Tag #detection
3932 papers:
POPL-2020-ZouZXFZS #fault #float- Detecting floating-point errors via atomic conditions (DZ, MZ, YX, ZF, LZ0, ZS), p. 27.
ASPLOS-2020-0001SWWKK #debugging #memory management #persistent #source code- Cross-Failure Bug Detection in Persistent Memory Programs (SL0, KS, YW, TFW, AK, SK), pp. 1187–1202.
ICSA-2019-AlamGPAB #framework- A Framework for Tunable Anomaly Detection (MRA, IG, CP, AA, TB), pp. 201–210.
EDM-2019-AlexandronVP #identification #online #towards- Towards a General Purpose Anomaly Detection Method to Identify Cheaters in Massive Open Online Courses (GA, JARV, DEP).
EDM-2019-BotelhoBH #behaviour #re-engineering #student- Machine-Learned or Expert-Engineered Features? Exploring Feature Engineering Methods in Detectors of Student Behavior and Affect (AFB, RSB, NTH).
EDM-2019-GuoB #analysis #collaboration #using- Collaboration Analysis Using Object Detection (ZG, RB).
EDM-2019-HowlinD #approach #behaviour #clustering #fuzzy #student #using- Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDM-2019-JensenHD #dataset #modelling #student- Generalizability of Sensor-Free Affect Detection Models in a Longitudinal Dataset of Tens of Thousands of Students (EJ, SH, SKD).
EDM-2019-OwenRTBJKB #education #effectiveness #game studies #persistent- Detecting Wheel Spinning and Productive Persistence in Educational Games (VEO, MHR, KPT, VB, DJ, EK, RSB).
EDM-2019-ShilloHG #geometry- Detecting Creativity in an Open Ended Geometry Environment (RS, NH, KG).
EDM-2019-SmeetsBB #education- Affect detection in home-based educational software for young children (RS, FLB, EB).
EDM-2019-YangBSHL #learning #student- Active Learning for Student Affect Detection (TYY, RSB, CS, NTH, ASL).
EDM-2019-ZhangHWLFSFHA #comparison #modelling- Early Detection of Wheel Spinning: Comparison across Tutors, Models, Features, and Operationalizations (CZ, YH, JW, DL, WF, JCS, SF, KH, VA).
EDM-2019-ZingleRXGXPKA - Detecting Suggestions in Peer Assessments (GZ, BR, YX, EFG, ZX, FP, GK, AA).
ICPC-2019-AlrubayeM0 #information retrieval #java #library #migration #on the #using- On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
ICPC-2019-LiuYJZS #clone detection #contract- Enabling clone detection for ethereum via smart contract birthmarks (HL0, ZY, YJ0, WZ, JS), pp. 105–115.
ICPC-2019-MizouchiSII #adaptation #named #online #using- PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
ICPC-2019-PecorelliPNL #heuristic #machine learning #smell- Comparing heuristic and machine learning approaches for metric-based code smell detection (FP, FP, DDN, ADL), pp. 93–104.
ICPC-2019-YuLCLXW #semantics- Neural detection of semantic code clones via tree-based convolution (HY, WL, LC, GL, TX, QW), pp. 70–80.
ICSME-2019-AlrubayeM0 #automation #java #library #migration #named- MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method Level (HA, MWM, AO0), pp. 414–417.
ICSME-2019-GaoJJ00G #contract #debugging #named- SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding (ZG, VJ, LJ, XX0, DL0, JCG), pp. 394–397.
ICSME-2019-GaoWLYSC #approach #clone detection #named- TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
ICSME-2019-Imran #analysis #design #java #open source #smell- Design Smell Detection and Analysis for Open Source Java Software (AI), pp. 644–648.
ICSME-2019-MihanceaS #adaptation #fault- CodeSonar (R) Extension for Copy-Paste-(Mis) Adapt Error Detection (PFM, RS), pp. 386–389.
MSR-2019-AmannNNNM - Investigating next steps in static API-misuse detection (SA, HAN, SN, TNN, MM), pp. 265–275.
MSR-2019-PerezC #abstract syntax tree #clone detection #learning #syntax- Cross-language clone detection by learning over abstract syntax trees (DP, SC), pp. 518–528.
MSR-2019-ScalabrinoBLLO #android #api #data-driven #empirical- Data-driven solutions to detect API compatibility issues in Android: an empirical study (SS, GB, MLV, ML, RO), pp. 288–298.
SANER-2019-ArcelliCP #automation #modelling #performance #refactoring #uml- Automating Performance Antipattern Detection and Software Refactoring in UML Models (DA, VC, DDP), pp. 639–643.
SANER-2019-BuchA #abstract syntax tree #clone detection #recursion #syntax- Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection (LB, AA0), pp. 95–104.
SANER-2019-ChaparroFSM #debugging #query- Reformulating Queries for Duplicate Bug Report Detection (OC, JMF, US, AM), pp. 218–229.
SANER-2019-ChenBJLH #consistency- Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers (QLC, JJB, ZMJ, JL, SMH0), pp. 366–376.
SANER-2019-Farmahinifarahani #clone detection #on the #precise #tool support- On Precision of Code Clone Detection Tools (FF, VS, DY, HS, CVL), pp. 84–94.
SANER-2019-Li00LML #android #game studies #image- Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps (WL, YJ0, CX0, YL, XM, JL0), pp. 355–365.
SANER-2019-MaFRWJZLS #online #virtual machine- EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine (FM, YF, MR, MW, YJ0, KZ, HL, XS), pp. 554–558.
SANER-2019-MuscedereHAADG #analysis #lightweight #using- Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SANER-2019-ThallerLE #design pattern #representation- Feature Maps: A Comprehensible Software Representation for Design Pattern Detection (HT, LL, AE), pp. 207–217.
SANER-2019-WangWZL #multi- Software Multiple-Level Change Detection Based on Two-Step MPAT Matching (TW, DW, YZ, BL), pp. 4–14.
SANER-2019-XiongL #design pattern #implementation #java- Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context (RX, BL), pp. 163–174.
SANER-2019-Zhan0T #android #case study #comparative- A Comparative Study of Android Repackaged Apps Detection Techniques (XZ, TZ0, YT), pp. 321–331.
FM-2019-SinghPDD #kernel #static analysis- Static Analysis for Detecting High-Level Races in RTOS Kernels (AS, RP, DD, MD), pp. 337–353.
SEFM-2019-PappTB #behaviour #towards- Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment (DP, TT, LB), pp. 491–509.
SEFM-2019-StillB #c++ #parallel #source code- Local Nontermination Detection for Parallel C++ Programs (VS, JB), pp. 373–390.
CHI-PLAY-2019-GielisVTA #case study #game studies- Age? It's in the Game: An Exploratory Study on Detection of Cognitive Aging through Card Games (KG, KV, JT, VVA), pp. 651–664.
CIKM-2019-ChenSHG #network- Attention-Residual Network with CNN for Rumor Detection (YC, JS, LH, WG), pp. 1121–1130.
CIKM-2019-CuiSW0L #named- dEFEND: A System for Explainable Fake News Detection (LC, KS, SW, DL0, HL0), pp. 2961–2964.
CIKM-2019-DongZHSL #graph #multi #network- Multiple Rumor Source Detection with Graph Convolutional Networks (MD, BZ, NQVH, HS, GL), pp. 569–578.
CIKM-2019-GiurgiuS #multi- Additive Explanations for Anomalies Detected from Multivariate Temporal Data (IG, AS), pp. 2245–2248.
CIKM-2019-GongZ00XWH #community #developer #learning #online #using- Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
CIKM-2019-GozuacikBBC #classification #concept- Unsupervised Concept Drift Detection with a Discriminative Classifier (ÖG, AB, HRB, FC), pp. 2365–2368.
CIKM-2019-HanMNKURNS #image #learning #using- Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
CIKM-2019-HouFZYLWWXS #android #graph #named #robust- αCyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model (SH, YF, YZ, YY, JL, WW, JW, QX, FS), pp. 609–618.
CIKM-2019-HuangYX #graph #learning- System Deterioration Detection and Root Cause Learning on Time Series Graphs (HH, SY, YX), pp. 2537–2545.
CIKM-2019-HwangYKK #ambiguity #precise- Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling (WSH, JHY, JK, HK), pp. 2241–2244.
CIKM-2019-JiangWZSLL #graph #learning #representation- Cross-domain Aspect Category Transfer and Detection via Traceable Heterogeneous Graph Representation Learning (ZJ, JW, LZ, CS, YL, XL), pp. 289–298.
CIKM-2019-LiHLDZ #named #network- SpecAE: Spectral AutoEncoder for Anomaly Detection in Attributed Networks (YL, XH, JL, MD, NZ), pp. 2233–2236.
CIKM-2019-LiQLYL #graph #network #overview- Spam Review Detection with Graph Convolutional Networks (AL, ZQ, RL, YY, DL), pp. 2703–2711.
CIKM-2019-MueenCM #metric #social- Taming Social Bots: Detection, Exploration and Measurement (AM, NC, AJM), pp. 2967–2968.
CIKM-2019-NeutatzMA #fault #learning #named- ED2: A Case for Active Learning in Error Detection (FN, MM, ZA), pp. 2249–2252.
CIKM-2019-Pasca #approximate #lightweight #wiki- Approximate Definitional Constructs as Lightweight Evidence for Detecting Classes Among Wikipedia Articles (MP), pp. 2373–2376.
CIKM-2019-ShanahanD #pipes and filters #realtime- Realtime Object Detection via Deep Learning-based Pipelines (JGS, LD), pp. 2977–2978.
CIKM-2019-ShaposhnikovBGD - Labelling for Venue Visit Detection by Matching Wi-Fi Hotspots with Businesses (DS, AAB, EG, AD), pp. 2281–2284.
CIKM-2019-SiddiqueeAM #named- SeiSMo: Semi-supervised Time Series Motif Discovery for Seismic Signal Detection (MAS, ZA, AM), pp. 99–108.
CIKM-2019-TianKA0C #adaptation #concept #health #monitoring #online- Concept Drift Adaption for Online Anomaly Detection in Structural Health Monitoring (HT, NLDK, AA, YW0, FC0), pp. 2813–2821.
CIKM-2019-TrittenbachB #learning #multi- One-Class Active Learning for Outlier Detection with Multiple Subspaces (HT, KB), pp. 811–820.
CIKM-2019-YangJGZL #interactive #online- Interactive Variance Attention based Online Spoiler Detection for Time-Sync Comments (WY, WJ, WG, XZ, YL), pp. 1241–1250.
ECIR-p1-2019-GhaderyMSFS #approach #independence #named- LICD: A Language-Independent Approach for Aspect Category Detection (EG, SM, MJS, HF, AS), pp. 575–589.
ECIR-p1-2019-KimA #online- Unsupervised Explainable Controversy Detection from Online News (YK, JA), pp. 836–843.
ECIR-p1-2019-KodeljaBF - Exploiting a More Global Context for Event Detection Through Bootstrapping (DK, RB, OF), pp. 763–770.
ECIR-p2-2019-LosadaCP #internet #risk management- Early Detection of Risks on the Internet: An Exploratory Campaign (DEL, FC, JP), pp. 259–266.
ECIR-p2-2019-PalodPBBG #metadata- Misleading Metadata Detection on YouTube (PP, AP, SB, SB, PG), pp. 140–147.
ECIR-p2-2019-SyedIGSV #induction #learning #natural language #query- Inductive Transfer Learning for Detection of Well-Formed Natural Language Search Queries (BS, VI, MG0, MS0, VV), pp. 45–52.
ICML-2019-ChungL - Weak Detection of Signal in the Spiked Wigner Model (HWC, JOL), pp. 1233–1241.
ICML-2019-Huang0 #algorithm #community #correlation- Detecting Overlapping and Correlated Communities without Pure Nodes: Identifiability and Algorithm (KH, XF0), pp. 2859–2868.
ICML-2019-NguyenLKB #multi #predict- Anomaly Detection With Multiple-Hypotheses Predictions (DTN, ZL, MK, TB), pp. 4800–4809.
ICML-2019-RothKH #statistics- The Odds are Odd: A Statistical Test for Detecting Adversarial Examples (KR, YK, TH), pp. 5498–5507.
ICML-2019-TzengW #distributed #graph- Distributed, Egocentric Representations of Graphs for Detecting Critical Structures (RCT, SHW), pp. 6354–6362.
KDD-2019-ChowdhurySM - Structured Noise Detection: Application on Well Test Pressure Derivative Data (FAC, SS, AM), pp. 2952–2960.
KDD-2019-FauvelMFFT #machine learning #towards- Towards Sustainable Dairy Management - A Machine Learning Enhanced Method for Estrus Detection (KF, VM, ÉF, PF, AT), pp. 3051–3059.
KDD-2019-FedoryszakFRZ #data type #realtime #social- Real-time Event Detection on Social Data Streams (MF, BF, VR, CZ), pp. 2774–2782.
KDD-2019-HulsebosHBZSKDH #approach #data type #learning #named #semantics- Sherlock: A Deep Learning Approach to Semantic Data Type Detection (MH, KZH, MAB, EZ, AS, TK, ÇD, CAH), pp. 1500–1508.
KDD-2019-LiHWL #approach #community #named- EdMot: An Edge Enhancement Approach for Motif-aware Community Detection (PZL, LH, CDW, JHL), pp. 479–487.
KDD-2019-OhI #learning #using- Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
KDD-2019-PangSH #network- Deep Anomaly Detection with Deviation Networks (GP, CS, AvdH), pp. 353–362.
KDD-2019-RamakrishnanSLS #e-commerce- Anomaly Detection for an E-commerce Pricing System (JR, ES, CL, MAS), pp. 1917–1926.
KDD-2019-RenXWYHKXYTZ - Time-Series Anomaly Detection Service at Microsoft (HR, BX, YW, CY, CH, XK, TX, MY, JT, QZ), pp. 3009–3017.
KDD-2019-ShuCW0L #named- dEFEND: Explainable Fake News Detection (KS, LC, SW, DL0, HL0), pp. 395–405.
KDD-2019-SuZNLSP #multi #network #probability #robust- Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network (YS, YZ, CN, RL, WS, DP), pp. 2828–2837.
KDD-2019-TaoLZZWFC #game studies #multi #named #network #online- MVAN: Multi-view Attention Networks for Real Money Trading Detection in Online Games (JT, JL, SZ, SZ, RW, CF, PC), pp. 2536–2546.
KDD-2019-TariqLSLJCW #multi #probability #using- Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
KDD-2019-WagstaffDDACCDP - Enabling Onboard Detection of Events of Scientific Interest for the Europa Clipper Spacecraft (KLW, GD, AD, SA, SC, MC, ID, CAP), pp. 2191–2201.
KDD-2019-XiaLGLCS #case study #mobile #network #privacy #social- Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study (ZX, CL, NZG, QL0, YC0, DS), pp. 2012–2022.
KDD-2019-YelundurCM #composition #multi #overview- Detection of Review Abuse via Semi-Supervised Binary Multi-Target Tensor Decomposition (ARY, VC, BM), pp. 2134–2144.
KDD-2019-YoonHSF #approach #graph #performance- Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach (MY, BH, KS, CF), pp. 647–657.
KDD-2019-ZafaraniZSL #problem #research- Fake News Research: Theories, Detection Strategies, and Open Problems (RZ, XZ, KS, HL0), pp. 3207–3208.
KDD-2019-ZhaoWSNHJSNBRPL #power management #smarttech- Raise to Speak: An Accurate, Low-power Detector for Activating Voice Assistants on Smartwatches (SZ, BW, SS, HN, RH, MJ, KS, BN, MB, SR, TP, KL, CG), pp. 2736–2744.
KDD-2019-ZheSX #community #network #scalability- Community Detection on Large Complex Attribute Network (CZ, AS, XX), pp. 2041–2049.
OOPSLA-2019-GencRXB #bound #concurrent #predict- Dependence-aware, unbounded sound predictive race detection (KG, JR, YX, MDB), p. 30.
OOPSLA-2019-LiWNN #debugging #learning #network #representation- Improving bug detection via context-based code representation learning and attention-based neural networks (YL, SW0, TNN, SVN), p. 30.
OOPSLA-2019-SongLO #automation #fault #functional #logic #programming #scalability- Automatic and scalable detection of logical errors in functional programming assignments (DS, ML, HO), p. 30.
OOPSLA-2019-WangZS #contract #debugging #nondeterminism- Detecting nondeterministic payment bugs in Ethereum smart contracts (SW, CZ, ZS), p. 29.
PLDI-2019-KhanZPMK #hybrid #named- Huron: hybrid false sharing detection and repair (TAK, YZ, GP, BM, BK), pp. 453–468.
POPL-2019-GorogiannisOS #theorem- A true positives theorem for a static race detector (NG, PWO, IS), p. 29.
ASE-2019-FengYLBWTSYXPXH #named #off the shelf #open source #reuse- B2SFinder: Detecting Open-Source Software Reuse in COTS Software (MF, ZY, FL, GB, SW, QT, HS, CY, JX, AP, JX, WH), pp. 1038–1049.
ASE-2019-HortonP #named #performance #python- V2: Fast Detection of Configuration Drift in Python (EH, CP), pp. 477–488.
ASE-2019-JiaLYLWLL #debugging #fault #specification- Detecting Error-Handling Bugs without Error Specification Input (ZJ, SL, TY, XL, JW, XL, YL), pp. 213–225.
ASE-2019-Kellogg #image- Compile-Time Detection of Machine Image Sniping (MK), pp. 1256–1258.
ASE-2019-Laguna #exception #float #gpu #named- FPChecker: Detecting Floating-Point Exceptions in GPU Applications (IL), pp. 1126–1129.
ASE-2019-LiuW0B0X #android #named- DaPanda: Detecting Aggressive Push Notifications in Android Apps (TL, HW, LL0, GB, YG0, GX), pp. 66–78.
ASE-2019-LiW0ZCM #clustering #effectiveness #fault #named #spreadsheet- SGUARD: A Feature-Based Clustering Tool for Effective Spreadsheet Defect Detection (DL, HW, CX0, RZ, SCC, XM), pp. 1142–1145.
ASE-2019-MengZYL0Y #concurrent #effectiveness #named- CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities (RM, BZ, HY, HL, YC0, ZY), pp. 1154–1157.
ASE-2019-NafiKRRS #api #clone detection #documentation #named #using- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASE-2019-PiskachevDJB #automation #named- SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods (GP, LNQD, OJ, EB), pp. 1094–1097.
ASE-2019-Xiao #android #approach- An Image-Inspired and CNN-Based Android Malware Detection Approach (XX), pp. 1259–1261.
ASE-2019-ZhengLZLZD #feedback #named #online #realtime #scalability- iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service Systems (WZ, HL, YZ, JL, HZ, YD), pp. 352–363.
ESEC-FSE-2019-AwadhutkarSHK #algorithm #complexity #named- DISCOVER: detecting algorithmic complexity vulnerabilities (PA, GRS, BH, SK), pp. 1129–1133.
ESEC-FSE-2019-BiagiolaSMRT #dependence #web- Web test dependency detection (MB, AS, AM, FR, PT), pp. 154–164.
ESEC-FSE-2019-CaiZMYHSL #concurrent #memory management- Detecting concurrency memory corruption vulnerabilities (YC, BZ, RM, HY, LH, PS, BL0), pp. 706–717.
ESEC-FSE-2019-FuRMSYJLS #named #testing- EVMFuzzer: detect EVM vulnerabilities via fuzz testing (YF, MR, FM, HS, XY, YJ0, HL, XS), pp. 1110–1114.
ESEC-FSE-2019-He19a #comprehension #debugging #fault #performance- Tuning backfired? not (always) your fault: understanding and detecting configuration-related performance bugs (HH), pp. 1229–1231.
ESEC-FSE-2019-JiaLYLW #automation- Automatically detecting missing cleanup for ungraceful exits (ZJ, SL, TY, XL, JW), pp. 751–762.
ESEC-FSE-2019-KimHK #composition #debugging #effectiveness #refinement #summary #testing- Target-driven compositional concolic testing with function summary refinement for effective bug detection (YK, SH, MK), pp. 16–26.
ESEC-FSE-2019-LiXCWZXWL #adaptation #effectiveness #fuzzing #named- Cerebro: context-aware adaptive fuzzing for effective vulnerability detection (YL, YX, HC, XW, CZ, XX, HW, YL0), pp. 533–544.
ESEC-FSE-2019-MordahlOKWG #debugging #empirical #tool support #variability- An empirical study of real-world variability bugs detected by variability-oblivious tools (AM, JO, UK, SW, PG), pp. 50–61.
ESEC-FSE-2019-SongZH #android #named- ServDroid: detecting service usage inefficiencies in Android applications (WS0, JZ, JH0), pp. 362–373.
ESEC-FSE-2019-Sonnekalb #source code- Machine-learning supported vulnerability detection in source code (TS), pp. 1180–1183.
ESEC-FSE-2019-StallenbergP #injection #named #search-based #web #xml- JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applications (DMS, AP), pp. 1090–1094.
ESEC-FSE-2019-ZhangXLQZDXYCLC #robust- Robust log-based anomaly detection on unstable log data (XZ, YX, QL, BQ, HZ0, YD, CX, XY, QC, ZL, JC0, XH, RY, JGL, MC, FS, DZ), pp. 807–817.
- ICSE-2019-AryaWGC #analysis #open source
- Analysis and detection of information types of open source software issue discussions (DA, WW, JLCG, JC), pp. 454–464.
- ICSE-2019-ChangDGW0H
- Detecting atomicity violations for event-driven Node.js applications (XC, WD, YG, JW, JW0, TH0), pp. 631–642.
- ICSE-2019-FanWS0ZZ #memory management #named #scalability
- Smoke: scalable path-sensitive memory leak detection for millions of lines of code (GF, RW, QS, XX0, JZ, CZ), pp. 72–82.
- ICSE-2019-GhorbaniGM #architecture #consistency #java #nondeterminism
- Detection and repair of architectural inconsistencies in Java (NG, JG, SM), pp. 560–571.
- ICSE-2019-LiC0S #named #smell
- Dlfinder: characterizing and detecting duplicate logging code smells (ZL, TH(C, JY0, WS), pp. 152–163.
- ICSE-2019-LickerR
- Detecting incorrect build rules (NL, AR), pp. 1234–1244.
- ICSE-2019-PhamLQT #debugging #learning #library #locality #named #validation
- CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries (HVP, TL, WQ, LT0), pp. 1027–1038.
- ICSE-2019-SainiFLY0SBL #automation #clone detection #precise #towards
- Towards automating precision studies of clone detectors (VS, FF, YL, DY, PM0, HS, PB, CVL), pp. 49–59.
- ICSE-2019-WangD00Z #mutation testing #network #testing
- Adversarial sample detection for deep neural network through model mutation testing (JW, GD, JS0, XW0, PZ), pp. 1245–1256.
- ICSE-2019-WeiLC #android #correlation #learning #named
- Pivot: learning API-device correlations to facilitate Android compatibility issue detection (LW, YL, SCC), pp. 878–888.
SLE-2019-KhelladiKE #consistency #nondeterminism- Detecting and exploring side effects when repairing model inconsistencies (DEK, RK, AE), pp. 113–126.
ASPLOS-2019-BaiLTH #automation #fault #kernel #linux #named- DCNS: Automated Detection Of Conservative Non-Sleep Defects in the Linux Kernel (JJB, JL, WT, SMH0), pp. 287–299.
ASPLOS-2019-OsterlundKOBBG #execution #kernel #multi #named- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution (SÖ, KK, PO, AB, HB, CG), pp. 559–572.
CASE-2019-0003L - Supervisory Control for Delayed Detectability of Discrete Event Systems (XY0, SL), pp. 480–485.
CASE-2019-AdamidesMKS #collaboration #proximity- A Time-of-Flight On-Robot Proximity Sensing System to Achieve Human Detection for Collaborative Robots (OAA, ASM, SK, FS), pp. 1230–1236.
CASE-2019-AhmedG0 #approach #generative #named #online- O-LoMST: An Online Anomaly Detection Approach And Its Application In A Hydropower Generation Plant (IA, TG, YD0), pp. 762–767.
CASE-2019-AzefackPAGCBX #approach #behaviour #smarttech- An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
CASE-2019-BaltaTB #framework #modelling #monitoring #performance- A Digital Twin Framework for Performance Monitoring and Anomaly Detection in Fused Deposition Modeling (ECB, DMT, KB), pp. 823–829.
CASE-2019-ChangLH #coordination #network #realtime #using- Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
CASE-2019-ChengJM #monitoring #process #robust- Data-Efficient Process Monitoring and Failure Detection for Robust Robotic Screwdriving (XC, ZJ, MTM), pp. 1705–1711.
CASE-2019-CrowleyZAS #predict- Set-Based Predictive Control for Collision Detection and Evasion (JC, YZ, BA, RGS), pp. 541–546.
CASE-2019-HenniSLR #framework- Improved dynamic object detection within evidential grids framework (AHH, AS, RL, NR), pp. 1080–1086.
CASE-2019-HeWDZB #adaptation #fault- An Adaptive Interval Forecast CNN Model for Fault Detection Method (JH, JW, LD, JZ, JB), pp. 602–607.
CASE-2019-KazmiNVRC #learning #recognition #using- Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
CASE-2019-LaiL #learning #using- Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
CASE-2019-LiGZYWSZ #fault #using- Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
CASE-2019-Morales-ValdezL - Damage detection of building structure based on vibration data and hysteretic model (JMV, MAL, WY), pp. 608–613.
CASE-2019-NiuLNLW #fault #generative #named #network #using- DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
CASE-2019-PengZZZ #analysis #component #fault #kernel #markov #multi #process- Hidden Markov Model Combined with Kernel Principal Component Analysis for Nonlinear Multimode Process Fault Detection (PP, JZ, YZ, HZ), pp. 1586–1591.
CASE-2019-PerdomoPMMKP #2d #named #performance- c-M2DP: A Fast Point Cloud Descriptor with Color Information to Perform Loop Closure Detection (LP, DP, MM, RM, MLK, EP), pp. 1145–1150.
CASE-2019-PotluriD #injection #learning #performance #process- Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection Attacks (SP, CD), pp. 854–860.
CASE-2019-SunLY #network #using- Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
CASE-2019-TaheritanjaniSB #automation #process- Automatic Damage Detection of Fasteners in Overhaul Processes (ST, RS, BB), pp. 1289–1295.
CASE-2019-WuMDXTIC #2d #automation #estimation #multi- Multi-Mosquito Object Detection and 2D Pose Estimation for Automation of PfSPZ Malaria Vaccine Production (HW, JM, TD, MX, RHT, II, GSC), pp. 411–417.
CASE-2019-XiaoH0HZ #fault #using- Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
CASE-2019-XuGWBCS #image- U-Net with optimal thresholding for small blob detection in medical images (YX, FG0, TW, KMB, JRC, SS), pp. 1761–1767.
CASE-2019-YanYS #fault #monitoring #process- Image-based Process Monitoring via Adversarial Autoencoder with Applications to Rolling Defect Detection (HY, HMY, NS), pp. 311–316.
CASE-2019-ZhangCZXL #fault #learning- Weld Defect Detection Based on Deep Learning Method (HZ, ZC, CZ, JX, XL), pp. 1574–1579.
CASE-2019-Zhao0Z #fault- Detecting Intermittent Faults with Moving Average Techniques (YZ, XH0, DZ), pp. 1712–1717.
CGO-2019-LiuSWDL #named- CSOD: Context-Sensitive Overflow Detection (HL, SS, XW, LD, TL), pp. 50–60.
FASE-2019-NicholsEH #clone detection- Structural and Nominal Cross-Language Clone Detection (LN, ME, BH), pp. 247–263.
ICST-2019-LamOSM0 #framework #named #testing- iDFlakies: A Framework for Detecting and Partially Classifying Flaky Tests (WL, RO, AS, DM, TX0), pp. 312–322.
ICST-2019-MonniPP - An RBM Anomaly Detector for the Cloud (CM, MP, GP), pp. 148–159.
ICST-2019-WuLSCX #analysis #android #order #precise- Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android (DW, JL0, YS, SC0, JX), pp. 276–287.
ICTSS-2019-VinarskiiLKYZ #approach #model checking- A Model Checking Based Approach for Detecting SDN Races (EV, JL, NK, NY, DZ), pp. 194–211.
JCDL-2018-MeuschkeGSBKG #adaptation #approach- An Adaptive Image-based Plagiarism Detection Approach (NM, CG, DS, CB, DAK, BG), pp. 131–140.
EDM-2018-BotelhoBOH #using- Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
ICPC-2018-GaoMSSZMMDDZC #c #c++ #debugging #named- CoBOT: static C/C++ bug detection in the presence of incomplete code (QG, SM, SS, YS, GZ, LM, XM, FD, XD, SZ, XC), pp. 385–388.
ICPC-2018-MaL0T0L #android #named- LESdroid: a tool for detecting exported service leaks of Android applications (JM0, SL, YJ0, XT, CX0, JL0), pp. 244–254.
ICSME-2018-IshioMSI #distance #normalisation #using- Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
ICSME-2018-JansenHT #case study #energy #evolution #network #predict #spreadsheet- Detecting and Predicting Evolution in Spreadsheets - A Case Study in an Energy Network Company (BJ, FH, ET), pp. 645–654.
ICSME-2018-KissM #design #towards- Towards Feature Envy Design Flaw Detection at Block Level (ÁK, PFM), pp. 544–548.
ICSME-2018-PalombaZL #automation #information retrieval #smell #using- Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
ICSME-2018-YueSMT00 #android #named #runtime #user interface- RegionDroid: A Tool for Detecting Android Application Repackaging Based on Runtime UI Region Features (SY, QS, JM0, XT, CX0, JL0), pp. 323–333.
MSR-2018-CiborowskaKD #behaviour #developer #reuse #using #web- Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSR-2018-NayrollesH #clone detection #fault #industrial #metric #named #scalability- CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects (MN, AHL), pp. 153–164.
MSR-2018-Soto-ValeroBB #analysis #behaviour #debugging #process- Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
SANER-2018-BritoXHV18a #api #named- APIDiff: Detecting API breaking changes (AB, LX, ACH, MTV), pp. 507–511.
SANER-2018-FakhouryANKA #learning #question #smell- Keep it simple: Is deep learning good for linguistic smell detection? (SF, VA, CN, FK, GA), pp. 602–611.
SANER-2018-LaverdiereM #evolution- Detection of protection-impacting changes during software evolution (MAL, EM), pp. 434–444.
SANER-2018-NucciPTSL #machine learning #question #smell #using- Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
SANER-2018-RoyC #benchmark #clone detection #metric- Benchmarks for software clone detection: A ten-year retrospective (CKR, JRC), pp. 26–37.
SANER-2018-SantosCPHA #fault #modelling #syntax #using- Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
SANER-2018-SilvaPM #stack overflow- Duplicate question detection in stack overflow: A reproducibility study (RFGdS, KVRP, MdAM), pp. 572–581.
SANER-2018-VislavskiRCB #clone detection #named- LICCA: A tool for cross-language clone detection (TV, GR, NC, ZB), pp. 512–516.
SANER-2018-XuWDYG00 #spreadsheet- Detecting faulty empty cells in spreadsheets (LX, SW, WD, BY, CG, JW0, TH0), pp. 423–433.
SANER-2018-ZhangDZHYY0 #android #library #precise- Detecting third-party libraries in Android applications with high precision and recall (YZ0, JD, XZ, SH, ZY, MY0, HC0), pp. 141–152.
SCAM-2018-IslamIMRRS #research #transitive #using- [Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
SCAM-2018-KoschkeSB #clone detection- [Engineering Paper] Built-in Clone Detection in Meta Languages (RK, UBS, BJB), pp. 165–170.
SCAM-2018-NafiRRS #api #documentation #research #similarity #using- [Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
SCAM-2018-SakuraiAG #concurrent #parallel #research- [Research Paper] POI: Skew-Aware Parallel Race Detection (YS, YA, KG), pp. 215–224.
SCAM-2018-SasBF #automation #java #library #research- [Research Paper] Automatic Detection of Sources and Sinks in Arbitrary Java Libraries (DS, MB, FAF), pp. 103–112.
FM-2018-AzadbakhtBV #concurrent- Deadlock Detection for Actor-Based Coroutines (KA, FSdB, EPdV), pp. 39–54.
FDG-2018-RingerN #game studies #multi #video- Deep unsupervised multi-view detection of video game stream highlights (CR, MAN), p. 6.
CIKM-2018-AllerhandYYA #interactive #question- Detecting Parkinson's Disease from Interactions with a Search Engine: Is Expert Knowledge Sufficient? (LIA, BY, EYT, DA), pp. 1539–1542.
CIKM-2018-CaoCCTLL #assessment #behaviour #community #enterprise #network- Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks (CC, ZC, JC, LAT, CL, ZL), pp. 1977–1985.
CIKM-2018-ChenXM #framework #social #social media- An Encoder-Memory-Decoder Framework for Sub-Event Detection in Social Media (GC, NX, WM), pp. 1575–1578.
CIKM-2018-DeutchGM #privacy #using- Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKM-2018-FanSW #network- Abnormal Event Detection via Heterogeneous Information Network Embedding (SF, CS, XW0), pp. 1483–1486.
CIKM-2018-GuoCZGL #network #social- Rumor Detection with Hierarchical Social Attention Network (HG, JC, YZ, JG, JL), pp. 943–951.
CIKM-2018-HoangVN #benchmark #dataset #metric #named #topic- W2E: A Worldwide-Event Benchmark Dataset for Topic Detection and Tracking (TAH, KDV, WN), pp. 1847–1850.
CIKM-2018-HooiAEPJPF #graph #locality #named #online- ChangeDAR: Online Localized Change Detection for Sensor Data on a Graph (BH, LA, DE, AP, MJ, LTP, CF), pp. 507–516.
CIKM-2018-KuoLK #correlation #metric- Detecting Outliers in Data with Correlated Measures (YHK, ZL, DK), pp. 287–296.
CIKM-2018-LinCCT0CL #collaboration #ranking- Collaborative Alert Ranking for Anomaly Detection (YL, ZC, CC, LAT, KZ0, WC, ZL), pp. 1987–1995.
CIKM-2018-LinmansVK #robust #scalability #semantics #using #web- Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
CIKM-2018-LiuCYZLS #graph #network- Heterogeneous Graph Neural Networks for Malicious Account Detection (ZL, CC, XY, JZ, XL, LS), pp. 2077–2085.
CIKM-2018-ShaabaniM #dependence #performance- Improving the Efficiency of Inclusion Dependency Detection (NS, CM), pp. 207–216.
CIKM-2018-TangTDJG #on the #realtime- On Real-time Detecting Passenger Flow Anomalies (BT, HT, XD, BJ, TG), pp. 1053–1062.
CIKM-2018-WangSZWL #multi- Multi-View Group Anomaly Detection (HW, PS, MZ, HW, GL), pp. 277–286.
CIKM-2018-WuWL18a #collaboration #learning #microblog #social- Semi-Supervised Collaborative Learning for Social Spammer and Spam Message Detection in Microblogging (FW, CW, JL), pp. 1791–1794.
CIKM-2018-XuWCWM #category theory #set- Exploring a High-quality Outlying Feature Value Set for Noise-Resilient Outlier Detection in Categorical Data (HX, YW, LC, YW, XM), pp. 17–26.
CIKM-2018-YeCZ #community #matrix- Deep Autoencoder-like Nonnegative Matrix Factorization for Community Detection (FY, CC, ZZ), pp. 1393–1402.
CIKM-2018-Zhang0T - Smooth q-Gram, and Its Applications to Detection of Overlaps among Long, Error-Prone Sequencing Reads (HZ, QZ0, HT), pp. 267–276.
CIKM-2018-ZhongS0 #automation #multi #privacy #towards- Toward Automated Multiparty Privacy Conflict Detection (HZ, ACS, DJM0), pp. 1811–1814.
ECIR-2018-0001TJ - To Cite, or Not to Cite? Detecting Citation Contexts in Text (MF0, AT, AJ), pp. 598–603.
ECIR-2018-AgrawalA #learning #multi #platform #social #social media- Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms (SA, AA), pp. 141–153.
ECIR-2018-DeySK #topic #twitter #using- Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
ECIR-2018-FaniBZBA #streaming- Stopword Detection for Streaming Content (HF, MB, FZ, EB, FAO), pp. 737–743.
ECIR-2018-Martinez-Castano #approach #modelling #realtime #social #social media- A Micromodule Approach for Building Real-Time Systems with Python-Based Models: Application to Early Risk Detection of Depression on Social Media (RMC, JCP, DEL, FC), pp. 801–805.
ECIR-2018-MeladianosXNV #approach #optimisation #summary #twitter- An Optimization Approach for Sub-event Detection and Summarization in Twitter (PM, CX, GN, MV), pp. 481–493.
ECIR-2018-StihecZP #approach #hybrid #semantics- Simplified Hybrid Approach for Detection of Semantic Orientations in Economic Texts (JS, MZ, SP), pp. 692–698.
ECIR-2018-TrikhaZB #mining #topic- Topic-Association Mining for User Interest Detection (AKT, FZ, EB), pp. 665–671.
ICML-2018-BoracchiCCM #data type #multi #named- QuantTree: Histograms for Change Detection in Multivariate Data Streams (GB, DC, CC, DM), pp. 638–647.
ICML-2018-JanzingS #linear #modelling #multi- Detecting non-causal artifacts in multivariate linear regression models (DJ, BS), pp. 2250–2258.
ICML-2018-KnoblauchD #online- Spatio-temporal Bayesian On-line Changepoint Detection with Model Selection (JK, TD), pp. 2723–2732.
ICML-2018-LiptonWS #black box #predict- Detecting and Correcting for Label Shift with Black Box Predictors (ZCL, YXW, AJS), pp. 3128–3136.
ICML-2018-LiuGDFH - Open Category Detection with PAC Guarantees (SL, RG, TGD, AF, DH), pp. 3175–3184.
ICML-2018-MazharRFH #clustering- Bayesian Model Selection for Change Point Detection and Clustering (OM, CRR, CF, MRH), pp. 3430–3439.
ICPR-2018-AbdeldayemB #automation #using- Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
ICPR-2018-AbdeltawabSSMEG #3d- A New 3D CNN-based CAD System for Early Detection of Acute Renal Transplant Rejection (HA, MS, AS0, SM, MEB, MG, YA, MAEG, ACD, MTEM, AEB), pp. 3898–3903.
ICPR-2018-AlshawaqfehKS #robust- Robust Fussed Lasso Model for Recurrent Copy Number Variation Detection (MA, AAK, ES), pp. 3772–3777.
ICPR-2018-AnnadaniJ #adaptation #approach #image- Augment and Adapt: A Simple Approach to Image Tampering Detection (YA, CVJ), pp. 2983–2988.
ICPR-2018-ArtaudSDOD #contest #exclamation- Find it! Fraud Detection Contest Report (CA, NS, AD, JMO, VPD), pp. 13–18.
ICPR-2018-BallottaBVC #image #network- Fully Convolutional Network for Head Detection with Depth Images (DB, GB, RV, RC), pp. 752–757.
ICPR-2018-CaoGWXW #learning- Gaze-Aided Eye Detection via Appearance Learning (LC, CG, KW, GX, FYW0), pp. 1965–1970.
ICPR-2018-CaoLL0JJC #image #learning- Deep Learning Based Bioresorbable Vascular Scaffolds Detection in IVOCT Images (YC, YL, JL, RZ0, QJ, JJ, YC), pp. 3778–3783.
ICPR-2018-CaoLZSLS #named #network #performance- ThinNet: An Efficient Convolutional Neural Network for Object Detection (SC, YL, CZ, QSS, PL, SS), pp. 836–841.
ICPR-2018-ChenHZLQ #analysis #multi #video- Video Salient Object Detection via Multiple Time-scale Analysis (YC, LH, WZ, XL, GQ), pp. 2184–2189.
ICPR-2018-ChenLT #algorithm #approximate #memory management- An Approximate Bayesian Long Short- Term Memory Algorithm for Outlier Detection (CC, XL, GT), pp. 201–206.
ICPR-2018-DahlDTG - Layered Surface Detection for Virtual Unrolling (VAD, ABD, CHT, CG), pp. 3074–3080.
ICPR-2018-DaiHGX0GQ #multi #network #segmentation- Fused Text Segmentation Networks for Multi-oriented Scene Text Detection (YD, ZH, YG, YX, KC0, JG, WQ), pp. 3604–3609.
ICPR-2018-DehzangiBI #multi #process #using- Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
ICPR-2018-DehzangiT #network #representation #using- Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
ICPR-2018-DengLLZL #composition #rank- Low-Rank and Sparse Decomposition on Contrast Map for Small Infrared Target Detection (XD, WL0, LL, WZ, XL), pp. 2682–2687.
ICPR-2018-DingLZ #framework- A Selective Tracking and Detection Framework with Target Enhanced Feature (XD, LL, XZ), pp. 1924–1928.
ICPR-2018-DingZXBBLDPZ #contest #image- ICPR2018 Contest on Object Detection in Aerial Images (ODAI-18) (JD, ZZ, GSX, XB, SJB, JL, MD, MP, LZ), pp. 1–6.
ICPR-2018-FengHYL #segmentation- Scene Text Detection with Recurrent Instance Segmentation (WF, WH, FY, CLL), pp. 2227–2232.
ICPR-2018-FuGA #learning #scalability- Simultaneous Context Feature Learning and Hashing for Large Scale Loop Closure Detection (ZF, YG, WA), pp. 1689–1694.
ICPR-2018-FuWZ #image- Context-Aware and Depthwise-based Detection on Orbit for Remote Sensing Image (YF, FW, JZ), pp. 1725–1730.
ICPR-2018-GalteriBSB #algorithm #video- Video Compression for Object Detection Algorithms (LG, MB, LS, ADB), pp. 3007–3012.
ICPR-2018-GuoDGB #multi #named- MSFD: Multi-Scale Receptive Field Face Detector (QG, YD, YG, HB), pp. 1869–1874.
ICPR-2018-GuptaJAMM #video- Pentuplet Loss for Simultaneous Shots and Critical Points Detection in a Video (NG, AJ, PA, SM, SM), pp. 2392–2397.
ICPR-2018-JiangZWYLWFL - R2 CNN: Rotational Region CNN for Arbitrarily-Oriented Scene Text Detection (YJ, XZ, XW, SY, WL, HW, PF, ZL), pp. 3610–3615.
ICPR-2018-JinZWJ #behaviour #clustering #representation- Sparse Representation and Weighted Clustering Based Abnormal Behavior Detection (DJ, SZ, SW, XYJ), pp. 1574–1579.
ICPR-2018-KataokaOIS #image- Occlusion Handling Human Detection with Refocused Images (HK, SO, KI, YS), pp. 1701–1706.
ICPR-2018-LiaoZWN #named #network #recognition- Uniface: A Unified Network for Face Detection and Recognition (ZL, PZ, QW, BN), pp. 3531–3536.
ICPR-2018-LiCZC #network- Mammographic mass detection based on convolution neural network (YL, HC, LZ, LC), pp. 3850–3855.
ICPR-2018-LiW18a #semantics #using #visual notation- Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
ICPR-2018-LiYL #clustering #documentation #image #predict- Page Object Detection from PDF Document Images by Deep Structured Prediction and Supervised Clustering (XL, FY, CLL), pp. 3627–3632.
ICPR-2018-LuLLZZ #fuzzy- Botnet Detection based on Fuzzy Association Rules (JL, FL, QHL, MZ, XZ), pp. 578–584.
ICPR-2018-LyuYCZZ #classification #learning- Learning Fixation Point Strategy for Object Detection and Classification (JL0, ZY, DC, YZ, HZ), pp. 2081–2086.
ICPR-2018-MaSLGX #image #novel- A Novel Two-Stage Deep Method for Mitosis Detection in Breast Cancer Histology Images (MM, YS, WL, YG0, JX), pp. 3892–3897.
ICPR-2018-MaWWW #multi #named #network #performance- MDCN: Multi-Scale, Deep Inception Convolutional Neural Networks for Efficient Object Detection (WM, YW, ZW, GW), pp. 2510–2515.
ICPR-2018-MeiJSH #dependence #multi- Region and Temporal Dependency Fusion for Multi-label Action Unit Detection (CM, FJ, RS, QH), pp. 848–853.
ICPR-2018-MingCLVB #interactive #liveness #named #network #verification- FaceLiveNet: End-to-End Networks Combining Face Verification with Interactive Facial Expression-Based Liveness Detection (ZM, JC, MML, MV, JCB), pp. 3507–3512.
ICPR-2018-MohantyDG #performance #using- An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
ICPR-2018-MohantyDG18a #network #robust- Robust Scene Text Detection with Deep Feature Pyramid Network and CNN based NMS Model (SM, TD, HPG), pp. 3741–3746.
ICPR-2018-MoTWW #approach #performance- An Efficient Approach for Polyps Detection in Endoscopic Videos Based on Faster R-CNN (XM, KT, QW, GW), pp. 3929–3934.
ICPR-2018-MustaniemiKSMH #metric #performance #using- Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
ICPR-2018-NabilIMSQS #network #random- Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters (MN, MI0, MMEAM, MS, KAQ, ES), pp. 740–745.
ICPR-2018-NadeemHS #algorithm #automation #image #segmentation #using- An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
ICPR-2018-PengLMSL #image #learning #sequence #video- Driving Maneuver Detection via Sequence Learning from Vehicle Signals and Video Images (XP, RL, YLM, SS, YL), pp. 1265–1270.
ICPR-2018-PengSCCXJ #architecture #multi #using- Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
ICPR-2018-RaghavendraVRGB #multi #recognition- Detecting Disguise Attacks on Multi-spectral Face Recognition Through Spectral Signatures (RR, NV, KBR, RSG, CB), pp. 3371–3377.
ICPR-2018-RazinkovSM #algorithm #named- ALFA: Agglomerative Late Fusion Algorithm for Object Detection (ER, IS, JM), pp. 2594–2599.
ICPR-2018-ShengCWL #image #multi #ranking- Weakly Supervised Vehicle Detection in Satellite Images via Multiple Instance Ranking (YS, LC, CW0, JL), pp. 2765–2770.
ICPR-2018-ShevchenkoEK - Fish Detection from Low Visibility Underwater Videos (VS, TE, AK), pp. 1971–1976.
ICPR-2018-SongCHSC #refinement #semantics- Scene Text Detection via Deep Semantic Feature Fusion and Attention-based Refinement (YS, YC, HH, SS, XC), pp. 3747–3752.
ICPR-2018-SuiZYC #framework #learning #novel #recognition- A Novel Integrated Framework for Learning both Text Detection and Recognition (WS, QZ, JY, WC), pp. 2233–2238.
ICPR-2018-Sun0L #image #multimodal- Multimodal Face Spoofing Detection via RGB-D Images (XS0, LH0, CL), pp. 2221–2226.
ICPR-2018-SunZWJ #behaviour #learning- Weak Supervised Learning Based Abnormal Behavior Detection (XS, SZ, SW, XYJ), pp. 1580–1585.
ICPR-2018-TlustyAB #clustering #estimation- Unsupervised clustering of mammograms for outlier detection and breast density estimation (TT, GA, RBA), pp. 3808–3813.
ICPR-2018-TuggenerESPS #classification #dataset #segmentation- DeepScores-A Dataset for Segmentation, Detection and Classification of Tiny Objects (LT, IE, JS, MP, TS), pp. 3704–3709.
ICPR-2018-WangF #using- Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
ICPR-2018-WangLLL #multi #network- Anchor Free Network for Multi-Scale Face Detection (CW, ZL, SL, SL), pp. 1554–1559.
ICPR-2018-WangWLW0 #identification- Temporal Action Detection by Joint Identification-Verification (WW, YW, HL, SW, JC0), pp. 2026–2031.
ICPR-2018-WangXLTXX #multi #network- Multi-scale Fusion with Context-aware Network for Object Detection (HW, JX, LL, YT, DX, SX), pp. 2486–2491.
ICPR-2018-WangXZ #encoding- Global Context Encoding for Salient Objects Detection (JW, YX, GZ), pp. 2337–2342.
ICPR-2018-WangZGW #image #multi #network #parametricity #using- Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
ICPR-2018-WangZL #generative #network- Anomaly Detection via Minimum Likelihood Generative Adversarial Networks (CW, YMZ, CLL), pp. 1121–1126.
ICPR-2018-WuYWWX #recognition- Facial Expression Recognition for Different Pose Faces Based on Special Landmark Detection (WW, YY, YW, XW, DX), pp. 1524–1529.
ICPR-2018-XieW #multi #segmentation #semantics- Multi-scale Semantic Segmentation Enriched Features for Pedestrian Detection (XX, ZW), pp. 2196–2201.
ICPR-2018-XuD #modelling #using- Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
ICPR-2018-XuZH - Densely Connected Single-Shot Detector (PX, XZ, KH), pp. 2178–2183.
ICPR-2018-Yang0CF #analysis #canonical #correlation #image #using- Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPR-2018-YangQKCF - Object Detection in Equirectangular Panorama (WY, YQ, JKK, FC, LF), pp. 2190–2195.
ICPR-2018-YangQLZZLWS #estimation- A Light CNN based Method for Hand Detection and Orientation Estimation (LY, ZQ, ZL, SZ, YZ, HL0, JW, LS), pp. 2050–2055.
ICPR-2018-YangZWQ #analysis #classification #image #quality #recognition- Quality Classified Image Analysis with Application to Face Detection and Recognition (FY, QZ0, MW, GQ), pp. 2863–2868.
ICPR-2018-YanJY #3d #generative #network- 3D Convolutional Generative Adversarial Networks for Detecting Temporal Irregularities in Videos (MY, XJ, JY), pp. 2522–2527.
ICPR-2018-YanXAK #3d #fault #feature model- Accumulated Aggregation Shifting Based on Feature Enhancement for Defect Detection on 3D Textured Low-Contrast Surfaces (YY, SX, HA, SK), pp. 2965–2970.
ICPR-2018-YaoDHB - Dense Receptive Field for Object Detection (YY, YD, ZH, HB), pp. 1815–1820.
ICPR-2018-YinLLCS #multi #realtime- Cross Modal Multiscale Fusion Net for Real-time RGB-D Detection (KY, SL0, RL, YC, KS), pp. 2386–2391.
ICPR-2018-YuanCLYL - Detecting Phishing Websites and Targets Based on URLs and Webpage Links (HY, XC0, YL, ZY, WL), pp. 3669–3674.
ICPR-2018-YuLLW - A Fusion Strategy for the Single Shot Text Detector (ZY, SL, YL, PSPW), pp. 3687–3691.
ICPR-2018-ZhangDKQL #multi #network- Global Contrast Enhancement Detection via Deep Multi-Path Network (CZ, DD, LK, HQ, SL), pp. 2815–2820.
ICPR-2018-ZhangGX #automation #towards- Towards Automatic Detection of Monkey Faces (MZ, SG, XX), pp. 2564–2569.
ICPR-2018-ZhangHLZ #network- Attention-based Neural Network for Traffic Sign Detection (JZ, LH, JL, YZ), pp. 1839–1844.
ICPR-2018-ZhangWGWXL #effectiveness #learning #network- An Effective Deep Learning Based Scheme for Network Intrusion Detection (HZ, CQW, SG, ZW, YX, YL), pp. 682–687.
ICPR-2018-ZhangYLQZC #network- Single Shot Feature Aggregation Network for Underwater Object Detection (LZ, XY0, ZL, LQ, HZ, CC), pp. 1906–1911.
ICPR-2018-ZhangZZL #bound #image #performance- Boundary-based Image Forgery Detection by Fast Shallow CNN (ZZ, YZ, ZZ, JL), pp. 2658–2663.
ICPR-2018-ZhengWXHG #adaptation #multi #self- A Noise-Robust Self-Adaptive Multitarget Speaker Detection System (SZ, JW, JX, WNH, JRG), pp. 1068–1072.
ICPR-2018-ZhouKHSL - A Co-occurrence Background Model with Hypothesis on Degradation Modification for Object Detection in Strong Background Changes (WZ, SK, MH, YS, DL), pp. 1743–1748.
ICPR-2018-ZhouMMB #learning- Learning Training Samples for Occlusion Edge Detection and Its Application in Depth Ordering Inference (YZ0, JM, AM, XB), pp. 541–546.
ICPR-2018-ZhouYCK #image- Blurred Image Region Detection based on Stacked Auto-Encoder (YZ0, JY, YC, SYK), pp. 2959–2964.
ICPR-2018-ZhuD #robust- Sliding Line Point Regression for Shape Robust Scene Text Detection (YZ, JD), pp. 3735–3740.
ICPR-2018-ZhuZ #network- A Comprehensive Study on Upper-Body Detection with Deep Neural Networks (YZ, LZ), pp. 171–176.
ICPR-2018-ZuninoMCAPBVBM #analysis #gesture #video- Video Gesture Analysis for Autism Spectrum Disorder Detection (AZ, PM, AC, CA, JP, FB, EV, CB, VM), pp. 3421–3426.
KDD-2018-BorisyukGS #image #named #recognition #scalability- Rosetta: Large Scale System for Text Detection and Recognition in Images (FB, AG, VS), pp. 71–79.
KDD-2018-ChungCHLE #behaviour #visual notation- Detection of Apathy in Alzheimer Patients by Analysing Visual Scanning Behaviour with RNNs (JC, SAC, NH, KLL, ME), pp. 149–157.
KDD-2018-ConteMSGMV #community #named #network #scalability- D2K: Scalable Community Detection in Massive Networks via Small-Diameter k-Plexes (AC, TDM, DDS, RG, AM, LV), pp. 1272–1281.
KDD-2018-EswaranFGM #graph #named #streaming- SpotLight: Detecting Anomalies in Streaming Graphs (DE, CF, SG, NM), pp. 1378–1386.
KDD-2018-FanHZYA #exclamation- Gotcha - Sly Malware!: Scorpion A Metagraph2vec Based Malware Detection System (YF, SH, YZ, YY, MA), pp. 253–262.
KDD-2018-He0LRLTZ #using- Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
KDD-2018-HundmanCLCS #parametricity #using- Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
KDD-2018-LiuSZ - Where Will Dockless Shared Bikes be Stacked?: - Parking Hotspots Detection in a New City (ZL, YS, YZ), pp. 566–575.
KDD-2018-LiuYH - Adversarial Detection with Model Interpretation (NL, HY, XH), pp. 1803–1811.
KDD-2018-NaKY #data type #effectiveness #memory management #named #performance- DILOF: Effective and Memory Efficient Local Outlier Detection in Data Streams (GSN, DHK, HY), pp. 1993–2002.
KDD-2018-PangCCL #learning #random- Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier Detection (GP, LC, LC, HL), pp. 2041–2050.
KDD-2018-QahtanEFO0 #named #robust- FAHES: A Robust Disguised Missing Values Detector (AAQ, AKE, RCF, MO, NT0), pp. 2100–2109.
KDD-2018-RouxPMVF #approach #machine learning #using- Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDD-2018-SatoNHMHAM #learning- Managing Computer-Assisted Detection System Based on Transfer Learning with Negative Transfer Inhibition (IS, YN, SH, SM, NH, OA, YM), pp. 695–704.
KDD-2018-ShashikumarSCN #bidirectional #network #using- Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
KDD-2018-TaoXGLFZ #framework #game studies #named- NGUARD: A Game Bot Detection Framework for NetEase MMORPGs (JT, JX, LG, YL, CF, ZZ), pp. 811–820.
KDD-2018-Valdez-VivasGKF #distributed #framework #performance #realtime- A Real-time Framework for Detecting Efficiency Regressions in a Globally Distributed Codebase (MVV, CG, AK, EF, KG, SC), pp. 821–829.
KDD-2018-WangMJYXJSG #multi #named #network- EANN: Event Adversarial Neural Networks for Multi-Modal Fake News Detection (YW, FM, ZJ, YY0, GX, KJ, LS, JG0), pp. 849–857.
KDD-2018-XieCS #online- False Discovery Rate Controlled Heterogeneous Treatment Effect Detection for Online Controlled Experiments (YX, NC, XS), pp. 876–885.
KDD-2018-YuCAZCW #approach #flexibility #named #network- NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks (WY, WC, CCA, KZ0, HC, WW0), pp. 2672–2681.
ECMFA-2018-Ramadan0SRJ #modelling #process #requirements #security- Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models (QR, DS, MS, VR, JJ), pp. 179–198.
ECOOP-2018-MezzettiMT #library #testing- Type Regression Testing to Detect Breaking Changes in Node.js Libraries (GM, AM, MTT), p. 24.
OOPSLA-2018-BlackshearGOS #composition #concurrent #named- RacerD: compositional static race detection (SB, NG, PWO, IS), p. 28.
OOPSLA-2018-MathurK0 #concurrent #power of #predict #what- What happens-after the first race? enhancing the predictive power of happens-before based dynamic race detection (UM, DK, MV0), p. 29.
OOPSLA-2018-PradelS #approach #debugging #learning #named- DeepBugs: a learning approach to name-based bug detection (MP, KS), p. 25.
PADL-2018-AnandCN #automation #consistency #logic #nondeterminism #using- An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
PLDI-2018-DuckY #c #c++ #effectiveness #fault #memory management #named #using- EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
PLDI-2018-PengGD #named- CURD: a dynamic CUDA race detector (YP, VG, JD), pp. 390–403.
PLDI-2018-RoemerGB #bound #concurrent #predict- High-coverage, unbounded sound predictive race detection (JR, KG, MDB), pp. 374–389.
POPL-2018-GrossmanAGMRSZ #contract #effectiveness #online- Online detection of effectively callback free objects with applications to smart contracts (SG, IA, GGG, YM, NR, MS, YZ), p. 28.
ASE-2018-HabibP18a #case study #debugging #how- How many of all bugs do we find? a study of static bug detectors (AH, MP), pp. 317–328.
ASE-2018-He0WZLX #android #comprehension- Understanding and detecting evolution-induced compatibility issues in Android apps (DH, LL0, LW, HZ, GL, JX), pp. 167–177.
ASE-2018-HuangWLC #android #comprehension- Understanding and detecting callback compatibility issues for Android applications (HH, LW, YL, SCC), pp. 532–542.
ASE-2018-JiangLC #contract #fuzzing #named- ContractFuzzer: fuzzing smart contracts for vulnerability detection (BJ, YL, WKC), pp. 259–269.
ASE-2018-LiuHZLLPZ #named #similarity- αDiff: cross-version binary code similarity detection with DNN (BL, WH, CZ0, WL, FL, AP, WZ), pp. 667–678.
ASE-2018-LiuXZ #learning- Deep learning based feature envy detection (HL, ZX, YZ), pp. 385–396.
ASE-2018-MoranWHPP #evolution #mobile #user interface- Detecting and summarizing GUI changes in evolving mobile apps (KM, CW, JH, GP, DP), pp. 543–553.
ASE-2018-Vera-PerezMB #named #pseudo #tool support- Descartes: a PITest engine to detect pseudo-tested methods: tool demonstration (OLVP, MM, BB), pp. 908–911.
ESEC-FSE-2018-0006WR #android #energy- Detection of energy inefficiencies in Android wear watch faces (HZ0, HW, AR), pp. 691–702.
ESEC-FSE-2018-AdamsenMAT #ajax #concurrent #javascript #web- Practical AJAX race detection for JavaScript web applications (CQA, AM, SA, FT), pp. 38–48.
ESEC-FSE-2018-BianLSH0 #debugging #named- NAR-miner: discovering negative association rules from code for bug detection (PB, BL0, WS, JH0, YC0), pp. 411–422.
ESEC-FSE-2018-DongWLGBLXK #android #automation #named- FraudDroid: automated ad fraud detection for Android apps (FD, HW, LL0, YG0, TFB, TL, GX, JK), pp. 257–268.
ESEC-FSE-2018-GadelhaMCN #debugging #performance #towards- Towards counterexample-guided k-induction for fast bug detection (MYRG, FRM, LCC, DAN), pp. 765–769.
ESEC-FSE-2018-GuoWW #execution #symbolic computation- Adversarial symbolic execution for detecting concurrency-related cache timing leaks (SG, MW, CW0), pp. 377–388.
ESEC-FSE-2018-KateOZEX #consistency #named #nondeterminism #physics #probability- Phys: probabilistic physical unit assignment and inconsistency detection (SK, JPO, XZ, SGE, ZX), pp. 563–573.
ESEC-FSE-2018-KiniM0 #concurrent- Data race detection on compressed traces (DK, UM, MV0), pp. 26–37.
ESEC-FSE-2018-LiuYLJZS #clone detection #named #semantics #sketching #transaction- EClone: detect semantic clones in Ethereum via symbolic transaction sketch (HL, ZY, CL, YJ0, WZ, JS), pp. 900–903.
ESEC-FSE-2018-SainiFLBL #named- Oreo: detection of clones in the twilight zone (VS, FF, YL, PB, CVL), pp. 354–365.
ESEC-FSE-2018-WoodRAM #debugging #developer #speech- Detecting speech act types in developer question/answer conversations during bug repair (AW, PR, AA, CM), pp. 491–502.
ESEC-FSE-2018-YangYSLC #automation #ide #named #web- PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE (JY, CY, PS, SL, AC), pp. 884–887.
- ICSE-2018-BellLHEYM #automation #named #testing
- DeFlaker: automatically detecting flaky tests (JB0, OL, MH, LE, TY, DM), pp. 433–444.
- ICSE-2018-CalefatoLMN #development #sentiment
- Sentiment polarity detection for software development (FC, FL, FM, NN), p. 128.
- ICSE-2018-GarciaHM #android #identification #lightweight #obfuscation #product line
- Lightweight, obfuscation-resilient detection and family identification of Android malware (JG, MH, SM), p. 497.
- ICSE-2018-PapadakisSYB #correlation #empirical #fault #scalability
- Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults (MP, DS0, SY, DHB), pp. 537–548.
- ICSE-2018-ShanNS #android #behaviour #self
- Self-hiding behavior in Android apps: detection and characterization (ZS, IN, RS), pp. 728–739.
- ICSE-2018-TsantalisMEMD #commit #performance #refactoring
- Accurate and efficient refactoring detection in commit history (NT, MM, LME, DM, DD), pp. 483–494.
- ICSE-2018-WangSWXR #clone detection #named
- CCAligner: a token based large-gap clone detector (PW, JS, YW, YX, CKR), pp. 1066–1077.
- ICSE-2018-YanSCX #approach #reduction
- Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities (HY, YS, SC0, JX), pp. 327–337.
GPCE-2018-VolanschiSC #domain-specific language #implementation- Implementing a semi-causal domain-specific language for context detection over binary sensors (NV, BPS, CC), pp. 66–78.
ASPLOS-2018-DavidPY #named #precise #static analysis- FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware (YD, NP, EY), pp. 392–404.
ASPLOS-2018-HuN #android #static analysis- Static Detection of Event-based Races in Android Apps (YH, IN), pp. 257–270.
ASPLOS-2018-LiuWLLYT #automation #debugging #named- FCatch: Automatically Detecting Time-of-fault Bugs in Cloud Systems (HL, XW, GL, SL, FY, CT0), pp. 419–431.
CASE-2018-AhmedDB0 #generative- Outlier Detection for Hydropower Generation Plant (IA, AD, AB, YD0), pp. 193–198.
CASE-2018-AshouriHNS #approximate #energy #performance #using- Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
CASE-2018-DasWSP #adaptation #interactive #using- Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
CASE-2018-ElHadyP #correlation #towards- Towards Sensor Failure Detection in Ambient Assisted Living: Sensors Correlations (NEE, JP), pp. 378–383.
CASE-2018-GaoXDCSG #using- Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
CASE-2018-GohSHSS #automation #clustering- Semi-Automatic Snore Detection in Polysomnography based on Hierarchical Clustering (CFG, LBS, MHH, GLGS, KS), pp. 1116–1122.
CASE-2018-GonzalezCPS #interface #multi- Obstacle Detection and Avoidance Device for Multirotor UAVs through interface with Pixhawk Flight Controller (JG, AC, JAP, CS), pp. 110–115.
CASE-2018-GuptaKKN - Vision-based deformation and wrinkle detection for semi-finished fiber products on curved surfaces (KG, MK, FK, HN), pp. 618–623.
CASE-2018-HaghighiRATMC #using- Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
CASE-2018-JalalianLWAC #approach #automation #fault #statistics #visual notation- An Automatic Visual Inspection Method based on Statistical Approach for Defect Detection of Ship Hull Surfaces (AJ, WFL, FSW, SMA, CMC), pp. 445–450.
CASE-2018-SeichterESG #how #learning- How to Improve Deep Learning based Pavement Distress Detection while Minimizing Human Effort (DS, ME0, RS, HMG), pp. 63–70.
CASE-2018-WangKZY #concept #data type #learning #multi- A Multiscale Concept Drift Detection Method for Learning from Data Streams (XW, QK, MZ, SY), pp. 786–790.
CASE-2018-Wu #approach #automation #clustering #multi #online- CASE 2018 Special Session Presentation-Only Abstract Submission Form: A Sequential Bayesian Partitioning Approach for Online Steady State Detection of Multivariate Systems (JW), pp. 1308–1309.
CASE-2018-ZhangM #data-driven- Data-driven Downtime Bottleneck Detection in Open Flow Lines (MZ, AM), pp. 1513–1518.
CASE-2018-ZhangZY #algorithm #distributed #fault- A Distributed Algorithm for Sensor Fault Detection (ZZ, QZ, WY), pp. 756–761.
CGO-2018-0001LQDL #android #distributed #logic #using- Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
CGO-2018-FuLJ #android #named- nAdroid: statically detecting ordering violations in Android applications (XF, DL, CJ), pp. 62–74.
CGO-2018-RoySKL #lightweight- Lightweight detection of cache conflicts (PR, SLS, SK, XL0), pp. 200–213.
FASE-2018-KorogluS #android #named #testing- TCM: Test Case Mutation to Improve Crash Detection in Android (YK, AS0), pp. 264–280.
ICST-2018-GambiBZ #dependence- Practical Test Dependency Detection (AG, JB0, AZ), pp. 1–11.
ICST-2018-RyouR #automation #fault #html #layout #web- Automatic Detection of Visibility Faults by Layout Changes in HTML5 Web Pages (YR, SR), pp. 182–192.
ICST-2018-TimperleyAKHG #debugging #question #simulation- Crashing Simulated Planes is Cheap: Can Simulation Detect Robotics Bugs Early? (CST, AA, DSK, JMH, CLG), pp. 331–342.
TAP-2018-VorobyovKS #c #case study #experience #runtime #security #using #verification- Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
CSEET-2017-JoL #case study #education #keyword #re-engineering #video #word- A Study of Keywords Based on the Word Frequency Effect Theory in Video Lectures of Software Engineering Education for Detecting Mind (JJ, HL), pp. 241–245.
EDM-2017-HuttHBSRD - Gaze-based Detection of Mind Wandering during Lecture Viewing (SH, JH, RB, AS, EFR, SD).
EDM-2017-PatikornSHBZ #multi #using- Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
EDM-2017-StewartBD - Generalizability of Face-Based Mind Wandering Detection Across Task Contexts (AS, NB, SD).
EDM-2017-TatoND #automation #network #reasoning- Convolutional Neural Network for Automatic Detection of Sociomoral Reasoning Level (AANT, RN, AD).
EDM-2017-YinBPHZ #empirical #personalisation- Causal Forest vs. Naive Causal Forest in Detecting Personalization: An Empirical Study in ASSISTments (BY, AFB, TP, NTH, JZ).
EDM-2017-ZengCB #online- Learner Affect Through the Looking Glass: Characterization and Detection of Confusion in Online Courses (ZZ, SC, SB).
ICPC-2017-HozanoGAFC #developer #exclamation #performance #smell- Smells are sensitive to developers!: on the efficiency of (un)guided customized detection (MH, AG, NA, BF, EdBC), pp. 110–120.
ICPC-2017-HuZLG #architecture #clone detection #compilation- Binary code clone detection across architectures and compiling configurations (YH, YZ0, JL, DG), pp. 88–98.
ICPC-2017-LiPG #automation- Automatically detecting integrity violations in database-centric applications (BL, DP, MG), pp. 251–262.
ICPC-2017-NguyenJQ #android #mining #repository- Android repository mining for detecting publicly accessible functions missing permission checks (HHN, LJ, TTQ), pp. 324–327.
ICPC-2017-SousaSFFB #composition #flexibility #named #smell- FindSmells: flexible composition of bad smell detection strategies (BLS, PPS, EF, KAMF, MASB), pp. 360–363.
ICPC-2017-YueFM0TXL #android #automation #named- RepDroid: an automated tool for Android application repackaging detection (SY, WF, JM0, YJ0, XT, CX0, JL0), pp. 132–142.
ICSME-2017-EbertCNS #code review- Confusion Detection in Code Reviews (FE, FC, NN, AS), pp. 549–553.
ICSME-2017-GuoWXL #adaptation #consistency #named #nondeterminism #scheduling- GEAS: Generic Adaptive Scheduling for High-Efficiency Context Inconsistency Detection (BG, HW, CX0, JL0), pp. 137–147.
ICSME-2017-LiFZMR #approach #clone detection #named- CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
ICSME-2017-PanM - Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions (JP, XM), pp. 24–34.
MSR-2017-SilvaV #named #refactoring #version control- RefDiff: detecting refactorings in version histories (DS, MTV), pp. 269–279.
SANER-2017-Kirda #approach #automation #named #scalability- UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (EK), p. 1.
SANER-2017-MizobuchiT #stack overflow- Two improvements to detect duplicates in Stack Overflow (YM, KT), pp. 563–564.
SANER-2017-PalombaNPZL #lightweight #smell- Lightweight detection of Android-specific code smells: The aDoctor project (FP, DDN, AP, AZ, ADL), pp. 487–491.
SANER-2017-ZhangLKXLS #git #repository- Detecting similar repositories on GitHub (YZ0, DL0, PSK, XX0, QL, JS), pp. 13–23.
SCAM-2017-NagyC #embedded #java #query #smell #sql- A Static Code Smell Detector for SQL Queries Embedded in Java Code (CN0, AC), pp. 147–152.
SCAM-2017-NashaatAM #object-oriented #php #security #source code- Detecting Security Vulnerabilities in Object-Oriented PHP Programs (MN, KA0, JM0), pp. 159–164.
SCAM-2017-RuizCM #source code- Working Around Loops for Infeasible Path Detection in Binary Programs (JR, HC, MDM), pp. 1–10.
CIG-2017-BurnsT #game studies #using- Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
VS-Games-2017-MaltezosDI #3d #modelling #visualisation- Improving the visualisation of 3D textured models via shadow detection and removal (EM, AD, CI), pp. 161–164.
CIKM-2017-CaiLZ #behaviour #modelling #social- Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information (CC, LL, DZ), pp. 1995–1998.
CIKM-2017-CavallariZCCC #community #graph #learning- Learning Community Embedding with Community Detection and Node Embedding on Graphs (SC, VWZ, HC, KCCC, EC), pp. 377–386.
CIKM-2017-ChenDWXCCM #learning #spreadsheet- Spreadsheet Property Detection With Rule-assisted Active Learning (ZC, SD, RW, GX, DC, MJC, JDM), pp. 999–1008.
CIKM-2017-FanZYLZ #automation #case study #social #social media #twitter- Social Media for Opioid Addiction Epidemiology: Automatic Detection of Opioid Addicts from Twitter and Case Studies (YF, YZ, YY, XL, WZ), pp. 1259–1267.
CIKM-2017-HagenPAFS #retrieval #reuse- Source Retrieval for Web-Scale Text Reuse Detection (MH, MP, PA, EF, BS0), pp. 2091–2094.
CIKM-2017-KhandpurJJ0LR #crowdsourcing #social #social media #using- Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
CIKM-2017-LiCHCGPY - Public Transportation Mode Detection from Cellular Data (GL, CJC, SYH, AJC, XG, WCP, CWY), pp. 2499–2502.
CIKM-2017-LiHPG #framework #machine learning #named- DeMalC: A Feature-rich Machine Learning Framework for Malicious Call Detection (YL, DH, AP, ZG), pp. 1559–1567.
CIKM-2017-LiuHF #named- HoloScope: Topology-and-Spike Aware Fraud Detection (SL, BH, CF), pp. 1539–1548.
CIKM-2017-MengMJ - Hierarchical RNN with Static Sentence-Level Attention for Text-Based Speaker Change Detection (ZM, LM, ZJ), pp. 2203–2206.
CIKM-2017-MeuschkeSHSG - Analyzing Mathematical Content to Detect Academic Plagiarism (NM, MS, FH, TS, BG), pp. 2211–2214.
CIKM-2017-Mihalcea - Deception Detection: When Computers Become Better than Humans (RM), p. 3.
CIKM-2017-PangXCZ #category theory #learning- Selective Value Coupling Learning for Detecting Outliers in High-Dimensional Categorical Data (GP, HX, LC, WZ), pp. 807–816.
CIKM-2017-PatwariGB #classification #multi #named- TATHYA: A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates (AP, DG, SB), pp. 2259–2262.
CIKM-2017-PersiaBH #framework #interactive #modelling #video- An Interactive Framework for Video Surveillance Event Detection and Modeling (FP, FB, SH), pp. 2515–2518.
CIKM-2017-ProskurniaM0AC #documentation #performance #topic #using- Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
CIKM-2017-RuchanskySL #hybrid #named- CSI: A Hybrid Deep Model for Fake News Detection (NR, SS, YL0), pp. 797–806.
CIKM-2017-SunSGOC #approach #community #symmetry- A Non-negative Symmetric Encoder-Decoder Approach for Community Detection (BJS, HS, JG, WO, XC), pp. 597–606.
CIKM-2017-TengLW #learning #multi #network #using- Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
CIKM-2017-WilliamsZ #interactive #modelling #sequence- Does That Mean You're Happy?: RNN-based Modeling of User Interaction Sequences to Detect Good Abandonment (KW, IZ), pp. 727–736.
CIKM-2017-WuSZ #approach #behaviour #modelling #performance- A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
CIKM-2017-WuUBG #network- Conflict of Interest Declaration and Detection System in Heterogeneous Networks (SW, LHU, SSB, WG), pp. 2383–2386.
CIKM-2017-YuanSCZG0 #multi #sequence- Detecting Multiple Periods and Periodic Patterns in Event Time Sequences (QY0, JS, XC, CZ0, XG, JH0), pp. 617–626.
CIKM-2017-YuanWLL #network- Spectrum-based Deep Neural Networks for Fraud Detection (SY, XW, JL, AL), pp. 2419–2422.
CIKM-2017-ZhangCYL #community #enterprise #learning #named- BL-ECD: Broad Learning based Enterprise Community Detection via Hierarchical Structure Fusion (JZ, LC, PSY, YL), pp. 859–868.
CIKM-2017-ZhuAMZH - Outlier Detection in Sparse Data with Factorization Machines (MZ, CCA, SM0, HZ, JH), pp. 817–826.
ECIR-2017-AlviSC #obfuscation- Plagiarism Detection in Texts Obfuscated with Homoglyphs (FA, MS, PDC), pp. 669–675.
ECIR-2017-Anand0P #exclamation #network #what- We Used Neural Networks to Detect Clickbaits: You Won't Believe What Happened Next! (AA, TC0, NP), pp. 541–547.
ECIR-2017-GarbaceaK #analysis #summary- A Systematic Analysis of Sentence Update Detection for Temporal Summarization (CG, EK), pp. 424–436.
ECIR-2017-HuangHC #network- Irony Detection with Attentive Recurrent Neural Networks (YHH, HHH, HHC), pp. 534–540.
ECIR-2017-QinWLT - Counteracting Novelty Decay in First Story Detection (YQ, DW, VL, CT), pp. 555–560.
ICML-2017-AksoylarOS - Connected Subgraph Detection with Mirror Descent on SDPs (CA, LO, VS), pp. 51–59.
ICML-2017-FutomaHH #classification #learning #multi #process- Learning to Detect Sepsis with a Multitask Gaussian Process RNN Classifier (JF, SH, KAH), pp. 1174–1182.
ICML-2017-HonerNBMG #robust #trust- Minimizing Trust Leaks for Robust Sybil Detection (JH, SN, AB0, KRM, NG), pp. 1520–1528.
KDD-2017-CaoZZYPZARL #mobile #modelling #named #type system- DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection (BC, LZ, CZ, PSY, AP, JZ, OA, KR, ADL), pp. 747–755.
KDD-2017-DadkhahiM #embedded #learning #network- Learning Tree-Structured Detection Cascades for Heterogeneous Networks of Embedded Devices (HD, BMM), pp. 1773–1781.
KDD-2017-FuA0TX #automation #interactive #named- REMIX: Automated Exploration for Interactive Outlier Detection (YF, CCA, SP0, DST, HX), pp. 827–835.
KDD-2017-HassanALT #automation #towards- Toward Automated Fact-Checking: Detecting Check-worthy Factual Claims by ClaimBuster (NH, FA, CL, MT), pp. 1803–1812.
KDD-2017-HouYSA #android #named #network- HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network (SH, YY, YS, MA), pp. 1507–1515.
KDD-2017-MaurusP #using- Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
KDD-2017-SaveskiPSDGXA #network #random- Detecting Network Effects: Randomizing Over Randomized Experiments (MS, JPA, GSJ, WD, SG, YX, EMA), pp. 1027–1035.
KDD-2017-ShinHKF #incremental #named- DenseAlert: Incremental Dense-Subtensor Detection in Tensor Streams (KS, BH, JK, CF), pp. 1057–1066.
KDD-2017-SifferFTL - Anomaly Detection in Streams with Extreme Value Theory (AS, PAF, AT, CL), pp. 1067–1075.
KDD-2017-WangFLHA #process- Human Mobility Synchronization and Trip Purpose Detection with Mixture of Hawkes Processes (PW, YF, GL, WH, CCA), pp. 495–503.
KDD-2017-WangGZOXLG #network- Adversary Resistant Deep Neural Networks with an Application to Malware Detection (QW, WG, KZ, AGOI, XX, XL, CLG), pp. 1145–1153.
KDD-2017-WuAL - Structural Event Detection from Log Messages (FW0, PA, ZL), pp. 1175–1184.
KDD-2017-YanCKR #big data #distributed- Distributed Local Outlier Detection in Big Data (YY, LC, CK, EAR), pp. 1225–1234.
KDD-2017-YanCR #scalability- Scalable Top-n Local Outlier Detection (YY, LC, EAR), pp. 1235–1244.
KDD-2017-ZhangLLYZH0 #named #online #twitter- TrioVecEvent: Embedding-Based Online Local Event Detection in Geo-Tagged Tweet Streams (CZ0, LL, DL, QY0, HZ, TH, JH0), pp. 595–604.
KDD-2017-ZhengBLL #learning #metric- Contextual Spatial Outlier Detection with Metric Learning (GZ, SLB, TL, ZL), pp. 2161–2170.
KDD-2017-ZhouP #robust- Anomaly Detection with Robust Deep Autoencoders (CZ, RCP), pp. 665–674.
ECOOP-2017-HuangR #concurrent #performance #perspective #precise #what- What's the Optimal Performance of Precise Dynamic Race Detection? - A Redundancy Perspective (JH, AKR), p. 22.
OOPSLA-2017-AdamsenMT #concurrent #javascript #web- Practical initialization race detection for JavaScript web applications (CQA, AM, FT), p. 22.
OOPSLA-2017-RiceAJJPA #fault- Detecting argument selection defects (AR, EA, CJ, EJ, MP, YAP), p. 22.
OOPSLA-2017-WoodCBG #bias #concurrent- Instrumentation bias for dynamic data race detection (BPW, MC, MDB, DG), p. 31.
LOPSTR-2017-AlbertGI #concurrent #effectiveness #generative- Generation of Initial Contexts for Effective Deadlock Detection (EA, MGZ, MI), pp. 3–19.
LOPSTR-2017-LaneveG #bytecode #concurrent #java- Deadlock Detection of Java Bytecode (CL, AG), pp. 37–53.
PEPM-2017-MatsushitaS - Detecting code clones with gaps by function applications (TM, IS), pp. 12–22.
PLDI-2017-RhodesFF #concurrent #named #static analysis- BigFoot: static check placement for dynamic race detection (DR, CF, SNF), pp. 141–156.
PLDI-2017-SanthiarK #c# #concurrent #source code- Static deadlock detection for asynchronous C# programs (AS, AK), pp. 292–305.
POPL-2017-LidburyD #concurrent- Dynamic race detection for C++11 (CL, AFD), pp. 443–457.
ASE-2017-ChenODL #static analysis #web- Static detection of asymptotic resource side-channel vulnerabilities in web applications (JC, OO, ID, CL), pp. 229–239.
ASE-2017-FazziniO #automation #consistency #mobile #nondeterminism #platform- Automated cross-platform inconsistency detection for mobile apps (MF, AO), pp. 308–318.
ASE-2017-LeeHR #all about #injection #process #semantics- All about activity injection: threats, semantics, and detection (SL, SH, SR), pp. 252–262.
ASE-2017-LeeYSNM #android #named #security #visualisation- SEALANT: a detection and visualization tool for inter-app security vulnerabilities in Android (YKL, PY, AS, DN, NM), pp. 883–888.
ASE-2017-MathisASBZ #data flow- Detecting information flow by mutating input data (BM, VA, EOS, MB, AZ), pp. 263–273.
ASE-2017-OcarizaP0 #consistency #nondeterminism #web- Detecting unknown inconsistencies in web applications (FSOJ, KP, AM0), pp. 566–577.
ASE-2017-RatolR - Detecting fragile comments (IKR, MPR), pp. 112–122.
ASE-2017-ZhouSLCL #named- UNDEAD: detecting and preventing deadlocks in production software (JZ, SS, HL, YC0, TL), pp. 729–740.
ESEC-FSE-2017-AliabadiKGP #cyber-physical #invariant #named #security- ARTINALI: dynamic invariant detection for cyber-physical system security (MRA, AAK, JGS, KP), pp. 349–361.
ESEC-FSE-2017-ChaparroLZMPMBN #debugging- Detecting missing information in bug descriptions (OC, JL, FZ, LM, MDP, AM, GB, VN), pp. 396–407.
ESEC-FSE-2017-GuoCY #concurrent #execution #named #thread- AtexRace: across thread and execution sampling for in-house race detection (YG, YC0, ZY), pp. 315–325.
ESEC-FSE-2017-Mujahid #android #case study #smarttech- Detecting wearable app permission mismatches: a case study on Android wear (SM), pp. 1065–1067.
ESEC-FSE-2017-PastoreM #automation #fault #named- VART: a tool for the automatic detection of regression faults (FP, LM), pp. 964–968.
- ICSE-2017-ChenJ #anti
- Characterizing and detecting anti-patterns in the logging code (BC, ZM(J), pp. 71–81.
- ICSE-2017-ChoudharyLP #concurrent #generative #performance #safety #testing #thread
- Efficient detection of thread safety violations via coverage-guided generation of concurrent tests (AC, SL, MP), pp. 266–277.
- ICSE-2017-GaoBB #debugging #javascript
- To type or not to type: quantifying detectable bugs in JavaScript (ZG, CB, ETB), pp. 758–769.
- ICSE-2017-HawkinsD #named #php
- ZenIDS: introspective intrusion detection for PHP applications (BH, BD), pp. 232–243.
- ICSE-2017-LiWWWWLXH #android #library #named #precise #scalability
- LibD: scalable and precise third-party library detection in android markets (ML, WW, PW0, SW0, DW, JL, RX, WH), pp. 335–346.
- ICSE-2017-PadhyeS #dynamic analysis #named #traversal
- Travioli: a dynamic analysis for detecting data-structure traversals (RP, KS), pp. 473–483.
- ICSE-2017-RodegheroJAM #developer #summary
- Detecting user story information in developer-client conversations to generate extractive summaries (PR, SJ, AA, CM), pp. 49–59.
- ICSE-2017-ThomeSBB #constraints #string #theorem proving
- Search-driven string constraint solving for vulnerability detection (JT, LKS, DB, LCB), pp. 198–208.
- ICSE-2017-VendomeVBPGP #exception #machine learning #open source
- Machine learning-based detection of open source license exceptions (CV, MLV, GB, MDP, DMG, DP), pp. 118–129.
- ICSE-2017-ZhouGCHPG #api #documentation #fault
- Analyzing APIs documentation and code to detect directive defects (YZ0, RG, TC, ZH, SP, HCG), pp. 27–37.
ASPLOS-2017-LiuLLLLGT #automation #concurrent #debugging #distributed #named- DCatch: Automatically Detecting Distributed Concurrency Bugs in Cloud Systems (HL, GL, JFL, JL, SL, HSG, CT0), pp. 677–691.
ASPLOS-2017-ZhangJL #concurrent #named- ProRace: Practical Data Race Detection for Production Use (TZ, CJ, DL), pp. 149–162.
CASE-2017-ChenWWWC #big data #classification #fault #multi- Big data analytic for multivariate fault detection and classification in semiconductor manufacturing (YJC, BCW, JZW, YCW, CFC), pp. 731–736.
CASE-2017-ChenZ #automation #multi #using- An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
CASE-2017-HanCZ #approach #matrix- Matrix approach to detectability of discrete event systems under partial observation (XH, ZC, JZ), pp. 187–192.
CASE-2017-JiaSYCYG #big data #data analysis #multi- Big-data analysis of multi-source logs for anomaly detection on network-based system (ZJ, CS0, XY, YC, TY, XG), pp. 1136–1141.
CASE-2017-KimV #adaptation #fault- Quadruple adaptive redundancy with fault detection estimator (DK, RMV), pp. 542–547.
CASE-2017-LuanWZCZ #fault #process- Porosity defect detection based on FastICA-RBF during pulsed TIG welding process (RL, GW, RZ, ZC, ZZ), pp. 548–553.
CASE-2017-LuLAHH - Generalized Haar filter based CNN for object detection in traffic scenes (KL, JL, XA, HH, XH0), pp. 1657–1662.
CASE-2017-LuRSW #learning #visual notation- Visual guided deep learning scheme for fall detection (NL, XR, JS, YW), pp. 801–806.
CASE-2017-RonB #clustering- Density based clustering for detection of robotic operations (MR, PB), pp. 314–319.
CASE-2017-SaezMBT #analysis #cyber-physical- Anomaly detection and productivity analysis for cyber-physical systems in manufacturing (MS, FPM, KB, DMT), pp. 23–29.
CASE-2017-TanGCCT #automation- Automated vision based detection of blistering on metal surface: For robot (WCT, PCG, AC, IMC, HKT), pp. 74–79.
CASE-2017-ZhaoSY - Obstacle detection and avoidance for autonomous bicycles (MZ, SS, YY), pp. 1310–1315.
CASE-2017-ZouZ #analysis- Occupancy detection in elevator car by fusing analysis of dual videos (JZ, QZ), pp. 906–911.
CC-2017-BiswasCZBW #concurrent #lightweight- Lightweight data race detection for production runs (SB, MC, MZ, MDB, BPW), pp. 11–21.
CGO-2017-ErbCG - Dynamic buffer overflow detection for GPGPUs (CE, MC, JLG), pp. 61–73.
CGO-2017-JimboreanWEKR #automation- Automatic detection of extended data-race-free regions (AJ, JW, PE, SK, AR), pp. 14–26.
CADE-2017-0001SUP #consistency #first-order #knowledge base #nondeterminism #scalability- Detecting Inconsistencies in Large First-Order Knowledge Bases (SS0, GS, JU, AP), pp. 310–325.
CAV-2017-AlurDLS #gpu #named #source code- GPUDrano: Detecting Uncoalesced Accesses in GPU Programs (RA, JD, OSNL, NS), pp. 507–525.
CAV-2017-SinghBM #debugging #fault #formal method #locality #named #validation- E-QED: Electrical Bug Localization During Post-silicon Validation Enabled by Quick Error Detection and Formal Methods (ES, CWB, SM), pp. 104–125.
ICST-2017-Gay #fault #generative #search-based #testing- The Fitness Function for the Job: Search-Based Generation of Test Suites That Detect Real Faults (GG), pp. 345–355.
ICST-2017-TangCZGXHBM #android #automation #named #verification- NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps (JT, XC, ZZ0, SG, XSX, CH, TB, BM), pp. 492–499.
VMCAI-2017-CuoqRC #alias #strict- Detecting Strict Aliasing Violations in the Wild (PC, LR, AC), pp. 14–33.
VMCAI-2017-MukherjeeKD #kernel- Detecting All High-Level Dataraces in an RTOS Kernel (SM, AK, DD), pp. 405–423.
ECSA-2016-KaptoEKT #analysis #approach #architecture #evolution #source code- Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
WICSA-2016-FontanaRZRC #architecture #case study #experience- An Experience Report on Detecting and Repairing Software Architecture Erosion (FAF, RR, MZ, CR, RC), pp. 21–30.
WICSA-2016-YuanM #architecture #component #interactive #mining #security- Mining Software Component Interactions to Detect Security Threats at the Architectural Level (EY, SM), pp. 211–220.
EDM-2016-BlanchardDOSKSW #automation #education- Semi-Automatic Detection of Teacher Questions from Human-Transcripts of Audio in Live Classrooms (NB, PJD, AO, BS, SK, XS, BW, MN, SKD), pp. 288–291.
EDM-2016-HuttMWDD #learning- The Eyes Have It: Gaze-based Detection of Mind Wandering during Learning with an Intelligent Tutoring System (SH, CM, SW, PJD, SKD), pp. 86–93.
EDM-2016-MatsudaCS #how #question- How quickly can wheel spinning be detected? (NM, SC, JCS), pp. 607–608.
EDM-2016-MillsBWD #automation- Automatic Gaze-Based Detection of Mind Wandering during Film Viewing (CM, RB, XW, SKD), pp. 30–37.
ICPC-2016-MakiharaIYFI #behaviour #programming- Detecting exploratory programming behaviors for introductory programming exercises (EM, HI, NY, KF, HI), pp. 1–4.
ICPC-2016-OguraYHHK #exclamation #injection #java- Hey! Are you injecting side effect?: A tool for detecting purity changes in java methods (NO, JY, KH, YH, SK), pp. 1–3.
ICPC-2016-PalombaPLOZ #smell- A textual-based technique for Smell Detection (FP, AP, ADL, RO, AZ), pp. 1–10.
ICPC-2016-VasquezHP #android #automation #on the- On automatically detecting similar Android apps (MLV, AH, DP), pp. 1–10.
ICSME-2016-FontanaPRZ #architecture #automation #smell- Automatic Detection of Instability Architectural Smells (FAF, IP, RR, MZ), pp. 433–437.
ICSME-2016-Palomba #smell- Alternative Sources of Information for Code Smell Detection: Postcards from Far Away (FP), pp. 636–640.
ICSME-2016-PuntVZ16a #css #refactoring- A Tool for Detecting and Refactoring the A?B*A Pattern in CSS (LP, SV, VZ), p. 613.
ICSME-2016-RostamiEMT #javascript- Detecting Function Constructors in JavaScript (SR, LME, DM, NT), pp. 488–492.
ICSME-2016-SvajlenkoR #clone detection #evaluation #framework #named- BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench (JS, CKR), pp. 596–600.
ICSME-2016-WuHTW #web- Detect Cross-Browser Issues for JavaScript-Based Web Applications Based on Record/Replay (GW, MH, HT, JW0), pp. 78–87.
MSR-2016-AhmedBCHS #case study #effectiveness #experience #performance #tool support #web- Studying the effectiveness of application performance management (APM) tools for detecting performance regressions for web applications: an experience report (TMA, CPB, THC, AEH, WS), pp. 1–12.
MSR-2016-AmannNNNM #benchmark #metric #named- MUBench: a benchmark for API-misuse detectors (SA, SN, HAN, TNN, MM), pp. 464–467.
MSR-2016-GomezRAS #android #automation #mining #performance #repository #user interface- Mining test repositories for automatic detection of UI performance regressions in Android apps (MG0, RR, BA, LS), pp. 13–24.
MSR-2016-IshioKKGI #component #java #reuse- Software ingredients: detection of third-party component reuse in Java software release (TI, RGK, TK0, DMG, KI), pp. 339–350.
MSR-2016-MantylaADGO #mining #question- Mining valence, arousal, and dominance: possibilities for detecting burnout and productivity? (MM, BA, GD, DG, MO), pp. 247–258.
SANER-2016-MloukiKA #android #ecosystem #on the- On the Detection of Licenses Violations in the Android Ecosystem (OM, FK, GA), pp. 382–392.
SCAM-2016-HollandSAK #algorithm #complexity #dynamic analysis #tool support- Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities (BH, GRS, PA, SK), pp. 79–84.
DLT-2016-Basten #ambiguity #automaton #multi #using- Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
FM-2016-BohmMJ #concurrent #reduction- State-Space Reduction of Non-deterministically Synchronizing Systems Applicable to Deadlock Detection in MPI (SB, OM, PJ), pp. 102–118.
- IFM-2016-AlbertGI #concurrent #static analysis #testing
- Combining Static Analysis and Testing for Deadlock Detection (EA, MGZ, MI), pp. 409–424.
CIG-2016-IkedaVS - Detection and labeling of bad moves for coaching go (KI, SV, NS), pp. 1–8.
CIKM-2016-0064NRR #framework #identification #learning #multi- A Multiple Instance Learning Framework for Identifying Key Sentences and Detecting Events (WW0, YN, HR, NR), pp. 509–518.
CIKM-2016-AlabdulmohsinHS #graph- Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph (IMA, YH, YS, XZ0), pp. 2395–2400.
CIKM-2016-HeindorfPSE - Vandalism Detection in Wikidata (SH, MP, BS0, GE), pp. 327–336.
CIKM-2016-JangFDA #probability- Probabilistic Approaches to Controversy Detection (MJ, JF, SDH, JA), pp. 2069–2072.
CIKM-2016-JinFF #approach #collaboration- A Context-aware Collaborative Filtering Approach for Urban Black Holes Detection (LJ, ZF, LF), pp. 2137–2142.
CIKM-2016-LiangP #robust- Robust Contextual Outlier Detection: Where Context Meets Sparsity (JL, SP0), pp. 2167–2172.
CIKM-2016-LiuLNFTAKVPWMDV #realtime #scalability #twitter #verification- Reuters Tracer: A Large Scale System of Detecting & Verifying Real-Time News Events from Twitter (XL, QL, AN, RF, MT, KA, RK, MV, SP, RW, RM, JD, AV, WK, SS), pp. 207–216.
CIKM-2016-LiuLZZMYL #query- Detecting Promotion Campaigns in Query Auto Completion (YL, YL, KZ0, MZ0, SM, YY, HL), pp. 125–134.
CIKM-2016-LiuZCC #graph #statistics #topic- Graph Topic Scan Statistic for Spatial Event Detection (YL, BZ, FC0, DWC), pp. 489–498.
CIKM-2016-SampsonMWL #social #social media- Leveraging the Implicit Structure within Social Media for Emergent Rumor Detection (JS, FM, LW0, HL0), pp. 2377–2382.
CIKM-2016-SuyehiraS #named #wiki- DePP: A System for Detecting Pages to Protect in Wikipedia (KS, FS), pp. 2081–2084.
CIKM-2016-TutekGSMB #concept #knowledge base #ranking #using- Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
CIKM-2016-Wang0PB #algorithm #cpu #online #self- A Self-Learning and Online Algorithm for Time Series Anomaly Detection, with Application in CPU Manufacturing (XW0, JL0, NP, MB), pp. 1823–1832.
CIKM-2016-WangZHZ #fault #wiki- Error Link Detection and Correction in Wikipedia (CW0, RZ0, XH, AZ), pp. 307–316.
ECIR-2016-PotthastKSH - Clickbait Detection (MP, SK, BS0, MH), pp. 810–817.
ECIR-2016-SochenkovZTSSSO - Exactus Like: Plagiarism Detection in Scientific Texts (IS, DZ, IT, IS, AS, RS, GSO), pp. 837–840.
ICML-2016-GuhaMRS #random #robust- Robust Random Cut Forest Based Anomaly Detection on Streams (SG, NM, GR, OS), pp. 2712–2721.
ICML-2016-SangnierGR #proximity #reliability #representation #using- Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
ICML-2016-ZhaiCLZ #energy #modelling- Deep Structured Energy Based Models for Anomaly Detection (SZ, YC, WL, ZZ), pp. 1100–1109.
ICPR-2016-0003BP #3d #symmetry- Detection and characterization of Intrinsic symmetry of 3D shapes (AM0, SMB, FP), pp. 1815–1820.
ICPR-2016-AbdicFBARMS #approach #learning- Detecting road surface wetness from audio: A deep learning approach (IA, LF, DEB, WA, BR, EM, BWS), pp. 3458–3463.
ICPR-2016-AghaeiDR #interactive #social- With whom do I interact? Detecting social interactions in egocentric photo-streams (MA, MD, PR), pp. 2959–2964.
ICPR-2016-Altamirano-Gomez #algebra #geometry- Conformal Geometric Algebra method for detection of geometric primitives (GEAG, EBC), pp. 4190–4195.
ICPR-2016-AnZH #online- Online RGB-D tracking via detection-learning-segmentation (NA, XZ, ZGH), pp. 1231–1236.
ICPR-2016-BillingsAB #analysis #image- Ultrasound image analysis for myopathy detection (SB, JA, PB), pp. 1461–1465.
ICPR-2016-BlondelPPLL #collaboration- Dynamic collaboration of far-infrared and visible spectrum for human detection (PB, AP, CP, RL, DL), pp. 698–703.
ICPR-2016-BrownF #smarttech #using- Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
ICPR-2016-BulatovS #segmentation- Segmentation methods for detection of stationary vehicles in combined elevation and optical data (DB, HS), pp. 603–608.
ICPR-2016-CapuaNP #network #social- Unsupervised cyber bullying detection in social networks (MDC, EDN, AP), pp. 432–437.
ICPR-2016-ChenGLZY - Appearance changes detection during tracking (WC, XG0, XL, EZ, JY), pp. 1821–1826.
ICPR-2016-ChenWHF #estimation #learning- Deep learning for integrated hand detection and pose estimation (TYC, MYW, YHH, LCF), pp. 615–620.
ICPR-2016-ChoiKPS #multi #network- Multi-spectral pedestrian detection based on accumulated object proposal with fully convolutional networks (HC, SK, KP, KS), pp. 621–626.
ICPR-2016-DupontMG #recognition- Detecting low-quality reference time series in stream recognition (MD, PFM, NG), pp. 2556–2561.
ICPR-2016-EggertWZL - Saliency-guided selective magnification for company logo detection (CE, AW, DZ, RL), pp. 651–656.
ICPR-2016-FengSZ #multi- Scene text detection based on multi-scale SWT and edge filtering (YF, YS, YZ0), pp. 645–650.
ICPR-2016-GabrE #runtime- Enhancing the runtime of JUDOCA detector (MG, RE), pp. 669–674.
ICPR-2016-GligorijevicPZ #community #graph #multi- Fusion and community detection in multi-layer graphs (VG, YP, SZ), pp. 1327–1332.
ICPR-2016-GouWWWJ - Learning-by-synthesis for accurate eye detection (CG, YW0, KW, FYW0, QJ), pp. 3362–3367.
ICPR-2016-GuoDFS #robust #using- A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
ICPR-2016-HuangWL - Egocentric hand detection via region growth (SH, WW, KL), pp. 639–644.
ICPR-2016-IshiiSIMSIN #classification #multi- Detection by classification of buildings in multispectral satellite imagery (TI, ESS, SI, YM, AS, HI0, RN), pp. 3344–3349.
ICPR-2016-IwataOWK #recognition #retrieval #video- Recognition and transition frame detection of Arabic news captions for video retrieval (SI, WO, TW, FK), pp. 4005–4010.
ICPR-2016-JeongKKN - Facial landmark detection based on an ensemble of local weighted regressors during real driving situation (MJ, JYK, BK, JYN), pp. 2198–2203.
ICPR-2016-JordaoSS #approach #multi- A late fusion approach to combine multiple pedestrian detectors (AJ, JSdS, WRS), pp. 4250–4255.
ICPR-2016-KerautretKDL16a - Centerline detection on partial mesh scans by confidence vote in accumulation map (BK, AK, IDR, JOL), pp. 1376–1381.
ICPR-2016-KilicarslanZR - Pedestrain detection from motion (MK, JYZ, KR), pp. 1857–1863.
ICPR-2016-KimP #approach #network #using- A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPR-2016-KondratevS #automation #constraints #geometry #image #using- Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
ICPR-2016-KovvuriNS #modelling- Segment-based models for event detection and recounting (RK, RN, CGMS), pp. 3868–3873.
ICPR-2016-KuranukiP - Minimal filtered channel features for pedestrian detection (YK, IP), pp. 681–686.
ICPR-2016-LangenkamperN #architecture #classification #learning #online #realtime- COATL - a learning architecture for online real-time detection and classification assistance for environmental data (DL, TWN), pp. 597–602.
ICPR-2016-LeHWO #performance- Temporally subsampled detection for accurate and efficient face tracking and diarization (NL, AH, DW0, JMO), pp. 1792–1797.
ICPR-2016-LeZZLS #robust- Robust hand detection in Vehicles (THNL, CZ, YZ, KL, MS), pp. 573–578.
ICPR-2016-LiH #approach #image #performance- A fast approach for traffic panel detection from natural scene images (ZML, LLH), pp. 579–584.
ICPR-2016-LiKZYP #anti- Generalized face anti-spoofing by detecting pulse from face videos (XL, JK, GZ, PCY, MP), pp. 4244–4249.
ICPR-2016-LuYLLZ - Edge chain detection by applying Helmholtz principle on gradient magnitude map (XL, JY, LL0, YL, WZ), pp. 1364–1369.
ICPR-2016-MaioranoP - Granular trajectory based anomaly detection for surveillance (FM, AP), pp. 2066–2072.
ICPR-2016-MinciulloC #analysis #automation- Fully automated shape analysis for detection of Osteoarthritis from lateral knee radiographs (LM, TFC), pp. 3787–3791.
ICPR-2016-MollerNN16a #clustering #image #using- Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
ICPR-2016-MuthuswamyR - Salient object detection in tracking shots (KM, DR), pp. 1780–1785.
ICPR-2016-NakamuraOB #process- Detection of groups in crowd considering their activity state (KN, TO, NB), pp. 277–282.
ICPR-2016-Ohn-BarT #locality #modelling #multi- Detection and localization with multi-scale models (EOB, MMT), pp. 1382–1387.
ICPR-2016-Ohn-BarT16a - To boost or not to boost? On the limits of boosted trees for object detection (EOB, MMT), pp. 3350–3355.
ICPR-2016-OrtellsM #case study- Detection of duplicate identities in streams of biometric samples: A gait-based case study (JO, RAM), pp. 2983–2988.
ICPR-2016-PalaniappanPAVF #using- Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
ICPR-2016-PangN #3d #multi #network- 3D point cloud object detection with multi-view convolutional neural network (GP, UN), pp. 585–590.
ICPR-2016-PeiYKY #multi- Multi-orientation scene text detection with multi-information fusion (WYP, CY, LJK, XCY), pp. 657–662.
ICPR-2016-Prado-RomeroA - Detecting contextual collective anomalies at a Glance (MAPR, AGA), pp. 2532–2537.
ICPR-2016-QinSLPT #categorisation #recognition #video- Video scene text frames categorization for text detection and recognition (LQ, PS, TL, UP0, CLT), pp. 3886–3891.
ICPR-2016-QuachtranHS #learning #using- Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
ICPR-2016-Ren0YZH0 #novel #recognition- A novel text structure feature extractor for Chinese scene text detection and recognition (XR, KC0, XY, YZ0, JH, JS0), pp. 3380–3385.
ICPR-2016-Sahbi #image #interactive- Misalignment resilient CCA for interactive satellite image change detection (HS), pp. 3326–3331.
ICPR-2016-SalaunMM16a #multi #robust- Multiscale line segment detector for robust and accurate SfM (YS, RM, PM), pp. 2000–2005.
ICPR-2016-ShanXS #video- A new method for spatiotemporal textual saliency detection in video (SS, HX, FS), pp. 3240–3245.
ICPR-2016-SidibeRM #multi #on the #using- On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
ICPR-2016-SinghTSV - Detection of glare in night photography (MS, RKT, KS, AV), pp. 865–870.
ICPR-2016-SuCHH #image #modelling #recognition #symmetry #using- Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
ICPR-2016-SukS #analysis #retrieval- Solar flare retrieval, detection and analysis (TS, SS), pp. 1183–1188.
ICPR-2016-SunBTTH #learning #locality #using- Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
ICPR-2016-SunHL #image #using- Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
ICPR-2016-SwamiDKV #image #robust- A robust flash image shadow detection method and seamless recovery of shadow regions (KS, SKD, GK, AV), pp. 2836–2841.
ICPR-2016-TakabeTKSMNY #consistency #using- Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
ICPR-2016-TakezawaHT #documentation #image #using- Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
ICPR-2016-TianMO #embedded #low cost #recognition #using- Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
ICPR-2016-Triantafyllidou #incremental #learning #network- Face detection based on deep convolutional neural networks exploiting incremental facial part learning (DT, AT), pp. 3560–3565.
ICPR-2016-VandoniHA #process- Crack detection based on a Marked Point Process model (JV, SLHM, EA), pp. 3933–3938.
ICPR-2016-VoTPV #classification #modelling- Model-based classification and novelty detection for point pattern data (BNV, NQT, DQP, BTV), pp. 2622–2627.
ICPR-2016-WangZQL #framework- RGB-D saliency detection under Bayesian framework (STW, ZZ, HBQ, BL), pp. 1881–1886.
ICPR-2016-WangZYP #classification- Anomaly detection in crowded scenes by SL-HOF descriptor and foreground classification (SW, EZ, JY, FP), pp. 3398–3403.
ICPR-2016-Yamada #network- Pedestrian detection with a resolution-aware convolutional network (KY), pp. 591–596.
ICPR-2016-YamashitaFYF #multi #network #using- Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
ICPR-2016-YangN #multi #network- A multi-scale cascade fully convolutional network face detector (ZY, RN), pp. 633–638.
ICPR-2016-YangSZ #network- A joint facial point detection method of deep convolutional network and shape regression (TY, CS, NZ), pp. 543–548.
ICPR-2016-YunLYKC - Attention-inspired moving object detection in monocular dashcam videos (KY, JL, SY, SWK, JYC0), pp. 2706–2711.
ICPR-2016-ZayeneHTMHIA #contest #recognition #video- ICPR2016 contest on Arabic Text detection and Recognition in video frames - AcTiVComp (OZ, NH, SMT, SBM, JH, RI, NEBA), pp. 187–191.
ICPR-2016-ZemeneTPP #clustering #set #using- Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
ICPR-2016-ZhangHMCP #3d #analysis #image- Face spoofing detection based on 3D lighting environment analysis of image pair (XZ, XH, MM, CC0, SP), pp. 2995–3000.
ICPR-2016-ZhangXLPQ #image #robust- Robust road detection from a single image (JZ, SYX, KL, HP, AKQ), pp. 859–864.
ICPR-2016-ZhangZ #effectiveness #video- Effective real-scenario Video Copy Detection (YZ, XZ), pp. 3951–3956.
ICPR-2016-ZhangZZB #symmetry- Symmetry-based object proposal for text detection (XZ, ZZ, CZ, XB), pp. 709–714.
KDD-2016-BurgessGKWWHG #reuse- The Legislative Influence Detector: Finding Text Reuse in State Legislation (MB, EG, JKS, JW, DW, LH, RG), pp. 57–66.
KDD-2016-DuLZHX #scalability- Catch Me If You Can: Detecting Pickpocket Suspects from Large-Scale Transit Records (BD, CL, WZ, ZH, HX), pp. 87–96.
KDD-2016-HeLMCSY #community #composition- Joint Community and Structural Hole Spanner Detection via Harmonic Modularity (LH0, CTL, JM, JC, LS, PSY), pp. 875–884.
KDD-2016-HuVQ #performance- Temporal Order-based First-Take-All Hashing for Fast Attention-Deficit-Hyperactive-Disorder Detection (HH, JVG, GJQ), pp. 905–914.
KDD-2016-ManzoorMA #graph #performance #streaming- Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs (EAM, SMM, LA), pp. 1035–1044.
KDD-2016-MelnykBMO #markov #modelling- Semi-Markov Switching Vector Autoregressive Model-Based Anomaly Detection in Aviation Systems (IM, AB, BLM, NCO), pp. 1065–1074.
KDD-2016-NandiMADB #control flow #execution #graph #mining #using- Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
KDD-2016-PaparrizosWH - Detecting Devastating Diseases in Search Logs (JP, RWW, EH), pp. 559–568.
KDD-2016-ReisFMB #incremental #online #performance #using- Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
KDD-2016-XuYYXZ #network- Talent Circle Detection in Job Transition Networks (HX, ZY0, JY, HX, HZ), pp. 655–664.
KDD-2016-ZhaoATBDBKD #approach #parametricity #strict #using- A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
ICMT-2016-StrueberPA #clone detection #graph #model transformation #transformation language- Clone Detection for Graph-Based Model Transformation Languages (DS, JP, VA), pp. 191–206.
MoDELS-2016-DeVriesC #analysis #automation #requirements- Automatic detection of incomplete requirements via symbolic analysis (BD, BHCC), pp. 385–395.
OOPSLA-2016-HuangR #concurrent #precise- Precise and maximal race detection from incomplete traces (JH0, AKR), pp. 462–476.
AdaEurope-2016-LaaliLHSS #fault #online #testing #using- Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
PLDI-2016-EizenbergHPD #named #online #virtual machine- Remix: online detection and repair of cache contention for the JVM (AE, SH, GP, JD), pp. 251–265.
ASE-2016-ChengPJZYZ #mining- Mining revision histories to detect cross-language clones without intermediates (XC, ZP, LJ, HZ, HY, JZ), pp. 696–701.
ASE-2016-DegiovanniRACA #satisfiability- Goal-conflict detection based on temporal satisfiability checking (RD, NR, DA, PFC, NA), pp. 507–518.
ASE-2016-DemuthRE #consistency #developer #multi #nondeterminism #performance- Efficient detection of inconsistencies in a multi-developer engineering environment (AD, MRE, AE), pp. 590–601.
ASE-2016-LinZCZ #api #java #named- LockPeeker: detecting latent locks in Java APIs (ZL, HZ, YC, JZ), pp. 368–378.
ASE-2016-PeldszusKLS #design #evolution #incremental #multi #object-oriented #pattern matching #source code #using- Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
ASE-2016-VojdaniARSVV #approach #concurrent- Static race detection for device drivers: the Goblint approach (VV, KA, VR, HS, VV, RV), pp. 391–402.
ASE-2016-WangCMT #debugging #modelling #n-gram #named- Bugram: bug detection with n-gram language models (SW, DC, DMA, LT), pp. 708–719.
ASE-2016-WeiLC #android- Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps (LW, YL, SCC), pp. 226–237.
ASE-2016-WhiteTVP #clone detection #learning- Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
ASE-2016-WuLDYZ #android #effectiveness #named #static analysis- Relda2: an effective static analysis tool for resource leak detection in Android apps (TW, JL, XD, JY, JZ), pp. 762–767.
FSE-2016-CaiZCL #concurrent- A deployable sampling strategy for data race detection (YC0, JZ, LC, JL), pp. 810–821.
FSE-2016-DhokR #generative #testing- Directed test generation to detect loop inefficiencies (MD, MKR), pp. 895–907.
FSE-2016-DouCGXXW #smell #spreadsheet- Detecting table clones and smells in spreadsheets (WD, SCC, CG, CX0, LX, JW0), pp. 787–798.
FSE-2016-GyoriLSLM #api #debugging #java #named #specification- NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications (AG, BL, AS, OL, DM), pp. 993–997.
FSE-2016-HuangZT #analysis #correlation- Detecting sensitive data disclosure via bi-directional text correlation analysis (JH0, XZ0, LT0), pp. 169–180.
FSE-2016-Kellogg #debugging #generative #testing- Combining bug detection and test case generation (MK), pp. 1124–1126.
FSE-2016-LiuXCT #android #comprehension- Understanding and detecting wake lock misuses for Android applications (YL, CX0, SCC, VT), pp. 396–409.
FSE-2016-SuBHSKJ - Code relatives: detecting similarly behaving software (FHS, JB0, KH, SS, GEK, TJ), pp. 702–714.
FSE-2016-WangZHXZ0 #fault #float- Detecting and fixing precision-specific operations for measuring floating-point errors (RW, DZ, XH, YX, LZ0, GH0), pp. 619–630.
FSE-2016-Xu0ZX #analysis #debugging #predict #python- Python predictive analysis for bug detection (ZX, PL0, XZ0, BX), pp. 121–132.
FSE-2016-YogaNG #concurrent #parallel #source code- Parallel data race detection for task parallel programs with locks (AY, SN, AG), pp. 833–845.
FSE-2016-ZhanH #concurrent #ide #named- ECHO: instantaneous in situ race detection in the IDE (SZ, JH0), pp. 775–786.
FSE-2016-ZhouW #analysis #api #web- API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
- ICSE-2016-CheungCLX #automation #clustering #named #smell #spreadsheet #using
- CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
- ICSE-2016-LiuCB #dynamic analysis #fault #named #performance #precise
- DoubleTake: fast and precise error detection via evidence-based dynamic analysis (TL, CC, EDB), pp. 911–922.
- ICSE-2016-SajnaniSSRL #clone detection #named #scalability
- SourcererCC: scaling code clone detection to big-code (HS, VS, JS, CKR, CVL), pp. 1157–1168.
- ICSE-2016-SlavinWHHKBBN #android #framework #policy #privacy #towards
- Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
ASPLOS-2016-ZhangLJ #concurrent #hardware #memory management #named #performance #transaction #using- TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
CASE-2016-FernandesYDS #privacy #smarttech #social- Detection of privacy-sensitive situations for social robots in smart homes (FEFJ, GY, HMD, WS), pp. 727–732.
CASE-2016-GonzalezF #online #process- MEMS accelerometer-based system for inexpensive online CNC milling process chatter detection (DMOG, JCEF), pp. 978–983.
CASE-2016-LiZHS #fault #identification- Fusing system configuration information for building cooling plant Fault Detection and severity level identification (DL, YZ, GH, CJS), pp. 1319–1325.
CASE-2016-SyJDD #clustering #graph- Graph-based clustering for detecting frequent patterns in event log data (ES, SAJ, AD, YD0), pp. 972–977.
CASE-2016-WangG #fault #online- On-line fault detection and diagnosis for chiller system (PW, RG), pp. 1313–1318.
CC-2016-NgY #concurrent #graph #synthesis- Static deadlock detection for concurrent go by global session graph synthesis (NN, NY), pp. 174–184.
CC-2016-RodriguesPA #representation- Sparse representation of implicit flows with applications to side-channel detection (BR, FMQP, DFA), pp. 110–120.
CC-2016-WuYR #android #energy #fault #static analysis- Static detection of energy defect patterns in Android applications (HW, SY, AR), pp. 185–195.
CGO-2016-LiuL #effectiveness #named- Cheetah: detecting false sharing efficiently and effectively (TL, XL0), pp. 1–11.
CGO-2016-TymburibaMP #branch- Inference of peak density of indirect branches to detect ROP attacks (MT, REAM, FMQP), pp. 150–159.
FASE-2016-WeckesserLSRS #automation #bound #exclamation #feature model #modelling- Mind the Gap! Automated Anomaly Detection for Potentially Unbounded Cardinality-Based Feature Models (MW, ML, TS, BR, AS), pp. 158–175.
ICST-2016-AlameerMH #web- Detecting and Localizing Internationalization Presentation Failures in Web Applications (AA, SM, WGJH), pp. 202–212.
ICST-2016-ArcainiGV #automation #consistency #fault #feature model #modelling- Automatic Detection and Removal of Conformance Faults in Feature Models (PA, AG, PV), pp. 102–112.
ICST-2016-ShiGLM #implementation #nondeterminism #specification- Detecting Assumptions on Deterministic Implementations of Non-deterministic Specifications (AS, AG, OL, DM), pp. 80–90.
ICST-2016-YeZWL #debugging #empirical- An Empirical Study on Detecting and Fixing Buffer Overflow Bugs (TY, LZ, LW, XL), pp. 91–101.
ECSA-2015-HansenM #automation #community #composition #using- (Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
WICSA-2015-BangM #design #higher-order- Proactive Detection of Higher-Order Software Design Conflicts (JYB, NM), pp. 155–164.
WICSA-2015-MoCKX #architecture #automation #smell- Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells (RM, YC, RK, LX), pp. 51–60.
DocEng-2015-BarabucciBIMM #documentation #modelling #visualisation- Document Changes: Modeling, Detection, Storage and Visualization (DChanges 2015) (GB, UMB, ADI, SM, EVM), pp. 227–228.
DocEng-2015-WuS #evolution- Detecting XSLT Rules Affected by Schema Evolution (YW, NS), pp. 143–146.
DRR-2015-DeMDC #documentation #image- Detection of electrical circuit elements from documents images (PD, SM, AKD, BC).
HT-2015-KumarDCC #social #social media- Detecting Changes in Suicide Content Manifested in Social Media Following Celebrity Suicides (MK, MD, GC, MDC), pp. 85–94.
HT-2015-SchulzSS - Small-Scale Incident Detection based on Microposts (AS, BS, TS), pp. 3–12.
SIGMOD-2015-YanZHSMZM #distributed #using- Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
TPDL-2015-AlNoamanyWN #topic #web- Detecting Off-Topic Pages in Web Archives (YA, MCW, MLN), pp. 225–237.
VLDB-2015-ChuWLHP #clustering #named #scalability- ALID: Scalable Dominant Cluster Detection (LC, SW, SL, QH, JP), pp. 826–837.
VLDB-2015-PotharajuCHNWZJ #automation #knowledge base #named- ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection (RP, JC, LH, CNR, MW, LZ, NJ), pp. 1828–1839.
VLDB-2015-WangWYZ #benchmark #community #framework #metric #network #social- Community Detection in Social Networks: An In-depth Benchmarking Study with a Procedure-Oriented Framework (MW, CW, JXY, JZ), pp. 998–1009.
VLDB-2015-WuJLZ #community #robust- Robust Local Community Detection: On Free Rider Effect and Its Elimination (YW, RJ, JL, XZ), pp. 798–809.
EDM-2015-ChenBD #learning- Video-Based Affect Detection in Noninteractive Learning Environments (YC, NB, SKD), pp. 440–443.
EDM-2015-Garcia-SaizZ #consistency #performance- Detection of Learners with a Performance Inconsistent with Their Effort (DGS, MEZ), pp. 606–607.
EDM-2015-JohnPM #graph #problem #question #semantics #similarity #word- Semantic Similarity Graphs of Mathematics Word Problems: Can Terminology Detection Help? (RJLJ, RJP, TSM), pp. 452–455.
EDM-2015-KaiPBBDOSV #comparison #physics- A Comparison of Face-based and Interaction-based Affect Detectors in Physics Playground (SK, LP, RSB, NB, SKD, JO, VS, MV), pp. 77–84.
EDM-2015-KoprinskaSY #student- Students at Risk: Detection and Remediation (IK, JS, KY), pp. 512–515.
EDM-2015-MillsD #online #realtime #towards- Toward a Real-time (Day) Dreamcatcher: Detecting Mind Wandering Episodes During Online Reading (CM, SKD), pp. 69–76.
EDM-2015-PaquetteRBMLDBS #comparison #multi- Sensor-Free or Sensor-Full: A Comparison of Data Modalities in Multi-Channel Affect Detection (LP, JPR, RSB, BWM, JCL, JD, KWB, RAS, VG), pp. 93–100.
SCAM-J-2013-CeruloPBCC15 #markov #named- Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
ICPC-2015-BenomarASPS #development #evolution #process- Detection of software evolution phases based on development activities (OB, HA, HAS, PP, MAS), pp. 15–24.
ICPC-2015-SohTAW #android #user interface- Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
ICSME-2015-Aniche #development #smell #web- Detection strategies of smells in web software development (MFA), pp. 598–601.
ICSME-2015-LuciaDGR #automation #behaviour #design pattern #dynamic analysis #towards- Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSME-2015-LuciaDGRP #behaviour #design pattern #named- ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
ICSME-2015-PoluriR #concurrent- Deterministic dynamic race detection across program versions (SVP, MKR), pp. 181–190.
ICSME-2015-SvajlenkoR #clone detection #tool support- Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
ICSME-2015-VasquezVLP #android #developer #how #performance- How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
MSR-2015-SinhaSDPM #repository #source code- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
MSR-2015-WuMKGI #consistency #nondeterminism #open source #scalability- A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
SANER-2015-AggarwalRTHGS #debugging #re-engineering- Detecting duplicate bug reports with software engineering domain knowledge (KA, TR, FT, AH, RG, ES), pp. 211–220.
SANER-2015-HeroldEBCC #modelling- Detection of violation causes in reflexion models (SH, ME, JB, SC, MÓC), pp. 565–569.
SANER-2015-Keivanloo0Z #clone detection #java #repository #scalability- Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
SANER-2015-SassoML #problem- Misery loves company: CrowdStacking traces to aid problem detection (TDS, AM, ML), pp. 131–140.
SANER-2015-YangMT #design pattern #quality- Measuring the quality of design pattern detection results (SY, AM, VT), pp. 53–62.
SCAM-2015-FenskeSMS #smell #variability- When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAM-2015-NicolayNRM #javascript- Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
FM-2015-BagheriKMJ #android #bound #design #protocol #verification- Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FDG-2015-ReuterGS #automation #game studies #multi #petri net #using- Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
VS-Games-2015-Cejka #using- Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
GaM-2015-KulcsarDLVS #graph transformation- Improved Conflict Detection for Graph Transformation with Attributes (GK, FD, ML, GV, AS), pp. 97–112.
GaM-2015-RadwanH #refactoring #smell- Detecting and Refactoring Operational Smells within the Domain Name System (MR, RH), pp. 113–128.
GaM-2015-Wijs #confluence #lts- Confluence Detection for Transformations of Labelled Transition Systems (AW), pp. 1–15.
CHI-2015-GoelZVP #flexibility #gesture #named #using- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHI-2015-HuberLP - Detecting User Intention at Public Displays from Foot Positions (BH, JHL, JHP), pp. 3899–3902.
CHI-2015-KimCD #interactive #monitoring- Sensors Know When to Interrupt You in the Car: Detecting Driver Interruptibility Through Monitoring of Peripheral Interactions (SK, JC, AKD), pp. 487–496.
CHI-2015-LiYS #interactive #named- IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
CHI-2015-ManciniHAG #interface #multi- Re-Centering Multispecies Practices: A Canine Interface for Cancer Detection Dogs (CM, RH, BA, CG), pp. 2673–2682.
CHI-2015-OhCKL #documentation #named- ScanShot: Detecting Document Capture Moments and Correcting Device Orientation (JO, WC, JK, UL), pp. 953–956.
CSCW-2015-AzariaRK - An Agent for Deception Detection in Discussion Based Environments (AA, AR, SK), pp. 218–227.
CSCW-2015-FreitasD15a #multi #using- Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
HCI-IT-2015-BrahnamRNSB #design- Design of a Bullying Detection/Alert System for School-Wide Intervention (SB, JJR, LN, CLS, SLB), pp. 695–705.
HCI-IT-2015-FukumotoTE #using- Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCI-UC-2015-SanchezA #automation #interface #internet- Automatic Deformations Detection in Internet Interfaces: ADDII (LS, PTAJ), pp. 43–53.
HIMI-IKC-2015-SotokawaMNSI #evaluation- Driving Evaluation of Mild Unilateral Spatial Neglect Patients-Three High-Risk Cases Undetected by BIT After Recovery (TS, TM, JN, YS, MI), pp. 253–261.
LCT-2015-Ai #automation #fault #feedback #generative- Automatic Pronunciation Error Detection and Feedback Generation for CALL Applications (RA), pp. 175–186.
LCT-2015-CastilloDSTC #student- Model for Detecting Student Difficulties in Solving Formative Assessments (CC, NDD, AS, VT, DAOC), pp. 199–207.
SCSM-2015-Kanawati #community #network- Ensemble Selection for Community Detection in Complex Networks (RK), pp. 138–147.
CAiSE-2015-KhelladiHBRG #evolution #metamodelling- Detecting Complex Changes During Metamodel Evolution (DEK, RH, RB, JR, MPG), pp. 263–278.
CAiSE-2015-WeilerGS #performance #runtime #twitter- Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
ICEIS-v1-2015-BedoBOCCRTT #effectiveness #image #performance #social #social media- Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
ICEIS-v1-2015-Xylogiannopoulos #roadmap- Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
ICEIS-v2-2015-AlahmadiLN #internet #process #profiling #using- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEIS-v2-2015-CostaMAO #automation #consistency #named #nondeterminism- Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
CIKM-2015-CeroniGF #automation- Improving Event Detection by Automatically Assessing Validity of Event Occurrence in Text (AC, UKG, MF), pp. 1815–1818.
CIKM-2015-ChaeKCK #api #named- DAAV: Dynamic API Authority Vectors for Detecting Software Theft (DKC, SWK, SjC, YK), pp. 1819–1822.
CIKM-2015-DoanRSML #profiling- Profiling Pedestrian Distribution and Anomaly Detection in a Dynamic Environment (MTD, SR, MS, MM, CL), pp. 1827–1830.
CIKM-2015-GribelBA #approach #clustering- A Clustering-based Approach to Detect Probable Outcomes of Lawsuits (DLG, MGdB, LGA), pp. 1831–1834.
CIKM-2015-HassanLT - Detecting Check-worthy Factual Claims in Presidential Debates (NH, CL, MT), pp. 1835–1838.
CIKM-2015-KhudaBukhshBW #case study #classification #effectiveness #query #self- Building Effective Query Classifiers: A Case Study in Self-harm Intent Detection (ARK, PNB, RWW), pp. 1735–1738.
CIKM-2015-MaGWLW #information management #microblog #social #using- Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
CIKM-2015-MiyauchiK #algorithm #community #network #novel #quality #what- What Is a Network Community?: A Novel Quality Function and Detection Algorithms (AM0, YK), pp. 1471–1480.
CIKM-2015-WuSHY #microblog #social- Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization (FW, JS, YH, ZY), pp. 1601–1610.
CIKM-2015-ZafaraniL - 10 Bits of Surprise: Detecting Malicious Users with Minimum Information (RZ, HL0), pp. 423–431.
ECIR-2015-BuitinckATR #multi- Multi-emotion Detection in User-Generated Reviews (LB, JvA, ET, MdR), pp. 43–48.
ECIR-2015-CaoC #analysis #behaviour #social #social media- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIR-2015-Dori-HacohenA #automation #web- Automated Controversy Detection on the Web (SDH, JA), pp. 423–434.
ECIR-2015-HagenPBS #classification #sentiment #twitter #using- Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIR-2015-LiangCC #approach #social #social media- A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIR-2015-LimCLK #community #constraints #using- Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIR-2015-YangLW - Detecting the Eureka Effect in Complex Search (HY, JL, CW), pp. 734–740.
ICML-2015-AvronH #community #personalisation #rank #using- Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICML-2015-ChangYXY #semantics #using- Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICML-2015-GornitzBK #markov- Hidden Markov Anomaly Detection (NG, MLB, MK), pp. 1833–1842.
ICML-2015-HockingRB #learning #named #segmentation- PeakSeg: constrained optimal segmentation and supervised penalty learning for peak detection in count data (TH, GR, GB), pp. 324–332.
KDD-2015-BeutelAF #behaviour #graph #modelling #predict- Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
KDD-2015-FakhraeiFSG #evolution #multi #network #social- Collective Spammer Detection in Evolving Multi-Relational Social Networks (SF, JRF, MVSS, LG), pp. 1769–1778.
KDD-2015-HayashiMTK #realtime #topic #twitter- Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
KDD-2015-LaptevAF #automation #framework #scalability- Generic and Scalable Framework for Automated Time-series Anomaly Detection (NL, SA, IF), pp. 1939–1947.
KDD-2015-LiuC #challenge #social #social media- Social Media Anomaly Detection: Challenges and Solutions (YL, SC), pp. 2317–2318.
KDD-2015-MitzenmacherPPT #clique #network #scalability- Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling (MM, JP, RP, CET, SCX), pp. 815–824.
KDD-2015-NairRKBSKHD #learning #monitoring- Learning a Hierarchical Monitoring System for Detecting and Diagnosing Service Issues (VN, AR, SK, VB, SS, SSK, SH, SD), pp. 2029–2038.
KDD-2015-QahtanAWZ #data type #framework #multi- A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams (AAQ, BA, SW, XZ), pp. 935–944.
KDD-2015-RayanaA #metadata #network #overview- Collective Opinion Spam Detection: Bridging Review Networks and Metadata (SR, LA), pp. 985–994.
KDD-2015-ShaoHYZ #community #distance- Community Detection based on Distance Dynamics (JS, ZH, QY, TZ), pp. 1075–1084.
KDD-2015-TsengYHKC #framework #named- FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (VST, JCY, CWH, YK, KTC), pp. 2157–2166.
SEKE-2015-HughesDH #streaming- Detecting Reporting Anomalies in Streaming Sensing Systems (SH, YD, JOH), pp. 427–432.
SEKE-2015-LinYX #automation #generative #parametricity #testing- Automatic Detection of Parameter Shielding for Test Case Generation (JL, JY, JX), pp. 571–574.
SEKE-2015-SaharAA #approach #case study #image #modelling #prototype- A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKE-2015-SalehianF #embedded #monitoring #realtime- Embedded Real Time Blink Detection System for Driver Fatigue Monitoring (SS, BF), pp. 188–194.
SEKE-2015-SunSWZ #analysis #data flow #fault #integer #using- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKE-2015-WanderleyP #folksonomy #learning- Learning Folksonomies for Trend Detection in Task-Oriented Dialogues (GW, ECP), pp. 483–488.
SEKE-2015-WangSZ #execution #symbolic computation- Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection (YW, HS, QZ), pp. 536–539.
SIGIR-2015-ChenC #web- Opinion Spammer Detection in Web Forum (YRC, HHC), pp. 759–762.
SIGIR-2015-DijkTR #community #topic- Early Detection of Topical Expertise in Community Question Answering (DvD, MT, MdR), pp. 995–998.
SIGIR-2015-Dori-Hacohen #analysis- Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIR-2015-HeindorfPSE #analysis #corpus #knowledge base #towards- Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
MoDELS-2015-StephanC #clone detection #identification #using- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
SPLC-2015-SoutoGdMKB #debugging #feature model #modelling #performance #product line- Faster bug detection for software product lines with incomplete feature models (SS, DG, Md, DM, SK, DSB), pp. 151–160.
ECOOP-2015-FangDX #named #performance #problem- PerfBlower: Quickly Detecting Memory-Related Performance Problems via Amplification (LF, LD, G(X), pp. 296–320.
OOPSLA-2015-AchourR #approximate- Approximate computation with outlier detection in Topaz (SA, MCR), pp. 711–730.
OOPSLA-2015-BielikRV #android #concurrent #scalability- Scalable race detection for Android applications (PB, VR, MTV), pp. 332–348.
OOPSLA-2015-HagueLO #approach #css #html- Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
PLDI-2015-OlivoDL #debugging #performance #static analysis #traversal- Static detection of asymptotic performance bugs in collection traversals (OO, ID, CL), pp. 369–378.
PPDP-2015-StievenartNMR #abstract interpretation #concurrent #debugging #higher-order #source code- Detecting concurrency bugs in higher-order programs through abstract interpretation (QS, JN, WDM, CDR), pp. 232–243.
REFSQ-2015-DaunWP #embedded #requirements- Detecting and Correcting Outdated Requirements in Function-Centered Engineering of Embedded Systems (MD, TW, KP), pp. 65–80.
ASE-2015-KhatchadourianR #using- Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
ASE-2015-WalshMK #automation #fault #layout #web- Automatic Detection of Potential Layout Faults Following Changes to Responsive Web Pages (N) (TAW, PM, GMK), pp. 709–714.
ASE-2015-WilcoxFFF #array #concurrent #precise- Array Shadow State Compression for Precise Dynamic Race Detection (T) (JRW, PF, CF, SNF), pp. 155–165.
ESEC-FSE-2015-BellKMD #dependence #java #performance- Efficient dependency detection for safe Java test acceleration (JB, GEK, EM, MD), pp. 770–781.
ESEC-FSE-2015-CaiC #effectiveness #java #precise #source code- Effective and precise dynamic detection of hidden races for Java programs (YC, LC), pp. 450–461.
ESEC-FSE-2015-MutluTL #javascript #matter- Detecting JavaScript races that matter (EM, ST, BL), pp. 381–392.
ESEC-FSE-2015-NguyenNDKN #execution #semantics #variability- Detecting semantic merge conflicts with variability-aware execution (HVN, MHN, SCD, CK, TNN), pp. 926–929.
ESEC-FSE-2015-RajagopalanH #concurrent #named- RDIT: race detection from incomplete traces (AKR, JH), pp. 914–917.
ESEC-FSE-2015-SafiSHM - Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
ESEC-FSE-2015-SamakR #testing- Synthesizing tests for detecting atomicity violations (MS, MKR), pp. 131–142.
ICSE-v1-2015-LiBBKTARBOM #android #component #named #privacy- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSE-v1-2015-NistorCRL #named #performance #problem- CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
ICSE-v1-2015-OcarizaP0 #consistency #javascript #mvc #nondeterminism- Detecting Inconsistencies in JavaScript MVC Applications (FSOJ, KP, AM), pp. 325–335.
ICSE-v1-2015-PapadakisJHT #compilation #effectiveness #empirical #equivalence #performance #scalability- Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
ICSE-v1-2015-PastoreM #named- ZoomIn: Discovering Failures by Detecting Wrong Assertions (FP, LM), pp. 66–76.
ICSE-v1-2015-ZouWXZSM #algorithm #float #search-based- A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies (DZ, RW, YX, LZ, ZS, HM), pp. 529–539.
ICSE-v2-2015-FooJAHZF #automation #case study #industrial #performance- An Industrial Case Study on the Automated Detection of Performance Regressions in Heterogeneous Environments (KCF, ZMJ, BA, AEH, YZ, PF), pp. 159–168.
ICSE-v2-2015-Hecht #android #approach- An Approach to Detect Android Antipatterns (GH), pp. 766–768.
ICSE-v2-2015-HerzigN #empirical #using- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSE-v2-2015-HollandDKMR #android #novel #security- Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
ICSE-v2-2015-Palomba #analysis #smell- Textual Analysis for Code Smell Detection (FP), pp. 769–771.
SAC-2015-AlvesMM #case study #fault #impact analysis #refactoring #test coverage- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SAC-2015-AttiaTHKTC - On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
SAC-2015-AwadBESAS #anti #approach #process #runtime- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SAC-2015-BezuBRVVF #component #multi #similarity #web- Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SAC-2015-ColantonioPPS #overview #platform #visual notation- Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
SAC-2015-DabainMT #design pattern #using- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SAC-2015-FernandesPCRP #metaheuristic #network #statistics- Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SAC-2015-GotoT #communication #network #visual notation- Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
SAC-2015-HozanoFSFC #developer #feedback #smell #using- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SAC-2015-KrutzMS #analysis #effectiveness #using- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SAC-2015-MongioviGFPT #analysis #approach #data flow #hybrid #java- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SAC-2015-OliveiraQMM #community #complexity #using- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SAC-2015-RegoMP #approach #folksonomy #learning- A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SAC-2015-Rekha #big data #performance #using- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SAC-2015-SantiagoPH #approach #modelling- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SAC-2015-SantosM - Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
CASE-2015-AntonelloGM #fault- Autonomous robotic system for thermographic detection of defects in upper layers of carbon fiber reinforced polymers (MA, SG, EM), pp. 634–639.
CASE-2015-BrisimiAZCP - Sensing and classifying roadway obstacles: The street bump anomaly detection and decision support system (TSB, SA, YZ, CGC, ICP), pp. 1288–1293.
CASE-2015-ButtersGS #network- Detecting and reducing redundancy in alarm networks (TDB, SG, JLS), pp. 1224–1229.
CASE-2015-DamesK #automation #locality #multi #smarttech- Automated detection, localization, and registration of smart devices with multiple robots (PD, VK), pp. 564–571.
CASE-2015-KreutzerRREL #automation #metric #using- Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASE-2015-SathishRB #approach #industrial #simulation- A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASE-2015-SundarkumarRNG #api #machine learning #modelling #topic- Malware detection via API calls, topic models and machine learning (GGS, VR, IN, VG), pp. 1212–1217.
CASE-2015-WuDZW - Kalman filter based DNS cache poisoning attack detection (HW, XD, LZ, LW), pp. 1594–1600.
CASE-2015-ZhangHZ #fault #metric- Fault detection for wireless networked systems with compressed measurements (JZ, XH, DHZ), pp. 356–361.
CASE-2015-ZonEHJVSB #delivery #multi #realtime #using- Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
CGO-2015-StepanovS #c++ #memory management #named #performance- MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
DAC-2015-CampbellLMC #debugging #fault #hybrid #synthesis #using #validation- Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DAC-2015-CampbellVPC #fault #low cost #synthesis- High-level synthesis of error detecting cores through low-cost modulo-3 shadow datapaths (KAC, PV, DZP, DC), p. 6.
DAC-2015-LiuHWSJHL #assessment #smarttech- Impact assessment of net metering on smart home cyberattack detection (YL, SH, JW, YS, YJ, YH, XL), p. 6.
DAC-2015-RajendranVK - Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
DAC-2015-YoonSMC #behaviour #embedded #heatmap #memory management #realtime #using- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DAC-2015-ZhouAZYUGUJ #embedded #hardware #using- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DATE-2015-CakirM #clustering #correlation #hardware #using- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
DATE-2015-CornaFNS #android- Occupancy detection via iBeacon on Android devices for smart building management (AC, LF, AAN, DS), pp. 629–632.
DATE-2015-CourbonLFT #hardware #performance- A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
DATE-2015-FrancqF #hardware- Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATE-2015-HollerKRRK #compilation #evaluation- Evaluation of diverse compiling for software-fault detection (AH, NK, TR, KR, CK), pp. 531–536.
DATE-2015-KanounS #big data #concept #data type #learning #online #scheduling #streaming- Big-data streaming applications scheduling with online learning and concept drift detection (KK, MvdS), pp. 1547–1550.
DATE-2015-KumarAL #fault #monitoring- Operational fault detection and monitoring of a memristor-based LUT (TNK, HAFA, FL), pp. 429–434.
DATE-2015-LiaperdosAT #estimation #fault #probability #testing- A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
DATE-2015-LinSKRM #debugging #effectiveness #fault #performance #testing #validation- Quick error detection tests with fast runtimes for effective post-silicon validation and debug (DL, ES, SK, ER, SM), pp. 1168–1173.
DATE-2015-NgoEBDGNRR #hardware #metric- Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
DATE-2015-RenTB #learning #statistics- Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
DATE-2015-TaatizadehN #automation #design #embedded #validation- A methodology for automated design of embedded bit-flips detectors in post-silicon validation (PT, NN), pp. 73–78.
DATE-2015-ZwergerG #symmetry- Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
HPCA-2015-OzsoyDGAP #framework #online #performance- Malware-aware processors: A framework for efficient online malware detection (MO, CD, IG, NBAG, DVP), pp. 651–661.
HPDC-2015-BerrocalBDLC #data analysis #lightweight #runtime- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
PDP-2015-El-KazzazE #framework #scalability #ubiquitous #using- A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
PDP-2015-GiitsidisKGS #image- Human and Fire Detection from High Altitude UAV Images (TG, EGK, AG, GCS), pp. 309–315.
PDP-2015-GuthmullerQC #distributed #legacy #similarity #verification- System-Level State Equality Detection for the Formal Dynamic Verification of Legacy Distributed Applications (MG, MQ, GC), pp. 451–458.
PDP-2015-NazarianRMCG #control flow #fault- Bit-Flip Aware Control-Flow Error Detection (GN, DGR, ÁFM, LC, GG), pp. 215–221.
PDP-2015-SkovorodaG #mobile #overview- Review of the Mobile Malware Detection Approaches (AS, DG), pp. 600–603.
PDP-2015-ZhangEHLJ #fault- A Routing-Level Solution for Fault Detection, Masking, and Tolerance in NoCs (XZ, ME, LH, GL, AJ), pp. 365–369.
PPoPP-2015-DasSR #communication #concurrent #program analysis #thread- Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
PPoPP-2015-McPhersonNSC #legacy #source code- Fence placement for legacy data-race-free programs via synchronization read detection (AJM, VN, SS, MC), pp. 249–250.
ESOP-2015-CalzavaraBCS #fine-grained- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ESOP-2015-ChengR #spreadsheet #static analysis- Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
FASE-2015-FedyukovichDHS #bound #dependence #model checking- Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
ICST-2015-ArcainiGV #fault #feature model #generative #modelling #testing- Generating Tests for Detecting Faults in Feature Models (PA, AG, PV), pp. 1–10.
ICST-2015-BardinDDKPTM #requirements- Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
ICST-2015-MahajanH #html #locality #using- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICST-2015-WanJLH #android #energy- Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
ICST-2015-XuLCK #approach #bound #lightweight #thread- A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ISSTA-2015-GyoriSHM #dependence #reliability #testing- Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
ISSTA-2015-HayTP #android #communication- Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
ISSTA-2015-ShenLPG #automation #performance #profiling #search-based #using- Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTA-2015-WangGMC #android #approach #clone detection #named #scalability- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
ISSTA-2015-XueWLXSC #behaviour #classification #javascript #modelling- Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
ISSTA-2015-ZhangE #fault- Proactive detection of inadequate diagnostic messages for software configuration errors (SZ, MDE), pp. 12–23.
SAT-2015-AnsoteguiGLS #community #using- Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
CBSE-2014-DidierM #approach #component- A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
ECSA-2014-PalmaMTG #specification #web #web service- Specification and Detection of SOA Antipatterns in Web Services (FP, NM, GT, YGG), pp. 58–73.
QoSA-2014-WertOHF #anti #automation #component #performance- Automatic detection of performance anti-patterns in inter-component communications (AW, MO, CH, RF), pp. 3–12.
DocEng-2014-BarabucciBIMM #documentation #modelling #visualisation- Document changes: modeling, detection, storage and visualization (DChanges 2014) (GB, UMB, ADI, SM, EVM), pp. 207–208.
DocEng-2014-DohrnR #documentation #fine-grained- Fine-grained change detection in structured text documents (HD, DR), pp. 87–96.
DocEng-2014-FerilliGRE #order- Abstract argumentation for reading order detection (SF, DG, DR, FE), pp. 45–48.
HT-2014-HerzigMR #social #social media #topic- An author-reader influence model for detecting topic-based influencers in social media (JH, YM, HR), pp. 46–55.
JCDL-2014-KoopmanW #similarity #what- Where should I publish? Detecting journal similarity based on what have been published there (RK, SW), pp. 483–484.
JCDL-2014-MeuschkeG #retrieval #using- Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
JCDL-2014-SmithCDSW #modelling #reuse- Detecting and modeling local text reuse (DAS, RC, EMD, NS, JW), pp. 183–192.
SIGMOD-2014-Dev #algorithm #community #interactive #network #online #social- A user interaction based community detection algorithm for online social networks (HD), pp. 1607–1608.
SIGMOD-2014-Dev14a #community #graph #precise #privacy #social- Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
SIGMOD-2014-ShaoCC #parallel #performance- Efficient cohesive subgraphs detection in parallel (YS, LC, BC), pp. 613–624.
VLDB-2014-ChenNC #performance #sql- Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
VLDB-2014-GuptaSGGZLL #graph #online #realtime #recommendation #scalability #twitter- Real-Time Twitter Recommendation: Online Motif Detection in Large Dynamic Graphs (PG, VS, AG, SG, VZ, QL, JL), pp. 1379–1380.
VLDB-2014-LondheGZNS #community- Matching Titles with Cross Title Web-Search Enrichment and Community Detection (NL, VG, AZ, HQN, RKS), pp. 1167–1178.
VLDB-2014-YuYWLC #big data #classification #design #power management- Big Data Small Footprint: The Design of A Low-Power Classifier for Detecting Transportation Modes (MCY, TY, SCW, CJL, EYC), pp. 1429–1440.
EDM-2014-BakerO #effectiveness #scalability- Cost-Effective, Actionable Engagement Detection at Scale (RSB, JO), pp. 345–346.
EDM-2014-NiznanPR #problem #using- Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
EDM-2014-PaquetteCBO #case study #game studies #process #re-engineering- Reengineering the Feature Distillation Process: A case study in detection of Gaming the System (LP, AMJBdC, RSB, JO), pp. 284–287.
EDM-2014-PeroH #how #programming #question #source code #student- How patterns in source codes of students can help in detection of their programming skills? (SP, TH), pp. 371–372.
EDM-2014-RoweBAKH #automation #learning- Building Automated Detectors of Gameplay Strategies to Measure Implicit Science Learning (ER, RSB, JAC, EK, WJH), pp. 337–338.
EDM-2014-Schneider #collaboration #learning #multimodal #towards- Toward Collaboration Sensing: Multimodal Detection of the Chameleon Effect in Collaborative Learning Settings (BS), pp. 435–437.
EDM-2014-ToussaintLT #automation #behaviour #similarity #towards #using- Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDM-2014-WixonAMBRW #scalability- The Opportunities and Limitations of Scaling Up Sensor-Free Affect Detection (MW, IA, KM, WB, DR, BPW), pp. 145–152.
SIGITE-2014-IhantolaSV #automation #programming- Automatically detectable indicators of programming assignment difficulty (PI, JS, AV), pp. 33–38.
CSMR-WCRE-2014-DingZT #branch- Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
CSMR-WCRE-2014-MondalRS14a - Improving the detection accuracy of evolutionary coupling by measuring change correspondence (MM, CKR, KAS), pp. 358–362.
CSMR-WCRE-2014-UjhelyiHVCSVF #comparison #query- Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
CSMR-WCRE-2014-VidacsBTSG #approach #fault #locality #reduction #testing- Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPC-2014-TianZLFZY #parallel #thread- Plagiarism detection for multithreaded software based on thread-aware software birthmarks (ZT, QZ, TL, MF, XZ, ZY), pp. 304–313.
ICSME-2014-AbreuCFMPS14a #fault #locality #smell- FaultySheet Detective: When Smells Meet Fault Localization (RA, JC, JPF, PM, AP, JS), pp. 625–628.
ICSME-2014-BauerVJ #approach #novel- A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSME-2014-Kumar #collaboration #source code- Detecting Collaborative Patterns in Programs (KK), p. 664.
ICSME-2014-Palma #specification- Specification and Detection of SOA Antipatterns (FP), p. 670.
ICSME-2014-PonzanelliMBLF #quality #stack overflow- Improving Low Quality Stack Overflow Post Detection (LP, AM, AB, ML, DF), pp. 541–544.
ICSME-2014-Stephan #analysis #clone detection #evaluation #mutation testing #using- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSME-2014-SvajlenkoR #clone detection #tool support- Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
MSR-2014-KleinCK #debugging- New features for duplicate bug detection (NK, CSC, NAK), pp. 324–327.
MSR-2014-LazarRS #debugging #metric #similarity #using- Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAM-2014-MurtazaHKC #automation- Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
SEFM-2014-AlrajehC #automation #composition #specification- Automated Error-Detection and Repair for Compositional Software Specifications (DA, RC), pp. 111–127.
SEFM-2014-ChristakisMW #invariant #testing- Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations (MC, PM, VW), pp. 65–80.
SFM-2014-GiachinoL #concurrent #linear #recursion #source code- Deadlock Detection in Linear Recursive Programs (EG, CL), pp. 26–64.
CHI-2014-HautasaariYG #communication #quote- “Maybe it was a joke”: emotion detection in text-only communication by non-native english speakers (AMJH, NY, GG), pp. 3715–3724.
CHI-2014-MinDWAZH #named #quality #smarttech- Toss-n-turn: smartphone as sleep and sleep quality detector (JKM, AD, JW, SA, JZ, JIH), pp. 477–486.
CHI-2014-SunPC #named- MouStress: detecting stress from mouse motion (DS, PP, JC), pp. 61–70.
DUXU-DI-2014-Al-SalhieAA #multi- Multimedia Surveillance in Event Detection: Crowd Analytics in Hajj (LAS, MAZ, AAW), pp. 383–392.
DUXU-DI-2014-GencerBZV #machine learning #mobile- Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
DUXU-DI-2014-HeZL #fault #feature model #image #segmentation- Aluminum CT Image Defect Detection Based on Segmentation and Feature Extraction (NH, LZ, KL), pp. 446–454.
HCI-AIMT-2014-HottaHOK #estimation #fault #multi- Detecting Address Estimation Errors from Users’ Reactions in Multi-user Agent Conversation (RH, HHH, SO, KK), pp. 245–253.
HCI-AIMT-2014-RoyC #artificial reality #invariant #markov #using- View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCI-AIMT-2014-TewsOFK #interface #research- Current and New Research Perspectives on Dynamic Facial Emotion Detection in Emotional Interface (TKT, MO, HF, TK), pp. 779–787.
LCT-TRE-2014-YamaguchiSYNSM #collaboration #distance #learning- Posture and Face Detection with Dynamic Thumbnail Views for Collaborative Distance Learning (TY, HS, MY, YN, HS, TM), pp. 227–236.
SCSM-2014-Ahangama #realtime #social #social media #twitter #using- Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
SCSM-2014-Kanawati #community #network- Seed-Centric Approaches for Community Detection in Complex Networks (RK), pp. 197–208.
CAiSE-2014-PadilhaPFAGS #effectiveness #empirical #metric #on the #smell- On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
ICEIS-v1-2014-Lenz - Data Fraud Detection (HJL), p. XV.
ICEIS-v1-2014-MezghaniPZAS #social- Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
ICEIS-v1-2014-SilvaNMFMM #algorithm #distributed #performance #pipes and filters #using- Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEIS-v2-2014-GippMBPN #semantics #similarity #using #visualisation- Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEIS-v2-2014-JulianoTS #metric #object-oriented #using- Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEIS-v2-2014-ThorntonCPHM #health- Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
CIKM-2014-AnchuriSS #architecture- Hotspot Detection in a Service-Oriented Architecture (PA, RS, SS), pp. 1749–1758.
CIKM-2014-KiselevaCBD #modelling #user satisfaction- Modelling and Detecting Changes in User Satisfaction (JK, EC, RB, RD), pp. 1449–1458.
CIKM-2014-LefortierSR #online- Online Exploration for Detecting Shifts in Fresh Intent (DL, PS, MdR), pp. 589–598.
CIKM-2014-OuyangSTN #crowdsourcing- Truth Discovery in Crowdsourced Detection of Spatial Events (WRO, MBS, AT, TJN), pp. 461–470.
CIKM-2014-ShihKRCGSP #component #network- Component Detection in Directed Networks (YKS, SK, YR, JC, AG, TS, SP), pp. 1729–1738.
CIKM-2014-ShuLLYT - Deal or deceit: detecting cheating in distribution channels (KS, PL, WL, PY, LT), pp. 1419–1428.
CIKM-2014-TakayamaTIOFC #probability- A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
CIKM-2014-TangWPTL #approach- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKM-2014-WangWC #community #named #network #social- CoDEM: An Ingenious Tool of Insight into Community Detection in Social Networks (MW, CW, JC), pp. 2006–2008.
CIKM-2014-YangLLLH #automation #clustering #multi #social #using- Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
ECIR-2014-CorneyMG #twitter- Spot the Ball: Detecting Sports Events on Twitter (DC, CJM, AG), pp. 449–454.
ECIR-2014-GalleR - Boilerplate Detection and Recoding (MG, JMR), pp. 462–467.
ECIR-2014-PanemBGV #realtime #topic #twitter #using- Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIR-2014-SchallerHE #smarttech- Detecting Event Visits in Urban Areas via Smartphone GPS Data (RS, MH, DE), pp. 681–686.
ECIR-2014-ThumaRO #query #retrieval- Detecting Missing Content Queries in an SMS-Based HIV/AIDS FAQ Retrieval System (ET, SR, IO), pp. 247–259.
ICML-c1-2014-ChenSMKWK #adaptation- Active Detection via Adaptive Submodularity (YC, HS, CFM, LPK, SW, AK), pp. 55–63.
ICML-c2-2014-AhmedTBZDKB #random- Hierarchical Conditional Random Fields for Outlier Detection: An Application to Detecting Epileptogenic Cortical Malformations (BA, TT, KB, YZ, OD, RK, CEB), pp. 1080–1088.
ICML-c2-2014-HarelMEC #concept- Concept Drift Detection Through Resampling (MH, SM, REY, KC), pp. 1009–1017.
ICPR-2014-0005ZTS #segmentation- Human Hair Segmentation and Length Detection for Human Appearance Model (YW, ZZ, EKT, BS), pp. 450–454.
ICPR-2014-AkinM #learning #online- Online Learning and Detection with Part-Based, Circulant Structure (OA, KM), pp. 4229–4233.
ICPR-2014-AlyuzGA #3d #recognition #robust- Detection of Realistic Facial Occlusions for Robust 3D Face Recognition (NA, BG, LA), pp. 375–380.
ICPR-2014-BalntasTM - Improving Object Tracking with Voting from False Positive Detections (VB, LT, KM), pp. 1928–1933.
ICPR-2014-BartoliLKBB #adaptation #multi #performance- Unsupervised Scene Adaptation for Faster Multi-scale Pedestrian Detection (FB, GL, SK, ADB, ADB), pp. 3534–3539.
ICPR-2014-BayramogluKEANKH #approach #image #machine learning #using- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPR-2014-BiswasZLMV #analysis #image #using- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPR-2014-BougueliaBB #classification #data type #novel #performance- Efficient Active Novel Class Detection for Data Stream Classification (MRB, YB, AB), pp. 2826–2831.
ICPR-2014-BrownFP #self #using- Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPR-2014-BuiNLYK #order #statistics #using- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPR-2014-CechFM #3d #approach #refinement- A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPR-2014-ChenH #composition- Implicit Rank-Sparsity Decomposition: Applications to Saliency/Co-saliency Detection (YLC, CTH), pp. 2305–2310.
ICPR-2014-ChenLHLLH #using- Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPR-2014-ChenLLYH #adaptation #forensics- Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
ICPR-2014-ChenSPS #energy #statistics- Statistical Anomaly Detection in Mean and Variation of Energy Consumption (BC, MS, JP, AS), pp. 3570–3575.
ICPR-2014-ChenWCN #fault #modelling #network- Confusion Network Based Recurrent Neural Network Language Modeling for Chinese OCR Error Detection (JC, YW, HC, PN), pp. 1266–1271.
ICPR-2014-Climent-PerezMR #multi #using- Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPR-2014-ContiFAAMCT #distance #evaluation- Evaluation of Time Series Distance Functions in the Task of Detecting Remote Phenology Patterns (JCC, FAF, JA, BA, LPCM, LC, RdST), pp. 3126–3131.
ICPR-2014-DingM #approach #image- An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPR-2014-ElmikatyS #image #multi #using- Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPR-2014-FerisBPS - Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
ICPR-2014-FiratCV #learning #representation- Representation Learning for Contextual Object and Region Detection in Remote Sensing (OF, GC, FTYV), pp. 3708–3713.
ICPR-2014-FradiD #recognition- Sparse Feature Tracking for Crowd Change Detection and Event Recognition (HF, JLD), pp. 4116–4121.
ICPR-2014-FrucciGNRB #mobile #named- IDEM: Iris DEtection on Mobile Devices (MF, CG, MN, DR, GSdB), pp. 1752–1757.
ICPR-2014-FuGYGY #graph- Graph Construction for Salient Object Detection in Videos (KF, IYHG, YY, CG, JY), pp. 2371–2376.
ICPR-2014-GomezK #realtime- MSER-Based Real-Time Text Detection and Tracking (LG, DK), pp. 3110–3115.
ICPR-2014-HedjamCK #documentation #energy #image #multi #self- Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
ICPR-2014-HtikeH #adaptation #performance #video- Efficient Non-iterative Domain Adaptation of Pedestrian Detectors to Video Scenes (KKH, DCH), pp. 654–659.
ICPR-2014-HuWSC #framework #robust #using- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPR-2014-JhuoL #learning #multi #video- Video Event Detection via Multi-modality Deep Learning (IHJ, DTL), pp. 666–671.
ICPR-2014-KamberovBKK #video- Unsupervised Detection of Video Sub-scenes (GK, MB, LK, OK), pp. 1934–1939.
ICPR-2014-KawarabukiO - Snowfall Detection in a Foggy Scene (HK, KO), pp. 877–882.
ICPR-2014-LablackDBD #approach- A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPR-2014-LemesSBS #authentication- Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
ICPR-2014-LiangLLFL #modelling- Accurate Facial Landmarks Detection for Frontal Faces with Extended Tree-Structured Models (AL, WL, LL, MRF, VL), pp. 538–543.
ICPR-2014-LiewY #feature model #novel #performance #robust- Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
ICPR-2014-LimKLC #similarity- Crowd Saliency Detection via Global Similarity Structure (MKL, VJK, CCL, CSC), pp. 3957–3962.
ICPR-2014-LinCCLH #analysis- Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPR-2014-LiuCL #segmentation- Exploring Depth Information for Object Segmentation and Detection (TLL, KYC, SHL), pp. 4340–4345.
ICPR-2014-LiuZZL #realtime- Real-Time Scene Text Detection Based on Stroke Model (YL, DZ, YZ, SL), pp. 3116–3120.
ICPR-2014-LuWMST #modelling- Anomaly Detection through Spatio-temporal Context Modeling in Crowded Scenes (TL, LW, XM, PS, CLT), pp. 2203–2208.
ICPR-2014-LuWW #summary- Audiotory Movie Summarization by Detecting Scene Changes and Sound Events (TL, YW, GW), pp. 756–760.
ICPR-2014-MaB #incremental #random- Compound Exemplar Based Object Detection by Incremental Random Forest (KM, JBA), pp. 2407–2412.
ICPR-2014-MatsuoSY #image #using- Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPR-2014-MatveevG #approximate #segmentation- Iris Segmentation System Based on Approximate Feature Detection with Subsequent Refinements (IM, KG), pp. 1704–1709.
ICPR-2014-MekonnenLHB #optimisation #people- People Detection with Heterogeneous Features and Explicit Optimization on Computation Time (AAM, FL, AH, CB), pp. 4322–4327.
ICPR-2014-MeloLMS #approach- An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPR-2014-MolderCCH #automation #reduction #using- Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPR-2014-MoriKNK #using #video- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPR-2014-MuddamsettySTM #using- Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPR-2014-NilssonAGF #using- Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPR-2014-NilufarP #learning #programming- Learning to Detect Contours with Dynamic Programming Snakes (SN, TJP), pp. 984–989.
ICPR-2014-OzkanEA #video #visual notation- Visual Group Binary Signature for Video Copy Detection (SÖ, EE, GBA), pp. 3945–3950.
ICPR-2014-PakKA #probability- Improvement of Benign and Malignant Probability Detection Based on Non-subsample Contourlet Transform and Super-resolution (FP, HRK, AA), pp. 895–899.
ICPR-2014-PanagiotakisK #automation #fault- Automatic Enhancement and Detection of Active Sea Faults from Bathymetry (CP, EK), pp. 855–860.
ICPR-2014-PedagadiOB - Integral Line Scan Features for Pedestrian Detection (SP, JO, BAB), pp. 2383–2388.
ICPR-2014-PistocchiCBFC #3d #classification #kernel- Kernelized Structural Classification for 3D Dogs Body Parts Detection (SP, SC, SB, NF, RC), pp. 1993–1998.
ICPR-2014-RahmanHZ - Information Divergence Based Saliency Detection with a Global Center-Surround Mechanism (IMHR, CH, MZ), pp. 3428–3433.
ICPR-2014-RamirezOT #multi- Go with the Flow: Improving Multi-view Vehicle Detection with Motion Cues (AR, EOB, MMT), pp. 4140–4145.
ICPR-2014-RazakarivonyJ - Discriminative Autoencoders for Small Targets Detection (SR, FJ), pp. 3528–3533.
ICPR-2014-RiabchenkoKC14a - Density-Aware Part-Based Object Detection with Positive Examples (ER, JKK, KC), pp. 2814–2819.
ICPR-2014-SantoshWAT #image #scalability- Scalable Arrow Detection in Biomedical Images (KCS, LW, SA, GRT), pp. 3257–3262.
ICPR-2014-SariE #analysis #fault #independence #using- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPR-2014-SchubertM #robust- Robust Registration and Filtering for Moving Object Detection in Aerial Videos (FS, KM), pp. 2808–2813.
ICPR-2014-SinghKZ #difference #image #markov #multi #scalability- A Multilayer Markovian Model for Change Detection in Aerial Image Pairs with Large Time Differences (PS, ZK, JZ), pp. 924–929.
ICPR-2014-SmedtBTG #combinator #multi- The Combinator: Optimal Combination of Multiple Pedestrian Detectors (FDS, KVB, TT, TG), pp. 3522–3527.
ICPR-2014-SongSLZZC #image- Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
ICPR-2014-SuL - High-Stakes Deception Detection Based on Facial Expressions (LS, MDL), pp. 2519–2524.
ICPR-2014-SunHJC #image #network #robust- Robust Text Detection in Natural Scene Images by Generalized Color-Enhanced Contrasting Extremal Region and Neural Networks (LS, QH, WJ, KC), pp. 2715–2720.
ICPR-2014-SunZL #adaptation- An Adaptive-Profile Active Shape Model for Facial-Feature Detection (KS, HZ, KML), pp. 2849–2854.
ICPR-2014-TaniH #robust #using- Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPR-2014-TavanaiSGCH - Context Aware Detection and Tracking (AT, MS, FG, AGC, DCH), pp. 2197–2202.
ICPR-2014-TuXN #analysis #process- Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPR-2014-UbukataSTMKMU #image #performance #segmentation- Fast Human Detection Combining Range Image Segmentation and Local Feature Based Detection (TU, MS, KT, AM, TK, GM, KU), pp. 4281–4286.
ICPR-2014-WangFC - Traffic Camera Anomaly Detection (YKW, CTF, JFC), pp. 4642–4647.
ICPR-2014-WangFH0KH #image #performance- Fast and Accurate Text Detection in Natural Scene Images with User-Intention (LW, WF, YH, JS, YK, YH), pp. 2920–2925.
ICPR-2014-WangLSSC #evaluation- Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos (CW, SL, YS, YS, HC), pp. 2596–2601.
ICPR-2014-WuJ #learning- Learning the Deep Features for Eye Detection in Uncontrolled Conditions (YW, QJ), pp. 455–459.
ICPR-2014-YunJKHC #modelling #performance #self- Self-Organizing Cascaded Structure of Deformable Part Models for Fast Object Detection (SY, HJ, WSK, BH, JYC), pp. 4246–4250.
ICPR-2014-YunJYKC #interactive #video- Motion Interaction Field for Accident Detection in Traffic Surveillance Video (KY, HJ, KMY, SWK, JYC), pp. 3062–3067.
ICPR-2014-YuSZ #artificial reality #image #realtime #sequence- Real Time Fingertip Detection with Kinect Depth Image Sequences (YY, YS, YZ), pp. 550–555.
ICPR-2014-ZhangKBC - Center-Surround Contrast Features for Pedestrian Detection (SZ, DAK, CB, ABC), pp. 2293–2298.
ICPR-2014-ZhangLYQWTZ #statistics- Sufficient Statistics Feature Mapping over Deep Boltzmann Machine for Detection (CZ, XL, JY, SQ, YW, CT, YZ), pp. 827–832.
ICPR-2014-ZhangM #adaptation- Improving Object Tracking by Adapting Detectors (LZ, LvdM), pp. 1218–1223.
ICPR-2014-ZhangM14a #learning #multi- Simultaneous Detection of Multiple Facial Action Units via Hierarchical Task Structure Learning (XZ, MHM), pp. 1863–1868.
KDD-2014-BabaieCA #online- Sleep analytics and online selective anomaly detection (TB, SC, RGA), pp. 362–371.
KDD-2014-ChenN #graph #parametricity #social #social media #statistics- Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs (FC, DBN), pp. 1166–1175.
KDD-2014-DuanSLL #community #correlation #graph- Community detection in graphs through correlation (LD, WNS, YL, HL), pp. 1376–1385.
KDD-2014-FortunySMMPM - Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
KDD-2014-GunnemannGF #evolution #probability #rating #robust- Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution (SG, NG, CF), pp. 841–850.
KDD-2014-KlosterG #community #kernel- Heat kernel based community detection (KK, DFG), pp. 1386–1395.
KDD-2014-PerozziASM #clustering #graph #scalability- Focused clustering and outlier detection in large attributed graphs (BP, LA, PIS, EM), pp. 1346–1355.
KDD-2014-RozenshteinAGT #network #process- Event detection in activity networks (PR, AA, AG, NT), pp. 1176–1185.
KDD-2014-SchubertWK #named #scalability #topic- SigniTrend: scalable detection of emerging topics in textual streams by hashed significance thresholds (ES, MW, HPK), pp. 871–880.
KDD-2014-TamersoyRC #graph #mining #scalability- Guilt by association: large scale malware detection by mining file-relation graphs (AT, KAR, DHC), pp. 1524–1533.
KDD-2014-YuCRW - Detecting moving object outliers in massive-scale trajectory streams (YY, LC, EAR, QW), pp. 422–431.
KDD-2014-YuH0 #analysis #named #social #social media- GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDIR-2014-NagwanshiM #semantics #sentiment #using- Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIR-2014-PassonneauRX #mining #scalability- Company Mention Detection for Large Scale Text Mining (RJP, TR, BX), pp. 512–520.
MLDM-2014-AndreaSVU #performance- A New Measure of Outlier Detection Performance (KA, GS, NV, AU), pp. 190–197.
MLDM-2014-KhasnabishSDS #learning #programming language #source code #using- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDM-2014-YuST #modelling #realtime- Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic (BY, LS, MT), pp. 258–271.
RecSys-2014-TavakolB #topic- Factored MDPs for detecting topics of user sessions (MT, UB), pp. 33–40.
SEKE-2014-CostaMM #diagrams #equivalence #semantics #uml- Detecting Semantic Equivalence in UML Class Diagrams (VOC, RM, LM), pp. 318–323.
SEKE-2014-LiuTA #database- Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
SEKE-2014-Otunba0 #approximate #named- APT: Approximate Period Detection in Time Series (RO, JL), pp. 490–494.
SEKE-2014-SantosM #identification- Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SEKE-2014-SolariM #empirical #fault #testing- A Controlled Experiment to Explore Potentially Undetectable Defects for Testing Techniques (MS, SM), pp. 106–109.
SIGIR-2014-HuTL #microblog- Leveraging knowledge across media for spammer detection in microblogging (XH, JT, HL), pp. 547–556.
SIGIR-2014-KumarJF #twitter #using- Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIR-2014-ParkS #higher-order #modelling #probability- Second order probabilistic models for within-document novelty detection in academic articles (LAFP, SS), pp. 1103–1106.
SIGIR-2014-SpinaGA #learning #monitoring #online #similarity #topic- Learning similarity functions for topic detection in online reputation monitoring (DS, JG, EA), pp. 527–536.
SIGIR-2014-ZhangKQH #semantics #word- Continuous word embeddings for detecting local text reuses at the semantic level (QZ, JK, JQ, XH), pp. 797–806.
SIGIR-2014-ZhouKWAD #recommendation- Detection of abnormal profiles on group attacks in recommender systems (WZ, YSK, JW, SA, GD), pp. 955–958.
MoDELS-2014-ChavarriagaNCJ #multi #process- Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
OOPSLA-2014-SamakR #concurrent #parallel #synthesis #thread- Multithreaded test synthesis for deadlock detection (MS, MKR), pp. 473–489.
PLATEAU-2014-SadowskiY #concurrent #developer #how #tool support- How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
LOPSTR-2014-SinghK #java #partial evaluation- Partial Evaluation for Java Malware Detection (RS, AK), pp. 133–147.
PEPM-2014-0008E #c++ #fault- Early detection of type errors in C++ templates (SC, ME), pp. 133–144.
PLDI-2014-DimitrovRVK #commutative #concurrent- Commutativity race detection (DD, VR, MTV, EK), p. 33.
PLDI-2014-HsiaoPYPNCKF #concurrent #mobile- Race detection for event-driven mobile applications (CHH, CP, JY, GP, SN, PMC, ZK, JF), p. 35.
PLDI-2014-HuangMR #abstraction #concurrent #control flow #predict- Maximal sound predictive race detection with control flow abstraction (JH, POM, GR), p. 36.
PLDI-2014-MaiyaKM #android #concurrent- Race detection for Android applications (PM, AK, RM), p. 34.
PLDI-2014-TavarageriKS #fault #memory management- Compiler-assisted detection of transient memory errors (ST, SK, PS), p. 24.
RE-2014-AdedjoumaSB #approach #automation #case study- Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
ASE-2014-LiuSLZWDW #automation #case study #documentation #fault- Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASE-2014-ThungKL #debugging #named #tool support- DupFinder: integrated tool support for duplicate bug report detection (FT, PSK, DL), pp. 871–874.
FSE-2014-BaeCLR #api #named #web- SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
FSE-2014-BanerjeeC0R #debugging #energy #mobile- Detecting energy bugs and hotspots in mobile apps (AB, LKC, SC, AR), pp. 588–598.
FSE-2014-Bell #dependence #testing- Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
FSE-2014-EslamimehrP #concurrent #named #scalability #source code- Sherlock: scalable deadlock detection for concurrent programs (ME, JP), pp. 353–365.
FSE-2014-FengADA #android #named #semantics #static analysis- Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSE-2014-HuoC #quality #testing- Improving oracle quality by detecting brittle assertions and unused inputs in tests (CH, JC), pp. 621–631.
FSE-2014-Kasi #scheduling- Minimizing software conflicts through proactive detection of conflicts and task scheduling (BKK), pp. 807–810.
FSE-2014-LuoMW0Z #comparison #obfuscation #semantics #similarity- Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
FSE-2014-MileaJK #abstraction #refactoring #scalability- Vector abstraction and concretization for scalable detection of refactorings (NAM, LJ, SCK), pp. 86–97.
FSE-2014-MirakhorliFGWC #architecture #monitoring #named- Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
FSE-2014-SamakR #concurrent #java #library #parallel #precise #thread- Omen+: a precise dynamic deadlock detector for multithreaded Java libraries (MS, MKR), pp. 735–738.
FSE-2014-Xiao #architecture #debugging- Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
ICSE-2014-ChenLZ #android #scalability- Achieving accuracy and scalability simultaneously in detecting application clones on Android markets (KC, PL, YZ), pp. 175–186.
ICSE-2014-ChenSJHNF #anti #performance #using- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSE-2014-DouCW #ambiguity #smell #spreadsheet- Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation (WD, SCC, JW), pp. 848–858.
ICSE-2014-HuangZTWL #android #behaviour #named #user interface- AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
ICSE-2014-JungLRP #automation #memory management- Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSE-2014-LeeJP #behaviour #machine learning #memory management #modelling #using- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSE-2014-LinXXLPSZ #difference #multi- Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
ICSE-2014-LiuXC #debugging #performance #smarttech- Characterizing and detecting performance bugs for smartphone applications (YL, CX, SCC), pp. 1013–1024.
ICSE-2014-NegaraCDJ #fine-grained #mining- Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
SAC-2014-ChenLFCCK #algorithm #design #effectiveness #health #implementation #monitoring- Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
SAC-2014-ChenZW #named #testing- Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
SAC-2014-Cooper #android #research #student- Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
SAC-2014-FerreiraBBAG #architecture #case study #effectiveness- Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SAC-2014-FreitasVHBV #twitter- Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
SAC-2014-IencoBPP #category theory #data type #evolution- Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
SAC-2014-JunAK #using- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SAC-2014-KawsarAL #multimodal #process #smarttech #using- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SAC-2014-KimK #community #mobile #network #social- A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
SAC-2014-MazelFF #comparison #diagrams #network #visual notation- Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
SAC-2014-NabeezathP #algorithm #performance- Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
SAC-2014-PalVCS #smarttech #using- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SAC-2014-PengYYHKH #3d #multi #using- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SAC-2014-ZandVYK - Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
ASPLOS-2014-WoodCG #low level- Low-level detection of language-level data races with LARD (BPW, LC, DG), pp. 671–686.
ASPLOS-2014-ZhangRZGBXZ #correlation #named- EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
CASE-2014-CanaliCCSEC #assembly #automation #industrial- An automatic assembly parts detection and grasping system for industrial manufacturing (CC, FC, FC, GS, AE, DGC), pp. 215–220.
CASE-2014-CaoMDZ #performance #visual notation- A gabor based fast interest point detector for image-based robot visual servo control (ZC, FM, JSD, JZ), pp. 883–888.
CASE-2014-ChiuC #bound #image- A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASE-2014-KuoSLW #3d #estimation #image- 3D object detection and pose estimation from depth image for robotic bin picking (HYK, HRS, SHL, CCW), pp. 1264–1269.
CASE-2014-YuM #approach #data-driven #statistics- Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
CGO-2014-SureshS #algorithm #automation #fault #grid #problem- Automated Algorithmic Error Resilience for Structured Grid Problems Based on Outlier Detection (AS, JS), p. 240.
CGO-2014-YanXYR #memory management #named- LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
CGO-2014-YeSX #analysis- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
DAC-2014-CuiMSW #hardware #runtime #synthesis- High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
DAC-2014-HernandezA #fault #named #safety- LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
DAC-2014-LiuHM #hardware #statistics- Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
DAC-2014-RaiHST #fault #framework #performance #realtime- An Efficient Real Time Fault Detection and Tolerance Framework Validated on the Intel SCC Processor (DR, PH, NS, LT), p. 6.
DAC-2014-VaidyanathanDP #reliability #stack #using- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DAC-2014-XiaCK #algorithm #automation #development- An Automobile Detection Algorithm Development for Automated Emergency Braking System (LX, TDC, KAAK), p. 6.
DATE-2014-AndradesRC #design- Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
DATE-2014-BardizbanyanSWL #data flow #dependence #energy- Reducing set-associative L1 data cache energy by early load data dependence detection (ELD3) (AB, MS, DBW, PLE), pp. 1–4.
DATE-2014-Fu0PJZ #data flow #fault #parallel #thread- A fault detection mechanism in a Data-flow scheduled Multithreaded processor (JF, QY, RP, CRJ, CZ), pp. 1–4.
DATE-2014-JunsangsriLH #concurrent #hybrid- A hybrid non-volatile SRAM cell with concurrent SEU detection and correction (PJ, FL, JH), pp. 1–4.
DATE-2014-KordesVDW #fault #hybrid #network #robust- Startup error detection and containment to improve the robustness of hybrid FlexRay networks (AK, BV, AKD, MGW), pp. 1–6.
DATE-2014-Maurer #algorithm #symmetry- A universal symmetry detection algorithm (PMM), pp. 1–4.
DATE-2014-MurilloWCLA #automation #concurrent #constraints #debugging- Automatic detection of concurrency bugs through event ordering constraints (LGM, SW, JC, RL, GA), pp. 1–6.
DATE-2014-NathanS #fault #low cost #named- Nostradamus: Low-cost hardware-only error detection for processor cores (RN, DJS), pp. 1–6.
DATE-2014-ZussaDTDMGCT #fault #injection #performance- Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
HPCA-2014-HuangHFS #concurrent #data transformation #metadata #runtime- Low-overhead and high coverage run-time race detection through selective meta-data management (RCH, EH, AF, GES), pp. 96–107.
HPCA-2014-QiMAT - Dynamically detecting and tolerating IF-Condition Data Races (SQ, AM, WA, JT), pp. 120–131.
OSDI-2014-ChenMXHPSZ - Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
PDP-2014-YalcinSHVWFUCF #energy #fault #memory management #transaction- Combining Error Detection and Transactional Memory for Energy-Efficient Computing below Safe Operation Margins (GY, AS, DH, AV, JTW, PF, OSÜ, AC, CF), pp. 248–255.
PPoPP-2014-Bautista-GomezC #monitoring- Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
PPoPP-2014-LiuTHB #named #predict- PREDATOR: predictive false sharing detection (TL, CT, ZH, EDB), pp. 3–14.
PPoPP-2014-SamakR #concurrent- Trace driven dynamic deadlock detection and reproduction (MS, MKR), pp. 29–42.
STOC-2014-Massoulie #community- Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
TACAS-2014-BozzanoCGT #component #design #fault #identification #logic #using- Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACAS-2014-FinkbeinerT #distributed #specification- Detecting Unrealizable Specifications of Distributed Systems (BF, LT), pp. 78–92.
ICST-2014-HongPK #concurrent #fault #java #web- Detecting Concurrency Errors in Client-Side Java Script Web Applications (SH, YP, MK), pp. 61–70.
ICTSS-2014-Bures #automation #maintenance #testing- Change Detection System for the Maintenance of Automated Testing (MB), pp. 192–197.
ISSTA-2014-AlshahwanH #fault #testing- Coverage and fault detection of the output-uniqueness test selection criteria (NA, MH), pp. 181–192.
ISSTA-2014-ChoudharyPO14a #consistency #named #nondeterminism #testing #web- X-PERT: a web application testing tool for cross-browser inconsistency detection (SRC, MRP, AO), pp. 417–420.
ISSTA-2014-MileaJK #refactoring #scalability- Scalable detection of missed cross-function refactorings (NAM, LJ, SCK), pp. 138–148.
ISSTA-2014-ZhangC #automation #exception #information management #lightweight- Lightweight automated detection of unsafe information leakage via exceptions (BZ, JC), pp. 327–338.
SAT-2014-BiereBLM #constraints- Detecting Cardinality Constraints in CNF (AB, DLB, EL, NM), pp. 285–301.
DocEng-2013-BarabucciBIM #documentation #modelling #visualisation- Document changes: modeling; detection; storing and visualization (DChanges) (GB, UMB, ADI, SM), pp. 281–282.
DocEng-2013-NevesZM #adaptation #algorithm #documentation #image- An adaptive thresholding algorithm based on edge detection and morphological operations for document images (RFdPN, CZ, CABM), pp. 107–110.
DocEng-2013-WilliamsG #library- Near duplicate detection in an academic digital library (KW, CLG), pp. 91–94.
DRR-2013-LiWTL #comprehension #image- Comic image understanding based on polygon detection (LL, YW, ZT, DL).
DRR-2013-RazaAS #image #multi- Multilingual artificial text detection and extraction from still images (AR, AA, IS).
DRR-2013-SalahRP #adaptation #assessment #automation #quality- Adaptive detection of missed text areas in OCR outputs: application to the automatic assessment of OCR quality in mass digitization projects (ABS, NR, TP).
HT-2013-JarukasemratanaML #algorithm #community #distance #network- Community detection algorithm based on centrality and node distance in scale-free networks (SJ, TM, XL), pp. 258–262.
ICDAR-2013-AlaeiDG #probability #representation #using- Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDAR-2013-BertrandGTFO #documentation- A System Based on Intrinsic Features for Fraudulent Document Detection (RB, PGK, ORT, PF, JMO), pp. 106–110.
ICDAR-2013-ChenPCN - Detecting OOV Names in Arabic Handwritten Data (JC, RP, HC, PN), pp. 994–998.
ICDAR-2013-DiamantatosVK #documentation #image- Detecting Main Body Size in Document Images (DP, VV, EK), pp. 1160–1164.
ICDAR-2013-DiemKS #documentation- Text Line Detection for Heterogeneous Documents (MD, FK, RS), pp. 743–747.
ICDAR-2013-FernandezT #algorithm- Handwritten Line Detection via an EM Algorithm (FCF, ORT), pp. 718–722.
ICDAR-2013-GandhiJ #documentation #image- Detection of Cut-and-Paste in Document Images (AG, CVJ), pp. 653–657.
ICDAR-2013-GaoRKLSIK #documentation #image #retrieval- Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
ICDAR-2013-GaoWXSZLS #adaptation- Adaptive Scene Text Detection Based on Transferring Adaboost (SG, CW, BX, CS, YZ, ZL, YS), pp. 388–392.
ICDAR-2013-GebhardtGSD #authentication #documentation #using- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDAR-2013-HaoGZXPSK #automation #fault #finite #transducer- Automated Error Detection and Correction of Chinese Characters in Written Essays Based on Weighted Finite-State Transducer (SH, ZG, MZ, YX, HP, KS, DK), pp. 763–767.
ICDAR-2013-HerasFVLS #architecture- Unsupervised Wall Detector in Architectural Floor Plans (LPdlH, DFM, EV, JL, GS), pp. 1245–1249.
ICDAR-2013-HuangSU - Scene Character Detection by an Edge-Ray Filter (RH, PS, SU), pp. 462–466.
ICDAR-2013-IdikaPV - Achieving Linguistic Provenance via Plagiarism Detection (NCI, HP, MV), pp. 648–652.
ICDAR-2013-JainD #documentation #image #named #verification- VisualDiff: Document Image Verification and Change Detection (RJ, DSD), pp. 40–44.
ICDAR-2013-KasarBACP #documentation #image #learning #using- Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDAR-2013-KessentiniCP #documentation #regular expression #word- Word Spotting and Regular Expression Detection in Handwritten Documents (YK, CC, TP), pp. 516–520.
ICDAR-2013-KhanSM13a - Hyperspectral Imaging for Ink Mismatch Detection (ZK, FS, ASM), pp. 877–881.
ICDAR-2013-KunzeSIK #documentation #off the shelf #process #recognition #using- Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDAR-2013-LiLLLFT #geometry- Detection of Overlapped Quadrangles in Plane Geometric Figures (KL, XL, HL, LL, TF, ZT), pp. 260–264.
ICDAR-2013-LinGTBAS #recognition- A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
ICDAR-2013-LiuS #documentation #equation #image- A Simple Equation Region Detector for Printed Document Images in Tesseract (ZL, RS), pp. 245–249.
ICDAR-2013-MoyssetK #algorithm #evaluation #on the- On the Evaluation of Handwritten Text Line Detection Algorithms (BM, CK), pp. 185–189.
ICDAR-2013-NassuMO #documentation #image #towards- Text Line Detection in Document Images: Towards a Support System for the Blind (BTN, RM, LESdO), pp. 638–642.
ICDAR-2013-RabaevBEKD - Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
ICDAR-2013-RazaSDE #multi #using- Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDAR-2013-RebeloC - Staff Line Detection and Removal in the Grayscale Domain (AR, JSC), pp. 57–61.
ICDAR-2013-RigaudBOKW #speech- An Active Contour Model for Speech Balloon Detection in Comics (CR, JCB, JMO, DK, JvdW), pp. 1240–1244.
ICDAR-2013-SankaranJ #fault- Error Detection in Highly Inflectional Languages (NS, CVJ), pp. 1135–1139.
ICDAR-2013-ShivakumaraBGT #video- Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
ICDAR-2013-SunBOK #using- Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDAR-2013-TeradaHFU #on the- On the Possibility of Structure Learning-Based Scene Character Detector (YT, RH, YF, SU), pp. 472–476.
ICDAR-2013-TuarobBMG #automation #documentation #machine learning #pseudo #using- Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDAR-2013-WangSZ #component #multi #segmentation- Natural Scene Text Detection with Multi-channel Connected Component Segmentation (XW, YS, YZ), pp. 1375–1379.
ICDAR-2013-YinLS #analysis #documentation #framework #image #multi #novel- A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDAR-2013-ZagorisP #image #modelling #using- Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDAR-2013-ZhuZ #image #recognition #using- Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
SIGMOD-2013-GeorgiadisKGPTM #algorithm #data type #framework #state of the art- Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms (DG, MK, AG, ANP, KT, YM), pp. 1061–1064.
VLDB-2013-AbdelhaqSG #locality #named #online #twitter- EvenTweet: Online Localized Event Detection from Twitter (HA, CS, MG), pp. 1326–1329.
VLDB-2013-DuttaNB #approach #approximate #data type #streaming- Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDB-2014-BudakGAA13 #named #network #online #roadmap #social- GeoScope: Online Detection of Geo-Correlated Information Trends in Social Networks (CB, TG, DA, AEA), pp. 229–240.
VLDB-2014-LiDWLKC13 - Attraction and Avoidance Detection from Movements (ZL, BD, FW, TKHL, RK, MC), pp. 157–168.
CSMR-2013-BertranGCS #architecture- Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMR-2013-GhaithWPM #analysis #independence #performance #testing- Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMR-2013-NegaraTS #web- Feature Detection in Ajax-Enabled Web Applications (NN, NT, ES), pp. 154–163.
CSMR-2013-PolychniatisHJBV #dependence- Detecting Cross-Language Dependencies Generically (TP, JH, SJ, EB, JV), pp. 349–352.
CSMR-2013-StevensRNJ #multi #query #refactoring- A History Querying Tool and Its Application to Detect Multi-version Refactorings (RS, CDR, CN, VJ), pp. 335–338.
ICPC-2013-Kamiya #clone detection #named #semantics- Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
ICPC-2013-MondalRS13a - Improving the detection accuracy of evolutionary coupling (MM, CKR, KAS), pp. 223–226.
ICPC-2013-MurakamiHHIK #analysis #clone detection #lightweight #source code- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPC-2013-UddinRS #clone detection #named #performance #scalability- SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
ICSM-2013-FontanaZMM #approach #machine learning #smell #towards- Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSM-2013-SorOTS #approach #machine learning #memory management #statistics #using- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSR-2013-AlaliBNM #distance #metric #using- A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSR-2013-AlipourHS #approach #debugging #towards- A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSR-2013-AmouiKATLL #experience #fault #industrial #search-based- Search-based duplicate defect detection: an industrial experience (MA, NK, AAD, LT, SL, WL), pp. 173–182.
MSR-2013-CampbellZXHM #analysis #documentation #topic #using- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSR-2013-WangG #android #api #case study #developer- Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
SCAM-2013-CeruloCPC #markov- A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
SCAM-2013-FardM #javascript #named #smell- JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
WCRE-2013-AntonyAC #approach #behaviour #clone detection #modelling- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCRE-2013-BernardiCL #approach #design pattern #graph #modelling- A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
WCRE-2013-ChenSB #c #memory management- Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
WCRE-2013-ChenSB13a #c #memory management #named- MemBrush: A practical tool to detect custom memory allocators in C binaries (XC, AS, HB), pp. 477–478.
WCRE-2013-DucheneRRG #black box #data flow #modelling #named- LigRE: Reverse-engineering of control and data flow models for black-box XSS detection (FD, SR, JLR, RG), pp. 252–261.
WCRE-2013-HallerSB #c #c++ #data type #named- MemPick: High-level data structure detection in C/C++ binaries (IH, AS, HB), pp. 32–41.
WCRE-2013-HallerSB13a #data type #named- MemPick: A tool for data structure detection (IH, AS, HB), pp. 479–480.
WCRE-2013-KrutzS #clone detection #named- CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
WCRE-2013-NayrollesMV #execution #mining- Improving SOA antipatterns detection in Service Based Systems by mining execution traces (MN, NM, PV), pp. 321–330.
WCRE-2013-SutiiRS #dependence #enterprise #java- Detecting dependencies in Enterprise JavaBeans with SQuAVisiT (AS, SAR, AS), pp. 485–486.
IFM-2013-SavaryFL #bytecode #modelling #testing #using #verification- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
SEFM-2013-KeshishzadehMM #automation #debugging #domain-specific language #fault #smt #using- Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFM-2013-SalehKBW #fault #implementation #specification #static analysis #using- Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
AIIDE-2013-ChenKS #interactive #learning- Learning Interrogation Strategies while Considering Deceptions in Detective Interactive Stories (GYC, ECCK, VWS).
CIG-2013-AlayedFN #behaviour #machine learning #online #using- Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
FDG-2013-RijnbouttHKB #game studies #library #mobile #robust- A robust throw detection library for mobile games (ER, OH, RK, RB), pp. 443–444.
GT-VMT-2013-MicallefC #case study #modelling #risk management #visual notation- A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
CHI-2013-WisemanCBGO #fault #using- Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCW-2013-AgustinaS #3d #collaboration #design #realtime- Dependency-conflict detection in real-time collaborative 3D design systems (A, CS), pp. 715–728.
CSCW-2013-BrooksKTPRSAZHA #chat #collaboration #statistics- Statistical affect detection in collaborative chat (MB, KK, MKT, DP, JJR, TJS, OA, AZ, PH, CRA), pp. 317–328.
DUXU-PMT-2013-Breiner #forensics #interactive- User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
HCI-III-2013-StorzRMLE #analysis #machine learning #visualisation #workflow- Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCI-III-2013-WangLDHY #set- A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
HCI-III-2013-YangZZJXW #multi #realtime #using- Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCI-IMT-2013-EbisawaF #using #video- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HIMI-D-2013-IshiiW #communication #evaluation #self #video- Evaluation of Superimposed Self-character Based on the Detection of Talkers’ Face Angles in Video Communication (YI, TW), pp. 431–438.
HIMI-HSM-2013-SaitohI #learning #using #visualisation- Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HIMI-LCCB-2013-SuzukiKUIISS #collaboration #multi- Detection of Division of Labor in Multiparty Collaboration (NS, TK, IU, SI, SI, MS, KS), pp. 362–371.
CAiSE-2013-BakkerFV #approach #hybrid #web- A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
ICEIS-v1-2013-LiuDH #assessment #exception #risk management- Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
CIKM-2013-FinisRABKF #flexibility #named #performance- RWS-Diff: flexible and efficient change detection in hierarchical data (JPF, MR, NA, RB, AK, FF), pp. 339–348.
CIKM-2013-KeikhaCC #retrieval- Generalizing diversity detection in blog feed retrieval (MK, FC, WBC), pp. 1201–1204.
CIKM-2013-McMinnMJ #corpus #scalability #twitter- Building a large-scale corpus for evaluating event detection on twitter (AJM, YM, JMJ), pp. 409–418.
CIKM-2013-TanGC0Z #named #network #social- UNIK: unsupervised social network spam detection (ET, LG, SC, XZ, YEZ), pp. 479–488.
CIKM-2013-XieSYPZ #correlation #streaming- Local correlation detection with linearity enhancement in streaming data (QX, SS, BY, CP, XZ), pp. 309–318.
CIKM-2013-ZhangJSCDZ #classification- Short text classification by detecting information path (SZ, XJ, DS, BC, XD, XZ), pp. 727–732.
CIKM-2013-ZhuXGC #mobile #perspective #ranking- Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
ECIR-2013-DadvarTOJ - Improving Cyberbullying Detection with User Context (MD, DT, RO, FdJ), pp. 693–696.
ECIR-2013-Franco-SalvadorGR #multi #network #semantics #using- Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIR-2013-IgnatovKC #approach- Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIR-2013-McParlaneMW #recommendation #semantics- Detecting Friday Night Party Photos: Semantics for Tag Recommendation (PJM, YM, IW), pp. 756–759.
ECIR-2013-PanchenkoBNF #categorisation #towards- Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames (AP, RB, HN, CF), pp. 776–779.
ECIR-2013-WaltherK #twitter- Geo-spatial Event Detection in the Twitter Stream (MW, MK), pp. 356–367.
ECIR-2013-YatesG #named #social #social media- ADRTrace: Detecting Expected and Unexpected Adverse Drug Reactions from User Reviews on Social Media Sites (AY, NG), pp. 816–819.
ICML-c1-2013-BuhlerRSH #clustering #community #set #source code- Constrained fractional set programs and their application in local clustering and community detection (TB, SSR, SS, MH), pp. 624–632.
ICML-c3-2013-FriedlandJL #social- Copy or Coincidence? A Model for Detecting Social Influence and Duplication Events (LF, DJ, ML), pp. 1175–1183.
ICML-c3-2013-HockingRVB #learning #using- Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICML-c3-2013-KoppulaS #learning #process- Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation (HSK, AS), pp. 792–800.
KDD-2013-CiglanLN #community #network #on the- On community detection in real-world networks and the importance of degree assortativity (MC, ML, KN), pp. 1007–1015.
KDD-2013-FeiKSNMH #learning- Heat pump detection from coarse grained smart meter data with positive and unlabeled learning (HF, YK, SS, MRN, SKM, JH), pp. 1330–1338.
KDD-2013-HuaCZLR #named #twitter- STED: semi-supervised targeted-interest event detectionin in twitter (TH, FC, LZ, CTL, NR), pp. 1466–1469.
KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #process- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
KDD-2013-StitelmanPDHRP #network #online #scalability #using- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDD-2013-ZhaoH #learning #online- Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
KDD-2013-ZimekGCS #effectiveness #performance- Subsampling for efficient and effective unsupervised outlier detection ensembles (AZ, MG, RJGBC, JS), pp. 428–436.
MLDM-2013-AmalamanER #using- Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDM-2013-KokkulaM #classification #synthesis #topic- Classification and Outlier Detection Based on Topic Based Pattern Synthesis (SK, NMM), pp. 99–114.
MLDM-2013-MaziluCGRHT #learning #predict- Feature Learning for Detection and Prediction of Freezing of Gait in Parkinson’s Disease (SM, AC, EG, DR, JMH, GT), pp. 144–158.
MLDM-2013-NikovskiWESSMT #data analysis- Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDM-2013-SharmaG - Optimal Time Segments for Stress Detection (NS, TG), pp. 421–433.
SEKE-2013-Al-JamimiA #design pattern #prolog #using- Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
SEKE-2013-CostaJM #modelling #semantics- Semantic Conflicts Detection in Model-driven Engineering (VOC, JMBOJ, LGPM), pp. 656–661.
SEKE-2013-LenhardW #modelling- Detecting Portability Issues in Model-Driven BPEL Mappings (JL, GW), pp. 18–21.
SEKE-2013-LiuWL #analysis #named #online #performance #pointer- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKE-2013-OliveiraBVC - Metrics-based Detection of Similar Software (PO, HB, MTV, HAXC), pp. 447–450.
SEKE-2013-ThommazoOORWF #network #traceability- Detecting traceability links through neural networks (ADT, TRdO, GO, RR, VW, SF), pp. 36–41.
SIGIR-2013-BonnefoyBB #documentation- A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
SIGIR-2013-ChenALC #microblog #topic- Emerging topic detection for organizations from microblogs (YC, HA, ZL, TSC), pp. 43–52.
SIGIR-2013-GippMBLN #analysis- Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIR-2013-SavenkovLL #behaviour- Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
SIGIR-2013-YinYHH #image #retrieval #robust- Accurate and robust text detection: a step-in for text retrieval in natural scene images (XCY, XY, KH, HWH), pp. 1091–1092.
AMT-2013-TichyKL #model transformation #performance #smell- Detecting Performance Bad Smells for Henshin Model Transformations (MT, CK, GL), pp. 82–91.
MoDELS-2013-RajbhojR #approach #metamodelling #version control- A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
ECOOP-2013-FlanaganF #named- RedCard: Redundant Check Elimination for Dynamic Race Detectors (CF, SNF), pp. 255–280.
ECOOP-2013-ShomratF - Detecting Refactored Clones (MS, YAF), pp. 502–526.
OOPSLA-2013-BaoZ #execution #float #on the fly #problem- On-the-fly detection of instability problems in floating-point program execution (TB, XZ), pp. 817–832.
OOPSLA-2013-BhattacharyaGN #program analysis- Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLA-2013-Deng0L #performance- Efficient concurrency-bug detection across inputs (DD, WZ, SL), pp. 785–802.
OOPSLA-2013-RaychevVS #concurrent #effectiveness #source code- Effective race detection for event-driven programs (VR, MTV, MS), pp. 151–166.
OOPSLA-2013-ZhongS #api #documentation #fault- Detecting API documentation errors (HZ, ZS), pp. 803–816.
PLDI-2013-ElwazeerAKSB #data type #scalability- Scalable variable and data type detection in a binary rewriter (KE, KA, AK, MS, RB), pp. 51–60.
POPL-2013-BarrVLS #automation #exception #float- Automatic detection of floating-point exceptions (ETB, TV, VL, ZS), pp. 549–560.
PPDP-2013-CalauttiGT #decidability #logic programming #source code- Detecting decidable classes of finitely ground logic programs with function symbols (MC, SG, IT), pp. 239–250.
ASE-2013-ChandramohanTBSP #approach #behaviour #bound #modelling #scalability- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASE-2013-Fard #behaviour #distributed #independence #using- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASE-2013-GhaisasMA #case study #documentation- Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASE-2013-GuoZYZZ #android- Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
ASE-2013-MoritzVPGMG #api #named #repository #scalability #source code #visualisation- ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
ASE-2013-PalombaBPOLP #smell #source code #using- Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASE-2013-RayKPR #consistency #nondeterminism #semantics- Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
ASE-2013-Zhang0SLMD #automation #constraints #symmetry- Constraint-based automatic symmetry detection (SJZ, JS, CS, YL, JM, JSD), pp. 15–25.
ESEC-FSE-2013-LiangWXM #debugging- Inferring project-specific bug patterns for detecting sibling bugs (GL, QW, TX, HM), pp. 565–575.
ESEC-FSE-2013-McPeakGR #debugging #incremental #scalability- Scalable and incremental software bug detection (SM, CHG, MKR), pp. 554–564.
ESEC-FSE-2013-NguyenX #named- Cachetor: detecting cacheable data to remove bloat (KN, G(X), pp. 268–278.
ESEC-FSE-2013-PetkeYCH #combinator #fault #interactive #performance #testing- Efficiency and early fault detection with lower and higher strength combinatorial interaction testing (JP, SY, MBC, MH), pp. 26–36.
ESEC-FSE-2013-SongT #automaton #model checking #named- PoMMaDe: pushdown model-checking for malware detection (FS, TT), pp. 607–610.
ESEC-FSE-2013-WuHTY #alias #analysis #effectiveness #fault- Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ICSE-2013-FemmerGLM #case study #consistency #nondeterminism- Detecting inconsistencies in wrappers: a case study (HF, DG, ML, DM), pp. 1022–1031.
ICSE-2013-HermansSPD #clone detection #spreadsheet #visualisation- Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
ICSE-2013-MalikHH #automation #performance #scalability #testing- Automatic detection of performance deviations in the load testing of large scale systems (HM, HH, AEH), pp. 1012–1021.
ICSE-2013-MarinoHDVTV #concurrent #source code- Detecting deadlock in programs with data-centric synchronization (DM, CH, JD, MV, FT, JV), pp. 322–331.
ICSE-2013-NguyenNNN #named #web- DRC: a detection tool for dangling references in PHP-based web applications (HVN, HAN, TTN, TNN), pp. 1299–1302.
ICSE-2013-NistorSML #data access #named #performance #problem- Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSE-2013-Simpson #communication #developer- Changeset based developer communication to detect software failures (BS), pp. 1468–1470.
ICSE-2013-StephanASC #analysis #clone detection #comparison #framework #mutation testing #using- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
ICSE-2013-TianD #model checking- Detecting spurious counterexamples efficiently in abstract model checking (CT, ZD), pp. 202–211.
ICSE-2013-ZhengZ #execution #static analysis #web- Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
SAC-2013-BakkerVFK #web- Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
SAC-2013-BanerjeeSS #monitoring #using- Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SAC-2013-ChaeKHLW #api- Software plagiarism detection via the static API call frequency birthmark (DKC, SWK, JH, SCL, GW), pp. 1639–1643.
SAC-2013-CostaBM #network #social- Detecting tip spam in location-based social networks (HC, FB, LHdCM), pp. 724–729.
SAC-2013-DietrichRP #clustering #visual notation- Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
SAC-2013-FariaGC #algorithm #data type #multi #problem- Novelty detection algorithm for data streams multi-class problems (ERF, JG, ACPLFC), pp. 795–800.
SAC-2013-HassanzadehN #algorithm #graph- A semi-supervised graph-based algorithm for detecting outliers in online-social-networks (RH, RN), pp. 577–582.
SAC-2013-HuangXCL #adaptation #algorithm #analysis #implementation #parallel #random testing #testing- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SAC-2013-KimM #algorithm #hybrid #search-based #using- Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SAC-2013-LeitaoC #adaptation #optimisation #performance #using #xml- Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SAC-2013-PerkusichAP #development #problem- A model to detect problems on scrum-based software development projects (MP, HOdA, AP), pp. 1037–1042.
SAC-2013-RieckerBH #energy #lightweight #network- Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
SAC-2013-TeixeiraRG #locality #parallel #using- Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SLE-2013-VasudevanT #ambiguity #programming language- Detecting Ambiguity in Programming Language Grammars (NV, LT), pp. 157–176.
ASPLOS-2013-QianTSQ #consistency #named #precise #scalability- Volition: scalable and precise sequential consistency violation detection (XQ, JT, BS, DQ), pp. 535–548.
ASPLOS-2013-WesterDCFN #concurrent- Parallelizing data race detection (BW, DD, PMC, JF, SN), pp. 27–38.
CASE-2013-LanzaKPSS #analysis #automation #fault #using- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASE-2013-LinG #framework #network #optimisation #synthesis- Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
CASE-2013-WeeklyRZBNS #low cost #matter- Low-cost coarse airborne particulate matter sensing for indoor occupancy detection (KW, DR, LZ, AMB, WWN, CJS), pp. 32–37.
CASE-2013-YanLS #fault #process #statistics- Fault detection of cooling coils based on unscented Kalman filters and statistical process control (YY, PBL, BS), pp. 237–242.
CASE-2013-ZhouL #realtime #throughput- Real time electricity demand response for sustainable manufacturing systems considering throughput bottleneck detection (ZZ, LL), pp. 640–644.
CGO-2013-TanFG #fault #lightweight #source code- Lightweight fault detection in parallelized programs (LT, MF, RG), p. 11.
DAC-2013-LiaoHL #fault- GPU-based n-detect transition fault ATPG (KYL, SCH, JCML), p. 8.
DAC-2013-LinCLWC #fuzzy #novel- A novel fuzzy matching model for lithography hotspot detection (SYL, JYC, JCL, WYW, SCC), p. 6.
DAC-2013-WangK #control flow #hardware #kernel #named #performance #using- NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DAC-2013-WeiP #hardware- The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
DAC-2013-YuLJC #classification #feature model #using- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATE-2013-AnanthanarayananGP #fault #low cost #set #using- Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATE-2013-ChaG #approach #effectiveness #metric- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATE-2013-DeOrioLBB #debugging #machine learning- Machine learning-based anomaly detection for post-silicon bug diagnosis (AD, QL, MB, VB), pp. 491–496.
DATE-2013-El-NacouziAPZJM #scalability- A dual grain hit-miss detector for large die-stacked DRAM caches (MEN, IA, MP, JZ, NDEJ, AM), pp. 89–92.
DATE-2013-HuHMCF #fault #realtime- Fault detection, real-time error recovery, and experimental demonstration for digital microfluidic biochips (KH, BNH, AM, KC, RBF), pp. 559–564.
DATE-2013-HuNRK #hardware #multimodal #using- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATE-2013-KocBKE #fault- Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
DATE-2013-LinHLFGHM #challenge #fault #validation- Overcoming post-silicon validation challenges through quick error detection (QED) (DL, TH, YL, FF, DSG, NH, SM), pp. 320–325.
DATE-2013-PontarelliOEW #fault #using- Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATE-2013-SarrazinENBG #concurrent #design #fault #performance- Scan design with shadow flip-flops for low performance overhead and concurrent delay fault detection (SS, SE, LAdBN, YB, VG), pp. 1077–1082.
DATE-2013-YalcinUC #fault #hardware #memory management #named #transaction #using- FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATE-2013-ZhaoLBT #manycore #probability #runtime- Run-time probabilistic detection of miscalibrated thermal sensors in many-core systems (JZ, S(L, WB, RT), pp. 1395–1398.
HPDC-2013-HeBTGGMS - I/O acceleration with pattern detection (JH, JB, AT, GG, GAG, CM, XHS), pp. 25–36.
HPDC-2013-ZhouTKB #automation #debugging #named #scalability- WuKong: automatically detecting and localizing bugs that manifest at large system scales (BZ, JT, MK, SB), pp. 131–142.
LCTES-2013-ChenY #comparison #fault #performance- Boosting efficiency of fault detection and recovery throughapplication-specific comparison and checkpointing (HC, CY), pp. 13–20.
PDP-2013-GarbadeWSFU #fault #network- Impact of Message Based Fault Detectors on Applications Messages in a Network on Chip (AG, SW, SS, BF, TU), pp. 470–477.
PDP-2013-GeleriTT #algorithm- Parallelizing Broad Phase Collision Detection Algorithms for Sampling Based Path Planners (FG, OT, HT), pp. 384–391.
PPoPP-2013-CaiZWC #named #parallel #source code #thread- TeamWork: synchronizing threads globally to detect real deadlocks for multithreaded programs (YC, KZ, SW, WKC), pp. 311–312.
PPoPP-2013-Chen #algorithm #fault #fault tolerance #named #online- Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
PPoPP-2013-LifflanderMK #fault tolerance #protocol #termination- Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
PPoPP-2013-ParkSI #concurrent #scalability #source code- Scalable data race detection for partitioned global address space programs (CSP, KS, CI), pp. 305–306.
SOSP-2013-KasikciZC #concurrent #crowdsourcing #named- RaceMob: crowdsourced data race detection (BK, CZ, GC), pp. 406–422.
STOC-2013-FeldmanGRVX #algorithm #bound #clique #statistics- Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
TACAS-2013-SongT #ltl #model checking- LTL Model-Checking for Malware Detection (FS, TT), pp. 416–431.
CAV-2013-KroeningLW #approximate #c #performance #source code- Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
ICLP-J-2013-CatB #dependence #functional #generative- Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
ICST-2013-ChristakisGS #concurrent #erlang #fault #source code #testing- Systematic Testing for Detecting Concurrency Errors in Erlang Programs (MC, AG, KFS), pp. 154–163.
ICST-2013-GreilerDS #automation #smell- Automated Detection of Test Fixture Strategies and Smells (MG, AvD, MADS), pp. 322–331.
ISSTA-2013-RadoiD #concurrent #java #parallel- Practical static race detection for Java parallel loops (CR, DD), pp. 178–190.
SAT-2013-MisraORS #bound #set- Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
WICSA-ECSA-2012-AstekinS #analysis #clone detection #simulation- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
DRR-2012-FengY #component #composition #documentation #using- Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRR-2012-Silva #algorithm #evaluation #using- Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
HT-2012-ChakrabortyGG #community #folksonomy- Detecting overlapping communities in folksonomies (AC, SG, NG), pp. 213–218.
HT-2012-FlockVS #wiki- Revisiting reverts: accurate revert detection in wikipedia (FF, DV, ES), pp. 3–12.
HT-2012-JainHVYS #linked data #open data- Moving beyond SameAs with PLATO: partonomy detection for linked data (PJ, PH, KV, PZY, APS), pp. 33–42.
HT-2012-LimD #community #twitter- Following the follower: detecting communities with common interests on twitter (KHL, AD), pp. 317–318.
HT-2012-NakajimaZIN #analysis #scalability- Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
HT-2012-SofeanS #architecture #design #evaluation #implementation #network #realtime #social #using- A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
JCDL-2012-BogenFS #evaluation- A quantitative evaluation of techniques for detection of abnormal change events in blogs (PLBI, RF, FS), pp. 157–166.
SIGMOD-2012-ZellagK #consistency #named #realtime- ConsAD: a real-time consistency anomalies detector (KZ, BK), pp. 641–644.
TPDL-2012-SumbanaGSAV #automation #classification #wiki- Automatic Vandalism Detection in Wikipedia with Active Associative Classification (MS, MAG, RSO, JMA, AV), pp. 138–143.
VLDB-2012-Bidoit-TolluCU #independence #type system #xml- Type-Based Detection of XML Query-Update Independence (NBT, DC, FU), pp. 872–883.
VLDB-2012-GraefeK #database- Definition, Detection, and Recovery of Single-Page Failures, a Fourth Class of Database Failures (GG, HAK), pp. 646–655.
ITiCSE-2012-PoonSTK #corpus #source code- Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
CSMR-2012-BinunK #design pattern #named- DPJF — Design Pattern Detection with High Accuracy (AB, GK), pp. 245–254.
CSMR-2012-DeissenboeckHHW #challenge- Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
CSMR-2012-FontanaCZ #benchmark #design pattern #metric #named #tool support- DPB: A Benchmark for Design Pattern Detection Tools (FAF, AC, MZ), pp. 235–244.
CSMR-2012-KaushikT #case study #comparative #debugging #information retrieval #modelling #performance- A Comparative Study of the Performance of IR Models on Duplicate Bug Detection (NK, LT), pp. 159–168.
CSMR-2012-Koschke #clone detection #scalability #using- Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMR-2012-NadiH #linux #mining #variability- Mining Kbuild to Detect Variability Anomalies in Linux (SN, RCH), pp. 107–116.
ICPC-2012-HauptmannJEJV #clone detection #comprehension #question- Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
ICPC-2012-Keivanloo #clone detection #code search #source code- Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPC-2012-KeivanlooRR #clone detection #named #semantics- SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
ICPC-2012-SajnaniOL #clone detection #parallel #pipes and filters #using- Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSM-2012-Al-KofahiNNNN #semantics- Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
ICSM-2012-AlalfiCDSS #clone detection #modelling- Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
ICSM-2012-FadhelKLW #search-based- Search-based detection of high-level model changes (AbF, MK, PL, MW), pp. 212–221.
ICSM-2012-HermansPD #smell #spreadsheet- Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
ICSM-2012-HigoK #consistency #how #nondeterminism- How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
ICSM-2012-RamaKVP #source code #version control- Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
ICSM-2012-TangWZL #maintenance- Time-leverage point detection for time sensitive software maintenance (ET, LW, JZ, XL), pp. 567–570.
ICSM-2012-ThungLJ #collaboration- Detecting similar applications with collaborative tagging (FT, DL, LJ), pp. 600–603.
ICSM-2012-ZouG #algorithm #automation #case study #industrial #what #why- An industrial case study of Coman’s automated task detection algorithm: What Worked, What Didn’t, and Why (LZ, MWG), pp. 6–14.
MSR-2012-Breckel #comparison #database #debugging #fault #mining #scalability- Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
SCAM-2012-GethersAP #concept #database #dependence- Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
SCAM-2012-MurakamiHHIK #clone detection- Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCRE-2012-Al-OmariKRR #dot-net #programming language- Detecting Clones Across Microsoft .NET Programming Languages (FAO, IK, CKR, JR), pp. 405–414.
WCRE-2012-DurfinaKZK #decompiler- Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler (LD, JK, PZ, BK), pp. 51–60.
WCRE-2012-GauthierM #data access #performance #php- Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
WCRE-2012-HemelK #case study #clone detection #linux #reverse engineering #source code #using #variability- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCRE-2012-IshiharaHHIK #clone detection #empirical #functional #library #towards- Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
WCRE-2012-JanaN #dynamic analysis #precise #using- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCRE-2012-LavoieKMZ #clone detection #nearest neighbour #repository #using- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCRE-2012-MaigaABSGA #anti #approach #incremental #named- SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
ICALP-v1-2012-LaplanteLR #bound #quantum- Classical and Quantum Partition Bound and Detector Inefficiency (SL, VL, JR), pp. 617–628.
FM-2012-SongT #model checking #performance #using- Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
IFM-2012-HoomanMW #abstraction #fault #industrial #modelling #using- Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFM-2012-TianBB #behaviour #game studies #multi- Behaviour-Based Cheat Detection in Multiplayer Games with Event-B (HT, PJB, AGB), pp. 206–220.
AIIDE-2012-BarikHRJ #game studies #social- Spatial Game Signatures for Bot Detection in Social Games (TB, BEH, DLR, XJ).
VS-Games-2012-AsteriadisKSY #behaviour #clustering #towards #using #visual notation- Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
CHI-2012-HollandKT #algorithm #identification #usability #visual notation- Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
CHI-2012-ViS #design #interactive- Detecting error-related negativity for interaction design (CV, SS), pp. 493–502.
CSCW-2012-LiuBS #collaboration #design #product line- Conflict detection and resolution for product line design in a collaborative decision making environment (X(L, ECB, JES), pp. 1327–1336.
EDOC-2012-CostaMPA #approach #modelling #rule-based- A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOC-2012-HarrisonBADN #framework #identification- A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
ICEIS-v3-2012-WangWZLW #modelling #process- Detecting Infeasible Traces in Process Models (ZW, LW, XZ, YL, JW), pp. 212–217.
CIKM-2012-AkogluTVF #category theory #performance #reliability- Fast and reliable anomaly detection in categorical data (LA, HT, JV, CF), pp. 415–424.
CIKM-2012-BaeJKL #using- Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKM-2012-CaballeroBA #topic- The generalized dirichlet distribution in enhanced topic detection (KLCE, JB, RA), pp. 773–782.
CIKM-2012-ComarLSNT #kernel #linear- Weighted linear kernel with tree transformed features for malware detection (PMC, LL, SS, AN, PNT), pp. 2287–2290.
CIKM-2012-HuangQYY #algorithm #robust- Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space (HH, HQ, SY, DY), pp. 405–414.
CIKM-2012-LiSD #named #twitter- Twevent: segment-based event detection from tweets (CL, AS, AD), pp. 155–164.
CIKM-2012-QahtanZW #estimation #performance- Efficient estimation of dynamic density functions with an application to outlier detection (AAQ, XZ, SW), pp. 2159–2163.
CIKM-2012-TangY #named #roadmap #social #social media #statistics #topic- TUT: a statistical model for detecting trends, topics and user interests in social media (XT, CCY), pp. 972–981.
CIKM-2012-XiangFWHR #corpus #scalability #topic #twitter- Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
ECIR-2012-BosmaMW #framework #network #social- A Framework for Unsupervised Spam Detection in Social Networking Sites (MB, EM, WW), pp. 364–375.
ECIR-2012-PolajnarGA - Detection of News Feeds Items Appropriate for Children (TP, RG, LA), pp. 63–72.
ICML-2012-BiessmannPBH #canonical #roadmap #web- Canonical Trends: Detecting Trend Setters in Web Data (FB, JMP, MLB, AH), p. 170.
ICML-2012-MalisiewiczSGE #image #retrieval #visual notation- Exemplar-SVMs for Visual Ob ject Detection, Label Transfer and Image Retrieval (TM, AS, AG, AAE), p. 4.
ICPR-2012-AhmedC #robust- A robust person detector for overhead views (IA, JNC), pp. 1483–1486.
ICPR-2012-AjmeraD #analysis #word- Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
ICPR-2012-BagdanovBLM #multi- Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
ICPR-2012-BaiZX #linear #multi- Multi scale multi structuring element top-hat transform for linear feature detection (XB, FZ, BX), pp. 1920–1923.
ICPR-2012-BarbulescuGGMR #2d #3d #estimation #using- 3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPR-2012-BurghoutsS #correlation- Correlations between 48 human actions improve their detection (GJB, KS), pp. 3815–3818.
ICPR-2012-ChengLWTCBWS - Peripapillary atrophy detection by biologically inspired feature (JC, JL, DWKW, NMT, CYlC, MB, TYW, SMS), pp. 53–56.
ICPR-2012-ChenYZZ #bound #network- Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPR-2012-CheungP #using- Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPR-2012-ChoKKA #kernel- Bilateral kernel-based Region Detector (WC, SYK, AK, MAA), pp. 750–753.
ICPR-2012-ChowdhuryBP #using- Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPR-2012-DahmBCG #morphism- Topological features and iterative node elimination for speeding up subgraph isomorphism detection (ND, HB, TC, YG), pp. 1164–1167.
ICPR-2012-DaiFZ #mining- Mining sub-categories for object detection (JD, JF, JZ), pp. 3260–3263.
ICPR-2012-DeshmukhRSL - Vocalization patterns of dairy animals to detect animal state (OD, NR, YS, SL), pp. 254–257.
ICPR-2012-DinhLLRD #image #multi- Training data selection for cancer detection in multispectral endoscopy images (VCD, ML, RL, OR, RPWD), pp. 161–164.
ICPR-2012-DuongDNLDLS #eye tracking #locality #robust #video- Robust eye localization in video by combining eye detector and eye tracker (CND, TCPD, TDN, DDL, DAD, BHL, SS), pp. 242–245.
ICPR-2012-FelhiBT #image- A skeleton based descriptor for detecting text in real scene images (MF, NB, ST), pp. 282–285.
ICPR-2012-FengB #concept #image #semantics- Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
ICPR-2012-GaoM #analysis #canonical #correlation #kernel #multi #using- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPR-2012-GerogiannisNL #image #performance- Fast and efficient vanishing point detection in indoor images (DG, CN, AL), pp. 3244–3247.
ICPR-2012-GhianiMR #liveness- Fingerprint liveness detection by local phase quantization (LG, GLM, FR), pp. 537–540.
ICPR-2012-GlazerLM - Feature shift detection (AG, ML, SM), pp. 1383–1386.
ICPR-2012-Goldstein #algorithm #named- FastLOF: An Expectation-Maximization based Local Outlier detection algorithm (MG), pp. 2282–2285.
ICPR-2012-GuermaziVB #image #multi- Matching of multi-resolution image for remote sensing glacier detection (AG, LV, PB), pp. 3406–3410.
ICPR-2012-GuR - Shadow detection via Rayleigh scattering and Mie theory (LG, ARK), pp. 2165–2168.
ICPR-2012-GuyonBZ #constraints #matrix #rank #robust- Foreground detection via robust low rank matrix factorization including spatial constraint with Iterative reweighted regression (CG, TB, EHZ), pp. 2805–2808.
ICPR-2012-HardingHCLC #automation #image- Automated detection of skeletal muscle twitches from B-mode ultrasound images: An application to motor neuron disease (PJH, EFHT, RC, IL, NC), pp. 2630–2633.
ICPR-2012-Ho #approach #effectiveness- An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPR-2012-HuangA #analysis #perspective- Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
ICPR-2012-HuangL #analysis #automation #component #independence- Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
ICPR-2012-HuangLW #clustering #incremental- Incremental support vector clustering with outlier detection (DH, JHL, CDW), pp. 2339–2342.
ICPR-2012-HuangOSU #framework #multi #recognition- Scene character detection and recognition based on multiple hypotheses framework (RH, SO, PS, SU), pp. 717–720.
ICPR-2012-IkemuraF #using- Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPR-2012-ItoOWK - Detection of eyes by circular Hough transform and histogram of gradient (YI, WO, TW, FK), pp. 1795–1798.
ICPR-2012-JiangES #estimation #integration #performance #robust- Efficient and robust integration of face detection and head pose estimation (FJ, HKE, BES), pp. 1578–1581.
ICPR-2012-JiangFZT #random- Active Shape Model with random forest for facial features detection (WJ, YF, ZZ, YT), pp. 593–596.
ICPR-2012-KataokaSM #using- Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPR-2012-KennardBS #2d #approach #geometry #using #verification- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPR-2012-KhanER #image- A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images (AMK, HED, NMR), pp. 149–152.
ICPR-2012-KunchevaF #feature model #multi #streaming- PCA feature extraction for change detection in multidimensional unlabelled streaming data (LIK, WJF), pp. 1140–1143.
ICPR-2012-LankinenKK #categorisation #comparison #visual notation- A comparison of local feature detectors and descriptors for visual object categorization by intra-class repeatability and matching (JL, VK, JKK), pp. 780–783.
ICPR-2012-LeeLM #realtime #smarttech- Real-time staircase detection from a wearable stereo system (YHL, TSL, GGM), pp. 3770–3773.
ICPR-2012-LePB #navigation #people- Pedestrian lane detection for assistive navigation of blind people (MCL, SLP, AB), pp. 2594–2597.
ICPR-2012-LiL - Scene text detection via stroke width (YL, HL), pp. 681–684.
ICPR-2012-LiP - Anomalous tie plate detection for railroad inspection (YL, SP), pp. 3017–3020.
ICPR-2012-LiSY #invariant- A Fully Affine Invariant Feature detector (WL, ZS, JY), pp. 2768–2771.
ICPR-2012-LiuL #analysis #learning #multi- Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
ICPR-2012-LiuSZWBCT #bound- Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPR-2012-MaB #multi- Multi-view multi-class object detection via exemplar compounding (KM, JBA), pp. 3256–3259.
ICPR-2012-MadabusiG #image- Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
ICPR-2012-MaLXS #image #using- Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPR-2012-MartelliCBTM #paradigm #similarity- Joining feature-based and similarity-based pattern description paradigms for object detection (SM, MC, LB, DT, VM), pp. 2702–2705.
ICPR-2012-McCloskeyD #metadata #process #using #video- Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPR-2012-MiksikM #evaluation #performance- Evaluation of local detectors and descriptors for fast feature matching (OM, KM), pp. 2681–2684.
ICPR-2012-MinagawaKTH #automation- A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
ICPR-2012-MinKCK #approach #higher-order #using- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPR-2012-MogelmoseTM #comparative #dataset #evaluation #learning- Learning to detect traffic signs: Comparative evaluation of synthetic and real-world datasets (AM, MMT, TBM), pp. 3452–3455.
ICPR-2012-NarayanamN #algorithm #community #distributed #game studies #graph #information management #social- A game theory inspired, decentralized, local information based algorithm for community detection in social graphs (RN, YN), pp. 1072–1075.
ICPR-2012-NguyenPRPV #multi #segmentation #video- Multi-modal abnormality detection in video with unknown data segmentation (TVN, DQP, SR, DSP, SV), pp. 1322–1325.
ICPR-2012-NiigakiSM #using- Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPR-2012-Ohtsuka #analysis- Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
ICPR-2012-PanZXQ #2d #category theory- Improved generic categorical object detection fusing depth cue with 2D appearance and shape features (HP, YZ, SX, KQ), pp. 1467–1470.
ICPR-2012-PhamDBR #image #re-engineering- Accurate junction detection and reconstruction in line-drawing images (TAP, MD, SB, JYR), pp. 693–696.
ICPR-2012-PhanST #symmetry #using- Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPR-2012-RadwanDG #estimation- Correcting pose estimation with implicit occlusion detection and rectification (IR, AD, RG), pp. 3496–3499.
ICPR-2012-RoyG #framework #image #locality #probability- A probabilistic framework for logo detection and localization in natural scene images (AR, UG), pp. 2051–2054.
ICPR-2012-RoyH #classification #component #documentation #image #using- Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPR-2012-SakaiKMK #robust- Robust detection of adventitious lung sounds in electronic auscultation signals (TS, MK, SM, SK), pp. 1993–1996.
ICPR-2012-SanLH - Constrained-MSER detection of retinal pathology (GLYS, MLL, WH), pp. 2059–2062.
ICPR-2012-Schmidt-HackenbergYB #image #visual notation- Visual cortex inspired features for object detection in X-ray images (LSH, MRY, TMB), pp. 2573–2576.
ICPR-2012-SharmaHN #classification #incremental #learning #performance- Efficient incremental learning of boosted classifiers for object detection (PS, CH, RN), pp. 3248–3251.
ICPR-2012-ShaukatGWB #approach #bottom-up #top-down- Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPR-2012-ShiLBH - Context-driven moving vehicle detection in wide area motion imagery (XS, HL, EB, WH), pp. 2512–2515.
ICPR-2012-ShinPJB #using- Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPR-2012-SiddiquieFDD #invariant- Unsupervised model selection for view-invariant object detection in surveillance environments (BS, RSF, AD, LSD), pp. 3252–3255.
ICPR-2012-SimoesSW #image #using- Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPR-2012-SjobergKIL #classification #concept #linear #realtime #scalability #visual notation- Real-time large-scale visual concept detection with linear classifiers (MS, MK, SI, JL), pp. 421–424.
ICPR-2012-SommerFHG #image- Learning-based mitotic cell detection in histopathological images (CS, LF, FAH, DG), pp. 2306–2309.
ICPR-2012-SoranHLS #using- Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPR-2012-SpampinatoP #performance- Enhancing object detection performance by integrating motion objectness and perceptual organization (CS, SP), pp. 3640–3643.
ICPR-2012-SrikanthaSM #approach #image- An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPR-2012-StrokinaMELK - Detection of bubbles as Concentric Circular Arrangements (NS, JM, TE, LL, HK), pp. 2655–2659.
ICPR-2012-TangHW #multi #recognition- Hand-dorsa vein recognition based on multi-level keypoint detection and local feature matching (YT, DH, YW), pp. 2837–2840.
ICPR-2012-TangW #semantics- Semantic Hough Transform based object detection with Partial Least Squares (JT, HW), pp. 3652–3655.
ICPR-2012-ThanhMNMY #recognition #robust #using- Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPR-2012-TiribuziPVR #framework #kernel #learning #multi- A Multiple Kernel Learning framework for detecting altered fingerprints (MT, MP, PV, ER), pp. 3402–3405.
ICPR-2012-Ugurlu #using- Head posture detection using skin and hair information (YU), pp. 1–4.
ICPR-2012-VazquezLP #adaptation- Unsupervised domain adaptation of virtual and real worlds for pedestrian detection (DV, AML, DP), pp. 3492–3495.
ICPR-2012-VitaladevuniCPN #documentation #image #using- Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPR-2012-WakayamaDDIMT #estimation #performance #visual notation- Estimation of the human performance for pedestrian detectability based on visual search and motion features (MW, DD, KD, II, HM, YT), pp. 1940–1943.
ICPR-2012-WangBLST #re-engineering- Detecting discontinuities for surface reconstruction (YW, JB, NL, MS, PT), pp. 2108–2111.
ICPR-2012-WangCCP #realtime #using- Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPR-2012-WangGL #image- A new depth descriptor for pedestrian detection in RGB-D images (NW, XG, JL), pp. 3688–3691.
ICPR-2012-WangPLQHJ - Color Maximal-Dissimilarity Pattern for pedestrian detection (QW, JP, GL, LQ, QH, SJ), pp. 1952–1955.
ICPR-2012-WechtitschFS #fault #robust- Robust detection of single-frame defects in archived film (SW, HF, PS), pp. 2647–2650.
ICPR-2012-WeibelDWR #graph #using- Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPR-2012-WidhalmNB #smarttech- Transport mode detection with realistic Smartphone sensor data (PW, PN, NB), pp. 573–576.
ICPR-2012-WongLTYLTCW #automation #image- Detecting the optic cup excavation in retinal fundus images by automatic detection of vessel kinking (DWKW, JL, NMT, FY, BHL, YCT, CYlC, TYW), pp. 73–76.
ICPR-2012-XiaDG #invariant- An accurate and contrast invariant junction detector (GSX, JD, YG), pp. 2780–2783.
ICPR-2012-XiangL #symmetry- Symmetric object detection based on symmetry and centripetal-SIFT edge descriptor (YX, SL), pp. 1403–1406.
ICPR-2012-YamashitaTHNH #representation- Sparse representation of audio features for sputum detection from lung sounds (TY, ST, KH, YN, SH), pp. 2005–2008.
ICPR-2012-YuYL #image- Ulcer detection in wireless capsule endoscopy images (LY, PCY, JHL), pp. 45–48.
ICPR-2012-ZhangL #using- Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPR-2012-ZhangLC #analysis #multi #novel- A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
ICPR-2012-ZhangLM12a #adaptation #automation #clustering #fault- An adaptive unsupervised clustering of pronunciation errors for automatic pronunciation error detection (LZ, HL, LM), pp. 1521–1525.
ICPR-2012-ZhangLMA #independence #statistics- A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
ICPR-2012-ZhangRZY #random- Contour detection via random forest (CZ, XR, YZ, MHY), pp. 2772–2775.
ICPR-2012-ZhangWBZCZ #feature model- Object detection via foreground contour feature selection and part-based shape model (HZ, JW, XB, JZ, JC, HZ), pp. 2524–2527.
ICPR-2012-ZhangWDP #linear- Skin detection via linear regression tree (JZ, HW, FD, CP), pp. 1711–1714.
ICPR-2012-ZhangWN #feature model #student- Bayesian feature selection and model detection for student’s t-mixture distributions (HZ, QMJW, TMN), pp. 1631–1634.
ICPR-2012-ZhangWSD #approach #effectiveness- A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPR-2012-ZhangXY #bound #modelling- An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
ICPR-2012-ZhangZHHT #mining #semantics- Semantic windows mining in sliding window based object detection (JZ, XZ, YH, KH, TT), pp. 3264–3267.
ICPR-2012-ZhaoL #3d- Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
ICPR-2012-ZhaoZWL #graph #mobile #robust- Robust mobile spamming detection via graph patterns (YZ, ZZ, YW, JL), pp. 983–986.
ICPR-2012-ZhouLYCL - Corner-surround Contrast for saliency detection (QZ, NL, YY, PC, WL), pp. 1423–1426.
KDD-2012-BatalFHMH #mining #multi- Mining recent temporal patterns for event detection in multivariate time series data (IB, DF, JH, FM, MH), pp. 280–288.
KDD-2012-DingKBKC #anti #communication #social- Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
KDD-2012-GuptaGSH #community #mining- Integrating community matching and outlier detection for mining evolutionary community outliers (MG, JG, YS, JH), pp. 859–867.
KDD-2012-HiraiY #clustering #normalisation #using- Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDD-2012-PhamP #algorithm #approximate- A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data (NP, RP), pp. 877–885.
KDD-2012-WuWCT #hybrid #named #recommendation- HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
KDD-2012-XieWLY #overview- Review spam detection via temporal pattern discovery (SX, GW, SL, PSY), pp. 823–831.
KDD-2012-XingLHCHLLMZ #behaviour #chat #online #scalability #video- Scalable misbehavior detection in online video chat services (XX, YLL, SH, HC, RH, QL, XL, SM, YZ), pp. 552–560.
KDD-2012-ZhangY #bound #community #matrix- Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
KDIR-2012-HaanR - Detecting Temporally Related Arithmetical Patterns — An Extension of Complex Event Processing (RdH, MR), pp. 329–332.
KDIR-2012-LemnaruTCP #case study #classification #hybrid #network #problem- A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
KDIR-2012-SantosGSK #behaviour #finite- Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
KEOD-2012-FukumotoST #multi #summary #topic- Topic and Subject Detection in News Streams for Multi-document Summarization (FF, YS, AT), pp. 166–171.
MLDM-2012-GlodekSP #process #recognition- Detecting Actions by Integrating Sequential Symbolic and Sub-symbolic Information in Human Activity Recognition (MG, FS, GP), pp. 394–404.
MLDM-2012-MaiorcaGC #pattern matching #pattern recognition #recognition- A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
MLDM-2012-SyarifZPW - Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
SEKE-2012-GallegosG #tool support- Tool Support for Anomaly Detection in Scientific Sensor Data (IG, AQG), pp. 678–683.
SEKE-2012-MireslamiMF #behaviour #distributed- Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
SEKE-2012-WangZWZZ #component #online- Online Anomaly Detection for Components in OSGi-based Software (TW, WZ, JW, JZ, HZ), pp. 188–193.
SIGIR-2012-AlasiryLP #query- Detecting candidate named entities in search queries (AA, ML, AP), pp. 1049–1050.
SIGIR-2012-JiangWLAW #alias #approach #learning #similarity #string #towards- Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIR-2012-Najork #scalability #web- Detecting quilted web pages at scale (MN), pp. 385–394.
SIGIR-2012-NishidaHF #classification #probability #twitter #word- Improving tweet stream classification by detecting changes in word probability (KN, TH, KF), pp. 971–980.
SIGIR-2012-ZhangWDH #learning #performance #reuse- Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
MoDELS-2012-FariasGL #aspect-oriented #consistency #empirical #nondeterminism- Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
MoDELS-2012-JacksonSB #constraints #declarative #fault #specification- Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
ECOOP-2012-XuYR #data type #invariant #static analysis- Static Detection of Loop-Invariant Data Structures (G(X, DY, AR), pp. 738–763.
OOPSLA-2012-Effinger-DeanLCGB #concurrent #named- IFRit: interference-free regions for dynamic data-race detection (LED, BL, LC, DG, HJB), pp. 467–484.
OOPSLA-2012-LucasER #distributed #problem #sequence- Detecting problematic message sequences and frequencies in distributed systems (CL, SGE, DSR), pp. 915–926.
TOOLS-EUROPE-2012-OlszakBJV #quantifier- Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
PLDI-2012-JinSSSL #comprehension #debugging #performance- Understanding and detecting real-world performance bugs (GJ, LS, XS, JS, SL), pp. 77–88.
PLDI-2012-NagarakatteBMM #concurrent #debugging #manycore- Multicore acceleration of priority-based schedulers for concurrency bug detection (SN, SB, MMKM, MM), pp. 543–554.
PLDI-2012-PetrovVSD #concurrent #web- Race detection for web applications (BP, MTV, MS, JD), pp. 251–262.
PLDI-2012-PradelG #automation #concurrent #precise #safety #thread- Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
PLDI-2012-RamanZSVY #concurrent #parallel #precise #scalability- Scalable and precise dynamic datarace detection for structured parallelism (RR, JZ, VS, MTV, EY), pp. 531–542.
POPL-2012-SmaragdakisESYF #concurrent #polynomial #predict- Sound predictive race detection in polynomial time (YS, JE, CS, JY, CF), pp. 387–400.
RE-2012-FerrariG #using- Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RE-2012-KnaussDPC #requirements- Detecting and classifying patterns of requirements clarifications (EK, DD, GPC, JCH), pp. 251–260.
RE-2012-YangRGWN #automation