-VerstoepH #functional #higher-order #strict
Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
PLDIPLDI-2015-DeligiannisDKLT #programming #state machine #testing
Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
PLDIPLDI-2015-WeijiangBLK #dependence
Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
POPLPOPL-2015-ChatterjeePV #interprocedural
Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
POPLPOPL-2015-GiacobazziLR #metaprogramming
Analyzing Program Analyses (RG, FL, FR), pp. 261–273.
POPLPOPL-2015-PredaGLM #automaton #bytecode #semantics #similarity
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
POPLPOPL-2015-TangWZXZM #data flow
Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
PPDPPPDP-2015-Hofmann #automation
Automatic amortized analysis (MH), p. 5.
QAPLQAPL-2015-RosendahlK #probability
Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
SASSAS-2015-AlbertGG #interprocedural #source code
May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
SASSAS-2015-BakhirkinBP #set
A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
SASSAS-2015-CastelnuovoNRSY #bottom-up #case study #composition #top-down
Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
SASSAS-2015-CattaruzzaASK #bound
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
SASSAS-2015-LiRC
Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
SASSAS-2015-LiTX #effectiveness
Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
SASSAS-2015-RapoportLT #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
ASEASE-2015-DeligiannisDR #concurrent #debugging #performance #precise
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers (T) (PD, AFD, ZR), pp. 166–177.
ASEASE-2015-LerchSBM #abstraction #bound #data flow #scalability
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
ASEASE-2015-ShermanD #data flow #performance #precise
Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T) (ES, MBD), pp. 608–618.
ASEASE-2015-VecchioSYWKZ #android #string
String Analysis of Android Applications (N) (JDV, FS, KMY, BW, SYK, LZ), pp. 680–685.
ASEASE-2015-WaterlooPE #fault #testing
Test Analysis: Searching for Faults in Tests (N) (MW, SP, SGE), pp. 149–154.
ESEC-FSEESEC-FSE-2015-BusanyM #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ESEC-FSEESEC-FSE-2015-FuLB #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-LiLWH #android #java #string
String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ICSEICSE-v1-2015-HuangLR #concurrent #named #predict
GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
ICSEICSE-v1-2015-OcteauLDJM #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSEICSE-v1-2015-PanW0G #javascript
Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
ICSEICSE-v1-2015-PradelSS #consistency #javascript #named #nondeterminism
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
ICSEICSE-v1-2015-YangYWWR #android #control flow
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSEICSE-v1-2015-YiYLZW #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-AlexandruG #agile #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-Berghe #security #towards
Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSEICSE-v2-2015-Bichhawat
Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
ICSEICSE-v2-2015-Hachem #architecture #data access #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
ICSEICSE-v2-2015-HermansM #dataset #email #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
ICSEICSE-v2-2015-KlasBDSH #evaluation #modelling #scalability #testing
A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
ICSEICSE-v2-2015-MaleticC #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-Palomba #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-SadeghiBM #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-Zieris #information management #programming
Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
SACSAC-2015-DuanZHX #delivery #framework #network #performance #platform
Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SACSAC-2015-FerreiraMME #comparison #kernel #memory management
An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SACSAC-2015-GimenesGRG #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SACSAC-2015-IqbalKK #sentiment
Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SACSAC-2015-IsraelHS #multi #semantics #summary
Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SACSAC-2015-JakobsW #data flow #proving #source code
Programs from proofs of predicated dataflow analyses (MCJ, HW), pp. 1729–1736.
SACSAC-2015-Jung0B #embedded #encoding #identification #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SACSAC-2015-KrutzMS #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-MaltaPSBF #case study #distance #information management #overview
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SACSAC-2015-MongioviGFPT #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-MoreiraJR #reduction #similarity #visual notation
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SACSAC-2015-OjameruayeB #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SACSAC-2015-PiMMG #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SACSAC-2015-Puffitsch #bound #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SACSAC-2015-RaniseTV #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SACSAC-2015-SilvaMS #quality
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
GPCEGPCE-2015-El-SharkawyKS #semantics #tool support
Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
SLESLE-2015-Bagge #library
Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
CASECASE-2015-CarmenateRLBM #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-HanZ #energy
Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
CASECASE-2015-JiaZAX #performance
Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
CASECASE-2015-MeddouriDF #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-NonakaSLNKK #simulation #statistics
The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
CASECASE-2015-SaezMBT #hybrid #performance #realtime #simulation
Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
CASECASE-2015-XiePLLY
Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
CASECASE-2015-XieZLSD #agile #approach #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CASECASE-2015-ZhongLBM #modelling
Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
CCCC-2015-AllenSK #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CGOCGO-2015-NagarajG #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-OanceaR #induction #scalability
Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
DACDAC-2015-ChangHLW #encoding #functional #named
TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DACDAC-2015-ChenTSHK #modelling #multi #reliability
Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
DACDAC-2015-EspinosaHAAR #correlation #robust #set #verification
Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
DACDAC-2015-HanF #approach #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KrishnaNRT #composition #modelling #product line
Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
DACDAC-2015-LiuZWYX #difference #encryption #fault #named
DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DACDAC-2015-MundhenkSLFC #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-RoseM #design #performance
Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DACDAC-2015-ThieleAE #scheduling
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DACDAC-2015-YangTJ
Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATEDATE-2015-AhmadyanGNCV #diagrams #performance
Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
DATEDATE-2015-AndradeMVAPL #data flow #modelling
Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
DATEDATE-2015-BaldwinBRPB #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BiondiB #modelling
Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
DATEDATE-2015-ChangD #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-DeyCAM #difference #fault
Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
DATEDATE-2015-DuongNXWTBYWW
Coherent crosstalk noise analyses in ring-based optical interconnects (LHKD, MN, JX, ZW, YT, SLB, PY, XW, ZW), pp. 501–506.
DATEDATE-2015-FeldS #dependence
Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
DATEDATE-2015-GuanTW0 #realtime
Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
DATEDATE-2015-HoqueMS #approach #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-IqtedarHSH #distributed #probability
Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
DATEDATE-2015-KhosraviMGT #optimisation #reliability
Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
DATEDATE-2015-KriebelRSASH #combinator #configuration management #fault #named #performance
ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
DATEDATE-2015-LezosDM #distance #locality #optimisation #reuse
Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
DATEDATE-2015-MacherSBAK #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-MajumderLBP #architecture #manycore #probability
NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
DATEDATE-2015-RamboE #communication #worst-case
Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
DATEDATE-2015-SeylerSGNT #formal method
Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
DATEDATE-2015-ThangamuthuCCL #network
Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
DATEDATE-2015-WartelKGBSTQLMB #case study #hardware #platform
Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
HPCAHPCA-2015-ZhaoY #distance #manycore #reuse #scalability
Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
HPDCHPDC-2015-AlvarezOEAGR
HPC System Lifetime Story: Workload Characterization and Evolutionary Analyses on NERSC Systems (GPRÁ, POÖ, EE, KA, RG, LR), pp. 57–60.
LCTESLCTES-2015-0001HL #kernel #realtime
Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
LCTESLCTES-2015-BarijoughHKG #streaming #trade-off
Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
LCTESLCTES-2015-StilkerichLES #embedded #realtime
A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
LCTESLCTES-2015-ZhangK #abstract interpretation #persistent #precise
Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
PDPPDP-2015-AbadalMMACM #design #manycore
Multicast On-chip Traffic Analysis Targeting Manycore NoC Design (SA, AM, RM, EA, ACA, RM), pp. 370–378.
PDPPDP-2015-AkutsuUCKS #distributed #reliability
Reliability Analysis of Highly Redundant Distributed Storage Systems with Dynamic Refuging (HA, KU, TC, TK, NS), pp. 261–268.
PDPPDP-2015-CabreraAAP #energy #library #metric
Energy Measurement Library (EML) Usage and Overhead Analysis (AC, FA, JA, VBP), pp. 554–558.
PDPPDP-2015-FedorchenkoKC #database #design #network #security
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis (AF, IVK, AC), pp. 559–566.
PDPPDP-2015-PatelDSE #comparative #embedded
Embedded Hypervisor Xvisor: A Comparative Analysis (AP, MD, MS, MWEK), pp. 682–691.
PDPPDP-2015-XavierORPMR #performance
A Performance Isolation Analysis of Disk-Intensive Workloads on Container-Based Clouds (MGX, ICDO, FDR, RDDP, KJM, CAFDR), pp. 253–260.
SOSPSOSP-2015-HooffLZZ #named #scalability
Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
ESOPESOP-2015-CernyHKRZ #abstraction #execution #worst-case
Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
ESOPESOP-2015-EmmiGMR #source code
Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
ESOPESOP-2015-VasconcelosJFH #functional #lazy evaluation #recursion #type system
Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
STOCSTOC-2015-SchulmanS #algorithm #matrix
Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
TACASTACAS-2015-AlbertFR #cumulative
Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
TACASTACAS-2015-DjoudiB #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
TACASTACAS-2015-FleuryLPV #framework #named
Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
TACASTACAS-2015-GuanTAS0 #refinement #scalability
Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
TACASTACAS-2015-HolikHLRSV #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-Immler #reachability
Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
TACASTACAS-2015-KongGCC #hybrid #named
dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
TACASTACAS-2015-NamjoshiT #network #process
Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
TACASTACAS-2015-Sankur #automaton #robust
Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
CAVCAV-2015-AbateBCK #adaptation #markov #network
Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
CAVCAV-2015-BozzanoCGM #modelling #performance #safety
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAVCAV-2015-BozzanoCPJKPRT #design #safety
Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CSLCSL-2015-ClementeL #automaton #first-order #reachability
Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
ICLPICLP-2015-KieslST #on the #source code
On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT), pp. 221–234.
ICSTICST-2015-0001YPGS #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-NardoPB #generative #modelling #mutation testing #testing
Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
ISSTAISSTA-2015-DimjasevicG #assurance #generative #runtime #testing #verification
Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
ISSTAISSTA-2015-HuangDMD #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTAISSTA-2015-QiLAR #correctness #generative
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
ICSTSAT-2015-FalknerLH #automation #named #performance #satisfiability
SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
TAPTAP-2015-GrinchteinCP #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
VMCAIVMCAI-2015-BackesR #abstraction #clustering #graph transformation #infinity
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
VMCAIVMCAI-2015-NagarS #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
VMCAIVMCAI-2015-PrabhakarS #abstraction #hybrid
Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
ECSAECSA-2014-BerardinelliMP #design #network #performance
fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
WICSAWICSA-2014-FuZBX
A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
DocEngDocEng-2014-DiemKS #classification #documentation
Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
DocEngDocEng-2014-KolbergFRF #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DRRDRR-2014-FengLLLT #geometry
Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
DRRDRR-2014-LiPLD #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
DRRDRR-2014-LiuWTLG #automation #comprehension #image
Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
HTHT-2014-KimWWO #multi #twitter
Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
HTHT-2014-ZhangBR #empirical #network #social #social media
Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
JCDLJCDL-2014-Dallmeier-TiessenLHRKN #comparative #data transformation #workflow
A comparative analysis of disciplinary data management workflows (SDT, AL, PH, LR, RK, EN), pp. 281–284.
JCDLJCDL-2014-KanhabuaNN #memory management #scalability #what #wiki
What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia (NK, TNN, CN), pp. 341–350.
JCDLJCDL-2014-KimuraM #documentation
Method for supporting analysis of personal relationships through place names extracted from documents (FK, AM), pp. 253–256.
JCDLJCDL-2014-MajidiC #dependence #fault #parsing
Human and machine error analysis on dependency parsing of ancient Greek texts (SM, GRC), pp. 221–224.
JCDLJCDL-2014-TakanoSIHT #behaviour #classification #documentation #towards
Microscopic analysis of document handling while reading: Classification of behavior toward paper document (KT, HS, JI, TH, ST), pp. 445–446.
JCDLJCDL-2014-ZhouTG #scalability #web
Extraction and analysis of referenced web links in large-scale scholarly articles (KZ, RT, CG), pp. 451–452.
PODSPODS-2014-Cohen #graph #sketching
All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
PODSPODS-2014-NgoNRR #worst-case
Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
SIGMODSIGMOD-2014-Musleh #twitter #visual notation
Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
SIGMODSIGMOD-2014-ZhuGCL #clustering #graph #sentiment #social #social media
Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
VLDBVLDB-2014-DeutchMT #framework #process
A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
VLDBVLDB-2014-JacobKS
A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
VLDBVLDB-2014-ZhangTCO #data transformation #in memory #performance
Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
CSEETCSEET-2014-Steppe #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
EDMEDM-2014-GalyardtG
Recent-Performance Factors Analysis (AG, IMG), pp. 411–412.
EDMEDM-2014-GerykP #student #using #visual notation
Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
EDMEDM-2014-KaserKG #learning #parametricity #predict
Different parameters - same prediction: An analysis of learning curves (TK, KRK, MHG), pp. 52–59.
EDMEDM-2014-MorganBR #fault #learning #validation
Error Analysis as a Validation of Learning Progressions (BM, WB, VR), pp. 245–248.
EDMEDM-2014-SnowVM #learning
Tracking Choices: Computational Analysis of Learning Trajectories (ELS, LKV, DSM), pp. 316–319.
EDMEDM-2014-WatanabeOK #behaviour #student
Analysis and extraction of behaviors by students in lectures (EW, TO, TK), pp. 329–330.
EDMEDM-2014-WenYR #question #sentiment #what
Sentiment Analysis in MOOC Discussion Forums: What does it tell us? (MW, DY, CPR), pp. 130–137.
ITiCSEITiCSE-2014-FerreiraM #algorithm #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-KohNBR #validation
Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
SIGITESIGITE-2014-JacksonEC #contest #performance #programming
An analysis of team performance in high school programming contests (SJ, HJCE, RC), pp. 27–32.
SIGITESIGITE-2014-PeltsvergerZ #education #security
Bottleneck analysis with NetKit: teaching information security with hands-on labs (SP, CZ), pp. 45–50.
SIGITESIGITE-2014-VihavainenLI #source code
Analysis of source code snapshot granularity levels (AV, ML, PI), pp. 21–26.
SANERCSMR-WCRE-2014-AlalfiCD #clustering #experience #industrial
Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
SANERCSMR-WCRE-2014-SantosVA #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-BinkleyHLO #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICSMEICSME-2014-ChaikalisLMC #evolution #named
SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
ICSMEICSME-2014-KlattKS #dependence
Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
ICSMEICSME-2014-LandmanSV #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
ICSMEICSME-2014-MondalRS #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #clustering #overview
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-SajnaniSOL #component #quality
Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
ICSMEICSME-2014-Stephan #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-TaoQ #concurrent #java #refactoring #source code
Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
ICSMEICSME-2014-WongXZHZM #fault #locality #segmentation
Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
MSRMSR-2014-BloemenAKO #database #dependence #open source
Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
MSRMSR-2014-FarahTC #architecture #named #quality #scalability
OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
MSRMSR-2014-GuzmanAL #commit #empirical #git #sentiment
Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
MSRMSR-2014-MurgiaTAO #developer
Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
MSRMSR-2014-PleteaVS #git #security #sentiment
Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
MSRMSR-2014-SteidlHJ #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
SCAMSCAM-2014-CaiJSZZ #named #predict
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAMSCAM-2014-HutchinsBS #c #c++ #concurrent #safety #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAMSCAM-2014-LiangSM #performance
Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAMSCAM-2014-LiangSMKH #automaton #exception
Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAMSCAM-2014-TengeriBHG #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAMSCAM-2014-YadegariD
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
ICALPICALP-v1-2014-DosaS
Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
LATALATA-2014-FelgenhauerT #automaton #reachability
Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
LATALATA-2014-SeidlK #data flow #interprocedural #xml
Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
FMFM-2014-AntoninoSW #concurrent #csp #network #process #refinement
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
FMFM-2014-BaeOM #multi #semantics
Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
FMFM-2014-ButinM
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
FMFM-2014-ForejtKNS #communication #precise #predict #source code
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
FMFM-2014-KordyLMP #algorithm #automaton #robust
A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
FMFM-2014-LakshmiAK #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-LiuGL #reliability
MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
FMFM-2014-WenMM #formal method #information management #towards
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
IFMIFM-2014-BruniSNN #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-CalvaneseKSVZ #data type
Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
IFMIFM-2014-GilmoreTV #evaluation
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
IFMIFM-2014-RamsdellDGR #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
RTARTA-TLCA-2014-HirokawaM #automation #complexity
Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
RTARTA-TLCA-2014-LiuDJ #confluence
Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
RTARTA-TLCA-2014-Schmidt-Schauss #concurrent #programming language #semantics
Concurrent Programming Languages and Methods for Semantic Analyses (MSS), pp. 21–30.
SEFMSEFM-2014-BeckerSAB #constraints #deployment #fault tolerance #formal method
A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
SEFMSEFM-2014-GrovO #consistency #formal method #multi
Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
SFMSFM-2014-BubelMH #execution #modelling
Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
FLOPSFLOPS-2014-HoffmannS #array #integer #type system
Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
ICFPICFP-2014-ChenE #parametricity #product line #type system
Type-based parametric analysis of program families (SC, ME), pp. 39–51.
ICFPICFP-2014-KakiJ #framework #higher-order #relational
A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
IFLIFL-2014-AdsitF #control flow #performance #system f
An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
LISPILC-2014-LevineY #assessment #profiling
Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
FDGFDG-2014-Grace #estimation #game studies
A linguistic analysis of games: Verbs and nouns for content estimation (LDG).
FDGFDG-2014-GrowGGMW #architecture #authoring #requirements #tool support
A methodology for requirements analysis of AI architecture authoring tools (AG, SEG, PG, MM, NWF).
FDGFDG-2014-SiPT #automation #game studies #realtime
Automated terrain analysis in real-time strategy games (CS, YP, CTT).
GRAPHITEGRAPHITE-2014-DelzannoRT #protocol
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
GRAPHITEGRAPHITE-2014-FernandezKP #framework #graph grammar #interactive #modelling
Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
CHICHI-2014-GoyalLCF #collaboration
Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
CHICHI-2014-LeeSS #bound #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-LiuGFXHK
CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
CHICHI-2014-Smith #comprehension #game studies #generative
Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
CHICHI-2014-XuYRFHB #exclamation
Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
CSCWCSCW-2014-BackstromK #facebook #network #social
Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
CSCWCSCW-2014-KangKK #collaboration #information management #tool support
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
HCIDHM-2014-ItoTGK #research
Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
HCIDHM-2014-KarlovicPMSRRS #case study #comparison
Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
HCIDHM-2014-MirandaRV #development #memory management #mobile #testing
Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
HCIDHM-2014-OhgiriYYKH #comparison
Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
HCIDHM-2014-OkaGTNH
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-SugimotoYG
Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
HCIDHM-2014-WongpatikasereeKT
Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
HCIDHM-2014-ZhouLXZZ #metric #parametricity
Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
HCIDUXU-DI-2014-ChammasQM #design #interactive
An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
HCIDUXU-DI-2014-NovickVSG #empirical #game studies #usability
Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
HCIDUXU-DI-2014-ShafiqICRAAR #case study #learning #smarttech #usability #user satisfaction #what
To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
HCIDUXU-DP-2014-BarrosSF14a #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-SilvaPS #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-TMT-2014-FilippiB #aspect-oriented #functional #human-computer #interactive #nondeterminism
In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
HCIDUXU-TMT-2014-NieminenRTN #collaboration #industrial #information management
Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
HCIDUXU-TMT-2014-QuaresmaG #smarttech #usability
Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
HCIDUXU-TMT-2014-Tao #identification #user interface
Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCIHCI-AS-2014-FerreiraB #elicitation #people #requirements #semantics
Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCIHCI-AS-2014-HooeyABF #design #fault
Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
HCIHCI-AS-2014-LandyLNPLM #comparative #development #predict
Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
HCIHCI-AS-2014-RafalakBW #evaluation
Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
HCIHIMI-AS-2014-Coelho
Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
HCIHIMI-AS-2014-JangKJS #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-AS-2014-TanikawaA #overview
User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
HCIHIMI-DE-2014-KimitaNS #education
Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
HCIHIMI-DE-2014-LinKT #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-NazemiRKK #adaptation #similarity #visualisation
User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
HCILCT-NLE-2014-BrayshawGNWB #case study #evaluation #heuristic
Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
HCILCT-NLE-2014-IbanezN #architecture #interactive
An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
HCILCT-NLE-2014-Jo0L #empirical #people
Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
HCISCSM-2014-AhangamaLKP #mobile #monitoring
Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
HCISCSM-2014-AhnMHNHPM #network #representation #semantics #social #twitter
Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
HCISCSM-2014-IoannidisPKKFA #named #social #social media
SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
HCISCSM-2014-LopesMP #social #web
Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
HCISCSM-2014-MendesFFC #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
VISSOFTVISSOFT-2014-VoineaT #visual notation
Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
CAiSECAiSE-2014-NobauerSG #approach #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
CAiSECAiSE-2014-RuizCEFP #information management #process
Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
EDOCEDOC-2014-FlorezSV #approach #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
EDOCEDOC-2014-Franke #architecture #enterprise
Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
EDOCEDOC-2014-MukkamalaHV #sentiment #social
Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
EDOCEDOC-2014-NardiFA #modelling #ontology
An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
ICEISICEIS-v1-2014-TimoteoVF #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v2-2014-BeenK #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-HernandesTTF #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-HoosGKM #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v2-2014-ProcaciSA #community #metric #online #people #reduction #reliability
Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
ICEISICEIS-v2-2014-VieiraJF #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-AlvesVS #architecture
Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
ICEISICEIS-v3-2014-NaranjoSV #architecture #enterprise #named
PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
CIKMCIKM-2014-ArapakisLV #comprehension #gesture
Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
CIKMCIKM-2014-CarmelMPS #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-JiaDGZ #community #network
Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
CIKMCIKM-2014-LinJXWCW #sentiment
A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
CIKMCIKM-2014-MengCS #approximate #keyword #query #semantics
Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
CIKMCIKM-2014-PhanDXPK #health #network #physics #process #social
Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
CIKMCIKM-2014-RahimiSK #axiom #information retrieval
Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
CIKMCIKM-2014-RosenthalJ #enterprise
Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
CIKMCIKM-2014-ShangLCC #component #robust
Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
CIKMCIKM-2014-SpirinHDKB #facebook #graph #network #online #people #query #scalability #social
People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKMCIKM-2014-TaoIWS #canonical #correlation
Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
CIKMCIKM-2014-TaxidouF #agile #information management #named #realtime #twitter
RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
CIKMCIKM-2014-WilkieA #bias #performance #retrieval
A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
CIKMCIKM-2014-YilmazVCRB #documentation
Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
ECIRECIR-2014-MonizJ #sentiment
Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
ECIRECIR-2014-WilkieA #bias #empirical #retrieval
Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
ICMLICML-c1-2014-MillerBAG #process
Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
ICMLICML-c1-2014-TangMNMZ #comprehension #modelling #topic
Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
ICMLICML-c2-2014-Lopez-PazSSGS #component #random
Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
ICMLICML-c2-2014-MukutaH #canonical #correlation #probability
Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
ICMLICML-c2-2014-NguyenMVEB #correlation #multi
Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
ICMLICML-c2-2014-NieYH #component #robust
Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
ICMLICML-c2-2014-SatoKN #normalisation
Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
ICMLICML-c2-2014-SatoN #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SunZZ #convergence
A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
ICMLICML-c2-2014-TaylorGP #approximate #linear #programming
An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
ICMLICML-c2-2014-ToulisAR #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICMLICML-c2-2014-TuZWQ #scalability
Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
ICMLICML-c2-2014-ZhaoMXZZ #component #robust
Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
ICPRICPR-2014-AhmadKM
Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
ICPRICPR-2014-AndreuLMG #automation #classification #gender #image
Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
ICPRICPR-2014-ArvanitopoulosBT #learning
Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
ICPRICPR-2014-BauckhageM #clustering #kernel #web
Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
ICPRICPR-2014-BiswasZLMV #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-ChengY
Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICPRICPR-2014-ChenYJ #feature model #linear #robust
An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
ICPRICPR-2014-DengHXC #composition #matrix #rank
Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
ICPRICPR-2014-FernandezT #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-Hess-FloresRJ #multi #nondeterminism
Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
ICPRICPR-2014-HongZP #estimation #image
Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
ICPRICPR-2014-HuDGX #distance #reduction
Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
ICPRICPR-2014-KrytheL #linear
Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
ICPRICPR-2014-KurtekS #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LinCCLH #detection
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LinH #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiuS
Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
ICPRICPR-2014-LiuXYZ
Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
ICPRICPR-2014-LiWQXG #estimation
Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
ICPRICPR-2014-MoilanenZP #agile #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MollerPB #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKO #collaboration #framework #online #platform #search-based
Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
ICPRICPR-2014-OhPKHB #image #personalisation #social
Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
ICPRICPR-2014-OkadaFWP #random
Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
ICPRICPR-2014-OnalAVFOOY #modelling
Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, , FTYV), pp. 3339–3344.
ICPRICPR-2014-SariE #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SeckDT #3d #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-SlitiHBA #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-TavakoliYRHS #eye tracking #recognition
Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
ICPRICPR-2014-TuXN #detection #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-WangGLYWY #canonical #correlation
Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
ICPRICPR-2014-WatanabeW #component #distance #learning #metric #performance
Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
ICPRICPR-2014-YanRLSS #clustering #invariant #linear #multi #recognition
Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
ICPRICPR-2014-YeWH #component #graph
Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
ICPRICPR-2014-ZhangWGZZ #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
KDDKDD-2014-AkibaMK #network
Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
KDDKDD-2014-JiangCWXZY #behaviour #flexibility #multi #named
FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDDKDD-2014-LanSB #learning
Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
KDDKDD-2014-TamhaneISDA #predict #risk management #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-YuH0 #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDDKDD-2014-ZhuSY #mining #network #social
Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
KDIRKDIR-2014-CastelltortL #graph
NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
KDIRKDIR-2014-HafethAC #case study #classification
Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
KDIRKDIR-2014-LiuF #classification #sentiment #topic #web
Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
KDIRKDIR-2014-LiuF14a #classification #n-gram #sentiment #similarity #web
Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
KDIRKDIR-2014-PsomakelisTAV #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-WanJLL #challenge #sentiment #web
Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
KEODKEOD-2014-AzaiezA #how #question #towards
How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KRKR-2014-BhattST #architecture #design #experience #industrial #user interface
Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
KRKR-2014-Delgrande #towards
Towards a Knowledge Level Analysis of Forgetting (JPD).
RecSysRecSys-2014-NoiaORTS #recommendation #towards
An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
SEKESEKE-2014-BarnesL #clustering
Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
SEKESEKE-2014-El-KharboutlyGF #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKESEKE-2014-Garcia-NunesSZB #collaboration #fuzzy #modelling
Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
SEKESEKE-2014-PaikariF #design #implementation #simulation
Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
SEKESEKE-2014-SchotsRS #performance #process
A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
SEKESEKE-2014-VianaCS #information management
Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
SEKESEKE-2014-WangC #approach #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-WanZWS #graph #performance #points-to
Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
SEKESEKE-2014-YangWSFC #debugging #fault
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
SIGIRSIGIR-2014-FangZ #axiom #information retrieval #modelling #optimisation
Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
SIGIRSIGIR-2014-GoeuriotKL #information retrieval #query
An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
SIGIRSIGIR-2014-LourencoVPMFP #sentiment
Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
SIGIRSIGIR-2014-PelejaSM #sentiment
Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
SIGIRSIGIR-2014-TsolmonL #modelling #timeline
An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
SIGIRSIGIR-2014-UstaAVOU #education #how #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIRSIGIR-2014-ZhangL0ZLM #modelling #recommendation #sentiment
Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
ECMFAECMFA-2014-Moreno-DelgadoDZT #composition #domain-specific language #flexibility
Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
ICMTICMT-2014-GonzalezC #constraints #generative #model transformation #testing
Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
ICMTICMT-2014-GuanaS
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
SPLCSPLC-2014-DomisSGAK #case study #experience #industrial #reuse
Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
ECOOPECOOP-2014-LiT #fault #python #source code
Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
ECOOPECOOP-2014-WeiR #behaviour #javascript #points-to
State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLAOOPSLA-2014-NazareMSBGP #memory management #validation
Validation of memory accesses through symbolic analyses (HN, IM, WS, LB, LG, FMQP), pp. 791–809.
OOPSLAOOPSLA-2014-ZhangXZYS #alias #c #performance
Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
AdaEuropeAdaEurope-2014-QamhiehM #graph #multi #scheduling
Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
PEPMPEPM-2014-HanusS #composition #functional #logic programming #source code
A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
PLDIPLDI-2014-ArztRFBBKTOM #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDIPLDI-2014-BorgesFdPV #composition #probability #quantifier
Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
PLDIPLDI-2014-MitraLABSG #debugging #parallel #scalability
Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
PLDIPLDI-2014-SmaragdakisKB #context-sensitive grammar
Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
PLDIPLDI-2014-ZhangMGNY #abstraction #datalog #on the #refinement
On abstraction refinement for program analyses in Datalog (XZ, RM, RG, MN, HY), p. 27.
PLDIPLDI-2014-ZhangMNY #bottom-up #hybrid #interprocedural #top-down
Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
POPLPOPL-2014-ChaudhuriFK #consistency #source code
Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
POPLPOPL-2014-CoughlinC #composition #invariant
Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
POPLPOPL-2014-SergeyVJ #composition #higher-order #theory and practice
Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
SASSAS-2014-BakhirkinBP #abstraction #approximate
Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
SASSAS-2014-CoxCR #automation #source code
Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
SASSAS-2014-MadsenM #data flow #pointer #reachability
Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SASSAS-2014-YeSX #pointer
Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
RERE-2014-AnishG #requirements
Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
RERE-2014-BadgerTC #design #named #requirements #verification
VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
RERE-2014-GuzmanM #fine-grained #how #sentiment
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
RERE-2014-MartinsO #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-NguyenGA #automation #named #ontology #requirements
GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
RERE-2014-SaxenaC #agile #named #requirements
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
REFSQREFSQ-2014-AlebrahimFHM #interactive #problem #requirements
Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
REFSQREFSQ-2014-NairVMTdB #problem #safety #traceability
Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
REFSQREFSQ-2014-RiegelD #elicitation #heuristic #optimisation #performance
An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
REFSQREFSQ-2014-SannierB #approach #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
REFSQREFSQ-2014-SethiaP #elicitation #empirical #performance #requirements
The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
REFSQREFSQ-2014-YangLJC #adaptation #modelling #overview #requirements #self
A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
ASEASE-2014-AbalBW #debugging #kernel #linux #variability
42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
ASEASE-2014-EllisHKLLLMM #automation #requirements
Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
ASEASE-2014-MarasSC #named #reuse #web
Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
ASEASE-2014-NearJ #interactive #named #security #web
Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASEASE-2014-SeguraSC #automation #case study #e-commerce #experience #testing #variability
Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
ASEASE-2014-TarvoR #automation #modelling #parallel #performance #source code #thread
Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
FSEFSE-2014-DevroeyPCPLS #mutation testing #variability
A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
FSEFSE-2014-Gui00ND #agile #named #nondeterminism #reliability #tool support
RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
FSEFSE-2014-LerchHBM #named #performance #scalability
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
FSEFSE-2014-LuoHEM #empirical #testing
An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
FSEFSE-2014-XiaoCK #architecture #named #quality #tool support
Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
FSEFSE-2014-Yang #network #open source #overview #perspective #social
Social network analysis in open source software peer review (XY), pp. 820–822.
ICSEICSE-2014-AndroutsopoulosCDHH #fault #testing
An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
ICSEICSE-2014-ArztB #data flow #incremental #named
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes (SA, EB), pp. 288–298.
ICSEICSE-2014-HuangMSZ #performance #testing
Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSEICSE-2014-NadiBKC #constraints #empirical #mining
Mining configuration constraints: static analyses and empirical results (SN, TB, CK, KC), pp. 140–151.
ICSEICSE-2014-SuR #empirical #parametricity #probability
Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICSEICSE-2014-YaoHJ #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
SACSAC-2014-AntunesBMBC #architecture #enterprise #ontology
Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SACSAC-2014-ChangCHKL #behaviour #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SACSAC-2014-Chen #behaviour #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SACSAC-2014-EliasMFB #algorithm #memory management
Experimental and theoretical analyses of memory allocation algorithms (DE, RM, MF, LBdA), pp. 1545–1546.
SACSAC-2014-HalderZC #database #information management #query
Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SACSAC-2014-HuangLD #delivery #modelling #multi #network #performance
Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SACSAC-2014-HuangYKYLYGFQ #clustering #self
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SACSAC-2014-KangS #implementation #scheduling
Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SACSAC-2014-OliveiraO #kernel #linux
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SACSAC-2014-OliveiraSB #coordination
Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SACSAC-2014-PapadakisT #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParkH #network #performance
Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SACSAC-2014-QuilleTR
Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SACSAC-2014-SeoKTC #framework #network #social
A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SACSAC-2014-ShoshitaishviliIDV #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SACSAC-2014-XiaLWZ #predict
Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SACSAC-2014-ZhanLS #in the cloud #mobile
A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
LDTALDTA-J-2011-SauthoffG #domain-specific language #optimisation #programming
Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
SLESLE-J-2012-KrishnanW #attribute grammar #composition #higher-order #termination
Monolithic and modular termination analyses for higher-order attribute grammars (LK, EVW), pp. 511–526.
CASECASE-2014-ChenGGLCL #approach #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChuLSO #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-GargSYPCHPAG #automation #reachability
Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
CASECASE-2014-HanZH
System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
CASECASE-2014-HuYLC #automation #modelling #multi #petri net
Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
CASECASE-2014-JiangCWWS #3d #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-JiaZAX
Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
CASECASE-2014-LiaoLCHF
Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
CASECASE-2014-PengHHW #effectiveness #metric
An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
CASECASE-2014-WangGWG #behaviour #generative #multi
Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
CASECASE-2014-WuCT #memory management #modelling #multi
Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
CASECASE-2014-ZhuWQZ #clustering #constraints #modelling #multi #petri net #scheduling #tool support
Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
CCCC-2014-MadsenA #string
String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
CCCC-2014-TavaresBPR #data flow
Parameterized Construction of Program Representations for Sparse Dataflow Analyses (ALCT, BB, FMQP, FR), pp. 18–39.
CGOCGO-2014-RountevY #android #user interface
Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
CGOCGO-2014-StadlerWM #java
Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
CGOCGO-2014-YeSX #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
DACDAC-2014-AthavaleMHV #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-IyengarG #embedded #memory management #modelling #power management #robust
Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
DACDAC-2014-KiamehrOTN #approach #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-KleebergerMS
Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
DACDAC-2014-LiangC #clustering #named #network #probability #reduction #scalability #smarttech
ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
DACDAC-2014-LinL #parallel #reachability #verification
Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
DACDAC-2014-NandakumarM
System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
DACDAC-2014-QuintonBHNNE #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-SchneiderPP #agile #multi
MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
DACDAC-2014-ShankarSWP #concept #design #specification
Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
DACDAC-2014-ShanSFZTXYL #algorithm #configuration management #encryption #multi
A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
DACDAC-2014-ShrivastavaRJW #control flow #fault
Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
DACDAC-2014-SiyoumGC #data flow
Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
DACDAC-2014-WaksmanRSS #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-XueQBYT #framework #manycore #platform #scalability
Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
DACDAC-2014-ZhengBB #identification #named #robust #towards
CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATEDATE-2014-AltmeyerD #correctness #on the #precise #probability
On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
DATEDATE-2014-BeneventiBVDB #identification #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATEDATE-2014-ButtazzoBB #adaptation #design
Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
DATEDATE-2014-ChenHD #graph #modelling
May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
DATEDATE-2014-ChienYHLC #geometry #image
Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
DATEDATE-2014-EbrahimiETSCA #embedded #fault
Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
DATEDATE-2014-FischerCM #design #modelling
Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
DATEDATE-2014-FrijnsASVGSC #graph
Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
DATEDATE-2014-GanapathyCACGR #framework #memory management #named #robust
INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
DATEDATE-2014-GangopadhyayLNR #adaptation #linear #modelling #performance
Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATEDATE-2014-GhalatyAS #fault
Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
DATEDATE-2014-Guan0 #performance #scheduling
General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
DATEDATE-2014-HoffmanRAA #fault #memory management
Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATEDATE-2014-KarakonstantisSSAB #approach #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KhanAHKKRC #bias
Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
DATEDATE-2014-LongLY #bound #evaluation #modelling #multi
Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATEDATE-2014-NowotschPHPS #monitoring #multi #off the shelf
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATEDATE-2014-PandeyV #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RadojicicGMP
Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
DATEDATE-2014-RamboTDAE #realtime
Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATEDATE-2014-RanaC #named #reduction #scalability #simulation
SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DATEDATE-2014-SalunkheMB #data flow #modelling
Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
DATEDATE-2014-SiddiqueT #formal method #towards
Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
DATEDATE-2014-SinghSWPWC #specification
Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
DATEDATE-2014-SongDY #bound #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATEDATE-2014-VijaykumarV #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-VillenaS #network #performance #variability
Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
DATEDATE-2014-ZhangB #probability
Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
DATEDATE-2014-ZhangYW #performance #problem
Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
HPDCHPDC-2014-BeaumontM #matrix #multi #platform #scheduling
Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
HPDCHPDC-2014-SuAWBS #correlation #dataset #distributed #parallel
Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
HPDCHPDC-2014-YinWFZZ #middleware #named #scalability #visualisation
SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
ISMMISMM-2014-RatnakarN #constraints #graph #performance #points-to
Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
LCTESLCTES-2014-BallabrigaCR
Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
LCTESLCTES-2014-RoyRWW #approximate #automation #named
ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
OSDIOSDI-2014-ChowMFPW #internet #performance #scalability
The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
OSDIOSDI-2014-YuanLZRZZJS #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
PDPPDP-2014-AcostaA #performance #source code
Performance Analysis of Paralldroid Generated Programs (AA, FA), pp. 60–67.
PDPPDP-2014-BelliniBCMN #gpu #simulation
Simulation and Analysis of the Blood Coagulation Cascade Accelerated on GPU (MB, DB, PC, GM, MSN), pp. 590–593.
PDPPDP-2014-ItoF #hardware #problem #resource management #using
An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
PDPPDP-2014-KumarL #latency #manycore
Latency Analysis of Network-on-Chip Based Many-Core Processors (SK, GL), pp. 432–439.
PDPPDP-2014-RonchieriCDCTCSCMM #case study #framework
The WNoDeS Cloud Virtualization Framework: A Macromolecular Surface Analysis Application Case Study (ER, DC, DD, VC, GDT, PC, DS, AC, LM, IM), pp. 218–222.
PPoPPPPoPP-2014-MaAC #algorithm #manycore #thread
Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
ESOPESOP-2014-Fu #abstraction #memory management
Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
ESOPESOP-2014-MangalNY #interprocedural
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FASEFASE-2014-CohenM #configuration management #semantics #specification
Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
FASEFASE-2014-HuangDM #java #type system #web
Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
FASEFASE-2014-KowalST #performance
Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
FASEFASE-2014-SadeghiEM #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FoSSaCSFoSSaCS-2014-BonnetKL #parallel #probability #process
Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
STOCSTOC-2014-BhaskaraCMV
Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
STOCSTOC-2014-DworkTT0 #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
TACASTACAS-2014-BrockschmidtEFFG #complexity #integer #runtime #source code
Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
TACASTACAS-2014-LoweMW #contest
CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses — (Competition Contribution) (SL, MUM, PW), pp. 392–394.
WRLAWRLA-2014-RochaMM #smt
Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
CAVCAV-2014-ChatterjeeCD #probability
CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
CAVCAV-2014-EsparzaLMMN #approach #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAVCAV-2014-Hagemann #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-HeizmannHP #learning #source code #termination
Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
CAVCAV-2014-ItzhakyBRST
Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
CAVCAV-2014-LeGQC #higher-order
Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICSTICST-2014-LiO #empirical #modelling #testing
An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
ICSTICST-2014-MiicBT #automation #multi #platform #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PapadakisHT #combinator #interactive #mutation testing #testing
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
ICSTICST-2014-WiklundSEL #automation #empirical #testing
Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
ISSTAISSTA-2014-HendersonPYHWZY #framework #performance #platform
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
ISSTAISSTA-2014-Just #framework #java #mutation testing #performance #scalability
The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
ISSTAISSTA-2014-JustEF #clustering #execution #mutation testing #performance
Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
ISSTAISSTA-2014-MarinescuHC #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TrippFP #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
ISSTAISSTA-2014-XiaoBIMGC #dependence #effectiveness #type system
ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
LICSLICS-CSL-2014-BaierDK #model checking #probability #trade-off
Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
ICSTSAT-2014-BacchusN #algorithm #satisfiability
Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
SMTSMT-2014-CarlssonGP #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
TAPTAP-2014-KosmatovS #runtime #tutorial
Runtime Assertion Checking and Its Combinations with Static and Dynamic Analyses — Tutorial Synopsis (NK, JS), pp. 165–168.
VMCAIVMCAI-2014-Ferrara #abstract interpretation
Generic Combination of Heap and Value Analyses in Abstract Interpretation (PF), pp. 302–321.
VMCAIVMCAI-2014-Fu #abstract domain #java #points-to #scalability
Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
VMCAIVMCAI-2014-GustavssonGL #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-Mine #abstract interpretation #relational #thread
Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAIVMCAI-2014-SchwarzSVA #precise #source code
Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
CBSECBSE-2013-LednickiCS #execution #worst-case
Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
ECSAECSA-2013-BuchgeherW #architecture #consistency #towards
Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
ECSAECSA-2013-GoknilSPM #constraints #modelling
Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
QoSAQoSA-2013-BeckerLB #adaptation #performance #requirements #self #validation
Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
QoSAQoSA-2013-BerardinelliLM #execution #non-functional
Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
QoSAQoSA-2013-KlattK #architecture #difference
Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
QoSAQoSA-2013-TrubianiMCAG #architecture #modelling #nondeterminism #performance
Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
DRRDRR-2013-MehriGHM #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SimistiraPKC #online
Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
HTHT-2013-WangQS #realtime #social #twitter
Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
HTHT-2013-WeiHGLZW #behaviour #case study #twitter
Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
ICDARICDAR-2013-AlkalaiBSL #identification
Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDARICDAR-2013-AntonacopoulosCPP #contest #layout
ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
ICDARICDAR-2013-GriechischML #online
Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDARICDAR-2013-KirbyH #using
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-LiPXW #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-StammLD #approach #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-TangHF #approach #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-WangLD #recognition
Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
ICDARICDAR-2013-WeiBSI #classification #documentation #evaluation #layout
Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
ICDARICDAR-2013-YinLS #detection #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZirariENM #component #documentation #image #segmentation #using
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
PODSPODS-2013-CalvaneseGM #database #perspective #process
Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
SIGMODSIGMOD-2013-GuilleFHZ #framework #mining #named #open source #platform #social
SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
SIGMODSIGMOD-2013-MoustafaMDG #declarative #interactive #named #network
GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
SIGMODSIGMOD-2013-SuZWHZ #similarity
Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
SIGMODSIGMOD-2013-TaoYLBCHKSWWW #named #network #research
Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
TPDLTPDL-2013-KemmanK #named
PoliMedia — Improving Analyses of Radio, TV and Newspaper Coverage of Political Debates (MK, MK), pp. 401–404.
TPDLTPDL-2013-ManghiM #data flow
Data Searchery — Preliminary Analysis of Data Sources Interlinking (PM, AM), pp. 458–461.
TPDLTPDL-2013-TranZBNK #corpus #topic
Topic Cropping: Leveraging Latent Topics for the Analysis of Small Corpora (NKT, SZ, KB, CN, RK), pp. 297–308.
VLDBVLDB-2013-DeutchMT #named #process
PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
VLDBVLDB-2013-MoyersSWKVBC #array #image #parallel
A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
VLDBVLDB-2013-OkcanRPF #named
Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
VLDBVLDB-2013-SeoPSL #distributed #graph #scalability
Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
VLDBVLDB-2013-SowellSCDG #in memory #memory management
An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
VLDBVLDB-2013-Taxidou #information management #realtime #social #social media
Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
ITiCSEITiCSE-2013-HerreroLOST13a #empirical #performance
An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
ITiCSEITiCSE-2013-Trakhtenbrot #algorithm #complexity #concept #problem #student
Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
CSMRCSMR-2013-BhattacharyaUNK #android #debugging #empirical #open source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMRCSMR-2013-GhaithWPM #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-JezekHB #compilation #library
Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
ICPCICPC-2013-MurakamiHHIK #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-PruijtKB #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICPCICPC-2013-SteidlHJ #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AnandEKSBK #abstraction #bytecode #framework #memory management #stack
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
ICSMEICSM-2013-Beck #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-LabicheKM #diagrams
Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams (YL, BK, HM), pp. 130–139.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-OsmanCP #algorithm #diagrams #machine learning
An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
ICSMEICSM-2013-SahaRS #evolution #named
gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
ICSMEICSM-2013-TianLS #debugging #multi #named #predict
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
ICSMEICSM-2013-VenkataramaniABM #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-YukselS #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-CampbellZXHM #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-DemeyerMWL #exclamation
Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
MSRMSR-2013-FuLLDZX #behaviour #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSRMSR-2013-VasquezDP #development #mobile #stack overflow #using
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
SCAMSCAM-2013-BiallasOCH #named #pointer
PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SCAMSCAM-2013-FabryRJ #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-PapadakisDT #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SCAMSCAM-2013-SvajlenkoRD #generative #named #similarity #tool support
ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
WCREWCRE-2013-ClearyGVSSP #interactive #memory management #multi
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
WCREWCRE-2013-SaeidiHKJ #legacy #modelling #named #tool support
Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
CIAACIAA-2013-DreyfusHK #approximate #reachability
Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
ICALPICALP-v1-2013-DeDS #algorithm #difference #fourier #geometry #robust
A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
ICALPICALP-v2-2013-HartungNNS #complexity #graph
A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
LATALATA-2013-FernauHV #automaton #multi #problem
A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
IFMIFM-2013-GiachinoGLLW #concurrent #theory and practice
Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
IFMIFM-2013-Song00LD #divide and conquer #reachability
Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
RTARTA-2013-BauLNW #term rewriting #termination
Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
SFMSFM-2013-GratieIP #biology
ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
SFMSFM-2013-KopfR #automation #data flow
Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
CoGCIG-2013-DivillyOH #evolution
Exploration and analysis of the evolution of strategies for Mancala variants (CD, CO, SH), pp. 1–7.
CoGCIG-2013-ShakerSNST #automation #game studies #generative
Automatic generation and analysis of physics-based puzzle games (MS, MHS, OAN, NS, JT), pp. 1–8.
CoGCIG-2013-SifaB #behaviour #game studies #learning
Archetypical motion: Supervised game behavior learning with Archetypal Analysis (RS, CB), pp. 1–8.
DiGRADiGRA-2013-Grace #game studies #web
Affection Games in Digital Play: A Content Analysis of Web Playable Games (LDG).
DiGRADiGRA-2013-Prax #design #game studies
Game Design and Business Model: an Analysis of Diablo 3 (PP).
DiGRADiGRA-2013-WehbeN #game studies #human-computer #interface #research
An Introduction to EEG Analysis Techniques and Brain-Computer Interfaces for Games User Researchers (RRW, LEN).
FDGFDG-2013-CaplarSM #case study #performance #rating
Analysis of players' in-game performance vs rating: Case study of Heroes of Newerth (NC, MS, MM), pp. 237–244.
FDGFDG-2013-Milik #category theory #multi #online #social
Protecting face in virtual life: An ethnographic analysis of identity categories and informal systems of social control in massively multiplayer online worlds (OM), pp. 477–478.
FDGFDG-2013-Waern #game studies
Game analysis as a signature pedagogy of game studies (AW), pp. 275–282.
FDGFDG-2013-Wallner #approach #named #visualisation
Play-Graph: A methodology and visualization approach for the analysis of gameplay data (GW), pp. 253–260.
GT-VMTGT-VMT-2013-MaximovaEE #graph transformation
Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
CHICHI-2013-AlperBRIF #comparison #graph
Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHICHI-2013-BrownML #mobile #video
iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHICHI-2013-GoyalLF #visualisation
Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
CHICHI-2013-VellosoBG #modelling #named
MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
CHICHI-2013-WalshFYD #design #framework
FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
CHICHI-2013-WangBK #facebook #gender #topic
Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
CSCWCSCW-2013-AlmuhimediWLSA #scalability #twitter
Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
CSCWCSCW-2013-Hautasaari #process #quote #wiki
“Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
CSCWCSCW-2013-Robert #multi
A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
CSCWCSCW-2013-SmithQC #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDHM-HB-2013-ZhaoLZ #higher-order #statistics
Higher Order Statistics Analyses Based on the Mathematical Model of Surface Electromyography (YZ, DL, JZ), pp. 402–408.
HCIDHM-SET-2013-ChiLC
The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
HCIDHM-SET-2013-HungCSC #case study #comparative #education #effectiveness #women
A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
HCIDUXU-CXC-2013-AsanoY #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-CarvalhoSNM #comparative #game studies #interactive #usability
Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
HCIDUXU-NTE-2013-BarrosSFCC #artificial reality #people
Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
HCIDUXU-NTE-2013-Danylak #gesture #human-computer #interactive
Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
HCIDUXU-NTE-2013-Gyoda #ad hoc #communication #evaluation #network #performance
Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
HCIDUXU-PMT-2013-KohnoYSN #approach #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-ZhangD #interactive
User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
HCIDUXU-WM-2013-BucchianicoCP #communication #towards #visual notation
Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
HCIDUXU-WM-2013-Kim13a #query
Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
HCIHCI-III-2013-IteyaMK #using #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-KimKAPW #artificial reality #social
Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
HCIHCI-III-2013-StorzRMLE #detection #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-IMT-2013-Farhadi-NiakiEA #design #gesture #usability
Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
HCIHCI-IMT-2013-SakataKN #collaboration #communication #scalability
Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
HCIHCI-IMT-2013-SrivastavaT #realtime #using
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-UC-2013-KuramochiOTHN #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-TajimaIK
Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
HCIHIMI-D-2013-KobayashiYA #behaviour
Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HCIHIMI-D-2013-KotaniKSA #development #memory management #using
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-SusukiTOM #behaviour
Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HCIHIMI-HSM-2013-ChiangWCH #performance #smarttech
An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
HCIHIMI-HSM-2013-HerronV #overview
Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
HCIHIMI-HSM-2013-LeeJ #simulation #using
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-Noda #industrial #monitoring #performance #statistics
Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
HCIHIMI-LCCB-2013-AntolosLLV #using
Burglary Crime Analysis Using Logistic Regression (DA, DL,