BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
using
Google using

Tag #using

13251 papers:

PADLPADL-2020-BrikX #pipes and filters
Diagnosing Data Pipeline Failures Using Action Languages: A Progress Report (AB, JX), pp. 73–81.
PADLPADL-2020-ChanC #distance #edit distance #flexibility #graph #programming #set
Flexible Graph Matching and Graph Edit Distance Using Answer Set Programming (SCC, JC), pp. 20–36.
PADLPADL-2020-ShakerinG #induction #mining
Whitebox Induction of Default Rules Using High-Utility Itemset Mining (FS, GG), pp. 168–176.
POPLPOPL-2020-AnSMS #relational #synthesis
Augmented example-based synthesis using relational perturbation properties (SA, RS, SM, RS), p. 24.
ASPLOSASPLOS-2020-HildebrandKTLA #automation #integer #linear #memory management #named #programming
AutoTM: Automatic Tensor Movement in Heterogeneous Memory Systems using Integer Linear Programming (MH, JK, ST, JLP, VA), pp. 875–890.
ASPLOSASPLOS-2020-LimN #hardware #optimisation #performance
Optimizing Nested Virtualization Performance Using Direct Virtual Hardware (JTL, JN), pp. 557–574.
ASPLOSASPLOS-2020-Mathur0 #linear
Atomicity Checking in Linear Time using Vector Clocks (UM, MV0), pp. 183–199.
ASPLOSASPLOS-2020-YangGLSPNBCHRKH #named #scheduling
Interstellar: Using Halide's Scheduling Language to Analyze DNN Accelerators (XY, MG, QL, JS, JP, AN, SB, KC, HH, PR, CK, MH), pp. 369–383.
CCCC-2020-FegadeW #analysis #data type #modelling #pointer #scalability #semantics
Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
CCCC-2020-PuriniBCB #analysis #image #pipes and filters #smt
Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
CGOCGO-2020-JavanmardAKPCH #algorithm #compilation #divide and conquer #multi #parametricity #programming #recursion
Deriving parametric multi-way recursive divide-and-conquer dynamic programming algorithms using polyhedral compilers (MMJ, ZA, MK, LNP, RC, RJH), pp. 317–329.
CGOCGO-2020-ShobakiKM #approach #combinator #gpu #optimisation
Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
EDMEDM-2019-ArthursSKP #modelling
Grades are not Normal: Improving Exam Score Models Using the Logit-Normal Distribution (NA, BS, SK, CP).
EDMEDM-2019-BanjadeR #logic #probability #student #tutorial
Assessing Student Response in Tutorial Dialogue Context using Probabilistic Soft Logic (RB, VR).
EDMEDM-2019-GruverMCPSP #modelling
Using Latent Variable Models to Observe Academic Pathways (NG, AM, BC, CP, MLS, AP).
EDMEDM-2019-GuoB #analysis #collaboration #detection
Collaboration Analysis Using Object Detection (ZG, RB).
EDMEDM-2019-HarrakBL #approach #categorisation #hybrid #student
Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
EDMEDM-2019-HicksCL #analysis #process #student
Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
EDMEDM-2019-HowlinD #approach #behaviour #clustering #detection #fuzzy #student
Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDMEDM-2019-HuangBS #collaboration #identification #machine learning
Identifying Collaborative Learning States Using Unsupervised Machine Learning on Eye-Tracking, Physiological and Motion Sensor Data (KH, TB, BS).
EDMEDM-2019-Ikeda #analysis #education #learning #quality
Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
EDMEDM-2019-JayaramanGG #identification #machine learning #student
Supporting Minority Student Success by using Machine Learning to Identify At-Risk Students (JDJ, SG, JG).
EDMEDM-2019-JeonSBLR #online #process #student
Time-series Insights into the Process of Passing or Failing Online University Courses using Neural-Induced Interpretable Student States (BJ, ES, LB, JL, CPR).
EDMEDM-2019-MalekianBKBN #analysis #process #student
Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
EDMEDM-2019-NguyenWSM #component #comprehension #game studies #learning #modelling
Using Knowledge Component Modeling to Increase Domain Understanding in a Digital Learning Game (HN, YW, JCS, BMM).
EDMEDM-2019-RamirezYCRS #learning #student #towards
Toward Instrumenting Makerspaces: Using Motion Sensors to Capture Students' Affective States in Open-Ended Learning Environments (LR, WY, EC, IR, BS).
EDMEDM-2019-Reddick #algorithm #learning
Using a Glicko-based Algorithm to Measure In-Course Learning (RR).
EDMEDM-2019-Sher #learning #mobile
Anatomy of mobile learners: Using learning analytics to unveil learning in presence of mobile devices (VS).
EDMEDM-2019-Unal #composition #modelling #performance #student
Modeling Student Performance and Disengagement Using Decomposition of Response Time Data (DSU).
EDMEDM-2019-WampflerKSSG #mobile #predict #smarttech
Affective State Prediction in a Mobile Setting using Wearable Biometric Sensors and Stylus (RW, SK, BS, VRS, MG0).
EDMEDM-2019-WeitekampHMRK #learning #predict #student #towards
Toward Near Zero-Parameter Prediction Using a Computational Model of Student Learning (DWI, EH, CJM, NR, KRK).
EDMEDM-2019-YahyaMO #data mining #education #effectiveness #mining #novel #source code
A Novel Use of Educational Data Mining to Inform Effective Management of Academic Programs (AAY, FAM, AO).
EDMEDM-2019-Yeung #learning #named
Deep-IRT: Make Deep Learning Based Knowledge Tracing Explainable Using Item Response Theory (CKY).
EDMEDM-2019-ZaidiCDMBR #learning #modelling #student
Accurate Modelling of Language Learning Tasks and Students Using Representations of Grammatical Proficiency (AHZ, AC, CD, RM, PB, AR).
ICPCICPC-2019-AlrubayeM0 #detection #information retrieval #java #library #migration #on the
On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
ICPCICPC-2019-FontanaP #debugging #sequence #visualisation
Visualizing sequences of debugging sessions using swarm debugging (EAF, FP), pp. 139–143.
ICPCICPC-2019-FucciGNQL #comprehension #lightweight #replication
A replication study on code comprehension and expertise using lightweight biometric sensors (DF, DG, NN, LQ, FL), pp. 311–322.
ICPCICPC-2019-KuangG0M0ME #analysis #feedback #traceability
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
ICPCICPC-2019-MizouchiSII #adaptation #detection #named #online
PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
ICSMEICSME-2019-AungHS #interactive #traceability #visualisation
Interactive Traceability Links Visualization using Hierarchical Trace Map (TWWA, HH, YS), pp. 367–369.
ICSMEICSME-2019-PalacioMMBPS #identification #learning #network
Learning to Identify Security-Related Issues Using Convolutional Neural Networks (DNP, DM, KM, CBC, DP, CS), pp. 140–144.
ICSMEICSME-2019-ShimariI0I #debugging #execution #java
Near-Omniscient Debugging for Java Using Size-Limited Execution Trace (KS, TI, TK0, KI), pp. 398–401.
MSRMSR-2019-DamPN0GGKK #fault #lessons learnt #predict
Lessons learned from using a deep tree-based model for software defect prediction in practice (HKD, TP, SWN, TT0, JCG, AG, TK, CJK), pp. 46–57.
MSRMSR-2019-EfstathiouS #identifier #modelling #semantics #source code
Semantic source code models using identifier embeddings (VE, DS), pp. 29–33.
MSRMSR-2019-KiehnPC #classification #empirical #version control
Empirical study in using version histories for change risk classification (MK, XP, FC), pp. 58–62.
MSRMSR-2019-LiuLZFDQ #commit #generative #network
Generating commit messages from diffs using pointer-generator network (QL, ZL, HZ, HF, BD, YQ), pp. 299–309.
SANERSANER-2019-KirinukiTN #named #recommendation #testing #web
COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application (HK, HT, KN), pp. 310–320.
SANERSANER-2019-MuscedereHAADG #analysis #detection #lightweight
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SANERSANER-2019-SunBBS #documentation #mining #specification
Mining Specifications from Documentation using a Crowd (PS, CB, IB, KTS), pp. 275–286.
SANERSANER-2019-VerhaegheEASDDD #case study #industrial #migration #user interface
GUI Migration using MDE from GWT to Angular 6: An Industrial Case (BV, AE, NA, AS, LD, SD, MD), pp. 579–583.
SANERSANER-2019-ZhangLML #approach #effectiveness #fault #named #network
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
SCAMSCAM-2019-HendersonPK #automation #fault #locality #markov #process
Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
SCAMSCAM-2019-MasudC #towards
Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
SCAMSCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAMSCAM-2019-PerumaMDN #commit #refactoring
Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
FMFM-2019-BardBD #fault #smt
Formally Verified Roundoff Errors Using SMT-based Certificates and Subdivisions (JB, HB, ED), pp. 38–44.
FMFM-2019-GomesB19a #csp #model checking #named
Circus2CSP: A Tool for Model-Checking Circus Using FDR (AOG, AB), pp. 235–242.
FMFM-2019-SilveiraJVJ #formal method #implementation #specification
Formal Methods Applicability on Space Applications Specification and Implementation Using MORA-TSP (DS, AJ, MV, TJ), pp. 727–737.
IFM-2019-BenesBGPS #algebra #constraints #parametricity #synthesis
Accelerating Parameter Synthesis Using Semi-algebraic Constraints (NB, LB, MG, SP, DS), pp. 27–45.
IFM-2019-BruckerW #certification #ontology
Using Ontologies in Formal Developments Targeting Certification (ADB, BW), pp. 65–82.
IFM-2019-LutebergetCJ #automation #optimisation #satisfiability
Automated Drawing of Railway Schematics Using Numerical Optimization in SAT (BL, KC, CJ), pp. 341–359.
SEFMSEFM-2019-BeckertBGHLU #relational #slicing #verification
Using Relational Verification for Program Slicing (BB, TB, SG, MH, DL, MU), pp. 353–372.
SEFMSEFM-2019-FarrellBFDDYM #analysis #case study #verification
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
ICFP-2019-HameerP #automation #case study #education #experience #functional #programming
Teaching the art of functional programming using automated grading (experience report) (AH, BP), p. 15.
AIIDEAIIDE-2019-BehroozRJ #matter #quality #word
Story Quality as a Matter of Perception: Using Word Embeddings to Estimate Cognitive Interest (MB, JR, AJ), pp. 3–9.
AIIDEAIIDE-2019-Sanghrajka #authoring #interactive #modelling
Interactive Narrative Authoring Using Cognitive Models in Narrative Planning (RS), pp. 224–226.
AIIDEAIIDE-2019-Shirvani #towards
Towards More Believable Characters Using Personality and Emotion (AS), pp. 230–232.
CHI-PLAYCHI-PLAY-2019-SchertlerKW #analysis #game studies #semantics
User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
CoGCoG-2019-Aitchison #experience
Optimal Use of Experience in First Person Shooter Environments (MA), pp. 1–4.
CoGCoG-2019-ChangAS #assurance #automation #named #quality #testing
Reveal-More: Amplifying Human Effort in Quality Assurance Testing Using Automated Exploration (KC, BA, AMS), pp. 1–8.
CoGCoG-2019-ChristiansenGW #bias #game studies
Resolving Simultaneity Bias: Using Features to Estimate Causal Effects in Competitive Games (AHC, EG, BSW), pp. 1–8.
CoGCoG-2019-Eidelberg0D #game studies #performance
Using Active Probing by a Game Management AI to Faster Classify Players (AE, CJ0, JD), pp. 1–8.
CoGCoG-2019-FendtA #education #game studies #learning #student
Using Learning Games to Teach Texas Civil War History to Public Middle School Students (MWF, EA), pp. 1–4.
CoGCoG-2019-IshiiITH #game studies #generative
A Fighting Game AI Using Highlight Cues for Generation of Entertaining Gameplay (RI, SI, RT, TH), pp. 1–6.
CoGCoG-2019-JooK #game studies #how #learning #question #visualisation
Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
CoGCoG-2019-JoppenSF #approximate #game studies
Ordinal Bucketing for Game Trees using Dynamic Quantile Approximation (TJ, TS, JF), pp. 1–8.
CoGCoG-2019-KatonaSHDBDW #learning #predict
Time to Die: Death Prediction in Dota 2 using Deep Learning (AK, RJS, VJH, SD, FB, AD, JAW), pp. 1–8.
CoGCoG-2019-KimLLHK #algorithm #automation #game studies #generative #graph
Automatic Generation of Game Content using a Graph-based Wave Function Collapse Algorithm (HK, SL, HL, TH, SK), pp. 1–4.
CoGCoG-2019-KusanoLPTH #game studies
Motion Gaming AI using Time Series Forecasting and Dynamic Difficulty Adjustment (TK, YL, PP, RT, TH), pp. 1–6.
CoGCoG-2019-Lanzi #complexity
Evaluating the Complexity of Players' Strategies using MCTS Iterations (PLL), pp. 1–8.
CoGCoG-2019-LipinskiSRA #generative #graph #incremental
Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees (BvRL, SS, JR, DA), pp. 1–7.
CoGCoG-2019-LiuR0S #heuristic #performance
Using Restart Heuristics to Improve Agent Performance in Angry Birds (TL, JR, PZ0, MS), pp. 1–8.
CoGCoG-2019-MassoudBBGP #behaviour #game studies #profiling
Eco-driving Profiling and Behavioral Shifts Using IoT Vehicular Sensors Combined with Serious Games (RM, FB, RB, ADG, SP), pp. 1–8.
CoGCoG-2019-NamI #game studies #generative #learning
Generation of Diverse Stages in Turn-Based Role-Playing Game using Reinforcement Learning (SN, KI), pp. 1–8.
CoGCoG-2019-NygrenD #case study #concept #game studies #self
Using Simple Games to Evaluate Self-Organization Concepts: a Whack-a-mole Case Study (NN, JD), pp. 1–8.
CoGCoG-2019-SarkarC #game studies
Inferring and Comparing Game Difficulty Curves using Player-vs-Level Match Data (AS, SC), pp. 1–4.
CoGCoG-2019-SpickCW #generative #learning
Procedural Generation using Spatial GANs for Region-Specific Learning of Elevation Data (RJS, PC, JAW), pp. 1–8.
FDGFDG-2019-GandhiH #generative #modelling #probability #visual notation
Guided open story generation using probabilistic graphical models (SG, BH), p. 7.
FDGFDG-2019-JemmaliKBARE #concept #design #game studies #learning #programming
Using game design mechanics as metaphors to enhance learning of introductory programming concepts (CJ, EK, SB, MVA, ER, MSEN), p. 5.
FDGFDG-2019-LiGH #game studies #generative #multi #video
End-to-end let's play commentary generation using multi-modal video representations (CL0, SG, BH), p. 7.
FDGFDG-2019-LiuLLMHSWCGLDT #automation #generative
Automatic generation of tower defense levels using PCG (SCL, CL, YL, HM, XH, YS, LW, ZC, XG, HL, YD, QT), p. 9.
FDGFDG-2019-LuoGR #network #parsing #video
Making CNNs for video parsing accessible: event extraction from DOTA2 gameplay video using transfer, zero-shot, and network pruning (ZL, MG, MR), p. 10.
FDGFDG-2019-MacCormickZ #development #game studies #named #programming #visual notation
SuBViS: the use of subjunctive visual programming environments for exploring alternatives in game development (DM, LZ), p. 11.
FDGFDG-2019-OuelletteBC #analysis #comprehension #design #education #game studies
Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
FDGFDG-2019-SarkarC #array #rating
Using rating arrays to estimate score distributions for player-versus-level matchmaking (AS, SC), p. 8.
CoGVS-Games-2019-BakalosRDDPV #identification #network
Choreographic Pose Identification using Convolutional Neural Networks (NB, IR, ND, AD, EP, AV), pp. 1–7.
CoGVS-Games-2019-Gabriel #concept #design #game studies
We Make Games. Using Serious Game Design Concepts in Secondary School (SG), pp. 1–4.
CoGVS-Games-2019-HeinzS #design #evaluation #heuristic #simulation
Addressing Spatio-Temporal Geogame Relocation Issues Using Design Evaluation Heuristics and Agent-based Simulation (TH0, CS), pp. 1–4.
CoGVS-Games-2019-KharvariH #3d #architecture #artificial reality #game studies #visualisation
The Role of Serious Gaming using Virtual Reality Applications for 3D Architectural Visualization (FK, WH), pp. 1–2.
CoGVS-Games-2019-KicoL #comparison
Comparison of Trajectories and Quaternions of Folk Dance Movements Using Dynamic Time Warping (IK, FL), pp. 1–4.
CIKMCIKM-2019-ChristmannRASW #graph
Look before you Hop: Conversational Question Answering over Knowledge Graphs Using Judicious Context Expansion (PC, RSR, AA, JS, GW), pp. 729–738.
CIKMCIKM-2019-DuongRN #multi #sketching #streaming
Sketching Streaming Histogram Elements using Multiple Weighted Factors (QHD, HR, KN), pp. 19–28.
CIKMCIKM-2019-GongZ00XWH #community #detection #developer #learning #online
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
CIKMCIKM-2019-HanMNKURNS #detection #image #learning
Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
CIKMCIKM-2019-IslamMR #graph #named #network #predict #social
NActSeer: Predicting User Actions in Social Network using Graph Augmented Neural Network (MRI, SM, NR), pp. 1793–1802.
CIKMCIKM-2019-JungLPP #framework #named
PRIVATA: Differentially Private Data Market Framework using Negotiation-based Pricing Mechanism (KJ, JL, KP, SP), pp. 2897–2900.
CIKMCIKM-2019-KangPKCC #modelling #recommendation #topic
Recommender System Using Sequential and Global Preference via Attention Mechanism and Topic Modeling (KK, JP, WK, HC, JC), pp. 1543–1552.
CIKMCIKM-2019-LinPLO #network #recognition
An Explainable Deep Fusion Network for Affect Recognition Using Physiological Signals (JL, SP, CSL, SLO), pp. 2069–2072.
CIKMCIKM-2019-LinWXLB #estimation #hybrid #network
Path Travel Time Estimation using Attribute-related Hybrid Trajectories Network (XL, YW, XX, ZL, SSB), pp. 1973–1982.
CIKMCIKM-2019-YangWCW #graph #network #predict
Using External Knowledge for Financial Event Prediction Based on Graph Neural Networks (YY, ZW, QC, LW), pp. 2161–2164.
CIKMCIKM-2019-YanLWLWZG #classification #image #multi #random
Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples (WY, RL, JW, YL, JW, PZ, XG), pp. 1131–1140.
CIKMCIKM-2019-ZhangL
Interpretable MTL from Heterogeneous Domains using Boosted Tree (YLZ, LL), pp. 2053–2056.
ECIRECIR-p1-2019-BalikasDMAA #learning #semantics
Learning Lexical-Semantic Relations Using Intuitive Cognitive Links (GB, GD, RM, HA, MRA), pp. 3–18.
ECIRECIR-p1-2019-DavilaJSGZ #graph #image #named
Tangent-V: Math Formula Image Search Using Line-of-Sight Graphs (KD, RJ, SS, VG, RZ), pp. 681–695.
ECIRECIR-p1-2019-GlavasV #bidirectional #retrieval
Zero-Shot Language Transfer for Cross-Lingual Sentence Retrieval Using Bidirectional Attention Model (GG, IV), pp. 523–538.
ECIRECIR-p1-2019-JeawakJS #modelling
Embedding Geographic Locations for Modelling the Natural Environment Using Flickr Tags and Structured Data (SSJ, CBJ, SS), pp. 51–66.
ECIRECIR-p1-2019-NguyenV
End-to-End Neural Relation Extraction Using Deep Biaffine Attention (DQN, KV), pp. 729–738.
ECIRECIR-p1-2019-ZhongZ #similarity
Structural Similarity Search for Formulas Using Leaf-Root Paths in Operator Subtrees (WZ, RZ), pp. 116–129.
ECIRECIR-p2-2019-AkbariCBOSW #modelling #process
Modeling User Return Time Using Inhomogeneous Poisson Process (MA, AC, SB, ADO, MS, JW0), pp. 37–44.
ECIRECIR-p2-2019-Ghosh #information retrieval
Exploring Result Presentation in Conversational IR Using a Wizard-of-Oz Study (SG), pp. 327–331.
ECIRECIR-p2-2019-ImaniVMS19a #network #query #word
Deep Neural Networks for Query Expansion Using Word Embeddings (AI, AV, AM, AS), pp. 203–210.
ECIRECIR-p2-2019-PritsosRS #distance #identification #nearest neighbour #web
Open-Set Web Genre Identification Using Distributional Features and Nearest Neighbors Distance Ratio (DAP, AR0, ES), pp. 3–11.
ICMLICML-2019-ChangMG #metric #scheduling
Dynamic Measurement Scheduling for Event Forecasting using Deep RL (CHC, MM, AG), pp. 951–960.
ICMLICML-2019-DaoGERR #algorithm #learning #linear #performance
Learning Fast Algorithms for Linear Transforms Using Butterfly Factorizations (TD, AG, ME, AR, CR), pp. 1517–1527.
ICMLICML-2019-ElfekiCRE #learning #named #process
GDPP: Learning Diverse Generations using Determinantal Point Processes (ME, CC, MR, ME), pp. 1774–1783.
ICMLICML-2019-GordalizaBGL
Obtaining Fairness using Optimal Transport Theory (PG, EdB, FG, JML), pp. 2357–2365.
ICMLICML-2019-HendrycksLM #nondeterminism #robust
Using Pre-Training Can Improve Model Robustness and Uncertainty (DH, KL, MM), pp. 2712–2721.
ICMLICML-2019-HollandI #robust
Better generalization with less data using robust gradient descent (MJH, KI), pp. 2761–2770.
ICMLICML-2019-HuntBLH #policy
Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
ICMLICML-2019-MendisRAC #estimation #named #network #performance #throughput
Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks (CM, AR, SPA, MC), pp. 4505–4515.
ICMLICML-2019-Ravi #modelling #performance
Efficient On-Device Models using Neural Projections (SR), pp. 5370–5379.
ICMLICML-2019-ThulasidasanBBC #learning
Combating Label Noise in Deep Learning using Abstention (ST, TB, JAB, GC, JMY), pp. 6234–6243.
ICMLICML-2019-TranKSK #named #network
DeepNose: Using artificial neural networks to represent the space of odorants (NBT, DRK, SS, AAK), pp. 6305–6314.
ICMLICML-2019-TrippeHAB #approximate #named #rank
LR-GLM: High-Dimensional Bayesian Inference Using Low-Rank Data Approximations (BLT, JHH, RA, TB), pp. 6315–6324.
ICMLICML-2019-WangDWK #learning #logic #named #reasoning #satisfiability
SATNet: Bridging deep learning and logical reasoning using a differentiable satisfiability solver (PWW, PLD, BW, JZK), pp. 6545–6554.
ICMLICML-2019-X #bound #named #policy #predict
POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICMLICML-2019-YangW #parametricity
Sample-Optimal Parametric Q-Learning Using Linearly Additive Features (LY, MW), pp. 6995–7004.
ICMLICML-2019-ZanetteB #bound #learning #problem
Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
ICMLICML-2019-ZhaoHDSZ #network
Improving Neural Network Quantization without Retraining using Outlier Channel Splitting (RZ, YH, JD, CDS, ZZ), pp. 7543–7552.
KDDKDD-2019-ChenLPS #predict #twitter
Using Twitter to Predict When Vulnerabilities will be Exploited (HC0, RL, NP, VSS), pp. 3143–3152.
KDDKDD-2019-ChenSJ0Z0 #behaviour #effectiveness #performance #recommendation #reuse
Effective and Efficient Reuse of Past Travel Behavior for Route Recommendation (LC, SS, CSJ, BY0, ZZ, LS0), pp. 488–498.
KDDKDD-2019-DeshpandeS #adaptation #modelling #streaming
Streaming Adaptation of Deep Forecasting Models using Adaptive Recurrent Units (PD, SS), pp. 1560–1568.
KDDKDD-2019-GuoHJZW0 #behaviour #multi #network #predict #realtime
Buying or Browsing?: Predicting Real-time Purchasing Intent using Attention-based Deep Network with Multiple Behavior (LG, LH, RJ, BZ, XW, BC0), pp. 1984–1992.
KDDKDD-2019-KillianWSCDT #learning
Learning to Prescribe Interventions for Tuberculosis Patients Using Digital Adherence Data (JAK, BW, AS, VC, BD, MT), pp. 2430–2438.
KDDKDD-2019-KitadaIS #effectiveness #multi #network #predict
Conversion Prediction Using Multi-task Conditional Attention Networks to Support the Creation of Effective Ad Creatives (SK, HI, YS), pp. 2069–2077.
KDDKDD-2019-LeeIFSM #approach #data-driven #estimation #named
DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
KDDKDD-2019-MarxV
Identifiability of Cause and Effect using Regularized Regression (AM, JV), pp. 852–861.
KDDKDD-2019-MonathZSMA #clustering
Gradient-based Hierarchical Clustering using Continuous Representations of Trees in Hyperbolic Space (NM, MZ, DS, AM, AA), pp. 714–722.
KDDKDD-2019-OhI #detection #learning
Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
KDDKDD-2019-PanLW00Z #learning #predict
Urban Traffic Prediction from Spatio-Temporal Data Using Deep Meta Learning (ZP, YL, WW, YY0, YZ0, JZ), pp. 1720–1730.
KDDKDD-2019-ParkKDZF #graph #network
Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks (NP, AK, XLD, TZ, CF), pp. 596–606.
KDDKDD-2019-RawatLY #learning #multi
Naranjo Question Answering using End-to-End Multi-task Learning Model (BPSR, FL, HY0), pp. 2547–2555.
KDDKDD-2019-SchonD0 #fault #how #predict
The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
KDDKDD-2019-SchulzeMRLB #identification
Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (JPS, AM, ER, HAL, KB), pp. 2059–2068.
KDDKDD-2019-SheehanMTUJBLE #development #predict #wiki
Predicting Economic Development using Geolocated Wikipedia Articles (ES, CM, MT, BU, NJ, MB, DBL, SE), pp. 2698–2706.
KDDKDD-2019-ShenVAAHN #learning #monitoring #smarttech
Ambulatory Atrial Fibrillation Monitoring Using Wearable Photoplethysmography with Deep Learning (YS, MV, AA, AA, AYH, AYN), pp. 1909–1916.
KDDKDD-2019-SiciliaPG #named
DeepHoops: Evaluating Micro-Actions in Basketball Using Deep Feature Representations of Spatio-Temporal Data (AS, KP, KG), pp. 2096–2104.
KDDKDD-2019-TariqLSLJCW #detection #multi #probability
Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
KDDKDD-2019-WangZTWX #named #network
AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks (JW, YZ0, KT, JW, ZX), pp. 1900–1908.
KDDKDD-2019-WuYZXZPXA #graph #kernel #random #scalability
Scalable Global Alignment Graph Kernel Using Random Features: From Node Embedding to Graph Embedding (LW, IEHY, ZZ0, KX, LZ0, XP0, YX, CCA), pp. 1418–1428.
KDDKDD-2019-YabeTSSU #behaviour #predict #web
Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior (TY, KT, TS, YS, SVU), pp. 2707–2717.
KDDKDD-2019-ZhengXKWMAY #linear #predict
Glaucoma Progression Prediction Using Retinal Thickness via Latent Space Linear Regression (YZ, LX, TK, JW0, HM, RA, KY), pp. 2278–2286.
KDDKDD-2019-ZhouMGBB #comprehension #network
Understanding Consumer Journey using Attention based Recurrent Neural Networks (YZ, SM, JG, TB, NB), pp. 3102–3111.
BXBX-2019-Tullsen #encoding
ASN.1 Encoding Schemes Done Right Using CMPCT (MT), pp. 1–15.
MoDELSMoDELS-2019-BencomoP #learning #modelling #named #ram #runtime
RaM: Causally-Connected and Requirements-Aware Runtime Models using Bayesian Learning (NB, LHGP), pp. 216–226.
MoDELSMoDELS-2019-TorreSSBAG #case study #experience #modelling
Using Models to Enable Compliance Checking Against the GDPR: An Experience Report (DT, GS, MS, LCB, YA, PG), pp. 1–11.
OOPSLAOOPSLA-2019-ChenWFBD #learning #relational #verification
Relational verification using reinforcement learning (JC, JW, YF, OB, ID), p. 30.
OOPSLAOOPSLA-2019-GoelV #design #implementation #lazy evaluation #on the
On the design, implementation, and use of laziness in R (AG, JV), p. 27.
OOPSLAOOPSLA-2019-KrikavaMV #scala #scalability
Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild (FK, HM, JV), p. 28.
PADLPADL-2019-AriasC #composition #evaluation #incremental #logic programming
Incremental Evaluation of Lattice-Based Aggregates in Logic Programming Using Modular TCLP (JA, MC), pp. 98–114.
PADLPADL-2019-KahramanE #personalisation #programming #set
Personalized Course Schedule Planning Using Answer Set Programming (MKK, EE0), pp. 37–45.
PLDIPLDI-2019-0001R #database #learning #modelling
Using active learning to synthesize models of applications that access databases (JS0, MCR), pp. 269–285.
PLDIPLDI-2019-DhulipalaBS #graph #streaming
Low-latency graph streaming using compressed purely-functional trees (LD, GEB, JS), pp. 918–934.
PLDIPLDI-2019-HeoRSN #difference #reasoning #source code
Continuously reasoning about programs using differential Bayesian inference (KH, MR, XS, MN), pp. 561–575.
PLDIPLDI-2019-LeZN #dynamic analysis #invariant #logic #named
SLING: using dynamic analysis to infer program invariants in separation logic (TCL, GZ, TN), pp. 788–801.
POPLPOPL-2019-BaeL #bound #logic #model checking
Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
POPLPOPL-2019-CastroHJNY #api #communication #distributed #parametricity #programming #static typing
Distributed programming using role-parametric session types in go: statically-typed endpoint APIs for dynamically-instantiated communication structures (DCP, RH, SSJ, NN, NY), p. 30.
POPLPOPL-2019-SkorstengaardDB #control flow #encapsulation #linear #named #stack
StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities (LS, DD, LB), p. 28.
POPLPOPL-2019-SpathAB #analysis #automaton #data flow
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
SASSAS-2019-DelmasM #abstract interpretation #analysis
Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
ASEASE-2019-Balasubramaniam #machine learning #representation #towards
Towards Comprehensible Representation of Controllers using Machine Learning (GB), pp. 1283–1285.
ASEASE-2019-ChenSHWL #behaviour #case study #experience #generative #testing
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour (JC, WS, AEH, YW, JL), pp. 669–681.
ASEASE-2019-KimC #embedded #model checking
Model Checking Embedded Control Software using OS-in-the-Loop CEGAR (DK, YC), pp. 565–576.
ASEASE-2019-MehraSKP #artificial reality #named #towards
XRaSE: Towards Virtually Tangible Software using Augmented Reality (RM, VSS, VK, SP), pp. 1194–1197.
ASEASE-2019-NafiKRRS #api #clone detection #detection #documentation #named
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASEASE-2019-Ramamoorthy #game studies #multi
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications (KMKR), pp. 1265–1267.
ASEASE-2019-Sharma #adaptation #automation #source code #synthesis
Automatically Repairing Binary Programs Using Adapter Synthesis (VS), pp. 1238–1241.
ASEASE-2019-ZhengFXS0HMLSC #automation #game studies #learning #named #online #testing
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning (YZ, CF, XX, TS, LM0, JH, ZM, YL0, RS, YC), pp. 772–784.
ESEC-FSEESEC-FSE-2019-BarashFJRTZ #feature model #interactive #ml #requirements
Bridging the gap between ML solutions and their business requirements using feature interactions (GB, EF, IJ, OR, RTB, MZ), pp. 1048–1058.
ESEC-FSEESEC-FSE-2019-Cetin #developer #graph #identification #traceability
Identifying the most valuable developers using artifact traceability graphs (HAC), pp. 1196–1198.
ESEC-FSEESEC-FSE-2019-Correia #industrial #testing
An industrial application of test selection using test suite diagnosability (DC), pp. 1214–1216.
ESEC-FSEESEC-FSE-2019-CorreiaASN #multi #named #testing
MOTSD: a multi-objective test selection tool using test suite diagnosability (DC, RA, PS, JN), pp. 1070–1074.
ESEC-FSEESEC-FSE-2019-Denkers #case study #domain-specific language #industrial
A longitudinal field study on creation and use of domain-specific languages in industry (JD), pp. 1152–1155.
ESEC-FSEESEC-FSE-2019-FucciMM #api #documentation #identification #machine learning #on the
On using machine learning to identify knowledge in API reference documentation (DF, AM, WM), pp. 109–119.
ESEC-FSEESEC-FSE-2019-LiewCDS #constraints #float #fuzzing
Just fuzz it: solving floating-point constraints using coverage-guided fuzzing (DL, CC, AFD, JRS), pp. 521–532.
ESEC-FSEESEC-FSE-2019-NguyenSCMBL #as a service #multitenancy
Using microservices for non-intrusive customization of multi-tenant SaaS (PHN, HS, FC, RM, SB, EL), pp. 905–915.
ESEC-FSEESEC-FSE-2019-Radavelli #modelling #testing
Using software testing to repair models (MR), pp. 1253–1255.
ESEC-FSEESEC-FSE-2019-SangleM #on the #open source #python
On the use of lambda expressions in 760 open source Python projects (SS, SM), pp. 1232–1234.
ESEC-FSEESEC-FSE-2019-Sulun #graph #traceability
Suggesting reviewers of software artifacts using traceability graphs (ES), pp. 1250–1252.
ICSE-2019-FanLLWNZL #analysis #android #graph #learning
Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
ICSE-2019-HuangLKSHLW #data type
Distilling neural representations of data structure manipulation using fMRI and fNIRS (YH0, XL, RK, TS, XH, KL, WW), pp. 396–407.
ICSE-2019-KimFY #learning #testing
Guiding deep learning system testing using surprise adequacy (JK, RF, SY), pp. 1039–1049.
ICSE-2019-ZhangHMBLU #ltl #named #source code
AutoTap: synthesizing and repairing trigger-action programs using LTL properties (LZ, WH, JM, NB, SL, BU), pp. 281–291.
GPCEGPCE-2019-Dimovski #abstract domain #diagrams #static analysis
Lifted static analysis using a binary decision diagram abstract domain (ASD), pp. 102–114.
ASPLOSASPLOS-2019-KondguliH #hardware #named #performance #smt #thread
Bootstrapping: Using SMT Hardware to Improve Single-Thread Performance (SK, MH), pp. 687–700.
ASPLOSASPLOS-2019-RenZYLXQLW #co-evolution #design #framework #multi #named
ADMM-NN: An Algorithm-Hardware Co-Design Framework of DNNs Using Alternating Direction Methods of Multipliers (AR, TZ, SY, JL, WX, XQ, XL, YW), pp. 925–938.
ASPLOSASPLOS-2019-WuSCL #pointer
Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
CASECASE-2019-AndersonlPL #estimation #mobile #recursion
Mobile Robotic Radiation Surveying Using Recursive Bayesian Estimation (RBA, MP, SL), pp. 1187–1192.
CASECASE-2019-AshouriNSG #predict
Day-ahead Prediction of Building Occupancy using WiFi Signals (AA, GRN, ZS, HBG), pp. 1237–1242.
CASECASE-2019-AyoobiCVV #learning
Handling Unforeseen Failures Using Argumentation-Based Learning (HA, MC0, RV, BV), pp. 1699–1704.
CASECASE-2019-BiedigerMB #artificial reality
Investigating the survivability of drone swarms with flocking and swarming flight patterns using Virtual Reality (DB, AM, ATB), pp. 1718–1723.
CASECASE-2019-ChangLH #coordination #detection #network #realtime
Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
CASECASE-2019-ChengT #flexibility #tool support
Control of a mechatronics-assisted system for surgeries using flexible tools (LC, MT), pp. 1768–1773.
CASECASE-2019-ChenLVR #machine learning #process
Strip Snap Analytics in Cold Rolling Process Using Machine Learning (ZC, YL, AVM, FR), pp. 368–373.
CASECASE-2019-DasSAP #estimation #interactive #physics
Joint Torque Estimation using Base Force-Torque Sensor to Facilitate Physical Human-Robot Interaction (pHRI) (SKD, MNS, SA, DOP), pp. 1367–1372.
CASECASE-2019-DuHD #identification #physics
Model Identification and Physical Exercise Control using Nonlinear Heart Rate Model and Particle Filter (DD, ZH, YD), pp. 405–410.
CASECASE-2019-FarooquiF #learning #modelling #synthesis
Synthesis of Supervisors for Unknown Plant Models Using Active Learning (AF, MF), pp. 502–508.
CASECASE-2019-FujitaDKRKSHAFA #multi
Bin-picking Robot using a Multi-gripper Switching Strategy based on Object Sparseness (MF, YD, RK, GAGR, KK, KS, RH, RA, HF, SA, MH, AJC, AN, HO, TO), pp. 1540–1547.
CASECASE-2019-HagelskjaerSKB #constraints #estimation #industrial #performance #precise
Using spatial constraints for fast set-up of precise pose estimation in an industrial setting (FH, TRS, NK, AGB), pp. 1308–1314.
CASECASE-2019-HekmatnejadPF #scheduling #smt
Task Scheduling with Nonlinear Costs using SMT Solvers (MH, GP, GF), pp. 183–188.
CASECASE-2019-HoangPDZH #configuration management #multi
Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO (VTH, MDP, THD, QZ, QPH), pp. 1670–1675.
CASECASE-2019-HongCL #learning #locality #mobile #realtime
Real-time Visual-Based Localization for Mobile Robot Using Structured-View Deep Learning (YFH, YMC, CHGL), pp. 1353–1358.
CASECASE-2019-HuML #petri net
Active Diagnosis of Petri Nets Using Q-Diagnoser (YH, ZM, ZL), pp. 203–208.
CASECASE-2019-ImamM #metric #modelling
Thermal Modeling of Indoor Spaces using Illumination Measurement as a Surrogate for Solar Heat Gain (MHTI, SM), pp. 1093–1098.
CASECASE-2019-JoshiLBB
Motion-planning Using RRTs for a Swarm of Robots Controlled by Global Inputs (PJ, JL, DB, ATB), pp. 1163–1168.
CASECASE-2019-KazmiNVRC #detection #learning #recognition
Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
CASECASE-2019-KumarAS #array #monitoring
Speed and Separation Monitoring using On-Robot Time-of-Flight Laser-ranging Sensor Arrays (SK, SA, FS), pp. 1684–1691.
CASECASE-2019-LaiL #detection #learning
Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
CASECASE-2019-LiGZYWSZ #detection #fault
Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
CASECASE-2019-LiuZHZWW #estimation #learning #network
sEMG-Based Continuous Estimation of Knee Joint Angle Using Deep Learning with Convolutional Neural Network (GL, LZ, BH, TZ, ZW, PW), pp. 140–145.
CASECASE-2019-LuoLLWG #multi #optimisation #problem #scheduling
Green Job Shop Scheduling Problem with Machine at Different Speeds using a multi-objective grey wolf optimization algorithm* (YL, CL, XL, LW, LG0), pp. 573–578.
CASECASE-2019-MackensenKRS #automation #energy #smarttech
Energy autonomous automation of Smart Home applications using the example of a wireless Indoor Smart Gardening system (EM, JK, AR, AS), pp. 1087–1092.
CASECASE-2019-MerktIYV #towards
Towards Shared Autonomy Applications using Whole-body Control Formulations of Locomanipulation (WM, VI, YY, SV), pp. 1206–1211.
CASECASE-2019-NguyenLLGL #network #self
Visual-Guided Robot Arm Using Self-Supervised Deep Convolutional Neural Networks (VTN, CL, CHGL, SMG, JJJL), pp. 1415–1420.
CASECASE-2019-NiuLNLW #detection #fault #generative #named #network
DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
CASECASE-2019-PangXHP #modelling #multi #optimisation
optimizing outpatient Department Staffing Level using Multi-Fidelity Models (BP, XX, BH, YP), pp. 715–720.
CASECASE-2019-PirehgalinTOV #analysis #automation #image #video #visual notation
Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
CASECASE-2019-PitschlP #adaptation #maintenance #mobile #persistent #reasoning
Obstacle Persistent Adaptive Map Maintenance for Autonomous Mobile Robots using Spatio-temporal Reasoning (MLP, MWP), pp. 1023–1028.
CASECASE-2019-RobinsonSP #heuristic #visual notation
Bin-Picking using Model-Free Visual Heuristics and Grasp-Constrained Imaging (CR, MNS, DOP), pp. 1618–1624.
CASECASE-2019-RoselliHRFA #equivalence #on the
On the Use of Equivalence Classes for Optimal and Sub-Optimal Bin Covering (SFR, FH, SR, MF, ), pp. 1004–1009.
CASECASE-2019-RoyMN #adaptation #visual notation
Dynamic Eye-in-Hand Visual Servoing using Adaptive Backstepping with a Supervisory Feature Jacobian (PLGR, CJBM, JN), pp. 1131–1137.
CASECASE-2019-SchulerS #analysis #automation #modelling #process #towards
Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
CASECASE-2019-SharabianiBGND #algorithm #kernel #polynomial
A Computer-Aided System for Determining the Application Range of a Warfarin Clinical Dosing Algorithm Using Support Vector Machines with a Polynomial Kernel Function (AS, AB, WLG, RN, HD), pp. 418–423.
CASECASE-2019-SunLY #detection #network
Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
CASECASE-2019-ThonnessenSFCK #quickcheck #safety #testing
Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
CASECASE-2019-WangJRH #image #realtime #scalability
Real-time control for large scale additive manufacturing using thermal images (FW, FJ, KR, NH), pp. 36–41.
CASECASE-2019-WannerS #flexibility #polynomial #programming
Tool-center-point control of a flexible link concrete pump with hydraulic limitations using quadratic programming (JW, OS), pp. 561–566.
CASECASE-2019-WarsewaBRST #design #distributed #scalability
Decentralized and Distributed Observer Design for Large-Scale Structures using Dynamic Condensation (AW, MB, PR, OS, CT), pp. 1256–1262.
CASECASE-2019-XiaoH0HZ #detection #fault
Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
CASECASE-2019-ZhangLWGG #fault #learning #network
Fault Diagnosis Using Unsupervised Transfer Learning Based on Adversarial Network (ZZ, XL, LW, LG0, YG), pp. 305–310.
CGOCGO-2019-KimK #generative #hardware
Translating CUDA to OpenCL for Hardware Generation using Neural Machine Translation (YK, HK), pp. 285–286.
CGOCGO-2019-KruppeOS0 #lightweight
Extending LLVM for Lightweight SPMD Vectorization: Using SIMD and Vector Instructions Easily from Any Language (RK, JO, LS, AK0), pp. 278–279.
CGOCGO-2019-SunBSB #graph #reasoning
Reasoning about the Node.js Event Loop using Async Graphs (HS, DB, FS, WB), pp. 61–72.
CAVCAV-2019-DavisHK #fault #formal method #multi #protocol #proving
When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
CAVCAV-2019-ElfarWP #game studies #synthesis
Security-Aware Synthesis Using Delayed-Action Games (ME, YW0, MP), pp. 180–199.
CAVCAV-2019-LiuWL #source code #verification
Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (PL, TW, AL), pp. 386–404.
CAVCAV-2019-LiuZWYLLYZ #algorithm #hoare #logic #quantum #verification
Formal Verification of Quantum Algorithms Using Quantum Hoare Logic (JL, BZ, SW, SY, TL, YL, MY, NZ), pp. 187–207.
ICSTICST-2019-CoppikSS #fuzzing #memory management #named
MemFuzz: Using Memory Accesses to Guide Fuzzing (NC, OS, NS), pp. 48–58.
ICSTICST-2019-HellhakeSW #black box #data flow #distributed #integration #test coverage #testing
Using Data Flow-Based Coverage Criteria for Black-Box Integration Testing of Distributed Software Systems (DH, TS, SW0), pp. 420–429.
ICSTICST-2019-LeeHYKKY #integration #network #static analysis
Classifying False Positive Static Checker Alarms in Continuous Integration Using Convolutional Neural Networks (SL, SH, JY, TK, CJK, SY), pp. 391–401.
ICSTICST-2019-PatersonCAKFM #empirical #fault #predict #testing
An Empirical Study on the Use of Defect Prediction for Test Case Prioritization (DP, JC, RA, GMK, GF, PM), pp. 346–357.
ICSTICST-2019-Radavelli #modelling #testing
Using Testing to Repair Models (MR), pp. 489–491.
ICTSSICTSS-2019-BombardaBGRDL #consistency #generative #protocol #refinement #state machine #testing
Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
ICTSSICTSS-2019-BozicW #testing
Testing Chatbots Using Metamorphic Relations (JB, FW), pp. 41–55.
ICTSSICTSS-2019-Huerta-GuevaraA19a #adaptation #named #performance #testing
DYNAMOJM: A JMeter Tool for Performance Testing Using Dynamic Workload Adaptation (OHG, VAR, LM0, AOPD), pp. 234–241.
TAPTAP-2019-CavalcantiBHL #csp #testing
Testing Robots Using CSP (AC, JB, RMH, RL), pp. 21–38.
VMCAIVMCAI-2019-AndreFMS #abstraction #algorithm #industrial #model checking #parametricity #verification
Verification of an Industrial Asynchronous Leader Election Algorithm Using Abstractions and Parametric Model Checking (ÉA, LF, JMM, RS), pp. 409–424.
VMCAIVMCAI-2019-BallabrigaFGLR #memory management #static analysis
Static Analysis of Binary Code with Memory Indirections Using Polyhedra (CB, JF, LG, GL, JR), pp. 114–135.
VMCAIVMCAI-2019-DeckerP #ltl #model checking #quantifier
Flat Model Checking for Counting LTL Using Quantifier-Free Presburger Arithmetic (ND, AP), pp. 513–534.
VMCAIVMCAI-2019-NguyenTC #automation #program repair #verification
Automatic Program Repair Using Formal Verification and Expression Templates (TTN, QTT, WNC), pp. 70–91.
ECSAECSA-2018-ChangS #as a service #mobile
Providing Context as a Service Using Service-Oriented Mobile Indie Fog and Opportunistic Computing (CC, SNS), pp. 219–235.
ECSAECSA-2018-SchneiderBK #information management #quality #trade-off
Using Informal Knowledge for Improving Software Quality Trade-Off Decisions (YS, AB, AK), pp. 265–283.
ICSAICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #privacy #simulation
Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
JCDLJCDL-2018-AlonsoKT #evolution #how #social
How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
JCDLJCDL-2018-KobayashiS0 #distributed #recommendation #representation
Citation Recommendation Using Distributed Representation of Discourse Facets in Scientific Articles (YK, MS, YM0), pp. 243–251.
JCDLJCDL-2018-MaiGS #learning #performance #semantics
Using Deep Learning for Title-Based Semantic Subject Indexing to Reach Competitive Performance to Full-Text (FM, LG, AS), pp. 169–178.
JCDLJCDL-2018-PoziMBJK #editing
Preserving Author Editing History Using Blockchain Technology (MSMP, GM, AAB, AJ, YK), pp. 165–168.
EDMEDM-2018-BotelhoBOH #detection
Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
EDMEDM-2018-CookOKD #approach #authentication #education
An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
EDMEDM-2018-EstebanGR #algorithm #approach #hybrid #multi #recommendation #search-based #student
A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
EDMEDM-2018-HalpernTWGPDG
Knowledge Tracing Using the Brain (DH, ST, HYW, CG, POP, LD, TMG).
EDMEDM-2018-HoernleGGPR #interactive #markov #modelling #simulation #student
Modeling the Effects of Students' Interactions with Immersive Simulations using Markov Switching Systems (NH, YG, BJG, PP, AR).
EDMEDM-2018-MittalNSDDK #knowledge base #multi
Using a Common Sense Knowledge Base to Auto Generate Multi-Dimensional Vocabulary Assessments (RSM, SN, MS, UD, PD, RK).
EDMEDM-2018-NandaHWDG #comprehension #modelling #online #topic
Understanding Learners' Opinion about Participation Certificates in Online Courses using Topic Modeling (GN, NMH, DRW, KAD, DG).
EDMEDM-2018-NguyenL #modelling #student
Using Student Logs to Build Bayesian Models of Student Knowledge and Skills (HN, CWL).
EDMEDM-2018-ReillyRS #collaboration #learning #multi
Exploring Collaboration Using Motion Sensors and Multi-Modal Learning Analytics (JMR, MR, BS).
EDMEDM-2018-SalesBPH #big data #testing
Using Big Data to Sharpen Design-Based Inference in A/B Tests (AS, AB, TP, NTH).
ICPCICPC-2018-OttAHBAFL #learning #network #programming language
Learning lexical features of programming languages from imagery using convolutional neural networks (JO, AA, PH, NB, HA, CF, EL), pp. 336–339.
ICPCICPC-2018-TakahashiSHS #case study #debugging #locality #smell
A preliminary study on using code smells to improve bug localization (AT, NSL, SH, MS), pp. 324–327.
ICSMEICSME-2018-Alsolai #maintenance #object-oriented #predict
Predicting Software Maintainability in Object-Oriented Systems Using Ensemble Techniques (HA), pp. 716–721.
ICSMEICSME-2018-FrickG0P #difference #generative
Generating Accurate and Compact Edit Scripts Using Tree Differencing (VF, TG, FB0, MP0), pp. 264–274.
ICSMEICSME-2018-IshioMSI #detection #distance #normalisation
Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
ICSMEICSME-2018-PalombaZL #automation #detection #information retrieval #smell
Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
ICSMEICSME-2018-RahmanR #code search #crowdsourcing #data analysis #effectiveness #query
Effective Reformulation of Query for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), pp. 473–484.
ICSMEICSME-2018-RahmanR18a #api #code search #crowdsourcing #data analysis #named #query
NLP2API: Query Reformulation for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), p. 714.
ICSMEICSME-2018-SchlieSS #analysis #matlab #matrix #modelling #multi
Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
MSRMSR-2018-AfzalG #case study #debugging #ide
A study on the use of IDE features for debugging (AA, CLG), pp. 114–117.
MSRMSR-2018-CiborowskaKD #behaviour #detection #developer #reuse #web
Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSRMSR-2018-LamotheS08 #android #api #automation #case study #experience #migration
Exploring the use of automated API migrating techniques in practice: an experience report on Android (ML, WS), pp. 503–514.
MSRMSR-2018-MoslehiAR #feature model
Feature location using crowd-based screencasts (PM, BA, JR), pp. 192–202.
MSRMSR-2018-RabbaniHSGM #fault #ide #interactive #replication #visual notation
Revisiting “programmers' build errors” in the visual studio context: a replication study using IDE interaction traces (NR, MSH, SS, KG, SM), pp. 98–101.
MSRMSR-2018-WilkieHKLNRPK #developer #ide #identification
Who's this?: developer identification using IDE event data (JW, ZAH, AK, JL, GN, CR, MP, JK), pp. 90–93.
SANERSANER-2018-KatzRS #decompiler #network
Using recurrent neural networks for decompilation (DSK, JR, ES), pp. 346–356.
SANERSANER-2018-LeemansAB18a #analysis #mining #process #scalability #statechart
The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
SANERSANER-2018-NucciPTSL #detection #machine learning #question #smell
Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
SANERSANER-2018-SantosCPHA #detection #fault #modelling #syntax
Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
SANERSANER-2018-SotoG #debugging #predict #probability
Using a probabilistic model to predict bug fixes (MS, CLG), pp. 221–231.
SCAMSCAM-2018-IslamIMRRS #detection #research #transitive
[Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
SCAMSCAM-2018-JiangCZPP0 #code search #research #semantics
[Research Paper] Semantics-Based Code Search Using Input/Output Examples (RJ, ZC, ZZ, YP0, MP, TZ0), pp. 92–102.
SCAMSCAM-2018-MostaeenSRRS #automation #design #machine learning #research #tool support #towards #validation
[Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools (GM, JS, BR, CKR, KAS), pp. 155–164.
SCAMSCAM-2018-MuylaertR #commit #research #slicing
[Research Paper] Untangling Composite Commits Using Program Slicing (WM, CDR), pp. 193–202.
SCAMSCAM-2018-NafiRRS #api #detection #documentation #research #similarity
[Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
SCAMSCAM-2018-PaceTG #architecture #predict #research #smell #towards
[Research Paper] Towards Anticipation of Architectural Smells Using Link Prediction Techniques (JADP, AT, DG), pp. 62–71.
CIAACIAA-2018-NozakiHYS #automaton #finite
Enumeration of Cryptarithms Using Deterministic Finite Automata (YN, DH, RY, AS), pp. 286–298.
FMFM-2018-0001BFLMR #automaton #energy #nondeterminism #robust #synthesis
Optimal and Robust Controller Synthesis - Using Energy Timed Automata with Uncertainty (GB0, PB, UF, KGL, NM, PAR), pp. 203–221.
FMFM-2018-AkazakiLYDH #cyber-physical #learning
Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning (TA, SL, YY, YD, JH), pp. 456–465.
FMFM-2018-Boralv #automation #design #proving
Interlocking Design Automation Using Prover Trident (AB), pp. 653–656.
FMFM-2018-GeislerH #development #distributed #model checking
Stepwise Development and Model Checking of a Distributed Interlocking System - Using RAISE (SG, AEH), pp. 277–293.
IFM-2018-DoughertyGR #analysis #protocol #security #smt
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
IFM-2018-GlabbeekHW
Analysing AWN-Specifications Using mCRL2 (Extended Abstract) (RJvG, PH, DvdW), pp. 398–418.
IFM-2018-KangMH #constraints #probability #verification
Probabilistic Verification of Timing Constraints in Automotive Systems Using UPPAAL-SMC (EYK0, DM, LH), pp. 236–254.
IFM-2018-KornerLM #model checking #state of the art
State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin (PK, ML, JM), pp. 275–295.
IFM-2018-SchmidtKL #formal method #generative #modelling #synthesis
Repair and Generation of Formal Models Using Synthesis (JS, SK, ML), pp. 346–366.
SEFMSEFM-2018-BabaeeGF #framework #learning #predict #runtime #statistics #verification
Prevent : A Predictive Run-Time Verification Framework Using Statistical Learning (RB, AG, SF), pp. 205–220.
SEFMSEFM-2018-DinSC #exception #verification
Program Verification for Exception Handling on Active Objects Using Futures (CCD, RS, TCC), pp. 73–88.
SEFMSEFM-2018-DuboisGPC #interactive #protocol #proving #theorem proving
Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
SEFMSEFM-2018-GolraDSSG #requirements #specification
Bridging the Gap Between Informal Requirements and Formal Specifications Using Model Federation (FRG, FD, JS, IS, SG), pp. 54–69.
ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #how
Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
ICFP-2018-StampoulisC #functional #higher-order #learning #logic programming #prolog #prototype
Prototyping a functional language using higher-order logic programming: a functional pearl on learning the ways of λProlog/Makam (AS, AC), p. 30.
AIIDEAIIDE-2018-MathewsonM #game studies #named
Improbotics: Exploring the Imitation Game Using Machine Intelligence in Improvised Theatre (KWM, PM), pp. 59–66.
CHI-PLAYCHI-PLAY-2018-ByrneMM #case study #experience #game studies
AR Fighter: Using HMDs to create Vertigo Play Experiences (RB, JM, F'M), pp. 45–57.
CHI-PLAYCHI-PLAY-2018-FrommelFR0 #self
Emotion-based Dynamic Difficulty Adjustment Using Parameterized Difficulty and Self-Reports of Emotion (JF, FF, KR, MW0), pp. 163–171.
CHI-PLAYCHI-PLAY-2018-VellaPKPMJ #case study #game studies
Using Applied Games to Engage mHealth Users: A Case Study of MindMax (KV, NP, MK, BP, JM, DJ0), pp. 511–522.
CoGCIG-2018-GlavinM #experience #learning
Skilled Experience Catalogue: A Skill-Balancing Mechanism for Non-Player Characters using Reinforcement Learning (FGG, MGM), pp. 1–8.
CoGCIG-2018-Guerrero-Romero #algorithm #design #game studies #testing
Using a Team of General AI Algorithms to Assist Game Design and Testing (CGR, SML, DPL), pp. 1–8.
CoGCIG-2018-KaravolosLY #automation #design
Using a Surrogate Model of Gameplay for Automated Level Design (DK, AL, GNY), pp. 1–8.
CoGCIG-2018-KosmidesDAKOL #game studies #named
InLife: Combining Real Life with Serious Games using IoT (PK, KPD, EFA, NK, YO, VDL), pp. 1–7.
CoGCIG-2018-StreckW #animation #markov
Using Discrete Time Markov Chains for Control of Idle Character Animation (AS, TW), pp. 1–4.
CoGCIG-2018-TziortziotiMMVC #education #game studies #internet #process
Scenarios for Educational and Game Activities using Internet of Things Data (CT, IM, GM, AV, IC), pp. 1–8.
FDGFDG-2018-PlumbKS #clustering #game studies #hybrid #multi #network #online
Hybrid network clusters using common gameplay for massively multiplayer online games (JNP, SKK, RS), p. 10.
FDGFDG-2018-SiljebratAP #towards
Towards human-like artificial intelligence using StarCraft 2 (HS, CA, AP), p. 4.
FDGFDG-2018-SmithPV #generative #graph #programming #set
Graph-based generation of action-adventure dungeon levels using answer set programming (TS0, JAP, AV), p. 10.
CoGVS-Games-2018-BardisKSVD #evolution #image
Image Warping Using WebGL for a Smart Avatar Animating Body Weight Evolution (GB, YK, NS, AV, ND), pp. 1–4.
CoGVS-Games-2018-LewisAMCKBDM #game studies #mobile
Balance Trucks: Using Crowd-Sourced Data to Procedurally-Generate Gameplay within Mobile Games (MRL, SA, LM, SC, LCK, AB, SD, AM), pp. 1–4.
CoGVS-Games-2018-Lim #case study #protocol
Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
CoGVS-Games-2018-MunozVCMH #artificial reality #coordination #diagrams
Dynamic Systems Theory in Human Movement Exploring Coordination Patterns by Angle-Angle Diagrams Using Kinect (JEMC, JFV, SC, MFM, ÓAH), pp. 1–4.
CoGVS-Games-2018-OberdorferL #game studies
Effectivity of Affine Transformation Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
CoGVS-Games-2018-OberdorferL18a #encoding #game studies
Gamified Knowledge Encoding: Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–2.
CoGVS-Games-2018-OberdorferL18b #effectiveness #game studies
Effective Orbital Mechanics Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
CoGVS-Games-2018-OhmotoTN #comprehension
Improving Context Understanding Using Avatar's Affective Expressions Reflecting Operator's Mental States (YO, ST, TN), pp. 1–4.
CoGVS-Games-2018-RallisLGVDD #analysis #artificial reality #game studies #learning #visualisation
An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
CoGVS-Games-2018-Ramic-Brkic #education #game studies
Enhancing Progressive Education through the Use of Serious Games (BRB), pp. 1–4.
CoGVS-Games-2018-WuGHL #3d #data fusion #multi #robust #towards
Towards Robust 3D Skeleton Tracking Using Data Fusion from Multiple Depth Sensors (YW, LG, SH, RWL), pp. 1–4.
CIKMCIKM-2018-AdigaCKMRRS #modelling #network #probability #query
Inferring Probabilistic Contagion Models Over Networks Using Active Queries (AA, VCM, CJK, MVM, SSR, DJR, RES), pp. 377–386.
CIKMCIKM-2018-ANR #algorithm #generative #higher-order #scalability
A Scalable Algorithm for Higher-order Features Generation using MinHash (PA, NN, RR), pp. 1213–1222.
CIKMCIKM-2018-CirsteaMMG0 #correlation #multi #network
Correlated Time Series Forecasting using Multi-Task Deep Neural Networks (RGC, DVM, GMM, CG, BY0), pp. 1527–1530.
CIKMCIKM-2018-DeutchGM #detection #privacy
Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKMCIKM-2018-GeDJNW #personalisation
Personalizing Search Results Using Hierarchical RNN with Query-aware Attention (SG, ZD, ZJ, JYN, JRW), pp. 347–356.
CIKMCIKM-2018-GeZZCLYHLSLYHZZ #behaviour #image #matter #modelling #visual notation
Image Matters: Visually Modeling User Behaviors Using Advanced Model Server (TG, LZ, GZ, KC, SL, HY, ZH, BL, PS, HL, PY, SH, ZZ, XZ, YZ, KG), pp. 2087–2095.
CIKMCIKM-2018-HashemiWKZC #query #user satisfaction
Measuring User Satisfaction on Smart Speaker Intelligent Assistants Using Intent Sensitive Query Embeddings (SHH, KW, AEK, IZ, PAC), pp. 1183–1192.
CIKMCIKM-2018-Kieu0GJ
Distinguishing Trajectories from Different Drivers using Incompletely Labeled Trajectories (TK, BY0, CG, CSJ), pp. 863–872.
CIKMCIKM-2018-KweeCPL #lifecycle #mining #named #visualisation
Traffic-Cascade: Mining and Visualizing Lifecycles of Traffic Congestion Events Using Public Bus Trajectories (ATK, MFC, PKP, EPL), pp. 1955–1958.
CIKMCIKM-2018-LinmansVK #detection #robust #scalability #semantics #web
Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
CIKMCIKM-2018-PandeyKS #learning #recommendation
Recommending Serendipitous Items using Transfer Learning (GP0, DK, AS), pp. 1771–1774.
CIKMCIKM-2018-PatidarAVS #automation #modelling
Automatic Conversational Helpdesk Solution using Seq2Seq and Slot-filling Models (MP, PA, LV, GMS), pp. 1967–1975.
CIKMCIKM-2018-PrasojoKN #fine-grained #information management #named #semantics
StuffIE: Semantic Tagging of Unlabeled Facets Using Fine-Grained Information Extraction (REP, MK, WN), pp. 467–476.
CIKMCIKM-2018-RoleMN #algorithm #clustering #evaluation #word
Unsupervised Evaluation of Text Co-clustering Algorithms Using Neural Word Embeddings (FR, SM, MN), pp. 1827–1830.
CIKMCIKM-2018-RoyGBBM #how #information retrieval #normalisation #performance #word
Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
CIKMCIKM-2018-ShangSSLGKLY0
Investigating Rumor News Using Agreement-Aware Search (JS, JS, TS, XL, AG, FK, ÁDL, CY0, JH0), pp. 2117–2125.
CIKMCIKM-2018-ShenYZPZ #parallel
Parallel Hashing Using Representative Points in Hyperoctants (CS, MY, CZ, YP, GZ), pp. 813–822.
CIKMCIKM-2018-SyedRN #named #rdf #validation
FactCheck: Validating RDF Triples Using Textual Evidence (ZHS, MR, ACNN), pp. 1599–1602.
CIKMCIKM-2018-Voorhees #on the #reuse
On Building Fair and Reusable Test Collections using Bandit Techniques (EMV), pp. 407–416.
CIKMCIKM-2018-ZhangNCC #database #parallel #probability #scalability
Scalable Entity Resolution Using Probabilistic Signatures on Parallel Databases (YZ, KSN, TC, PC), pp. 2213–2221.
ECIRECIR-2018-BalikasLRA #distance #documentation #retrieval
Cross-Lingual Document Retrieval Using Regularized Wasserstein Distance (GB, CL, IR, MRA), pp. 398–410.
ECIRECIR-2018-DeySK #detection #topic #twitter
Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
ECIRECIR-2018-Jalan0V #classification #learning
Medical Forum Question Classification Using Deep Learning (RSJ, MG0, VV), pp. 45–58.
ECIRECIR-2018-McDonaldMO18a #overview #predict #towards
Towards Maximising Openness in Digital Sensitivity Review Using Reviewing Time Predictions (GM, CM, IO), pp. 699–706.
ECIRECIR-2018-SinghM #recommendation #symmetry
Benefits of Using Symmetric Loss in Recommender Systems (GS, SM), pp. 345–356.
ECIRECIR-2018-Zhang0LZ #analysis #matrix #representation #sentiment #twitter
Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
ICMLICML-2018-0001JCCJ #robust
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training (XW0, UJ, JC, LC, SJ), pp. 5330–5338.
ICMLICML-2018-AghazadehSLDSB #feature model #named #scalability #sketching
MISSION: Ultra Large-Scale Feature Selection using Count-Sketches (AA, RS, DL, GD, AS, RGB), pp. 80–88.
ICMLICML-2018-ArenzZN #performance #policy
Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
ICMLICML-2018-BajajGHHL #clustering #named
SMAC: Simultaneous Mapping and Clustering Using Spectral Decompositions (CB, TG, ZH, QH, ZL), pp. 334–343.
ICMLICML-2018-BangS #generative #network
Improved Training of Generative Adversarial Networks using Representative Features (DB, HS), pp. 442–451.
ICMLICML-2018-BansalAB #agile #design
Using Inherent Structures to design Lean 2-layer RBMs (AB, AA, CB), pp. 452–460.
ICMLICML-2018-BarretoBQSSHMZM #learning #policy
Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
ICMLICML-2018-ChenLW #learning #scalability
Scalable Bilinear Learning Using State and Action Features (YC, LL0, MW), pp. 833–842.
ICMLICML-2018-DaiZGW #network
Compressing Neural Networks using the Variational Information Bottleneck (BD, CZ, BG, DPW), pp. 1143–1152.
ICMLICML-2018-DharGE #generative #modelling
Modeling Sparse Deviations for Compressed Sensing using Generative Models (MD, AG, SE), pp. 1222–1231.
ICMLICML-2018-FengWCS #learning #multi #network #parametricity
Nonparametric variable importance using an augmented neural network with multi-task learning (JF, BDW, MC, NS), pp. 1495–1504.
ICMLICML-2018-GaninKBEV #image #learning #source code
Synthesizing Programs for Images using Reinforced Adversarial Learning (YG, TK, IB, SMAE, OV), pp. 1652–1661.
ICMLICML-2018-HuangA0S #learning
Learning Deep ResNet Blocks Sequentially using Boosting Theory (FH, JTA, JL0, RES), pp. 2063–2072.
ICMLICML-2018-HuWL #analysis #probability #reduction #source code
Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
ICMLICML-2018-IcarteKVM #composition #learning #specification
Using Reward Machines for High-Level Task Specification and Decomposition in Reinforcement Learning (RTI, TQK, RAV, SAM), pp. 2112–2121.
ICMLICML-2018-JohnH #fourier #process #scalability
Large-Scale Cox Process Inference using Variational Fourier Features (STJ, JH), pp. 2367–2375.
ICMLICML-2018-KaiserBRVPUS #modelling #performance #sequence
Fast Decoding in Sequence Models Using Discrete Latent Variables (LK, SB, AR, AV, NP, JU, NS), pp. 2395–2404.
ICMLICML-2018-KalimerisSSW #learning
Learning Diffusion using Hyperparameters (DK, YS, KS, UW), pp. 2425–2433.
ICMLICML-2018-KeivaniS #nearest neighbour
Improved nearest neighbor search using auxiliary information and priority functions (OK, KS), pp. 2578–2586.
ICMLICML-2018-KuleshovFE #learning #nondeterminism
Accurate Uncertainties for Deep Learning Using Calibrated Regression (VK, NF, SE), pp. 2801–2809.
ICMLICML-2018-RaileanuDSF #learning #modelling #multi
Modeling Others using Oneself in Multi-Agent Reinforcement Learning (RR, ED, AS, RF), pp. 4254–4263.
ICMLICML-2018-SharmaNK #clique #problem #random
Solving Partial Assignment Problems using Random Clique Complexes (CS, DN, MK), pp. 4593–4602.
ICMLICML-2018-Sinha #clustering #matrix #random
K-means clustering using random matrix sparsification (KS), pp. 4691–4699.
ICMLICML-2018-WeissGY #automaton #network #query
Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples (GW, YG, EY), pp. 5244–5253.
ICMLICML-2018-YoonJS #generative #named
GAIN: Missing Data Imputation using Generative Adversarial Nets (JY, JJ, MvdS), pp. 5675–5684.
ICMLICML-2018-YoonJS18a #dataset #generative #modelling #multi #named #network #predict
RadialGAN: Leveraging multiple datasets to improve target-specific predictive models using Generative Adversarial Networks (JY, JJ, MvdS), pp. 5685–5693.
ICPRICPR-2018-AbdeldayemB #automation #detection
Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
ICPRICPR-2018-AfonsoPSP #classification #learning
Improving Optimum- Path Forest Classification Using Unsupervised Manifold Learning (LCSA, DCGP, ANdS, JPP), pp. 560–565.
ICPRICPR-2018-AkdemirBS #locality #realtime
Real-time Vehicle Localization and Tracking Using Monocular Panomorph Panoramic Vision (BA, ANB, LMS), pp. 2350–2355.
ICPRICPR-2018-AzzopardiFGSV #gender #image #recognition
Gender recognition from face images using trainable shape and color features (GA, PF, AG, AS, MV), pp. 1983–1988.
ICPRICPR-2018-BeheraDDR #recognition
Air Signature Recognition Using Deep Convolutional Neural Network-Based Sequential Model (SKB, AKD, DPD, PPR0), pp. 3525–3530.
ICPRICPR-2018-BhuniaBBKB0P #network
Handwriting Trajectory Recovery using End-to-End Deep Encoder-Decoder Network (AKB, AB, AKB, AK, PB, PPR0, UP0), pp. 3639–3644.
ICPRICPR-2018-BhuniaBBKB0P18a #generative #image #network #word
Word Level Font-to-Font Image Translation using Convolutional Recurrent Generative Adversarial Networks (AKB, AKB, PB, AK, AB, PPR0, UP0), pp. 3645–3650.
ICPRICPR-2018-BicegoLDGA #mining #modelling #topic
Mining NMR Spectroscopy Using Topic Models (MB, PL, MD, FG, MA), pp. 3784–3789.
ICPRICPR-2018-CombinidoMA #approach #image #network
A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
ICPRICPR-2018-CuiZZH #learning #multi #network #recognition
Multi-source Learning for Skeleton -based Action Recognition Using Deep LSTM Networks (RC, AZ, SZ, GH0), pp. 547–552.
ICPRICPR-2018-CzovnyBSC #3d
Minutia Matching using 3D Pore Clouds (RKC, ORPB, LS, HSGC), pp. 3138–3143.
ICPRICPR-2018-DehzangiBI #detection #multi #process
Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
ICPRICPR-2018-DehzangiM #behaviour #predict
Unobtrusive Driver Drowsiness Prediction Using Driving Behavior from Vehicular Sensors (OD, SM), pp. 3598–3603.
ICPRICPR-2018-DehzangiS #analysis #process #recognition #reduction #robust
IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
ICPRICPR-2018-DehzangiT #detection #network #representation
Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
ICPRICPR-2018-Dey0GVLP #image #learning #multi #retrieval #sketching
Learning Cross-Modal Deep Embeddings for Multi-Object Image Retrieval using Text and Sketch (SD, AD0, SKG, EV, JL0, UP0), pp. 916–921.
ICPRICPR-2018-DongTC #automation #image
Automatic Inspection of Aerospace Welds Using X-Ray Images (XD, CJT, TFC), pp. 2002–2007.
ICPRICPR-2018-DuanMKY #classification #image
A New Single Image Super-resolution Method Using SIMK-based Classification and ISRM Technique (PD, AM, XK, CY), pp. 3043–3048.
ICPRICPR-2018-El-GamalEAGBHKE #framework
Significant Region-Based Framework for Early Diagnosis of Alzheimer's Disease Using 11C PiB-PET Scans (FEZAEG, MME, AA, MG, GNB, HH, RK, ASEB), pp. 2989–2994.
ICPRICPR-2018-EskenaziGO #component #image
Watercolor, Segmenting Images Using Connected Color Components (SE, PGK, JMO), pp. 3633–3638.
ICPRICPR-2018-GarciaLSH #classification #complexity #metric #recommendation
Classifier Recommendation Using Data Complexity Measures (LPFG, ACL, MCPdS, TKH), pp. 874–879.
ICPRICPR-2018-GarrettR #3d #network #performance
Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network (TG, RR), pp. 1211–1216.
ICPRICPR-2018-HeYLXLHS #estimation #physics
Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise (WH, YY, YL, HX, LL0, WH, MS), pp. 3766–3771.
ICPRICPR-2018-HibrajVSP #clustering #set
Speaker Clustering Using Dominant Sets (FH, SV, TS, MP), pp. 3549–3554.
ICPRICPR-2018-JaberiPF #clustering #probability
Probabilistic Sparse Subspace Clustering Using Delayed Association (MJ, MP, HF), pp. 2087–2092.
ICPRICPR-2018-JiQYKZ #automation #image #network #segmentation
Automatic Prostate Segmentation on MR Images Using Enhanced Holistically-Nested Networks (DJ, JQ, JY, TK, SZ), pp. 3820–3825.
ICPRICPR-2018-JohnKGKM #estimation
Free Space, Visible and Missing Lane Marker Estimation using the PsiNet and Extra Trees Regression (VJ, NMK, CG, KK, SM), pp. 189–194.
ICPRICPR-2018-JyotiD #automation #estimation #geometry #network
Automatic Eye Gaze Estimation using Geometric & Texture-based Networks (SJ, AD), pp. 2474–2479.
ICPRICPR-2018-KateFG #visual notation
Visual Tracking with Breeding Fireflies using Brightness from Background-Foreground Information (PK, MF, PG), pp. 2570–2575.
ICPRICPR-2018-KawanishiMXTY #estimation
Which Content in a Booklet is he/she Reading? Reading Content Estimation using an Indoor Surveillance Camera (YK, HM, JX, KT, HY), pp. 1731–1736.
ICPRICPR-2018-KilKC
Scene text rectification using glyph and character alignment properties (THK, HIK, NIC), pp. 3663–3668.
ICPRICPR-2018-KimuraSDNKBI #3d #representation
Representing a Partially Observed Non-Rigid 3D Human Using Eigen-Texture and Eigen-Deformation (RK, AS, FLD, YN, HK, AB, KI), pp. 1043–1048.
ICPRICPR-2018-KokakiTKHO #modelling
Sequential Fish Catch Forecasting Using Bayesian State Space Models (YK, NT, TK, KH, TO), pp. 776–781.
ICPRICPR-2018-KonwerBBBB0P #generative #network
Staff line Removal using Generative Adversarial Networks (AK, AKB, AB, AKB, PB, PPR0, UP0), pp. 1103–1108.
ICPRICPR-2018-KurzendorferBSB #analysis #classification #random #segmentation
Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
ICPRICPR-2018-LeeLC
Cancelable Biometrics Using Noise Embedding (DHL, SHL, NIC), pp. 3390–3395.
ICPRICPR-2018-LiangYLH #classification
A Segmented Local Offset Method for Imbalanced Data Classification Using Quasi-Linear Support Vector Machine (PL, XY, WL, JH), pp. 746–751.
ICPRICPR-2018-LiaoCQ #image #visualisation
Visualization of Hyperspectral Images Using Moving Least Squares (DL, SC, YQ), pp. 2851–2856.
ICPRICPR-2018-LiCGJH #gesture #multimodal #recognition
Multimodal Gesture Recognition Using Densely Connected Convolution and BLSTM (DL, YC, MkG, SJ, CH), pp. 3365–3370.
ICPRICPR-2018-LiciottiPPFZ #network #segmentation #semantics
Convolutional Networks for Semantic Heads Segmentation using Top-View Depth Data in Crowded Environment (DL, MP, RP, EF, PZ), pp. 1384–1389.
ICPRICPR-2018-LiH #algorithm #estimation #performance #robust
Fast and Robust Pose Estimation Algorithm for Bin Picking Using Point Pair Feature (ML, KH), pp. 1604–1609.
ICPRICPR-2018-Liu0H #integration
High-Quality and Memory-Efficient Volumetric Integration of Depth Maps Using Plane Priors (YL, WG0, ZH), pp. 1749–1754.
ICPRICPR-2018-LiuH0 #online #optimisation
Online Temporal Calibration of Camera and IMU using Nonlinear Optimization (JL, ZH, WG0), pp. 1761–1766.
ICPRICPR-2018-LiW18a #detection #semantics #visual notation
Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
ICPRICPR-2018-LiWK18a #framework #image #learning
Infrared and Visible Image Fusion using a Deep Learning Framework (HL0, XJW, JK), pp. 2705–2710.
ICPRICPR-2018-LocBO #documentation #image #network #security
Document Images Watermarking for Security Issue using Fully Convolutional Networks (CVL, JCB, JMO), pp. 1091–1096.
ICPRICPR-2018-LuoCCTTKH
Oil Price Forecasting Using Supervised GANs with Continuous Wavelet Transform Features (ZL, JC, XJC, KT, TT, TK, SH), pp. 830–835.
ICPRICPR-2018-MaH #generative #network
Perceptual Face Completion using a Local-Global Generative Adversarial Network (RM, HH0), pp. 1670–1675.
ICPRICPR-2018-MaierSSWSCF #learning #network #precise #towards
Precision Learning: Towards Use of Known Operators in Neural Networks (AKM, FS, CS, TW, SS, JHC, RF), pp. 183–188.
ICPRICPR-2018-MaLHY #estimation #hybrid #network
Image-based Air Pollution Estimation Using Hybrid Convolutional Neural Network (JM, KL, YH, JY), pp. 471–476.
ICPRICPR-2018-MerchantSKM #dataset #image
Appearance-based data augmentation for image datasets using contrast preserving sampling (AKM, TQS, BK, RM), pp. 1235–1240.
ICPRICPR-2018-MohantyDG #detection #performance
An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
ICPRICPR-2018-MustaniemiKSMH #detection #metric #performance
Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
ICPRICPR-2018-NadeemHS #algorithm #automation #detection #image #segmentation
An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
ICPRICPR-2018-NguyenTL #data-driven #learning
Are French Really That Different? Recognizing Europeans from Faces Using Data-Driven Learning (VDN, MT, JL), pp. 2729–2734.
ICPRICPR-2018-PassalisT #information management #network #similarity
Neural Network Knowledge Transfer using Unsupervised Similarity Matching (NP, AT), pp. 716–721.
ICPRICPR-2018-PengSCCXJ #architecture #detection #multi
Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
ICPRICPR-2018-PereraAP #generative #multi #named #network
In2I: Unsupervised Multi-Image-to-Image Translation Using Generative Adversarial Networks (PP, MA, VMP), pp. 140–146.
ICPRICPR-2018-RhifWF #3d #network #recognition #sequence
Action Recognition from 3D Skeleton Sequences using Deep Networks on Lie Group Features (MR, HW, IRF), pp. 3427–3432.
ICPRICPR-2018-RoyT #higher-order #learning
Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs (AR, ST), pp. 97–102.
ICPRICPR-2018-SadafiKHPMS #multi
Multiple Mice Tracking: Occlusions Disentanglement using a Gaussian Mixture Model (AS, VMK, HH, FP, VM, DS), pp. 2433–2437.
ICPRICPR-2018-Savchenko #performance #recognition #statistics
Efficient Statistical Face Recognition Using Trigonometric Series and CNN Features (AVS), pp. 3262–3267.
ICPRICPR-2018-ShibataIHM #image #set
Restoration of Sea Surface Temperature Satellite Images Using a Partially Occluded Training Set (SS, MI, AH, MM), pp. 2771–2776.
ICPRICPR-2018-SuHK #analysis #classification #component #multi #performance
Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
ICPRICPR-2018-SuJ #analysis #image #multi
Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
ICPRICPR-2018-TayanovKS #classification #learning #predict
Prediction-based classification using learning on Riemannian manifolds (VT, AK, CYS), pp. 591–596.
ICPRICPR-2018-UekiHKK #fine-grained #query #retrieval #video
Fine-grained Video Retrieval using Query Phrases - Waseda_Meisei TRECVID 2017 AVS System - (KU, KH, KK, TK), pp. 3322–3327.
ICPRICPR-2018-VinayavekhinCMA #comprehension #learning #what
Focusing on What is Relevant: Time-Series Learning and Understanding using Attention (PV, SC, AM, DJA, GDM, DK, RT), pp. 2624–2629.
ICPRICPR-2018-WangF #detection
Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
ICPRICPR-2018-WangHJ #learning
Focus on Scene Text Using Deep Reinforcement Learning (HW, SH, LJ), pp. 3759–3765.
ICPRICPR-2018-WangSH #algorithm #black box #generative
Universal Perturbation Generation for Black-box Attack Using Evolutionary Algorithms (SW, YS, YH), pp. 1277–1282.
ICPRICPR-2018-WangZGW #detection #image #multi #network #parametricity
Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
ICPRICPR-2018-WeiCYLL #black box #classification #image
Explain Black-box Image Classifications Using Superpixel-based Interpretation (YW, MCC, YY, SNL, SL), pp. 1640–1645.
ICPRICPR-2018-Windeatt #analysis #classification #optimisation
Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
ICPRICPR-2018-WitmerB #classification #image #learning #multi
Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning (AW, BB), pp. 1408–1413.
ICPRICPR-2018-WuW #gesture #recognition
Applying hand gesture recognition and joint tracking to a TV controller using CNN and Convolutional Pose Machine (YW, CMW), pp. 3086–3091.
ICPRICPR-2018-WuY0Y #robust
Robust ECG Biometrics Using Two-Stage Model (BW, GY, LY0, YY), pp. 1062–1067.
ICPRICPR-2018-XinCCZYW #locality #recognition #visual notation
Visual Localization in Changing Environments using Place Recognition Techniques (ZX, YC, SC, JZ0, YY, YW), pp. 1785–1790.
ICPRICPR-2018-XiongJXXLW #documentation #energy #estimation #image
Historical document image binarization using background estimation and energy minimization (WX0, XJ, JX, ZX, ML, JW), pp. 3716–3721.
ICPRICPR-2018-XuCG #learning #modelling #multi #random
Common Random Subgraph Modeling Using Multiple Instance Learning (TX, DKYC, IG), pp. 1205–1210.
ICPRICPR-2018-XuD #detection #modelling
Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
ICPRICPR-2018-XuDMB #recognition
Video-based Emotion Recognition using Aggregated Features and Spatio-temporal Information (JX, YD, LM, HB), pp. 2833–2838.
ICPRICPR-2018-XuZZ #image #network #recognition
Screen-rendered text images recognition using a deep residual network based segmentation-free method (XX0, JZ, HZ), pp. 2741–2746.
ICPRICPR-2018-YamadaIYK #network #segmentation
Texture Segmentation using Siamese Network and Hierarchical Region Merging (RY, HI, NY, TK), pp. 2735–2740.
ICPRICPR-2018-Yang0CF #analysis #canonical #correlation #detection #image
Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPRICPR-2018-YangZT
Reducing Tongue Shape Dimensionality from Hundreds of Available Resources Using Autoencoder (MY, DZ, JT), pp. 2875–2880.
ICPRICPR-2018-YanWSLZ #image #learning #network
Image Captioning using Adversarial Networks and Reinforcement Learning (SY, FW, JSS, WL, BZ), pp. 248–253.
ICPRICPR-2018-YlimakiHK #3d #re-engineering #refinement
Accurate 3-D Reconstruction with RGB-D Cameras using Depth Map Fusion and Pose Refinement (MY, JH, JK), pp. 1977–1982.
ICPRICPR-2018-YuanTLDZ #automation #learning #multi #segmentation
Fully Automatic Segmentation of the Left Ventricle Using Multi-Scale Fusion Learning (TY, QT, XL, XD, JZ), pp. 3838–3843.
ICPRICPR-2018-ZhangSOS #identification #network
Person Re-identification Using Two-Stage Convolutional Neural Network (YZ, JS, DO, HTS), pp. 3341–3346.
ICPRICPR-2018-ZhanLL #network #recognition #string
Handwritten Digit String Recognition using Convolutional Neural Network (HZ, SL, YL), pp. 3729–3734.
ICPRICPR-2018-ZhaoLZTNM #analysis #automation #component #image #multi #robust #segmentation
Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
ICPRICPR-2018-ZhaoPL0DWQ #learning #locality #semantics #topic
Learning Topics Using Semantic Locality (ZZ, KP, SL, ZL0, CD, YW, QQ), pp. 3710–3715.
ICPRICPR-2018-ZhaoSJ #integer #linear #locality #programming
Temporal Pattern Localization using Mixed Integer Linear Programming (RZ, GS, QJ), pp. 1361–1365.
ICPRICPR-2018-ZhaoYT #network #order #predict
Pen Tip Motion Prediction for Handwriting Drawing Order Recovery using Deep Neural Network (BZ, MY, JT), pp. 704–709.
KDDKDD-2018-DaltayanniDA #automation #segmentation
Automated Audience Segmentation Using Reputation Signals (MD, AD, LdA), pp. 186–195.
KDDKDD-2018-DasSCHLCKC #learning #named #performance
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression (ND, MS, STC, FH, SL, LC, MEK, DHC), pp. 196–204.
KDDKDD-2018-GittensRWMGPKRM #data analysis #library #scalability
Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist (AG, KR, SW, MWM, LG, P, JK, MFR, KJM), pp. 293–301.
KDDKDD-2018-GohSVH #learning #predict #rule-based
Using Rule-Based Labels for Weak Supervised Learning: A ChemNet for Transferable Chemical Property Prediction (GBG, CS, AV, NOH), pp. 302–310.
KDDKDD-2018-GrbovicC #personalisation #ranking #realtime
Real-time Personalization using Embeddings for Search Ranking at Airbnb (MG, HC), pp. 311–320.
KDDKDD-2018-HarelR #network #prototype
Accelerating Prototype-Based Drug Discovery using Conditional Diversity Networks (SH, KR), pp. 331–339.
KDDKDD-2018-He0LRLTZ #detection
Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
KDDKDD-2018-HundmanCLCS #detection #parametricity
Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
KDDKDD-2018-Janakiraman #learning #multi #safety
Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
KDDKDD-2018-JauvionGSGG #optimisation
Optimization of a SSP's Header Bidding Strategy using Thompson Sampling (GJ, NG, PDS, AG, SG), pp. 425–432.
KDDKDD-2018-KhuranaASV
Resolving Abstract Anaphora Implicitly in Conversational Assistants using a Hierarchically stacked RNN (PK, PA, GMS, LV), pp. 433–442.
KDDKDD-2018-KumarRBVWKEFMZG #machine learning
Using Machine Learning to Assess the Risk of and Prevent Water Main Breaks (AK, SAAR, BB, RAV, KHW, CK, SE, AF, AM, JZ, RG), pp. 472–480.
KDDKDD-2018-LeeRK #classification #graph
Graph Classification using Structural Attention (JBL, RAR, XK), pp. 1666–1674.
KDDKDD-2018-OshriHACDWBLE #assessment #framework #learning #quality
Infrastructure Quality Assessment in Africa using Satellite Imagery and Deep Learning (BO, AH, PA, XC, PD, JW, MB, DBL, SE), pp. 616–625.
KDDKDD-2018-RouxPMVF #approach #detection #machine learning
Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDDKDD-2018-Ruhrlander0U #modelling #predict
Improving Box Office Result Predictions for Movies Using Consumer-Centric Models (RPR, MB0, MU), pp. 655–664.
KDDKDD-2018-ShashikumarSCN #bidirectional #detection #network
Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
KDDKDD-2018-Ting #bound #empirical #estimation #fault #named
Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
KDDKDD-2018-WuCYXXA #clustering #random #scalability
Scalable Spectral Clustering Using Random Binning Features (LW, PYC, IEHY, FX, YX, CCA), pp. 2506–2515.
KDDKDD-2018-WuZW #graph #on the
On Discrimination Discovery and Removal in Ranked Data using Causal Graph (YW, LZ0, XW), pp. 2536–2544.
KDDKDD-2018-XuLDH #learning #metric #robust
New Robust Metric Learning Model Using Maximum Correntropy Criterion (JX0, LL, CD, HH), pp. 2555–2564.
KDDKDD-2018-ZhaoAS0 #classification #dependence #performance #predict
Prediction-time Efficient Classification Using Feature Computational Dependencies (LZ0, AAF, MS, KZ0), pp. 2787–2796.
ECMFAECMFA-2018-RutleIKD #automation #co-evolution #graph transformation #modelling #traceability
Automatic Transformation Co-evolution Using Traceability Models and Graph Transformation (AR, LI, HK, ZD), pp. 80–96.
ICMTICMT-2018-Voelter #design #evolution #functional #kernel
The Design, Evolution, and Use of KernelF — An Extensible and Embeddable Functional Language (MV), pp. 3–55.
MoDELSMoDELS-2018-MarussySV #incremental #modelling
Incremental View Model Synchronization Using Partial Models (KM, OS, DV), pp. 323–333.
MoDELSMoDELS-2018-PouraliA #challenge #empirical #modelling #tool support
An Empirical Investigation to Understand the Difficulties and Challenges of Software Modellers When Using Modelling Tools (PP, JMA), pp. 224–234.
ECOOPECOOP-2018-QunaibitBNVF #dynamic typing #optimisation #platform
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization (MQ, SB, YN, SV, MF), p. 29.
OOPSLAOOPSLA-2018-AlpernasFFRSSW #data flow #information management
Secure serverless computing using dynamic information flow control (KA, CF, SF, LR, MS, TS, KW), p. 26.
OOPSLAOOPSLA-2018-WilliamsMW #contract
The root cause of blame: contracts for intersection and union types (JW, JGM, PW), p. 29.
AdaEuropeAdaEurope-2018-JaradatP #contract #design #runtime #safety #verification
Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
LOPSTRLOPSTR-2018-PapapanagiotouF #approach #composition #linear #logic #process #scalability
A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
PADLPADL-2018-AnandCN #automation #consistency #detection #logic #nondeterminism
An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
PADLPADL-2018-Crary #code generation #source code
Hygienic Source-Code Generation Using Functors - (Extended Abstract) (KC), pp. 53–60.
PLDIPLDI-2018-DuckY #c #c++ #detection #effectiveness #fault #memory management #named
EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
PLDIPLDI-2018-FengMBD #learning #synthesis
Program synthesis using conflict-driven learning (YF, RM, OB, ID), pp. 420–435.
PLDIPLDI-2018-HongSKRKPRS #analysis #gpu #kernel #optimisation
GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
PLDIPLDI-2018-LeeHAN #modelling #probability #search-based #synthesis
Accelerating search-based program synthesis using learned probabilistic models (WL, KH, RA, MN), pp. 436–449.
PLDIPLDI-2018-RaghothamanKHN #reasoning
User-guided program reasoning using Bayesian inference (MR, SK, KH, MN), pp. 722–735.
POPLPOPL-2018-Danielsson
Up-to techniques using sized types (NAD), p. 28.
POPLPOPL-2018-InalaS #named #spreadsheet #web
WebRelate: integrating web data with spreadsheets using examples (JPI, RS), p. 28.
POPLPOPL-2018-WangDS #abstraction #refinement #synthesis
Program synthesis using abstraction refinement (XW0, ID, RS), p. 30.
PPDPPPDP-2018-NogatzKS #definite clause grammar #prolog #visualisation
Web-based Visualisation for Definite Clause Grammars Using Prolog Meta-Interpreters: System Description (FN, JK, DS), p. 10.
SASSAS-2018-RothenbergDH #abstraction #incremental #verification
Incremental Verification Using Trace Abstraction (BCR, DD, MH), pp. 364–382.
SASSAS-2018-Shoham #decidability #distributed #interactive #logic #protocol #verification
Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
ASEASE-2018-AbdessalemPNBS #feature model #interactive #testing
Testing autonomous cars for feature interaction failures using many-objective search (RBA, AP, SN, LCB, TS), pp. 143–154.
ASEASE-2018-HabibP #documentation #graph #learning #thread
Is this class thread-safe? inferring documentation using graph-based learning (AH, MP), pp. 41–52.
ASEASE-2018-PatwardhanSSKG #ambiguity #automation #towards
Towards automating disambiguation of regulations: using the wisdom of crowds (MP, AS, RS, SK, SG), pp. 850–855.
ASEASE-2018-QuLCJCHZ #2d #fault #named #network #predict
node2defect: using network embedding to improve software defect prediction (YQ, TL0, JC, YJ, DC, AH, QZ), pp. 844–849.
ESEC-FSEESEC-FSE-2018-AmarBB0M #difference #finite #modelling
Using finite-state models for log differencing (HA, LB, NB, DL0, SM), pp. 49–59.
ESEC-FSEESEC-FSE-2018-DashAB #named
RefiNym: using names to refine types (SKD, MA, ETB), pp. 107–117.
ESEC-FSEESEC-FSE-2018-HuaZWK #approach #automation #generative #lazy evaluation #named #program repair #sketching
SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
ESEC-FSEESEC-FSE-2018-HuZY #machine learning #named #reuse #robust #testing #user interface
AppFlow: using machine learning to synthesize robust, reusable UI tests (GH, LZ, JY), pp. 269–282.
ESEC-FSEESEC-FSE-2018-KimC0 #fault
Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF (MK, SCC, SK0), pp. 679–690.
ESEC-FSEESEC-FSE-2018-LeB0 #mining #named #network #specification
DSM: a specification mining tool using recurrent neural network based language model (TDBL, LB, DL0), pp. 896–899.
ESEC-FSEESEC-FSE-2018-StoccoYM18a #named #web
Vista: web test repair using computer vision (AS0, RY, AM0), pp. 876–879.
ESEC-FSEESEC-FSE-2018-TuZZZ #empirical #issue tracking
Be careful of when: an empirical study on time-related misuse of issue tracking data (FT, JZ, QZ, MZ), pp. 307–318.
ICSE-2018-AbdessalemNBS #algorithm #testing
Testing vision-based control systems using learnable evolutionary algorithms (RBA, SN, LCB, TS), pp. 1016–1026.
ICSE-2018-DamevskiCSKP #behaviour #developer #ide #modelling #predict #topic
Predicting future developer behavior in the IDE using topic models (KD, HC, DCS, NAK, LLP), p. 932.
ICSE-2018-HabayebMMB #debugging #markov #on the #predict
On the use of hidden Markov model to predict the time to fix bugs (MH, SSM, AVM, ABB), p. 700.
ICSE-2018-KimCK #c #precise #source code #testing
Precise concolic unit testing of C programs using extended units and symbolic alarm filtering (YK, YC, MK), pp. 315–326.
ICSE-2018-LangeNTY #behaviour #framework #message passing #verification
A static verification framework for message passing in Go using behavioural types (JL, NN, BT, NY), pp. 1137–1148.
ICSE-2018-MechtaevNNGR #implementation #program repair #semantics
Semantic program repair using a reference implementation (SM, MDN, YN, LG, AR), pp. 129–139.
SLESLE-2018-MeySHSKFOA #attribute grammar #validation
Continuous model validation using reference attribute grammars (JM, RS, GH, ES, TK0, NF, , UA), pp. 70–82.
ASPLOSASPLOS-2018-DickensGFH #encryption #named #performance
StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption (BDI, HSG, AJF, HH), pp. 708–721.
CASECASE-2018-AshouriHNS #approximate #detection #energy #performance
Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
CASECASE-2018-BarretoC #multi #simulation
Matching the Free-Vibration Response of a Delta Robot with Pick-and-Place Tasks Using Multi-Body Simulation (JPB, BC), pp. 1487–1492.
CASECASE-2018-CheonKKKC #design #fuzzy #optimisation
Systematic Design Method of Controller using Discrete Fuzzy PI Control and Particle Swarm Optimization (JC, JK, HK, SK, YC), pp. 1581–1586.
CASECASE-2018-ChuBIICS #learning #multi #online #power management
Plug-and-Play Power Management Control of All-Electric Vehicles Using Multi-Agent System and On-line Gaussian Learning (KCC, GB, MI, AI, CC, KS), pp. 1599–1604.
CASECASE-2018-DasWSP #adaptation #detection #interactive
Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
CASECASE-2018-DingLWL #automation #testing
6-DOF Automated Flight Testing Using a Humanoid Robot Arm (CD, LL0, CW0, JL), pp. 217–222.
CASECASE-2018-FrancoAGABB #approach #deployment #optimisation #probability
Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
CASECASE-2018-GaoXDCSG #detection
Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
CASECASE-2018-HaghighiRATMC #detection
Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
CASECASE-2018-InuiEMZ #geometry #gpu #process #simulation
Geometric Simulation of Infeed Grinding Process of Silicon Wafer Using GPU (MI, YE, TM, LZ), pp. 1519–1524.
CASECASE-2018-JulienN #coordination #exponential
Dynamics and Control of Tree-Type Manipulator Systems using Exponential Coordinates (AJ, KN), pp. 136–143.
CASECASE-2018-KacarMU #problem #reduction
Problem Reduction Approaches for Production Planning Using Clearing Functions (NBK, LM, RU), pp. 931–938.
CASECASE-2018-KangYJ #analysis #performance #realtime
Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
CASECASE-2018-KuoC #algorithm #capacity #industrial #scheduling #search-based
Using Auxiliary Capacity Planning Strategy Genetic Algorithm for TFT-LCD photolithography scheduling to empower Industry 3.5 (HAK, CFC0), pp. 920–925.
CASECASE-2018-LowO #hybrid #implementation #predict #realtime
Real-time Implementation of Nonlinear Model Predictive Control for Mechatronic Systems Using a Hybrid Model (SL, DO), pp. 164–167.
CASECASE-2018-RibeiroRPS #approach #architecture #design
An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
CASECASE-2018-ShimasakiOJTIY #image #pattern matching #pattern recognition #recognition
HFR-video-based Image Pattern Recognition Using Pixel-level Temporal Frequency Response Matching (KS, TO, MJ, TT, II, KY), pp. 451–456.
CASECASE-2018-SpenrathP #heuristic #network #random
Using Neural Networks for Heuristic Grasp Planning in Random Bin Picking (FS, AP), pp. 258–263.
CASECASE-2018-StarkGDBG #integration
Cloud-based integration of robot engineering data using AutomationML (KS, TG, JD, PB, DG), pp. 645–648.
CASECASE-2018-TerzimehicVW #deployment #design
Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems (TT, SV, MW), pp. 881–886.
CASECASE-2018-ToriiH #3d #approximate #estimation #parametricity
Model-less Estimation Method for Robot Grasping Parameters Using 3D Shape Primitive Approximation (TT, MH), pp. 580–585.
CASECASE-2018-WijayasingheSPP #adaptation #algorithm #interface #search-based
Adaptive Interface for Robot Teleoperation using a Genetic Algorithm (IBW, MNS, SP, DOP, SC), pp. 50–56.
CASECASE-2018-XuLS0L #realtime #recognition #self
Real-time Shape Recognition of a Deformable Link by Using Self-Organizing Map (SX, GL, DS, LS0, JL), pp. 586–591.
CASECASE-2018-ZhangLFL #integer #linear #programming #sequence
Shortest Legal Firing Sequence of Net Condition/Event Systems Using Integer Linear Programming (JZ, HL, GF, ZL), pp. 1556–1561.
CGOCGO-2018-0001LQDL #android #detection #distributed #logic
Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
ESOPESOP-2018-Matsuda0 #combinator #lens #named #programming
HOBiT: Programming Lenses Without Using Lens Combinators (KM, MW0), pp. 31–59.
FASEFASE-2018-Dimovski #model checking
Abstract Family-Based Model Checking Using Modal Featured Transition Systems: Preservation of CTL* (ASD), pp. 301–318.
FASEFASE-2018-KatirtzisDS #api #clustering
Summarizing Software API Usage Examples Using Clustering Techniques (NK, TD, CAS), pp. 189–206.
FASEFASE-2018-LandsbergSK #fault #locality #optimisation #source code #specification
Optimising Spectrum Based Fault Localisation for Single Fault Programs Using Specifications (DL, YS, DK), pp. 246–263.
FASEFASE-2018-ParkSR #analysis #framework #web
EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
CAVCAV-2018-KongBH #approximate #set
Reachable Set Over-Approximation for Nonlinear Systems Using Piecewise Barrier Tubes (HK, EB, TAH), pp. 449–467.
CAVCAV-2018-BouajjaniEMT #abstraction #reasoning #reduction #source code
Reasoning About TSO Programs Using Reduction and Abstraction (AB, CE, SOM, ST), pp. 336–353.
CAVCAV-2018-NiemetzPRBT #quantifier
Solving Quantified Bit-Vectors Using Invertibility Conditions (AN, MP, AR, CWB, CT), pp. 236–255.
ICSTICST-2018-MahajanAMH #automation #clustering #search-based #similarity #web
Automated Repair of Internationalization Presentation Failures in Web Pages Using Style Similarity Clustering and Search-Based Techniques (SM, AA, PM, WGJH), pp. 215–226.
ICSTICST-2018-PradhanW00L #mining #multi #named #testing
REMAP: Using Rule Mining and Multi-objective Search for Dynamic Test Case Prioritization (DP, SW0, SA0, TY0, ML), pp. 46–57.
ICSTICST-2018-Rajaram #fault #taxonomy #testing
Taxonomy Based Testing Using SW91, a Medical Device Software Defect Taxonomy (HKR), pp. 422–423.
IJCARIJCAR-2018-KazakovS
Enumerating Justifications Using Resolution (YK, PS), pp. 609–626.
IJCARIJCAR-2018-ZeljicBWR #approximate #float
Exploring Approximations for Floating-Point Arithmetic Using UppSAT (AZ, PB, CMW, PR), pp. 246–262.
TAPTAP-2018-HerdaTB #data flow #dependence #graph #testing #verification
Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties (MH, SST, BB), pp. 83–102.
TAPTAP-2018-VorobyovKS #c #case study #detection #experience #runtime #security #verification
Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
VMCAIVMCAI-2018-KranzS #analysis #bytecode #composition #on-demand
Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
ECSAECSA-2017-FilhoRAB #architecture #consistency #design #exception
Preventing Erosion in Exception Handling Design Using Static-Architecture Conformance Checking (JLMF, LSR, RMCA, RB), pp. 67–83.
ICSAICSA-2017-GesvindrBG #as a service #design #evaluation #prototype #quality
Quality Evaluation of PaaS Cloud Application Design Using Generated Prototypes (DG, BB, OG), pp. 31–40.
ICSAICSA-2017-Yasaweerasinghelage #architecture #latency #modelling #predict #simulation
Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation (RY, MS, IW), pp. 253–256.
JCDLJCDL-2017-AlamKWN #re-engineering
Client-Side Reconstruction of Composite Mementos Using ServiceWorker (SA, MK, MCW, MLN), pp. 237–240.
JCDLJCDL-2017-CastroCWPF #framework #platform #semistructured data
Classifying Short Unstructured Data Using the Apache Spark Platform (EPSC, SC, EW, DAP, EAF), pp. 129–138.
JCDLJCDL-2017-ChironDCVM #fault #library #towards
Impact of OCR Errors on the Use of Digital Libraries: Towards a Better Access to Information (GC, AD, MC, MV, JPM), pp. 249–252.
JCDLJCDL-2017-GippBMB #feedback #named #overview
CryptSubmit: Introducing Securely Timestamped Manuscript Submission and Peer Review Feedback Using the Blockchain (BG, CB, NM, JB), pp. 273–276.
JCDLJCDL-2017-HassanAH #identification #information management
Identifying Important Citations Using Contextual Information from Full Text (SUH, AA, PH), pp. 41–48.
JCDLJCDL-2017-KleinS
Discovering Scholarly Orphans Using ORCID (MK, HVdS), pp. 189–198.
JCDLJCDL-2017-KocherS #clustering
Author Clustering Using SPATIUM (MK, JS), pp. 265–268.
JCDLJCDL-2017-YangHHOZKG #identification #learning #library
Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
CSEETCSEET-2017-IacobF #education #requirements
Using Extreme Characters to Teach Requirements Engineering (CI, SF), pp. 107–111.
CSEETCSEET-2017-PintoFSG #open source #perspective
Training Software Engineers Using Open-Source Software: The Professors' Perspective (GHLP, FFF, IS, MAG), pp. 117–121.
CSEETCSEET-2017-PortelaVOS #case study #experience #industrial #re-engineering
The Use of Industry Training Strategies in a Software Engineering Course: An Experience Report (CSP, AV, SRBO, MRdAS), pp. 29–36.
EDMEDM-2017-AndresBSGSC #framework #replication #scalability
Studying MOOC Completion at Scale Using the MOOC Replication Framework (JMLA, RSB, GS, DG, CAS, SAC).
EDMEDM-2017-GrawemeyerWSHMP #graph #learning #modelling #student
Using Graph-based Modelling to explore changes in students' affective states during exploratory learning tasks (BG, AW, SGS, WH, MM, AP).
EDMEDM-2017-HongB #learning #predict
A Prediction and Early Alert Model Using Learning Management System Data and Grounded in Learning Science Theory (WJH, MLB).
EDMEDM-2017-LiuL #student
Exploring the Relationship Between Student Pre-knowledge and Engagement in MOOC Class Using Polytomous IRT (JL, HL).
EDMEDM-2017-MadaioLCO #mining #predict
Using Temporal Association Rule Mining to Predict Dyadic Rapport in Peer Tutoring (MAM, RL, JC, AO).
EDMEDM-2017-McBride #simulation #student
Student Use of Inquiry Simulations in Middle School Science (EM).
EDMEDM-2017-McBrideVL #simulation #student
Student Use of Scaffolded Inquiry Simulations in Middle School Science (EM, JMV, MCL).
EDMEDM-2017-MichalenkoLB #feedback #memory management #network #personalisation
Personalized Feedback for Open-Response Mathematical Questions using Long Short-Term Memory Networks (JJM, ASL, RGB).
EDMEDM-2017-MiF #adaptation #recommendation
Adaptive Sequential Recommendation for Discussion Forums on MOOCs using Context Trees (FM, BF).
EDMEDM-2017-ParedesHH #behaviour #comprehension #programming #student
Understanding Student's Reviewing and Reflection Behaviors Using Web-based Programming Grading Assistant (YVMP, PKH, SIHH).
EDMEDM-2017-PatikornSHBZ #detection #multi
Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
EDMEDM-2017-PokrajacSYH #markov #modelling
Modeling Dormitory Occupancy Using Markov Chains (DDP, KS, DY, TH).
EDMEDM-2017-RihakP #education #performance #similarity
Measuring Similarity of Educational Items Using Data on Learners' Performance (JR, RP).
EDMEDM-2017-ShenC #clustering #student
Clustering Student Sequential Trajectories Using Dynamic Time Wrapping (SS, MC).
EDMEDM-2017-ShiPG #analysis #learning #performance
Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
EDMEDM-2017-WanDGP #predict
Dropout Prediction in MOOCs using Learners' Study Habits Features (HW, JD, XG, DP).
EDMEDM-2017-WangSLP #learning #programming #student
Learning to Represent Student Knowledge on Programming Exercises Using Deep Learning (LW, AS, LL, CP).
EDMEDM-2017-YasudaNKKH #automation #network
Automatic Scoring Method for Descriptive Test Using Recurrent Neural Network (KY, IN, HK, HK, MH).
ICPCICPC-2017-AlexandruPG #behaviour #parsing
Replicating parser behavior using neural machine translation (CVA, SP, HCG), pp. 316–319.
ICPCICPC-2017-HatanoM #compilation #industrial
Removing code clones from industrial systems using compiler directives (TH, AM), pp. 336–345.
ICSMEICSME-2017-ChaparroFM #behaviour #debugging #locality #query
Using Observed Behavior to Reformulate Queries during Text Retrieval-based Bug Localization (OC, JMF, AM), pp. 376–387.
ICSMEICSME-2017-DeshmukhMPSD #debugging #learning #retrieval #towards
Towards Accurate Duplicate Bug Retrieval Using Deep Learning Techniques (JD, KMA, SP, SS, ND), pp. 115–124.
ICSMEICSME-2017-Gupta #maintenance #mining #predict #process
Improving Software Maintenance Using Process Mining and Predictive Analytics (MG0), pp. 681–686.
ICSMEICSME-2017-HanLXLF #learning #predict
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description (ZH, XL0, ZX, HL, ZF0), pp. 125–136.
ICSMEICSME-2017-TerdchanakulHPM #classification #debugging #n-gram
Bug or Not? Bug Report Classification Using N-Gram IDF (PT, HH, PP, KM), pp. 534–538.
MSRMSR-2017-CartaxoPRKSSS
Using Q&A websites as a method for assessing systematic reviews (BC, GP0, DMR, FK, RESS, FQBdS, SS), pp. 238–242.
MSRMSR-2017-NiL #classification #effectiveness #predict
Cost-effective build outcome prediction using cascaded classifiers (AN, ML0), pp. 455–458.
MSRMSR-2017-RahmanRK #code review #developer #experience #overview #predict
Predicting usefulness of code review comments using textual features and developer experience (MMR0, CKR, RGK), pp. 215–226.
MSRMSR-2017-RajbahadurWKH #classification #fault #modelling
The impact of using regression models to build defect classifiers (GKR, SW0, YK, AEH), pp. 135–145.
SANERSANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #pointer
Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
SANERSANER-2017-LaverdiereM #modelling #security
Computing counter-examples for privilege protection losses using security models (MAL, EM), pp. 240–249.
SANERSANER-2017-LiuLNB #fault #locality #modelling #predict #search-based #testing
Improving fault localization for Simulink models using search-based testing and prediction models (BL, L, SN, LCB), pp. 359–370.
SANERSANER-2017-TangL #approach #mining #named #novel #probability
StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
SCAMSCAM-2017-0008SMOBL #analysis #consistency #identifier
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
IFM-2017-AronisFS #model checking #testing #verification
Testing and Verifying Chain Repair Methods for Corfu Using Stateless Model Checking (SA, SLF, KS), pp. 227–242.
IFM-2017-FerreiraJMB #authentication #case study #coq #linux #quality
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules (JFF, SAJ, AM, PJB), pp. 407–421.
IFM-2017-KovalovLGL #network #smt
Task-Node Mapping in an Arbitrary Computer Network Using SMT Solver (AK, EL, AG, DL), pp. 177–191.
SEFMSEFM-2017-TomascoN0TP #abstraction #design #memory management #modelling
Using Shared Memory Abstractions to Design Eager Sequentializations for Weak Memory Models (ET, TLN, BF0, SLT, GP), pp. 185–202.
HaskellHaskell-2017-WiegleyD #coq #haskell #performance
Using Coq to write fast and correct Haskell (JW, BD), pp. 52–62.
ICFP-2017-AuerbachHMSS #case study #compilation #coq #experience #prototype #query
Prototyping a query compiler using Coq (experience report) (JSA, MH, LM, AS, JS), p. 15.
AIIDEAIIDE-2017-BunianCCE #behaviour #difference #game studies #modelling
Modeling Individual Differences in Game Behavior Using HMM (SB, AC, RCC, MSEN), pp. 158–164.
AIIDEAIIDE-2017-FarrellW #interactive
Influencing User Choices in Interactive Narratives Using Indexter's Pairwise Event Salience Hypothesis (RF, SGW), pp. 37–42.
AIIDEAIIDE-2017-FarrellW17a #semantics
Causal Link Semantics for Narrative Planning Using Numeric Fluents (RF, SGW), pp. 193–199.
AIIDEAIIDE-2017-ViljanenAHP
A/B-Test of Retention and Monetization Using the Cox Model (MV, AA, JH, TP), pp. 248–254.
CHI-PLAYCHI-PLAY-2017-BoweyM #game studies #prototype
Those are not the Stories you are Looking For: Using Text Prototypes to Evaluate Game Narratives Early (JTB, RLM), pp. 265–276.
CHI-PLAYCHI-PLAY-2017-Peddycord-LiuCK #game studies #question #student #what
Using Serious Game Analytics to Inform Digital Curricular Sequencing: What Math Objective Should Students Play Next? (ZPL, CC, SK, TB, CFL, TR), pp. 195–204.
CoGCIG-2017-ApeldoornV #game studies #knowledge base
Measuring strategic depth in games using hierarchical knowledge bases (DA, VV), pp. 9–16.
CoGCIG-2017-BaldwinDFH #design pattern #game studies #generative
Mixed-initiative procedural generation of dungeons using game design patterns (AB0, SD, JMF, JH), pp. 25–32.
CoGCIG-2017-BrownA #game studies #multi
Using multiple worlds for multiple agent roles in games (JAB, DA), pp. 37–44.
CoGCIG-2017-BurnsT #detection #game studies
Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
CoGCIG-2017-JiangHT #generative
Procedural generation of angry birds fun levels using pattern-struct and preset-model (YJ0, TH, RT), pp. 154–161.
CoGCIG-2017-JustesenR #learning
Learning macromanagement in starcraft from replays using deep learning (NJ, SR), pp. 162–169.
CoGCIG-2017-MinK #game studies #learning #visual notation
Learning to play visual doom using model-free episodic control (BJM, KJK), pp. 223–225.
CoGCIG-2017-OonishiI #game studies #learning
Improving generalization ability in a puzzle game using reinforcement learning (HO, HI), pp. 232–239.
CoGCIG-2017-PhucNK #behaviour #learning #statistics
Learning human-like behaviors using neuroevolution with statistical penalties (LHP, KN, KI), pp. 207–214.
CoGCIG-2017-SilvaVT #game studies #monte carlo
Using Monte Carlo tree search and google maps to improve game balancing in location-based games (LFMS, WV, FT), pp. 215–222.
CoGCIG-2017-SnodgrassO #generative #multi
Procedural level generation using multi-layer level representations with MdMCs (SS, SO), pp. 280–287.
FDGFDG-2017-Abuzuraiq #clustering #constraints #generative #graph #morphism #on the
On using graph partitioning with isomorphism constraint in procedural content generation (AMA), p. 10.
FDGFDG-2017-AllartLPGN #analysis #game studies #motivation #video
Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
FDGFDG-2017-CampbellV
Exploration in NetHack using occupancy maps (JC, CV), p. 4.
FDGFDG-2017-CleghernLOR #modelling #predict
Predicting future states in DotA 2 using value-split models of time series attribute data (ZC, SL, OYÖ, DLR), p. 10.
FDGFDG-2017-Mawhorter #case study #generative #performance #product line #representation
Efficiency, realism, and representation in generated content: a case study using family tree generation (PAM), p. 4.
FDGFDG-2017-MelcerI17a #challenge #collaboration #education #game studies #programming
Embodiment, collaboration, and challenge in educational programming games: exploring use of tangibles and mouse (EFM, KI), p. 6.
FDGFDG-2017-MurrayMW #graph #interactive
Proposal for analyzing player emotions in an interactive narrative using story intention graphs (JTM, MM, NWF), p. 4.
FDGFDG-2017-SeguraIBW #design
Design, appropriation, and use of technology in larps (EMS, KI, JB, AW), p. 4.
CoGVS-Games-2017-FerkovaZUM #database #image #re-engineering
Single image reconstruction of human faces using database of depth images (ZF, MZ, PU, PM), pp. 109–116.
CoGVS-Games-2017-KontadakisCPM #3d #low cost
Gamified 3D orthopaedic rehabilitation using low cost and portable inertial sensors (GK, DC, DP, KM), pp. 165–168.
CIKMCIKM-2017-BouadjenekVZ #biology #learning #sequence
Learning Biological Sequence Types Using the Literature (MRB, KV, JZ), pp. 1991–1994.
CIKMCIKM-2017-BrayteeLCK #correlation #feature model #multi
Multi-Label Feature Selection using Correlation Information (AB, WL0, DRC, PJK), pp. 1649–1656.
CIKMCIKM-2017-ChavaryEL #mining #network
Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining (EAC, SME, CL), pp. 2015–2018.
CIKMCIKM-2017-DasMBS #word
Estimating Event Focus Time Using Neural Word Embeddings (SD, AM, KB, VS), pp. 2039–2042.
CIKMCIKM-2017-DhakadDBDKM #named #process
SOPER: Discovering the Influence of Fashion and the Many Faces of User from Session Logs using Stick Breaking Process (LD, MKD, CB, SD, MK, VM), pp. 1609–1618.
CIKMCIKM-2017-DingLHM #fault tolerance #performance #recommendation
Efficient Fault-Tolerant Group Recommendation Using alpha-beta-core (DD, HL, ZH0, NM), pp. 2047–2050.
CIKMCIKM-2017-GarciaM #energy #network
Inferring Appliance Energy Usage from Smart Meters using Fully Convolutional Encoder Decoder Networks (FCCG, EQBM), pp. 2075–2078.
CIKMCIKM-2017-GaurBB #graph #query
Tracking the Impact of Fact Deletions on Knowledge Graph Queries using Provenance Polynomials (GG, SJB, AB0), pp. 2079–2082.
CIKMCIKM-2017-GuptaLHA #induction #sequence #taxonomy
Taxonomy Induction Using Hypernym Subsequences (AG, RL, HH, KA), pp. 1329–1338.
CIKMCIKM-2017-HalderKS #concurrent #health #recommendation #thread #topic
Health Forum Thread Recommendation Using an Interest Aware Topic Model (KH, MYK, KS), pp. 1589–1598.
CIKMCIKM-2017-KhandpurJJ0LR #crowdsourcing #detection #social #social media
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
CIKMCIKM-2017-KhoaAW #analysis #framework #incremental #maintenance
Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
CIKMCIKM-2017-KimJY #multi #online
Construction of a National Scale ENF Map using Online Multimedia Data (HK, YBJ, JWY), pp. 19–28.
CIKMCIKM-2017-KwonKS #recognition #robust
A Robust Named-Entity Recognition System Using Syllable Bigram Embedding with Eojeol Prefix Information (SK, YK, JS), pp. 2139–2142.
CIKMCIKM-2017-MehrotraY #learning #query
Task Embeddings: Learning Query Embeddings using Task Context (RM, EY), pp. 2199–2202.
CIKMCIKM-2017-Ni0ZYM #fine-grained #learning #metric #similarity
Fine-grained Patient Similarity Measuring using Deep Metric Learning (JN, JL0, CZ, DY, ZM), pp. 1189–1198.
CIKMCIKM-2017-ParmarBBK #online #process
Forecasting Ad-Impressions on Online Retail Websites using Non-homogeneous Hawkes Processes (KP, SB, SB, SK), pp. 1089–1098.
CIKMCIKM-2017-ProskurniaM0AC #detection #documentation #performance #topic
Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
CIKMCIKM-2017-TengLW #detection #learning #multi #network
Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
CIKMCIKM-2017-VellosoD #approach #web
Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
CIKMCIKM-2017-WangCL #graph #twitter
Using Knowledge Graphs to Explain Entity Co-occurrence in Twitter (YW, MJC, YFL), pp. 2351–2354.
CIKMCIKM-2017-YeHHCLQS #classification
Nationality Classification Using Name Embeddings (JY, SH, YH, BC, ML, HQ, SS), pp. 1897–1906.
CIKMCIKM-2017-ZhangH #ambiguity #graph #network
Name Disambiguation in Anonymized Graphs using Network Embedding (BZ, MAH), pp. 1239–1248.
CIKMCIKM-2017-ZhangJT #retrieval
Temporal Analog Retrieval using Transformation over Dual Hierarchical Structures (YZ, AJ, KT), pp. 717–726.
CIKMCIKM-2017-ZhiSLZ0 #database #named #realtime #verification #web
ClaimVerif: A Real-time Claim Verification System Using the Web and Fact Databases (SZ, YS, JL, CZ0, JH0), pp. 2555–2558.
ECIRECIR-2017-AletrasM #image #network #topic
Labeling Topics with Images Using a Neural Network (NA, AM), pp. 500–505.
ECIRECIR-2017-ArguelloA0 #performance #predict #query
Using Query Performance Predictors to Reduce Spoken Queries (JA, SA, FD0), pp. 27–39.
ECIRECIR-2017-AyadiKHDJ #image #learning
Learning to Re-rank Medical Images Using a Bayesian Network-Based Thesaurus (HA, MTK, JXH, MD, MBJ), pp. 160–172.
ECIRECIR-2017-BaruaP #classification #query
Named Entity Classification Using Search Engine's Query Suggestions (JB, DP), pp. 612–618.
ECIRECIR-2017-J0V #twitter
Improving Tweet Representations Using Temporal and User Context (GJ, MG0, VV), pp. 575–581.
ECIRECIR-2017-McDonaldMO #classification #semantics #word
Enhancing Sensitivity Classification with Semantic Features Using Word Embeddings (GM, CM, IO), pp. 450–463.
ECIRECIR-2017-ParamitaCG #similarity #wiki
Using Section Headings to Compute Cross-Lingual Similarity of Wikipedia Articles (MLP, PDC, RJG), pp. 633–639.
ICMLICML-2017-BernsteinMSSHM #learning #modelling #visual notation
Differentially Private Learning of Undirected Graphical Models Using Collective Graphical Models (GB, RM, TS, DS, MH, GM), pp. 478–487.
ICMLICML-2017-BoraJPD #generative #modelling
Compressed Sensing using Generative Models (AB, AJ, EP, AGD), pp. 537–546.
ICMLICML-2017-ChenKB #equation #identification #linear #modelling #testing
Identification and Model Testing in Linear Structural Equation Models using Auxiliary Variables (BC, DK, EB), pp. 757–766.
ICMLICML-2017-ChouMS #learning #policy #probability
Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
ICMLICML-2017-EcksteinGK #generative
Rule-Enhanced Penalized Regression by Column Generation using Rectangular Maximum Agreement (JE, NG, AK), pp. 1059–1067.
ICMLICML-2017-JaderbergCOVGSK #interface
Decoupled Neural Interfaces using Synthetic Gradients (MJ, WMC, SO, OV, AG, DS, KK), pp. 1627–1635.
ICMLICML-2017-Kallus #clustering #personalisation #recursion
Recursive Partitioning for Personalization using Observational Data (NK), pp. 1789–1798.
ICMLICML-2017-MhammediHRB #network #orthogonal #performance
Efficient Orthogonal Parametrisation of Recurrent Neural Networks Using Householder Reflections (ZM, ADH, AR, JB0), pp. 2401–2409.
ICMLICML-2017-MollaysaSK #modelling
Regularising Non-linear Models Using Feature Side-information (AM, PS, AK), pp. 2508–2517.
ICMLICML-2017-NguyenLST #machine learning #named #novel #probability #problem #recursion
SARAH: A Novel Method for Machine Learning Problems Using Stochastic Recursive Gradient (LMN, JL, KS, MT), pp. 2613–2621.
ICMLICML-2017-SchlegelPCW #adaptation #kernel #online
Adapting Kernel Representations Online Using Submodular Maximization (MS, YP, JC, MW), pp. 3037–3046.
ICMLICML-2017-Villacampa-Calvo #classification #multi #process #scalability
Scalable Multi-Class Gaussian Process Classification using Expectation Propagation (CVC, DHL), pp. 3550–3559.
ICMLICML-2017-YangHSB #modelling
Improved Variational Autoencoders for Text Modeling using Dilated Convolutions (ZY, ZH, RS, TBK), pp. 3881–3890.
KDDKDD-2017-AgarwalBSJ #effectiveness #evaluation #feedback #multi
Effective Evaluation Using Logged Bandit Feedback from Multiple Loggers (AA, SB0, TS, TJ), pp. 687–696.
KDDKDD-2017-AlbertKG #identification #network #scalability
Using Convolutional Networks and Satellite Imagery to Identify Patterns in Urban Environments at a Large Scale (AA, JK, MCG), pp. 1357–1366.
KDDKDD-2017-ChamberlainCLPD #predict
Customer Lifetime Value Prediction Using Embeddings (BPC, ÂC, CHBL, RP, MPD), pp. 1753–1762.
KDDKDD-2017-EmraniMX #learning #multi
Prognosis and Diagnosis of Parkinson's Disease Using Multi-Task Learning (SE, AM, WX), pp. 1457–1466.
KDDKDD-2017-FoxAJPW
Contextual Motifs: Increasing the Utility of Motifs using Contextual Data (IF, LA, MJ, RPB, JW), pp. 155–164.
KDDKDD-2017-LiHG #concept #enterprise #spreadsheet
Discovering Enterprise Concepts Using Spreadsheet Tables (KL, YH, KG), pp. 1873–1882.
KDDKDD-2017-MaurusP #detection
Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
KDDKDD-2017-MottiniA #network #pointer #predict
Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
KDDKDD-2017-WoodsAMM #feedback #modelling #predict
Formative Essay Feedback Using Predictive Scoring Models (BW, DA, SM, EM), pp. 2071–2080.
ICMTICMT-2017-BurguenoHVG #modelling #testing
Testing Transformation Models Using Classifying Terms (LB, FH, AV, MG), pp. 69–85.
ICMTICMT-2017-GerkingSB #imperative
Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities (CG, DS, IB), pp. 19–34.
OOPSLAOOPSLA-2017-MazinanianKTD #comprehension #java
Understanding the use of lambda expressions in Java (DM, AK, NT, DD), p. 31.
OOPSLAOOPSLA-2017-WangDS #automaton #finite #synthesis
Synthesis of data completion scripts using finite tree automata (XW0, ID, RS), p. 26.
AdaEuropeAdaEurope-2017-JeongYB #transaction
Lock Elision for Protected Objects Using Intel Transactional Synchronization Extensions (SJ, SY, BB), pp. 121–136.
PADLPADL-2017-MantadelisR #logic #probability
Using Iterative Deepening for Probabilistic Logic Inference (TM, RR0), pp. 198–213.
PEPMPEPM-2017-HengleinR #dynamic analysis #parsing expression grammar
PEG parsing in less space using progressive tabling and dynamic analysis (FH, UTR), pp. 35–46.
PEPMPEPM-2017-WolffH #typescript
Refining types using type guards in TypeScript (IGdW, JH), pp. 111–122.
PLDIPLDI-2017-HuD #automation #transducer
Automatic program inversion using symbolic transducers (QH, LD), pp. 376–389.
PLDIPLDI-2017-PetrashkoLO #compilation #composition #named #performance #program transformation
Miniphases: compilation using modular and efficient tree transformations (DP, OL, MO), pp. 201–216.
POPLPOPL-2017-SrikanthSH #complexity #theorem #verification
Complexity verification using guided theorem enumeration (AS, BS, WRH), pp. 639–652.
QAPLQAPL-2017-LidmanS #fuzzy #logic #program analysis
Bridging Static and Dynamic Program Analysis using Fuzzy Logic (JL, JS), pp. 111–126.
SASSAS-2017-OuadjaoutM #communication #markov #protocol #static analysis
Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
ASEASE-2017-Abdelrasoul #order #random #scheduling
Promoting secondary orders of event pairs in randomized scheduling using a randomized stride (MA), pp. 741–752.
ASEASE-2017-JiangAM #automation #commit #generative
Automatically generating commit messages from diffs using neural machine translation (SJ, AA, CM), pp. 135–146.
ASEASE-2017-KrugerNRAMBGGWD #developer #encryption #named
CogniCrypt: supporting developers in using cryptography (SK, SN, MR, KA0, MM, EB, FG, FG0, CW, DD, RK), pp. 931–936.
ASEASE-2017-LinZZX #concept #retrieval #source code
Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
ASEASE-2017-NguyenDV #invariant #named
SymInfer: inferring program invariants using symbolic states (TN, MBD, WV), pp. 804–814.
ASEASE-2017-RahmanR #concept #documentation #query
Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
ASEASE-2017-Sultana #metric #predict #towards
Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
ASEASE-2017-SunCWB
Improving missing issue-commit link recovery using positive and unlabeled data (YS, CC, QW0, BWB), pp. 147–152.
ESEC-FSEESEC-FSE-2017-Abdalkareem #developer #perspective
Reasons and drawbacks of using trivial npm packages: the developers' perspective (RA), pp. 1062–1064.
ESEC-FSEESEC-FSE-2017-LabuschagneIH #case study #cost analysis #integration #java #testing
Measuring the cost of regression testing in practice: a study of Java projects using continuous integration (AL, LI, RH), pp. 821–830.
ESEC-FSEESEC-FSE-2017-MaggioPFH #automation #multi
Automated control of multiple software goals using multiple actuators (MM, AVP, AF, HH), pp. 373–384.
ESEC-FSEESEC-FSE-2017-NairMSA
Using bad learners to find good configurations (VN, TM, NS, SA), pp. 257–267.
ESEC-FSEESEC-FSE-2017-Oliveira #architecture #co-evolution #dependence #fine-grained #named #refactoring
DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies (MCdO0), pp. 1018–1021.
ESEC-FSEESEC-FSE-2017-Schramm #automation #heuristic #performance #program repair
Improving performance of automatic program repair using learned heuristics (LS), pp. 1071–1073.
ESEC-FSEESEC-FSE-2017-Wang #adaptation #nondeterminism #re-engineering #search-based #self
Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems (LW), pp. 1014–1017.
ESEC-FSEESEC-FSE-2017-YiAKTR #automation #program repair #programming
A feasibility study of using automated program repair for introductory programming assignments (JY, UZA, AK, SHT, AR), pp. 740–751.
ICSE-2017-0004CC #learning #semantics #traceability
Semantically enhanced software traceability using deep learning techniques (JG0, JC, JCH), pp. 3–14.
GPCEGPCE-2017-GrebeYG #compilation #domain-specific language #haskell
Rewriting a shallow DSL using a GHC compiler extension (MG, DY, AG), pp. 246–258.
SLESLE-2017-BrambillaCIM #crowdsourcing #domain-specific language
Better call the crowd: using crowdsourcing to shape the notation of domain-specific languages (MB, JC, JLCI, AM), pp. 129–138.
ASPLOSASPLOS-2017-GeCJ #control flow #named
GRIFFIN: Guarding Control Flows Using Intel Processor Trace (XG, WC, TJ), pp. 585–598.
ASPLOSASPLOS-2017-RenLDQWLQY #named #network #probability
SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing (AR, ZL0, CD, QQ, YW, JL0, XQ, BY0), pp. 405–418.
CASECASE-2017-0013YG #graph #image #optimisation
Accurate image mosaicing for bridge deck using graph optimization with GPS data (FL0, JY, NG), pp. 1090–1095.
CASECASE-2017-CarliD #distributed #grid #monitoring #multi #smarttech
Using the distributed proximal alternating direction method of multipliers for smart grid monitoring (RC, MD), pp. 418–423.
CASECASE-2017-CarliD17a #distributed #energy #programming #scalability
A decentralized control strategy for energy retrofit planning of large-scale street lighting systems using dynamic programming (RC, MD), pp. 1196–1200.
CASECASE-2017-ChenZ #automation #detection #multi
An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
CASECASE-2017-DuHZL #automation #petri net #robust
Robust control of automated manufacturing systems with complex structures using Petri Nets (ND, HH, YZ0, YL0), pp. 364–369.
CASECASE-2017-HuangMY #algorithm #difference #evolution #performance #throughput
Forecasting of throughput performance using an ARMA model with improved differential evolution algorithm (JTH, YM, YY), pp. 376–381.
CASECASE-2017-InuiKU #gpu #parallel #performance
Fast extraction of cutter engagement features by using the parallel processing function of a GPU (MI, MK, NU), pp. 668–673.
CASECASE-2017-KeL #mobile #predict #robust #visual notation
Visual servoing of constrained differential-drive mobile robots using robust tube-based predictive control (FK, ZL0), pp. 1073–1078.
CASECASE-2017-KongN #approach #fault #predict
A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
CASECASE-2017-LeeJFBGBL #analysis #modelling #process #simulation
Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
CASECASE-2017-LiangMLLG #automation #industrial #learning
Using dVRK teleoperation to facilitate deep learning of automation tasks for an industrial robot (JL, JM, ML, PL, KG), pp. 1–8.
CASECASE-2017-LiLHTCLW #analysis
The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
CASECASE-2017-OhKKSC
Calibration of 6 axis force/torque sensor by using deep-learning method (HSO, GK, UK, JKS, HRC), pp. 1316–1317.
CASECASE-2017-QinLG #data analysis #energy #internet
Data analytics for energy consumption of digital manufacturing systems using Internet of Things method (JQ, YL, RIG), pp. 482–487.
CASECASE-2017-SugimotoMMM #3d #modelling
A 3D block printer using toy bricks for various models (CS, YM, TM, SM), pp. 958–963.
CASECASE-2017-SunLYLL #simulation #smarttech
Muscle control of fore-aft and vertical body center of mass accelerations of human slip recovery gait: A simulation study using wearable sensor shoes (WS, GL, JY, QL, TL0), pp. 1408–1413.
CASECASE-2017-SunLZJ #framework #functional #learning
Exploring functional variant using a deep learning framework (TS, ZL, XMZ, RJ), pp. 98–99.
CASECASE-2017-ToneS
A ferrofluid-based robotic sheet for liquid manipulation by using vibration control (TT, KS), pp. 776–781.
CASECASE-2017-WangOLC #big data #problem #self
Capacitated competitive facility location problem of self-collection lockers by using public big data (YW0, TO, LHL, EPC), p. 1344.
CASECASE-2017-WangW #approach #constraints #higher-order #programming
Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
CASECASE-2017-WangZLHSMGY #online
Smart control of indoor thermal environment based on online learned thermal comfort model using infrared thermal imaging (FW, BZ, RL, DH, ZS, SM, ZG, WY), pp. 924–925.
CASECASE-2017-Xiao #constraints
Selecting the best system using transient means with sequential sampling constraints (HX), p. 1052.
CASECASE-2017-ZhangJ17a #estimation
An occupancy distribution estimation method using the surveillance cameras in buildings (CZ, QSJ), pp. 894–899.
CCCC-2017-ShirakoHS #gpu #parallel
Optimized two-level parallelization for GPU accelerators using the polyhedral model (JS, AH, VS), pp. 22–33.
CGOCGO-2017-SenguptaCBK #bound #hardware #memory management #named #transaction
Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
ESOPESOP-2017-0001P #source code #syntax
Programs Using Syntax with First-Class Binders (FF0, BP), pp. 504–529.
ESOPESOP-2017-KhyzhaDGP #partial order #proving
Proving Linearizability Using Partial Orders (AK, MD, AG, MJP), pp. 639–667.
ESOPESOP-2017-KopS #complexity #higher-order #nondeterminism #power of #programming
The Power of Non-determinism in Higher-Order Implicit Complexity - Characterising Complexity Classes Using Non-deterministic Cons-Free Programming (CK, JGS), pp. 668–695.
FASEFASE-2017-LeblebiciAS #consistency #graph grammar #linear #optimisation
Inter-model Consistency Checking Using Triple Graph Grammars and Linear Optimization Techniques (EL, AA, AS), pp. 191–207.
CAVCAV-2017-Vafeiadis #consistency #logic #memory management #verification
Program Verification Under Weak Memory Consistency Using Separation Logic (VV), pp. 30–46.
CAVCAV-2017-BouajjaniEEM #proving #simulation
Proving Linearizability Using Forward Simulations (AB, ME, CE, SOM), pp. 542–563.
CAVCAV-2017-ReynoldsWBBLT #scalability #string
Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification (AR, MW, CWB, DB, TL, CT), pp. 453–474.
ICSTICST-2017-ChanWSPS #analysis #concurrent #fault #invariant #multi #named #source code #thread
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
ICSTICST-2017-ConverseOK #execution #generative #semantics #symbolic computation #testing
Non-Semantics-Preserving Transformations for Higher-Coverage Test Generation Using Symbolic Execution (HC, OO, SK), pp. 241–252.
ICSTICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #safety
Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
ICSTICST-2017-DiasFFLSSV #concurrent #contract #source code #verification
Verifying Concurrent Programs Using Contracts (RJD, CF0, JF, JML, AS, DGS, TV), pp. 196–206.
ICSTICST-2017-LinWC #semantics #similarity #testing #web
Using Semantic Similarity in Crawling-Based Web Application Testing (JWL, FW, PC), pp. 138–148.
ICSTICST-2017-LuckowKP #analysis #complexity
Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
ICSTICST-2017-SunRJB #android #named #runtime #verification #weaving
ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving (HS, AR, OJ, WB), pp. 532–539.
ICSTICST-2017-XuLC #concurrent #data type #debugging #testing
Using Delta Debugging to Minimize Stress Tests for Concurrent Data Structures (JX, YL, RHC), pp. 35–46.
ICTSSICTSS-2017-HusterSRKR #robust #testing #verification
Using Robustness Testing to Handle Incomplete Verification Results When Combining Verification and Testing Techniques (SH, JS, JR, TK, WR), pp. 54–70.
ICTSSICTSS-2017-SalvaR #integration #security #testing
Using Data Integration for Security Testing (SS, LR), pp. 178–194.
ICTSSICTSS-2017-SimosBDGKLW #combinator #execution #framework #testing
Testing TLS Using Combinatorial Methods and Execution Framework (DES, JB, FD, BG, KK, YL, FW), pp. 162–177.
VMCAIVMCAI-2017-BotbolCG #communication #process #static analysis #transducer
Static Analysis of Communicating Processes Using Symbolic Transducers (VB, EC, TLG), pp. 73–90.
VMCAIVMCAI-2017-FerraraT0K #abstract interpretation #fault
Using Abstract Interpretation to Correct Synchronization Faults (PF, OT, PL0, EK), pp. 187–208.
VMCAIVMCAI-2017-GuW #analysis #float #source code
Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
VMCAIVMCAI-2017-MonatM #abstract interpretation #abstraction #concurrent #precise #relational #source code #thread
Precise Thread-Modular Abstract Interpretation of Concurrent Programs Using Relational Interference Abstractions (RM, AM), pp. 386–404.
VMCAIVMCAI-2017-OzeriPRS #abstract interpretation
Conjunctive Abstract Interpretation Using Paramodulation (OO, OP, NR, MS), pp. 442–461.
CBSECBSE-2016-CrnkovicMMS #architecture #component #cyber-physical #on the
On the Use of Component-Based Principles and Practices for Architecting Cyber-Physical Systems (IC, IM, HM, MS), pp. 23–32.
CBSECBSE-2016-StevaneticZ #architecture #component #experience #metric #modelling
Exploring the Understandability of Components in Architectural Component Models Using Component Level Metrics and Participants' Experience (SS, UZ), pp. 1–6.
ECSAECSA-2016-ErsoyKAS #architecture #clustering #re-engineering
Using Hypergraph Clustering for Software Architecture Reconstruction of Data-Tier Software (EE, KK, MA, HS), pp. 326–333.
QoSAQoSA-2016-LehrigB #as a service #case study #modelling #performance
Using Performance Models for Planning the Redeployment to Infrastructure-as-a-Service Environments: A Case Study (SL, SB0), pp. 11–20.
WICSAWICSA-2016-KazmanCHH #architecture #design #summary #tutorial
Tutorial Summary for Designing Software Architectures Using ADD 3.0 (RK, HC, SH, OH), p. 253.
WICSAWICSA-2016-SobernigZ #architecture #design
Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets (SS, UZ), pp. 61–70.
JCDLJCDL-2016-BornandBS #classification
Routing Memento Requests Using Binary Classifiers (NJB, LB, HVdS), pp. 63–72.
JCDLJCDL-2016-Frick #framework #library #platform #research
The State of Practice and Use of Digital Collections: The Digital Public Library of America as a platform for research (RF), p. 3.
JCDLJCDL-2016-JettNCPD #comparative #library #metadata #ontology #overview
Enhancing Scholarly Use of Digital Libraries: A Comparative Survey and Review of Bibliographic Metadata Ontologies (JJ, TNF, TWC, KRP, JSD), pp. 35–44.
CSEETCSEET-2016-FreitasSM #learning #student
Using an Active Learning Environment to Increase Students' Engagement (SAAdF, WCMPS, GM), pp. 232–236.
CSEETCSEET-2016-GeorgasPM #architecture #learning #runtime #visualisation
Supporting Software Architecture Learning Using Runtime Visualization (JCG, JDP, MJM), pp. 101–110.
CSEETCSEET-2016-LiebelHS #education #industrial #modelling #tool support
Impact of the Use of Industrial Modelling Tools on Modelling Education (GL, RH, JPS), pp. 18–27.
CSEETCSEET-2016-SrinivasanLY #comprehension #diagrams #object-oriented #programming #sequence chart
Enhancing Object-Oriented Programming Comprehension Using Optimized Sequence Diagram (MS, YL, JY), pp. 81–85.
EDMEDM-2016-ChenDP #diagrams #problem
Examining the necessity of problem diagrams using MOOC AB experiments (ZC, ND, DEP), pp. 579–580.
EDMEDM-2016-FouhFHKS #data analysis #data type #topic
Investigating Difficult Topics in a Data Structures Course Using Item Response Theory and Logged Data Analysis (EF, MFF, SH, KHK, CAS), pp. 370–375.
EDMEDM-2016-Kyrilov #automation #feedback #programming #reasoning
Using Case-Based Reasoning to Automatically Generate High-Quality Feedback for Programming Exercises (AK), pp. 669–671.
EDMEDM-2016-LiuDS #data type #data-driven #multi #towards
Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement (RL0, JLD, JCS), pp. 436–441.
EDMEDM-2016-Mojarad #performance #student
Studying Assignment Size and Student Performance Using Propensity Score Matching (SM), pp. 701–702.
EDMEDM-2016-NgHLK #learning #modelling #sequence
Modelling the way: Using action sequence archetypes to differentiate learning pathways from learning outcomes (KHRN, KH, KL, AWHK), pp. 167–174.
EDMEDM-2016-NogaitoYK #automation #case study #similarity #testing
Study on Automatic Scoring of Descriptive Type Tests using Text Similarity Calculations (IN, KY, HK), pp. 616–617.
EDMEDM-2016-Penteado #assessment #data mining #estimation #mining #scalability #semantics
Estimation of prerequisite skills model from large scale assessment data using semantic data mining (BEP), pp. 675–677.
EDMEDM-2016-RaffertyJG #feedback #personalisation
Using Inverse Planning for Personalized Feedback (ANR, RJ, TLG), pp. 472–477.
EDMEDM-2016-RenRJ #modelling #multi #performance #predict
Predicting Performance on MOOC Assessments using Multi-Regression Models (ZR, HR, AJ), pp. 484–489.
EDMEDM-2016-Yee-KingGd #collaboration #learning #metric #online #predict #social #student
Predicting student grades from online, collaborative social learning metrics using K-NN (MYK, AGR, Md), pp. 654–655.
EDMEDM-2016-ZhengKTG #clustering #concept #physics
Soft Clustering of Physics Misconceptions Using a Mixed Membership Model (GZ, SK, YT, AG), pp. 658–659.
ICPCICPC-2016-MetcalfFYF #interactive #parametricity #static analysis
Extracting configuration parameter interactions using static analysis (CAM, FF, TY, JF), pp. 1–4.
ICSMEICSME-2016-AndersonDS #testing
Customized Regression Testing Using Telemetry Usage Patterns (JA, HD, SS), pp. 572–581.
ICSMEICSME-2016-GopinathWHK #fault #machine learning
Repairing Intricate Faults in Code Using Machine Learning and Path Exploration (DG, KW, JH, SK), pp. 453–457.
ICSMEICSME-2016-KargenS #towards
Towards Accurate Binary Correspondence Using Runtime-Observed Values (UK, NS), pp. 438–442.
ICSMEICSME-2016-KhourySH #comprehension #principle
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle (RK, LS, AHL), pp. 478–482.
ICSMEICSME-2016-LevinY #developer #maintenance #predict #process #semantics
Using Temporal and Semantic Developer-Level Information to Predict Maintenance Activity Profiles (SL, AY), pp. 463–467.
ICSMEICSME-2016-NguyenNN #fine-grained #source code #topic
Using Topic Model to Suggest Fine-Grained Source Code Changes (HAN, ATN0, TNN), pp. 200–210.
ICSMEICSME-2016-PalombaZFLO #debugging #performance #predict #smell
Smells Like Teen Spirit: Improving Bug Prediction Performance Using the Intensity of Code Smells (FP, MZ, FAF, ADL, RO), pp. 244–255.
ICSMEICSME-2016-XiaBLL #automation #case study #debugging #fault #harmful #locality #scalability #user study
“Automated Debugging Considered Harmful” Considered Harmful: A User Study Revisiting the Usefulness of Spectra-Based Fault Localization Techniques with Professionals Using Real Bugs from Large Systems (XX0, LB, DL0, SL), pp. 267–278.
MSRMSR-2016-DamevskiCSP #developer #interactive #markov
Interactive exploration of developer interaction traces using a hidden markov model (KD, HC0, DCS, LLP), pp. 126–136.
MSRMSR-2016-KikasDP #git #predict
Using dynamic and contextual features to predict issue lifetime in GitHub projects (RK, MD, DP), pp. 291–302.
MSRMSR-2016-RolfsnesMABB #recommendation
Improving change recommendation using aggregated association rules (TR, LM, SDA, RB, DWB), pp. 73–84.
SANERSANER-2016-0029BKT #android #library
An Investigation into the Use of Common Libraries in Android Apps (LL0, TFB, JK, YLT), pp. 403–414.
SANERSANER-2016-BorckBSHHJSS #named #source code
Frankencode: Creating Diverse Programs Using Code Clones (HB, MSB, IJDS, SAH, KH, SJ, AS, MS), pp. 604–608.
SANERSANER-2016-MazinanianT #css #empirical #preprocessor
An Empirical Study on the Use of CSS Preprocessors (DM, NT), pp. 168–178.
SANERSANER-2016-MendesVHS #identification #random
Identifying Utility Functions Using Random Forests (TM, MTV, ACH, AS), pp. 614–618.
SANERSANER-2016-NishimuraM #fine-grained
Supporting Merge Conflict Resolution by Using Fine-Grained Code Change History (YN, KM), pp. 661–664.
SANERSANER-2016-PanichellaDOPPL #algorithm #search-based
Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms (AP, BD, RO, MDP, DP, ADL), pp. 314–325.
SANERSANER-2016-RahmanRL #api #automation #crowdsourcing #named #recommendation
RACK: Automatic API Recommendation Using Crowdsourced Knowledge (MMR0, CKR, DL0), pp. 349–359.
SANERSANER-2016-ZhengRSLSJBCQB #analysis #hybrid #named
AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
CIAACIAA-2016-StasioMPV #algorithm #game studies
Solving Parity Games Using an Automata-Based Algorithm (ADS, AM, GP, MYV), pp. 64–76.
CIAACIAA-2016-WeidemanMBW #ambiguity #automaton #backtracking #behaviour #nondeterminism #regular expression
Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA (NW, BvdM, MB, BWW), pp. 322–334.
DLTDLT-2016-Basten #ambiguity #automaton #detection #multi
Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
FMFM-2016-CavadaCCRT #design #embedded #energy #modelling
Model-Based Design of an Energy-System Embedded Controller Using Taste (RC, AC, LC, MR, ST), pp. 741–747.
FMFM-2016-StoenescuSPI #analysis #execution #framework #named #symbolic computation
RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
FMFM-2016-VakiliD #finite #logic #similarity
Finite Model Finding Using the Logic of Equality with Uninterpreted Functions (AV, NAD), pp. 677–693.
IFM-2016-AntoninoGR #analysis #performance #satisfiability
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
IFM-2016-KumarBLDUB #verification
CloudSDV Enabling Static Driver Verifier Using Microsoft Azure (RK, TB, JL, ND, AU, CB), pp. 523–536.
IFM-2016-Preoteasa #invariant #logic #pointer #programming #source code #verification
Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
IFM-2016-SchutsHV #case study #equivalence #experience #industrial #learning #legacy #refactoring
Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report (MS, JH, FWV), pp. 311–325.
SEFMSEFM-2016-FeistMP #control flow #execution #symbolic computation
Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information (JF, LM, MLP), pp. 76–81.
SEFMSEFM-2016-HusienS #generative #model checking
Program Generation Using Simulated Annealing and Model Checking (IH, SS), pp. 155–171.
HaskellHaskell-2016-WangNF #algorithm #named #search-based #strict
Autobahn: using genetic algorithms to infer strictness annotations (YRW, DN, KF), pp. 114–126.
ICFP-2016-CastroHS #morphism #parallel #pipes and filters #process #reasoning
Farms, pipes, streams and reforestation: reasoning about structured parallel processes using types and hylomorphisms (DC, KH, SS), pp. 4–17.
AIIDEAIIDE-2016-DebkowskiMYYYFK #behaviour #collaboration #game studies #multi #named #online
Contained: Using Multiplayer Online Games to Quantify Success of Collaborative Group Behavior (DD, AM, NY, LY, YY, SF, MK), pp. 149–154.
AIIDEAIIDE-2016-GeibWMKCP #recognition
Building Helpful Virtual Agents Using Plan Recognition and Planning (CWG, JW, SM, PK, BGWC, RPAP), pp. 162–168.
AIIDEAIIDE-2016-GunesSAES #approach #modelling
A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
AIIDEAIIDE-2016-HarrisonR #crowdsourcing #learning
Learning From Stories: Using Crowdsourced Narratives to Train Virtual Agents (BH, MOR), pp. 183–189.
AIIDEAIIDE-2016-SinghDHJPM #network
Recognizing Actions in Motion Trajectories Using Deep Neural Networks (KYS, NMD, CPH, MJ, KP, BM), pp. 211–217.
AIIDEAIIDE-2016-SooLC #monte carlo
Generate Believable Causal Plots with User Preferences Using Constrained Monte Carlo Tree Search (VWS, CML, THC), pp. 218–224.
CHI-PLAYCHI-PLAY-2016-ReinschluesselM #game studies #self
Using Positive or Negative Reinforcement in Neurofeedback Games for Training Self-Regulation (AVR, RLM), pp. 186–198.
CHI-PLAYCHI-PLAY-2016-SavardBW #challenge #collaboration #game studies
Collaborative Solving in a Human Computing Game Using a Market, Skills and Challenges (OTS, AB, JW), pp. 130–141.
CHI-PLAYCHI-PLAY-2016-SharmaTDKJ #artificial reality #game studies
Evaluating Display Modalities Using a Mixed Reality Game (HNS, ZOT, ID, AK, AJ), pp. 65–77.
CHI-PLAYCHI-PLAY-2016-ZayerTF #mobile #named
PAWdio: Hand Input for Mobile VR using Acoustic Sensing (MAZ, ST, EF), pp. 154–158.
CoGCIG-2016-Bursztein #learning #statistics
I am a legend: Hacking hearthstone using statistical learning methods (EB), pp. 1–8.
CoGCIG-2016-CazenaveLTT #game studies #learning #random
Learning opening books in partially observable games: Using random seeds in Phantom Go (TC, JL0, FT, OT), pp. 1–7.
CoGCIG-2016-KiourtK #modelling #social
Using opponent models to train inexperienced synthetic agents in social environments (CK, DK), pp. 1–4.
CoGCIG-2016-ParkK #visual notation
Deep Q-learning using redundant outputs in visual doom (HSP, KJK), pp. 1–2.
CoGCIG-2016-SephtonCDHS #android #mining #predict
Using association rule mining to predict opponent deck content in android: Netrunner (NS, PIC, SD, VJH, NHS), pp. 1–8.
CoGCIG-2016-StanescuBHB #game studies #network #realtime
Evaluating real-time strategy game states using convolutional neural networks (MS, NAB, AH, MB), pp. 1–7.
CoGCIG-2016-YooK #algorithm #game studies #video
Changing video game graphic styles using neural algorithms (BY, KJK), pp. 1–2.
DiGRADiGRA-FDG-2016-GoddardM #assembly #design #game studies
Designing Unconventional Use of Conventional Displays in Games: Some Assembly Required (WG, AM).
DiGRADiGRA-FDG-2016-LimLH #approach #bottom-up #category theory #clustering #image #social
Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
DiGRADiGRA-FDG-2016-ZhuKCL #education #game studies #interactive #social
Using Interactive Social Story Games to Teach Social Skills to Children with Autism (JZ, CK, JC, NL).
CoGVS-Games-2016-AyedGJAVM #game studies #people
Fall Prevention Serious Games for Elderly People Using RGBD Devices (IA, AG, AJiC, BMA, JV, PMB), pp. 1–3.
CoGVS-Games-2016-LopeM #education #game studies #uml
Using UML to Model Educational Games (RPdL, NMM), pp. 1–4.
CoGVS-Games-2016-NicolaouLL #artificial reality
Stroke Event Simulator Using Virtual Reality (PN, ML, FL), pp. 1–2.
CoGVS-Games-2016-PaliokasS #game studies
The Use of Serious Games in Museum Visits and Exhibitions: A Systematic Mapping Study (IP, SS), pp. 1–8.
CoGVS-Games-2016-Piedra-Fernandez #artificial reality #communication #people
Sign Communication for People with Disabilities Using Kinect Technology at Home (JAPF, JJOC, CBB, LIM), pp. 1–2.
CoGVS-Games-2016-VosinakisKMS #approach #artificial reality
A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
CIKMCIKM-2016-0001H #adaptation #interactive #learning #multi #named
aptMTVL: Nailing Interactions in Multi-Task Multi-View Multi-Label Learning using Adaptive-basis Multilinear Factor Analyzers (XL0, JH), pp. 1171–1180.
CIKMCIKM-2016-AgrawalC #data mining #mining #predict
A Fatigue Strength Predictor for Steels Using Ensemble Data Mining: Steel Fatigue Strength Predictor (AA, ANC), pp. 2497–2500.
CIKMCIKM-2016-Balaneshinkordan #concept #graph #query
Sequential Query Expansion using Concept Graph (SB, AK), pp. 155–164.
CIKMCIKM-2016-CheemaKALWCR #analysis #health #monitoring #on the
On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
CIKMCIKM-2016-ChenWPT #community #network #performance
Efficient Computation of Importance Based Communities in Web-Scale Networks Using a Single Machine (SC, RW, DP, AT), pp. 1553–1562.
CIKMCIKM-2016-HanadaPCL #effectiveness #fault #type system
Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution (RH, MdGCP, MC, FAL), pp. 1723–1732.
CIKMCIKM-2016-HansenLM #predict #query #web
Ensemble Learned Vaccination Uptake Prediction using Web Search Queries (NDH, CL, KM), pp. 1953–1956.
CIKMCIKM-2016-JatowtKT #predict #wiki
Predicting Importance of Historical Persons using Wikipedia (AJ, DK, KT), pp. 1909–1912.
CIKMCIKM-2016-KuziSK #query #word
Query Expansion Using Word Embeddings (SK, AS, OK), pp. 1929–1932.
CIKMCIKM-2016-LiCL #approximate #graph #query
Approximating Graph Pattern Queries Using Views (JL, YC0, XL), pp. 449–458.
CIKMCIKM-2016-LiuKL #predict #social #social media
Collective Traffic Prediction with Partially Observed Traffic History using Location-Based Social Media (XL, XK, YL), pp. 2179–2184.
CIKMCIKM-2016-ManotumruksaMO #modelling #recommendation
Regularising Factorised Models for Venue Recommendation using Friends and their Comments (JM, CM, IO), pp. 1981–1984.
CIKMCIKM-2016-MartinoBR0M #community #learning
Learning to Re-Rank Questions in Community Question Answering Using Advanced Features (GDSM, ABC, SR, AU0, AM), pp. 1997–2000.
CIKMCIKM-2016-Najork #email #experience #machine learning
Using Machine Learning to Improve the Email Experience (MN), p. 891.
CIKMCIKM-2016-RoyGMJ #composition #estimation #feedback #kernel #word
Word Vector Compositionality based Relevance Feedback using Kernel Density Estimation (DR, DG, MM, GJFJ), pp. 1281–1290.
CIKMCIKM-2016-RuanSXTFLZ #network
Forecasting Seasonal Time Series Using Weighted Gradient RBF Network based Autoregressive Model (WR, QZS, PX, NKT0, NJGF, XL0, WEZ), pp. 2021–2024.
CIKMCIKM-2016-SinghC #aspect-oriented #query
Iterative Search using Query Aspects (MS, WBC), pp. 2037–2040.
CIKMCIKM-2016-TongKIKSV
Deep Match between Geology Reports and Well Logs Using Spatial Information (BT, MK, MI, YK, AS, RV), pp. 1833–1842.
CIKMCIKM-2016-TutekGSMB #concept #detection #knowledge base #ranking
Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
CIKMCIKM-2016-WangJYJM #learning
Learning to Extract Conditional Knowledge for Question Answering using Dialogue (PW, LJ, JY0, LJ, WYM), pp. 277–286.
CIKMCIKM-2016-WangOWWLPG #concept
Using Prerequisites to Extract Concept Maps fromTextbooks (SW, AO, ZW0, KW, CL0, BP, CLG), pp. 317–326.
CIKMCIKM-2016-WangWZ #distributed #graph #partial evaluation #performance #query #rdf
Efficient Distributed Regular Path Queries on RDF Graphs Using Partial Evaluation (XW0, JW, XZ), pp. 1933–1936.
CIKMCIKM-2016-Wu0XTL #named #recommendation #word
Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation (YW, YY0, FX0, HT, JL0), pp. 2287–2292.
CIKMCIKM-2016-XuCLMM #personalisation #recommendation #semantics #similarity
Tag-Aware Personalized Recommendation Using a Deep-Semantic Similarity Model with Negative Sampling (ZX, CC0, TL, YM, XM), pp. 1921–1924.
CIKMCIKM-2016-YuanGJCYZ #learning #named #ranking
LambdaFM: Learning Optimal Ranking with Factorization Machines Using Lambda Surrogates (FY, GG, JMJ, LC0, HY, WZ0), pp. 227–236.
CIKMCIKM-2016-ZhangDH #ambiguity #case study #classification #online
Bayesian Non-Exhaustive Classification A Case Study: Online Name Disambiguation using Temporal Record Streams (BZ, MD, MAH), pp. 1341–1350.
CIKMCIKM-2016-ZhangLDCKS #big data #locality #privacy #scalability
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
CIKMCIKM-2016-ZhengWPYFX #big data #predict
Urban Traffic Prediction through the Second Use of Inexpensive Big Data from Buildings (ZZ, DW0, JP, YY, CF, LFX), pp. 1363–1372.
ECIRECIR-2016-0002B #information retrieval
Diversifying Search Results Using Time - An Information Retrieval Method for Historians (DG0, KB), pp. 789–795.
ECIRECIR-2016-ArguelloAD #performance #predict #query
Using Query Performance Predictors to Improve Spoken Queries (JA, SA, FD0), pp. 309–321.
ECIRECIR-2016-BalikasA #classification #multi
Multi-label, Multi-class Classification Using Polylingual Embeddings (GB, MRA), pp. 723–728.
ECIRECIR-2016-WangME #category theory #fine-grained #image #visual notation
Harvesting Training Images for Fine-Grained Object Categories Using Visual Descriptions (JW, KM, ME), pp. 549–560.
ICMLICML-2016-AroraMM #learning #multi #optimisation #probability #representation
Stochastic Optimization for Multiview Representation Learning using Partial Least Squares (RA, PM, TVM), pp. 1786–1794.
ICMLICML-2016-BuiHHLT #approximate #process
Deep Gaussian Processes for Regression using Approximate Expectation Propagation (TDB, DHL, JMHL, YL, RET), pp. 1472–1481.
ICMLICML-2016-GonenOS #sketching
Solving Ridge Regression using Sketched Preconditioned SVRG (AG, FO, SSS), pp. 1397–1405.
ICMLICML-2016-GuanRW #learning #markov #multi #performance #process #recognition
Efficient Multi-Instance Learning for Activity Recognition from Time Series Data Using an Auto-Regressive Hidden Markov Model (XG, RR, WKW), pp. 2330–2339.
ICMLICML-2016-JasinskaDBPKH #probability
Extreme F-measure Maximization using Sparse Probability Estimates (KJ, KD, RBF, KP, TK, EH), pp. 1435–1444.
ICMLICML-2016-JohnsonZ #categorisation
Supervised and Semi-Supervised Text Categorization using LSTM for Region Embeddings (RJ, TZ0), pp. 526–534.
ICMLICML-2016-JunN #multi
Anytime Exploration for Multi-armed Bandits using Confidence Information (KSJ, RDN), pp. 974–982.
ICMLICML-2016-LarsenSLW #encoding #metric #similarity
Autoencoding beyond pixels using a learned similarity metric (ABLL, SKS, HL, OW), pp. 1558–1566.
ICMLICML-2016-NiuRFH #parametricity #performance
Fast Parameter Inference in Nonlinear Dynamical Systems using Iterative Gradient Matching (MN, SR, MF, DH), pp. 1699–1707.
ICMLICML-2016-RoychowdhuryKP #monte carlo #robust
Robust Monte Carlo Sampling using Riemannian Nosé-Poincaré Hamiltonian Dynamics (AR, BK, SP0), pp. 2673–2681.
ICMLICML-2016-SangnierGR #detection #proximity #reliability #representation
Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
ICMLICML-2016-SiHD #approximate #performance
Computationally Efficient Nyström Approximation using Fast Transforms (SS, CJH, ISD), pp. 2655–2663.
ICMLICML-2016-ZhuQRY #coordination #performance
Even Faster Accelerated Coordinate Descent Using Non-Uniform Sampling (ZAZ, ZQ, PR, YY), pp. 1110–1119.
ICPRICPR-2016-AhmedCSNN #image #smarttech
Using fusion of iris code and periocular biometric for matching visible spectrum iris images captured by smart phone cameras (NUA, SC, EHS, AN, IN), pp. 176–180.
ICPRICPR-2016-Al-DulaimiBTC #automation #geometry #image #segmentation #set
Automatic segmentation of HEp-2 cell Fluorescence microscope images using level set method via geometric active contours (KAD, JB, ITR, VC), pp. 81–83.
ICPRICPR-2016-Alonso-Fernandez #multi #recognition
Compact multi-scale periocular recognition using SAFE features (FAF, AM, JB), pp. 1455–1460.
ICPRICPR-2016-AntonyMOM #network
Quantifying radiographic knee osteoarthritis severity using deep convolutional neural networks (JA, KM, NEO, KM), pp. 1195–1200.
ICPRICPR-2016-AydinKAA #automation #predict #random
Automatic personality prediction from audiovisual data using random forest regression (BA, AAK, OA, LA), pp. 37–42.
ICPRICPR-2016-BachaAB #probability #recognition #visual notation
Event recognition in photo albums using probabilistic graphical model and feature relevance (SB, MSA, NB), pp. 2819–2823.
ICPRICPR-2016-BartoliLSB #estimation #profiling
User interest profiling using tracking-free coarse gaze estimation (FB, GL, LS, ADB), pp. 1839–1844.
ICPRICPR-2016-BertoliniOS #difference #identification #multi
Multi-script writer identification using dissimilarity (DB, LSO, RS), pp. 3025–3030.
ICPRICPR-2016-BhagavatulaAS #estimation
Pose estimation using Spectral and Singular Value recomposition (CB, RA, MS), pp. 4095–4100.
ICPRICPR-2016-Brandtberg #analysis #classification #fourier #fuzzy #multi #order #rank
Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
ICPRICPR-2016-BrownF #detection #smarttech
Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
ICPRICPR-2016-BSSH #approach #classification #network
HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
ICPRICPR-2016-BullingerBWA #bound #generative #re-engineering #video
Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
ICPRICPR-2016-CamgozHKB #3d #gesture #independence #network #recognition
Using Convolutional 3D Neural Networks for User-independent continuous gesture recognition (NCC, SH, OK, RB), pp. 49–54.
ICPRICPR-2016-CarbonneauGG #identification #learning #multi #random
Witness identification in multiple instance learning using random subspaces (MAC, EG, GG), pp. 3639–3644.
ICPRICPR-2016-ChakrabortyPK #information management #recognition #speech
Spontaneous speech emotion recognition using prior knowledge (RC, MP, SKK), pp. 2866–2871.
ICPRICPR-2016-ChowdhuryBMKS #image #network #performance #retrieval
An efficient radiographic Image Retrieval system using Convolutional Neural Network (MC, SRB, RM, MKK, ÖS), pp. 3134–3139.
ICPRICPR-2016-Chun #adaptation #authentication
Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information (SYC), pp. 3043–3048.
ICPRICPR-2016-DaiDCLY #multi #rank #representation #segmentation
Object segmentation using low-rank representation with multiple block-diagonal priors (LD, JD, JC, JL0, JY0), pp. 1959–1964.
ICPRICPR-2016-DaoodRB #classification #multi #recognition
Pollen recognition using a multi-layer hierarchical classifier (AD, ER, MB), pp. 3091–3096.
ICPRICPR-2016-DutaNAIS #recognition
Boosting VLAD with double assignment using deep features for action recognition in videos (ICD, TAN0, KA, BI, NS), pp. 2210–2215.
ICPRICPR-2016-EichhardtH
Improvement of camera calibration using surface normals (IE, LH), pp. 3745–3750.
ICPRICPR-2016-ElTantawyS #matrix #novel #physics
A novel method for segmenting moving objects in aerial imagery using matrix recovery and physical spring model (AE, MSS), pp. 3898–3903.
ICPRICPR-2016-EumD #evaluation #multi
Content selection using frontalness evaluation of multiple frames (SE, DSD), pp. 3404–3409.
ICPRICPR-2016-FariaCLI #dependence #recognition
Information fusion for cocaine dependence recognition using fMRI (FAF, FAMC, CsRL, JSI), pp. 1107–1112.
ICPRICPR-2016-FengLL #effectiveness #learning
Learning effective Gait features using LSTM (YF0, YL, JL), pp. 325–330.
ICPRICPR-2016-FoareLT16a #calculus #functional #image #segmentation
Image restoration and segmentation using the Ambrosio-Tortorelli functional and Discrete Calculus (MF, JOL, HT), pp. 1418–1423.
ICPRICPR-2016-GaoCZFZ #image #segmentation
Texture image segmentation using fused features and active contour (MG, HC, SZ, BF0, LZ), pp. 2036–2041.
ICPRICPR-2016-GaoYGC #approach #constraints #network
Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
ICPRICPR-2016-GhoraiMC #image #kernel #statistics
Patch sparsity based image inpainting using local patch statistics and steering kernel descriptor (MG, SM, BC), pp. 781–786.
ICPRICPR-2016-GiraudTP #linear #named
SCALP: Superpixels with Contour Adherence using Linear Path (RG, VTT, NP), pp. 2374–2379.
ICPRICPR-2016-GrimmMBS #classification
Sleep position classification from a depth camera using Bed Aligned Maps (TG, MM, AB, RS), pp. 319–324.
ICPRICPR-2016-GuoDFS #detection #robust
A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
ICPRICPR-2016-HafemannSO #verification
Analyzing features learned for Offline Signature Verification using Deep CNNs (LGH, RS, LSO), pp. 2989–2994.
ICPRICPR-2016-HajduHBLEHT #algorithm #approximate #grid #network
Measuring regularity of network patterns by grid approximations using the LLL algorithm (AH, BH, RB, IL, GE, LH, RT), pp. 1524–1529.
ICPRICPR-2016-HasegawaH #classification #image #named #network
PLSNet: A simple network using Partial Least Squares regression for image classification (RH, KH), pp. 1601–1606.
ICPRICPR-2016-HsuCH #representation #verification
Object verification in two views using Sparse representation (SCH, ICC, CLH), pp. 504–509.
ICPRICPR-2016-HuangY #3d #network
Point cloud labeling using 3D Convolutional Neural Network (JH0, SY), pp. 2670–2675.
ICPRICPR-2016-ItoA #authentication
A score calculation method using positional information of feature points for biometric authentication (KI, TA), pp. 3049–3054.
ICPRICPR-2016-JafariKNSSWN #image #learning #segmentation
Skin lesion segmentation in clinical images using deep learning (MHJ, NK, ENE, SS, SMRS, KRW, KN), pp. 337–342.
ICPRICPR-2016-JhuangLT #3d #network #verification
Face verification with three-dimensional point cloud by using deep belief networks (DHJ, DTL, CHT), pp. 1430–1435.
ICPRICPR-2016-JiaoZ #learning #multi #taxonomy
Multiple Instance Dictionary Learning using Functions of Multiple Instances (CJ, AZ), pp. 2688–2693.
ICPRICPR-2016-JohnKGNMI #learning #modelling #performance #segmentation
Fast road scene segmentation using deep learning and scene-based models (VJ, KK, CG, HTN, SM, KI), pp. 3763–3768.
ICPRICPR-2016-JoyR0V #big data #optimisation
Hyperparameter tuning for big data using Bayesian optimisation (TTJ, SR, SG0, SV), pp. 2574–2579.
ICPRICPR-2016-KalraSRT #learning #network
Learning opposites using neural networks (SK, AS, SR, HRT), pp. 1213–1218.
ICPRICPR-2016-Kamkar0LPV #graph #predict
Stable clinical prediction using graph support vector machines (IK, SG0, CL0, DQP, SV), pp. 3332–3337.
ICPRICPR-2016-KhanH #adaptation #learning #polynomial
Adapting instance weights for unsupervised domain adaptation using quadratic mutual information and subspace learning (MNAK, DRH), pp. 1560–1565.
ICPRICPR-2016-KilicarslanZ #video
Bridge motion to collision alarming using driving video (MK, JYZ), pp. 1870–1875.
ICPRICPR-2016-KimP #approach #detection #network
A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPRICPR-2016-KimP16a #network
Discovering characteristic landmarks on ancient coins using convolutional networks (JK, VP), pp. 1595–1600.
ICPRICPR-2016-KimV #classification #semantics
Deep Action Unit classification using a binned intensity loss and semantic context model (EK, SV), pp. 4136–4141.
ICPRICPR-2016-KondratevS #automation #constraints #detection #geometry #image
Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
ICPRICPR-2016-LeiT #modelling
Modeling human-skeleton motion patterns using conditional deep Boltzmann machine (PL, ST), pp. 1845–1850.
ICPRICPR-2016-Lezoray #image
High dynamic range image processing using manifold-based ordering (OL), pp. 289–294.
ICPRICPR-2016-LiaoLL #classification #multi #network #robust
Skin disease classification versus skin lesion characterization: Achieving robust diagnosis using multi-label deep neural networks (HL, YL, JL), pp. 355–360.
ICPRICPR-2016-LiuHWLL #image #performance #retrieval #segmentation
Efficient segmentation for Region-based Image Retrieval using Edge Integrated Minimum Spanning Tree (YL0, LH0, SW, XL, BL), pp. 1929–1934.
ICPRICPR-2016-LuoGPWY #locality #mobile #multi
Accurate localization for mobile device using a multi-planar city model (YL, TG, HP, YW, JY), pp. 3733–3738.
ICPRICPR-2016-MarronePFPSS #fuzzy #segmentation
Breast segmentation using Fuzzy C-Means and anatomical priors in DCE-MRI (SM0, GP, RF, AP, MS, CS), pp. 1472–1477.
ICPRICPR-2016-Martinez-DiazCH #encoding #performance #recognition #video
Efficient video face recognition by using Fisher Vector encoding of binary features (YMD, LC, NH, HMV, LES), pp. 1436–1441.
ICPRICPR-2016-MatsukawaS #identification
Person re-identification using CNN features learned from combination of attributes (TM, ES), pp. 2428–2433.
ICPRICPR-2016-MatsuzakiUSS #2d #3d #constraints #geometry #retrieval #verification
Geometric verification using semi-2D constraints for 3D object retrieval (KM, YU, SS, SS), pp. 2338–2343.
ICPRICPR-2016-MohagheghKSSN #estimation #image
Single image depth estimation using joint local-global features (HM, NK, SMRS, SS, KN), pp. 727–732.
ICPRICPR-2016-MollerNN16a #clustering #detection #image
Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
ICPRICPR-2016-MontenegroA #artificial reality #estimation #human-computer
Gaze estimation using EEG signals for HCI in augmented and virtual reality headsets (JMFM, VA), pp. 1159–1164.
ICPRICPR-2016-NahaW16a #learning #segmentation
Object figure-ground segmentation using zero-shot learning (SN, YW0), pp. 2842–2847.
ICPRICPR-2016-NairKNG #documentation #network #segmentation
Segmentation of highly unstructured handwritten documents using a neural network technique (RRN, BUK, IN, VG), pp. 1291–1296.
ICPRICPR-2016-Nakazawa #image #random
Noise stable image registration using RANdom RESAmple Consensus (AN), pp. 853–858.
ICPRICPR-2016-NaminAP #2d #3d #higher-order #segmentation #semantics
2D-3D semantic segmentation using cardinality as higher-order loss (SRN, JMA, LP), pp. 3775–3780.
ICPRICPR-2016-Nguyen #automation #generative #image
Automatic generation of a realistic looking single image stereogram using stereo vision (MN), pp. 3826–3831.
ICPRICPR-2016-NishiyamaNYYIS #identification #physics
Person re-identification using co-occurrence attributes of physical and adhered human characteristics (MN, SN, TY, HY, YI, KS), pp. 2085–2090.
ICPRICPR-2016-OnZEB #multi #pattern matching #pattern recognition #recognition
Spatio-temporal pattern recognition of dendritic spines and protein dynamics using live multichannel fluorescence microscopy (VO, AZ, IE, BB), pp. 2042–2047.
ICPRICPR-2016-OrriteRM #distance #learning #process #sequence
One-shot learning of temporal sequences using a distance dependent Chinese Restaurant Process (CO, MR, CM), pp. 2694–2699.
ICPRICPR-2016-OrueG #graph #process #recognition
Face recognition using activities of directed graphs in spatial pyramid (JPMO, WNG), pp. 3162–3167.
ICPRICPR-2016-Oskarsson
Characterizing the structure tensor using gamma distributions (MO), pp. 763–768.
ICPRICPR-2016-PalaniappanPAVF #detection
Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
ICPRICPR-2016-PalCGCC #learning #multi
Severity grading of psoriatic plaques using deep CNN based multi-task learning (AP, AC, UG, AC, RC), pp. 1478–1483.
ICPRICPR-2016-PengRP #learning #network #recognition
Learning face recognition from limited training data using deep neural networks (XP, NKR, SP), pp. 1442–1447.
ICPRICPR-2016-Ponce-Hinestroza #adaptation
Using a MRF-BP model with color adaptive training for underwater color restoration (ANPH, LATM, PDJ), pp. 787–792.
ICPRICPR-2016-PrasathKOGHSP #classification #random #segmentation
HEp-2 cell classification and segmentation using motif texture patterns and spatial features with random forests (VBSP, YMK, ZAO, JBG, AH, GS, KP), pp. 90–95.
ICPRICPR-2016-QinJYW #image #recognition
Building facade recognition from aerial images using Delaunay Triangulation induced feature perceptual grouping (XQ, MJ, XY, JW0), pp. 3368–3373.
ICPRICPR-2016-QuachtranHS #detection #learning
Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
ICPRICPR-2016-QuWL #recognition #representation
In-air handwritten Chinese character recognition using discriminative projection based on locality-sensitive sparse representation (XQ, WW, KL), pp. 1137–1140.
ICPRICPR-2016-RaiNCD #clustering #graph #multi
Partial Multi-View Clustering using Graph Regularized NMF (NR, SN, SC, OD), pp. 2192–2197.
ICPRICPR-2016-RaytchevKTK #kernel #recognition #representation
Higher-level representation of local spatio-temporal features for human action recognition using Subspace Matching Kernels (BR, HK, TT, KK), pp. 3862–3867.
ICPRICPR-2016-Robles-KellyW #graph #image
Semi-supervised image labelling using barycentric graph embeddings (ARK, RW), pp. 1518–1523.
ICPRICPR-2016-Rowekamp #performance
Fast thresholding of high dimensional Euclidean distances using binary squaring (JHR), pp. 3103–3108.
ICPRICPR-2016-SagawaSHOKF #automation #feature model #robust
Automatic feature extraction using CNN for robust active one-shot scanning (RS, YS, TH, SO, HK, RF), pp. 234–239.
ICPRICPR-2016-SahooA0 #approach #automation #clustering #generative #multi
Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
ICPRICPR-2016-SaikiaSSKG #analysis #kernel #learning #multi
Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
ICPRICPR-2016-SerinoB #3d
Using local convexities as anchor points for 3D curve skeletonization (LS, GSdB), pp. 2854–2859.
ICPRICPR-2016-ShigetaMKSTMI #segmentation
A bone marrow cavity segmentation method using wavelet-based texture feature (HS, TM, JK, SS, HT, HM, MI), pp. 2133–2138.
ICPRICPR-2016-ShiWXW #adaptation #image
OTSU guided adaptive binarization of CAPTCHA image using gamma correction (CS, YW, BX, CW), pp. 3962–3967.
ICPRICPR-2016-SidibeRM #detection #multi #on the
On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
ICPRICPR-2016-SuCHH #detection #image #modelling #recognition #symmetry
Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
ICPRICPR-2016-SunBTTH #detection #learning #locality
Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
ICPRICPR-2016-SunHL #detection #image
Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
ICPRICPR-2016-TakabeTKSMNY #consistency #detection
Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
ICPRICPR-2016-TakadaHJ
Human tracking in crowded scenes using target information at previous frames (HT, KH, PJ), pp. 1809–1814.
ICPRICPR-2016-TakahashiIKOM #multi #robust
Robust volleyball tracking system using multi-view cameras (MT, KI, MK, HO, TM), pp. 2740–2745.
ICPRICPR-2016-TakezawaHT #detection #documentation #image
Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
ICPRICPR-2016-TianMO #detection #embedded #low cost #recognition
Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
ICPRICPR-2016-TizhooshMZD #image #retrieval
Barcodes for medical image retrieval using autoencoded Radon transform (HRT, CM, SZ, SD), pp. 3150–3155.
ICPRICPR-2016-ToyamaMS #clustering #performance
Fast template matching using Brick Partitioning and initial threshold (FT, HM, KS), pp. 687–691.
ICPRICPR-2016-VinhEPBLR #modelling #random #robust
Training robust models using Random Projection (XVN, SME, SP, JB0, CL, KR), pp. 531–536.
ICPRICPR-2016-WangLLGTO #gesture #network #recognition #scalability
Large-scale Isolated Gesture Recognition using Convolutional Neural Networks (PW, WL, SL, ZG, CT, PO), pp. 7–12.
ICPRICPR-2016-WangLLZGO #gesture #network #recognition #scalability
Large-scale Continuous Gesture Recognition Using Convolutional Neural Networks (PW, WL, SL, YZ, ZG, PO), pp. 13–18.
ICPRICPR-2016-WangWH #analysis #network
Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
ICPRICPR-2016-WarisIG
Object proposals using CNN-based edge filtering (MAW, AI, MG), pp. 627–632.
ICPRICPR-2016-Williams #classification #network
Underwater target classification in synthetic aperture sonar imagery using deep convolutional neural networks (DPW), pp. 2497–2502.
ICPRICPR-2016-WuLZN #modelling #re-engineering
Model-based face reconstruction using SIFT flow registration and spherical harmonics (FW, SL, TZ, KNN), pp. 1774–1779.
ICPRICPR-2016-XuLHWLWHC #3d #image #multi #retrieval #word
Bag of temporal co-occurrence words for retrieval of focal liver lesions using 3D multiphase contrast-enhanced CT images (YX, LL, HH, DW, YL, JW0, XHH, YWC), pp. 2282–2287.
ICPRICPR-2016-YamashitaFYF #detection #multi #network
Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
ICPRICPR-2016-YangJNL #network #normalisation #online #recognition
Rotation-free online handwritten character recognition using dyadic path signature features, hanging normalization, and deep neural network (WY, LJ, HN, TL), pp. 4083–4088.
ICPRICPR-2016-YangL #learning #nondeterminism
Active learning using uncertainty information (YY, ML), pp. 2646–2651.
ICPRICPR-2016-YB #3d #optimisation #video
Rate distortion optimization using SSIM for 3D video coding (HY, PKB), pp. 1261–1266.
ICPRICPR-2016-YeWH #generative #graph
Analyzing graph time series using a generative model (CY, RCW0, ERH), pp. 3338–3343.
ICPRICPR-2016-YildizU #classification #incremental #order
Incremental construction of rule ensembles using classifiers produced by different class orderings (OTY, AU), pp. 492–497.
ICPRICPR-2016-YodaNTKYK #image #multi
Dynamic photometric stereo method using multi-tap CMOS image sensor (TY, HN, RiT, KK, KY, SK), pp. 2356–2361.
ICPRICPR-2016-YuLC #multi
Recognizing text in historical maps using maps from multiple time periods (RY, ZL, YYC), pp. 3993–3998.
ICPRICPR-2016-YuWSH #invariant #recognition
View invariant gait recognition using only one uniform model (SY, QW, LS, YH), pp. 889–894.
ICPRICPR-2016-ZemeneTPP #clustering #detection #set
Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
ICPRICPR-2016-ZhangGSSL #robust
Robust tensor factorization using maximum correntropy criterion (MZ, YG, CS, JLS, JL), pp. 4184–4189.
ICPRICPR-2016-ZhangLQ #network
Wake-up-word spotting using end-to-end deep neural network system (SZ, WL, YQ0), pp. 2878–2883.
ICPRICPR-2016-ZhangWY #correlation #image
Theoretical criterion for image matching using GPT correlation (SZ, TW, YY), pp. 555–560.
ICPRICPR-2016-ZhaoIBJ #fault #predict
Wind turbine fault prediction using soft label SVM (RZ, MRAI, KPB, QJ), pp. 3192–3197.
ICPRICPR-2016-ZhaoMFQH #performance #predict
Fast motion deblurring using gyroscopes and strong edge prediction (JZ, JM, BF, SQ, FH), pp. 739–744.
ICPRICPR-2016-ZhengCZZL #independence #network
Text-independent voice conversion using deep neural network based phonetic level features (HZ, WC, TZ, SZ, ML0), pp. 2872–2877.
ICPRICPR-2016-ZhengLZW #image #multi
Multi-focus image fusion using quaternion wavelet transform (XNZ, XL, ZZ, XJW), pp. 883–888.
ICPRICPR-2016-ZhugeHNY #clustering #feature model #graph
Unsupervised feature extraction using a learned graph with clustering structure (WZ, CH, FN, DY), pp. 3597–3602.
ICPRICPR-2016-ZhuZMSSS #3d #gesture #network #recognition #scalability
Large-scale Isolated Gesture Recognition using pyramidal 3D convolutional networks (GZ, LZ0, LM, JS, JS, PS), pp. 19–24.
KDDKDD-2016-AgostaGHIKZ #clustering #data analysis #scalability
Scalable Data Analytics Using R: Single Machines to Hadoop Spark Clusters (JMA, DG, RH, MI, SK, MZ), p. 2115.
KDDKDD-2016-BrooksKG #data-driven #predict #ranking
Developing a Data-Driven Player Ranking in Soccer Using Predictive Model Weights (JB, MK, JVG), pp. 49–55.
KDDKDD-2016-ChakrabortyVJS #predict
Predicting Socio-Economic Indicators using News Events (SC, AV, SJ, LS), pp. 1455–1464.
KDDKDD-2016-ChenLHYGG
City-Scale Map Creation and Updating using GPS Collections (CC0, CL, QH, QY0, DG, LJG), pp. 1465–1474.
KDDKDD-2016-HaarenSDF #machine learning
Analyzing Volleyball Match Data from the 2014 World Championships Using Machine Learning Techniques (JVH, HBS, JD, PF), pp. 627–634.
KDDKDD-2016-HaPK #categorisation #e-commerce #multi #network #scalability
Large-Scale Item Categorization in e-Commerce Using Multiple Recurrent Neural Networks (JH, HP, JK), pp. 107–115.
KDDKDD-2016-HuoNH #effectiveness #learning #metric #robust
Robust and Effective Metric Learning Using Capped Trace Norm: Metric Learning via Capped Trace Norm (ZH, FN, HH), pp. 1605–1614.
KDDKDD-2016-KuangTCPSP #self
Computational Drug Repositioning Using Continuous Self-Controlled Case Series (ZK, JAT, MC, PLP, RMS, DP), pp. 491–500.
KDDKDD-2016-NandiMADB #control flow #detection #execution #graph #mining
Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
KDDKDD-2016-ReisFMB #detection #incremental #online #performance
Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
KDDKDD-2016-SinghSA #independence #machine learning
Question Independent Grading using Machine Learning: The Case of Computer Program Grading (GS, SS, VA), pp. 263–272.
KDDKDD-2016-TaghaviLK #machine learning #memory management #recommendation
Compute Job Memory Recommender System Using Machine Learning (TT, ML, YK), pp. 609–616.
KDDKDD-2016-TingZCZZ #difference
Overcoming Key Weaknesses of Distance-based Neighbourhood Methods using a Data Dependent Dissimilarity Measure (KMT, YZ, MJC, YZ, ZHZ), pp. 1205–1214.
KDDKDD-2016-YinW #algorithm #clustering #online
A Text Clustering Algorithm Using an Online Clustering Scheme for Initialization (JY, JW), pp. 1995–2004.
KDDKDD-2016-ZhangZYZHH #modelling #named #social #social media
GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media (CZ0, KZ, QY0, LZ, TH, JH0), pp. 1305–1314.
KDDKDD-2016-ZhaoATBDBKD #approach #detection #parametricity #strict
A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
BXBX-2016-SemerathDHV #co-evolution #logic #modelling #satisfiability #synthesis
Change Propagation of View Models by Logic Synthesis using SAT solvers (OS, CD, ÁH0, DV), pp. 40–44.
ECMFAECMFA-2016-HeimNRW #composition #static typing #type safety
Compositional Language Engineering Using Generated, Extensible, Static Type-Safe Visitors (RH, PMSN, BR, AW), pp. 67–82.
ECMFAECMFA-2016-KessentiniSW #approach #automation #co-evolution #metamodelling #multi #optimisation
Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
ICMTICMT-2016-MooijJEJR #industrial #open source #parsing
Industrial Software Rejuvenation Using Open-Source Parsers (AJM, MMJ, GE, PJ, AR), pp. 157–172.
ICMTICMT-2016-RoccoRPCLG #atl #collaboration #framework #modelling #platform
Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform (JDR, DDR, AP, JSC, JdL, EG), pp. 70–78.
ICMTICMT-2016-SalayZC #reuse
Correct Reuse of Transformations is Hard to Guarantee (RS, SZ, MC), pp. 107–122.
MoDELSMoDELS-2016-BergmannDRV #bidirectional #collaboration #data access #modelling
Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
MoDELSMoDELS-2016-Blache #bound #c #development #embedded #modelling #safety
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
MoDELSMoDELS-2016-GolraBDGG #agile #modelling
Using free modeling as an agile method for developing domain specific modeling languages (FRG, AB, FD, SG, CG), pp. 24–34.
MoDELSMoDELS-2016-KalenkovaALR #mining #modelling #process
Process mining using BPMN: relating event logs and process models (AAK, WMPvdA, IAL, VAR), p. 123.
MoDELSMoDELS-2016-SzvetitsZ #comprehension #design #empirical #modelling #runtime
Controlled experiment on the comprehension of runtime phenomena using models created at design time (MS, UZ), pp. 151–161.
OnwardOnward-2016-MarterBLH #identifier #lightweight #programming #readability #similarity #source code
Lightweight programming experiments without programmers and programs: an example study on the effect of similarity and number of object identifiers on the readability of source code using natural texts (TM, PB, PL, SH), pp. 1–14.
OOPSLAOOPSLA-2016-GollamudiC #automation #policy #security
Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
OOPSLAOOPSLA-2016-Itzhaky0SYLLC #algorithm #divide and conquer #programming
Deriving divide-and-conquer dynamic programming algorithms using solver-aided transformations (SI, RS0, ASL, KY, YL, CEL, RAC), pp. 145–164.
OOPSLAOOPSLA-2016-SteimannHU #attribute grammar #constraints #source code
Computing repair alternatives for malformed programs using constraint attribute grammars (FS, JH, BU), pp. 711–730.
OOPSLAOOPSLA-2016-WangGS #named #spreadsheet
FIDEX: filtering spreadsheet data using examples (XW0, SG, RS), pp. 195–213.
AdaEuropeAdaEurope-2016-LaaliLHSS #detection #fault #online #testing
Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
AdaEuropeAdaEurope-2016-MohaqeqiAY #analysis #data flow #graph #modelling #realtime
Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
AdaEuropeAdaEurope-2016-Wittiger #csp
Eliminating Data Race Warnings Using CSP (MW), pp. 30–43.
LOPSTRLOPSTR-2016-AngelisFMPP #horn clause #process #verification
Verification of Time-Aware Business Processes Using Constrained Horn Clauses (EDA, FF, MCM, AP, MP), pp. 38–55.
PADLPADL-2016-CaretteS #algebra #probability #source code
Simplifying Probabilistic Programs Using Computer Algebra (JC, CcS), pp. 135–152.
PADLPADL-2016-JelinekB #array #constraints #logic programming
Using Constraint Logic Programming to Schedule Solar Array Operations on the International Space Station (JJ, RB), pp. 3–12.
PLDIPLDI-2016-KimJJKL #distributed #framework #replication
A distributed OpenCL framework using redundant computation and data replication (JK, GJ, JJ, JK, JL), pp. 553–569.
PLDIPLDI-2016-LaurenzanoHSMMT #approximate #latency
Input responsiveness: using canary inputs to dynamically steer approximation (MAL, PH, MS, SAM, JM, LT), pp. 161–176.
POPLPOPL-2016-0001NMR #invariant #learning
Learning invariants using decision trees and implication counterexamples (PG0, DN, PM, DR), pp. 499–512.
POPLPOPL-2016-AltenkirchK #induction #type system
Type theory in type theory using quotient inductive types (TA, AK), pp. 18–29.
POPLPOPL-2016-KatzEY #modelling #predict
Estimating types in binaries using predictive modeling (OK, REY, EY), pp. 313–326.
POPLPOPL-2016-PlotkinBLRV #network #scalability #symmetry #verification
Scaling network verification using symmetry and surgery (GDP, NB, NPL, AR, GV), pp. 69–83.
POPLPOPL-2016-SinghG #data type #spreadsheet
Transforming spreadsheet data types using examples (RS, SG), pp. 343–356.
PPDPPPDP-2016-AlbertAG #concurrent #imperative #testing
Testing of concurrent and imperative software using CLP (EA, PA, MGZ), pp. 1–8.
SASSAS-2016-GharatKM #analysis #graph #points-to
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
ASEASE-2016-AbdessalemNBS #multi #network #testing
Testing advanced driver assistance systems using multi-objective search and neural networks (RBA, SN, LCB, TS), pp. 63–74.
ASEASE-2016-AlmhanaMK0 #debugging #multi #recommendation
Recommending relevant classes for bug reports using multi-objective search (RA, WM, MK, AO), pp. 286–295.
ASEASE-2016-AlshanqitiHK #contract #dynamic analysis #reverse engineering #visual notation
Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis (AMA, RH, TK), pp. 816–821.
ASEASE-2016-BaekB #android #automation #comparison #modelling #multi #testing #user interface
Automated model-based Android GUI testing using multi-level GUI comparison criteria (YMB, DHB), pp. 238–249.
ASEASE-2016-FengJCF #comprehension #image #multi
Multi-objective test report prioritization using image understanding (YF, JAJ, ZC, CF), pp. 202–213.
ASEASE-2016-MoonenABR #guidelines #mining #recommendation
Practical guidelines for change recommendation using association rule mining (LM, SDA, DB, TR), pp. 732–743.
ASEASE-2016-Mougouei #dependence #graph #integer #programming #requirements
Factoring requirement dependencies in software requirement selection using graphs and integer programming (DM), pp. 884–887.
ASEASE-2016-Nishi #bound #model checking #programming #towards
Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
ASEASE-2016-PatrickCSG #automation #generative #image
Automatic test image generation using procedural noise (MP, MDC, ROJHS, CAG), pp. 654–659.
ASEASE-2016-PeldszusKLS #design #detection #evolution #incremental #multi #object-oriented #pattern matching #source code
Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
ASEASE-2016-RahmanR #automation #concept #crowdsourcing #named #query
QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge (MMR, CKR), pp. 220–225.
ASEASE-2016-YamadaBAKC #combinator #generative #satisfiability #testing
Greedy combinatorial test case generation using unsatisfiable cores (AY, AB, CA, TK, EHC), pp. 614–624.
FSEFSE-2016-Alexandru #network #synthesis
Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
FSEFSE-2016-Hammoudi #testing #tool support #web
Regression testing of web applications using Record/Replay tools (MH), pp. 1079–1081.
FSEFSE-2016-Luo16a #automation #performance #profiling #testing
Automatic performance testing using input-sensitive profiling (QL), pp. 1139–1141.
FSEFSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics
API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
FSEFSE-2016-NiuWG #requirements #traceability
Gray links in the use of requirements traceability (NN, WW0, AG), pp. 384–395.
FSEFSE-2016-Rolim #automation
Automating repetitive code changes using examples (RR), pp. 1063–1065.
ICSE-2016-BersaniBGKP #performance #pipes and filters #scalability
Efficient large-scale trace checking using mapreduce (MMB, DB, CG, SK, PSP), pp. 888–898.
ICSE-2016-CheungCLX #automation #clustering #detection #named #smell #spreadsheet
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
ICSE-2016-DesaiGHJKMRR #natural language #synthesis
Program synthesis using natural language (AD, SG, VH, NJ, AK, MM, SR, SR), pp. 345–356.
ICSE-2016-MullerF #metric #online #predict #quality
Using (bio)metrics to predict code quality online (SCM, TF0), pp. 452–463.
ICSE-2016-NearJ #data access #debugging #security #web
Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
ICSE-2016-Rubio-Gonzalez0 #analysis #float #precise
Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
ICSE-2016-SuRT #evaluation #model checking #parametricity #reliability #runtime
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking (GS, DSR, GT), pp. 73–84.
ICSE-2016-ZhangZZH #classification #fault #predict
Cross-project defect prediction using a connectivity-based unsupervised classifier (FZ0, QZ, YZ0, AEH), pp. 309–320.
GPCEGPCE-2016-Al-HajjajiKTLS #incremental #named #performance #product line #testing
IncLing: efficient product-line testing using incremental pairwise sampling (MAH, SK, TT, ML, GS), pp. 144–155.
SLESLE-2016-AmorimEWV #code completion
Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
SLESLE-2016-VoelterSLKEB #consistency #development #editing #performance #projectional
Efficient development of consistent projectional editors using grammar cells (MV, TS, SL, BK, SE, TB), pp. 28–40.
ASPLOSASPLOS-2016-BrownNE #how #order #static analysis
How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
ASPLOSASPLOS-2016-GuoSCM #approximate #image #memory management
High-Density Image Storage Using Approximate Memory Cells (QG, KS, LC, HSM), pp. 413–426.
ASPLOSASPLOS-2016-ZhangLJ #concurrent #detection #hardware #memory management #named #performance #transaction
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
CASECASE-2016-AndreJT #assembly #modelling #reliability
Reliable robot assembly using haptic rendering models in combination with particle filters (RA, MJ, UT), pp. 1134–1139.
CASECASE-2016-ChengZWCJL #case study #data mining #energy #fault #mining
Case studies of fault diagnosis and energy saving in buildings using data mining techniques (ZC, QZ, FW, ZC, YJ, YL), pp. 646–651.
CASECASE-2016-DuH #petri net #robust
Robust control of Backward Conflict Free Systems with Resources using Petri nets (ND, HH), pp. 1034–1041.
CASECASE-2016-GargSKJMMG #adaptation #automation #locality #process
Tumor localization using automated palpation with Gaussian Process Adaptive Sampling (AG, SS, RK, YJ, SM, LM, KG), pp. 194–200.
CASECASE-2016-HsuYL #analysis #process
Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
CASECASE-2016-IrieST #dependence
Target-less camera-LiDAR extrinsic calibration using a bagged dependence estimator (KI, MS, MT), pp. 1340–1347.
CASECASE-2016-LaskeyLCGHPDG #learning
Robot grasping in clutter: Using a hierarchy of supervisors for learning from demonstrations (ML, JL, CC, DVG, WYSH, FTP, ADD, KG), pp. 827–834.
CASECASE-2016-LiSXSL #framework #hybrid #low cost
A hybrid model and kinematic-free control framework for a low-cost deformable manipulator using in home service (GL, LS0, SX, DS, JL), pp. 1002–1007.
CASECASE-2016-LiuT #distributed #hybrid #multi #network
Distributed vision network for multiple target tracking using a dynamic hybrid consensus filter (GL, GT), pp. 805–808.
CASECASE-2016-MahadevKRFB #grid
Collecting a swarm in a grid environment using shared, global inputs (AVM, DK, JMR, SPF, ATB), pp. 1231–1236.
CASECASE-2016-ShahrokhiB
Object manipulation and position control using a swarm with global inputs (SS, ATB), pp. 561–566.
CASECASE-2016-SrinivasanC #approach #approximate #orthogonal
Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
CASECASE-2016-TanCPT #automation #design #diagrams #evaluation #layout
Automated design evaluation on layout of Piping and Instrumentation Diagram using Histogram of Connectivity (WCT, IMC, SJP, HKT), pp. 1295–1300.
CASECASE-2016-TsaiWPXLFZ #behaviour #predict #process #smarttech
Context-aware activity prediction using human behavior pattern in real smart home environments (MJT, CLW, SKP, YX, TYL, LCF, YCZ), pp. 168–173.
CASECASE-2016-WiebeRRV #approach #automation #composition #delivery #fault #generative #injection #simulation #testing
Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CASECASE-2016-YangH #distributed #petri net
Mono-T-semiflow systems with resources and their distributed control using Petri nets (YY, HH), pp. 1042–1048.
CASECASE-2016-ZouFP #estimation #metric #network
Psychoacoustic impacts estimation in manufacturing based on accelerometer measurement using artificial neural networks (MZ, LF, JP), pp. 1203–1208.
CAVCAV-2016-KafleGM #abstract interpretation #automaton #finite #horn clause #named #verification
Rahft: A Tool for Verifying Horn Clauses Using Abstract Interpretation and Finite Tree Automata (BK, JPG, JFM), pp. 261–268.
CAVCAV-2016-MuellerSS #automation #execution #symbolic computation #verification
Automatic Verification of Iterated Separating Conjunctions Using Symbolic Execution (PM, MS, AJS), pp. 405–425.
CAVCAV-2016-PernsteinerLTTW #modelling #safety
Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
ICSTICST-2016-HuoC
Interpreting Coverage Information Using Direct and Indirect Coverage (CH, JC), pp. 234–243.
ICSTICST-2016-MahajanLBH #debugging #visual notation #web
Using Visual Symptoms for Debugging Presentation Failures in Web Applications (SM, BL, PB, WGJH), pp. 191–201.
ICSTICST-2016-MarculescuFT #evaluation #search-based #testing
Using Exploration Focused Techniques to Augment Search-Based Software Testing: An Experimental Evaluation (BM, RF, RT), pp. 69–79.
ICTSSICTSS-2016-EnoiuSCFP #embedded #generative #model checking #testing
Mutation-Based Test Generation for PLC Embedded Software Using Model Checking (EPE, DS, AC, RF, PP), pp. 155–171.
ICTSSICTSS-2016-PradhanWAYL #industrial #multi #named #testing
STIPI: Using Search to Prioritize Test Cases Based on Multi-objectives Derived from Industrial Practice (DP, SW0, SA0, TY0, ML), pp. 172–190.
ICTSSICTSS-2016-ReichstallerEKR #learning #testing
Risk-Based Interoperability Testing Using Reinforcement Learning (AR, BE, AK, WR, MG), pp. 52–69.
IJCARIJCAR-2016-AthanasiouLW #bound #equation #thread #verification
Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
IJCARIJCAR-2016-DawsonBG #calculus #logic #theorem
Machine-Checked Interpolation Theorems for Substructural Logics Using Display Calculi (JED, JB, RG), pp. 452–468.
TAPTAP-2016-ReichlFT #formal method #validation #verification
Using Formal Methods for Verification and Validation in Railway (KR, TF, PT), pp. 3–13.
VMCAIVMCAI-2016-MarechalFKMP #approximate #multi #theorem
Polyhedral Approximation of Multivariate Polynomials Using Handelman's Theorem (AM, AF, TK0, DM, MP), pp. 166–184.
CBSECBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented
Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSAECSA-2015-AgrawalP #adaptation #framework #towards #web
Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSAECSA-2015-GalsterA #agile #architecture #comprehension #development
Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSAECSA-2015-HansenM #automation #community #composition #detection
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSAECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech
Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
QoSAQoSA-2015-HofigZS #automation #dependence
Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
DocEngDocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary
Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEngDocEng-2015-LesnikovaDE #rdf
Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRRDRR-2015-BideaultMCP #architecture #regular expression #word
Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRRDRR-2015-MehriSHGAM #documentation #image #segmentation
Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRRDRR-2015-PengCN #approach
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRRDRR-2015-RabaevCEK #documentation #programming
Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRRDRR-2015-SitaramHPSK #recognition #word
Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRRDRR-2015-StalnakerZ #retrieval
Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HTHT-2015-Bayomi #adaptation #corpus #framework #reuse
A Framework to Provide Customized Reuse of Open Corpus Content for Adaptive Systems (MB), pp. 315–318.
HTHT-2015-BlountMW #logic #social #web
An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
JCDLJCDL-2015-CuongCKL #documentation #higher-order #information management #performance
Scholarly Document Information Extraction using Extensible Features for Efficient Higher Order Semi-CRFs (NVC, MKC, MYK, WSL), pp. 61–64.
PODSPODS-2015-CateCST #ontology
High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMODSIGMOD-2015-BarthelsLAK #in memory
Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMODSIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media
DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMODSIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability
Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMODSIGMOD-2015-TuR #named #query
DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMODSIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-XiaoBME #metadata #summary
Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMODSIGMOD-2015-YanZHSMZM #detection #distributed
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMODSIGMOD-2015-ZhangCPSX #graph #statistics
Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDBVLDB-2015-DeutchGM #datalog #query #source code
Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDBVLDB-2015-HeCMPS #named #synthesis
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDBVLDB-2015-HeGC #corpus #named #semantics
SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDBVLDB-2015-LazersonSKSGS #distributed #monitoring
Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDBVLDB-2015-ParkMS #pipes and filters #probability #query
Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDBVLDB-2015-ShinWWSZR #incremental #knowledge base
Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEETCSEET-2015-SedanoP #experience #student
Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
EDMEDM-2015-AlHarbiH #automation #modelling #segmentation #topic
Using Topic Segmentation Models for the Automatic Organisation of MOOCs resources (GA, TH), pp. 524–527.
EDMEDM-2015-AnayaGLH #analysis #approach #collaboration #diagrams #network #social
An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDMEDM-2015-BorjiginMSZ #assessment #behaviour
Skill Assessment Using Behavior Data in Virtual World (AB, CM, ZS, ZZ), pp. 570–571.
EDMEDM-2015-BotelhoAWH #performance #predict #student
Predicting Student Aptitude Using Performance History (AFB, SAA, HW, NTH), pp. 622–623.
EDMEDM-2015-EmondB #classification #process #sequence #student
Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification (BE, SB), pp. 412–415.
EDMEDM-2015-Fancsali #algebra #behaviour #learning #modelling #visual notation
Confounding Carelessness? Exploring Causal Relationships Between Carelessness, Affect, Behavior, and Learning in Cognitive Tutor Algebra Using Graphical Causal Models (SF), pp. 508–511.
EDMEDM-2015-Feild #performance #student
Improving Student Performance Using Nudge Analytics (JLF), pp. 464–467.
EDMEDM-2015-GandhiBD #education #topic #visual notation #word
Topic Transition in Educational Videos Using Visually Salient Words (AG, AB, OD), pp. 289–296.
EDMEDM-2015-Geryk #comprehension #visual notation
Using Visual Analytics Tool for Improving Data Comprehension (JG), pp. 327–334.
EDMEDM-2015-InwegenAWH
Using Partial Credit and Response History to Model User Knowledge (EVI, SA, YW0, NTH), pp. 313–319.
EDMEDM-2015-LuoSMG #predict #student #word
Predicting Student Grade based on Free-style Comments using Word2Vec and ANN by Considering Prediction Results Obtained in Consecutive Lessons (JL, SES, TM, KG), pp. 396–399.
EDMEDM-2015-MacHardyP #big data #education
Evaluating Educational Videos using Bayesian Knowledge Tracing and Big Data (ZM, ZAP), pp. 424–427.
EDMEDM-2015-NicolajsenP #adaptation #collaboration #component
Using Knowledge Components for Collaborative Filtering in Adaptive Tutoring Systems (PHN, BP), pp. 536–539.
EDMEDM-2015-Rihak #adaptation #modelling
Use of Time Information in Models behind Adaptive Practice System for Building Fluency in Mathematics (JR), pp. 642–644.
ITiCSEITiCSE-2015-Dickson #development #education #game studies
Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSEITiCSE-2015-Harms15a #java
Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSEITiCSE-2015-KirkpatrickP #assurance #operating system #process
Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-TarmazdiVSFF #learning #visualisation
Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSEITiCSE-2015-WangMSLCW #data access #education #named #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
SIGITESIGITE-2015-ZhouCKNCUG #collaboration #feedback #scalability #student
M-CAFE 1.0: Motivating and Prioritizing Ongoing Student Feedback During MOOCs and Large on-Campus Courses using Collaborative Filtering (MZ, AC, SK, BN, CC, KU, KG), pp. 153–158.
ICPCICPC-2015-CosmaM #component #comprehension #visual notation #web
Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPCICPC-2015-Escobar-AvilaVH #bytecode #categorisation
Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPCICPC-2015-HillSP #evaluation #feature model
Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MacLeodSB #developer #documentation #how
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-SaiedABS #api #library #question #source code
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-CorleyDK #feature model #learning
Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSMEICSME-2015-DongAS #fault #static analysis
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-HardtM #empirical #evaluation #maintenance
An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSMEICSME-2015-MedicherlaKN #specification #verification
Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-DonadelliZR #case study #fault #replication
Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSRMSR-2015-WangPWG #comprehension #git #what
What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSRMSR-2015-ZanjaniKB #developer
Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-BezemerPG #comprehension #difference #graph #performance
Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANERSANER-2015-CabotICR #open source
Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANERSANER-2015-HuSLL #development #evolution #modelling #topic
Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-NayrollesHTL #approach #debugging #model checking #named
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-QiuSM #graph #identification #library #morphism
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAMSCAM-2015-BonifacioCRKC #c++ #exception
The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAMSCAM-2015-ChochlovEB #data flow #feature model
Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-PanditaJSW #api #mining
Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-RenatusBE #modelling #security
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
ICALPICALP-v1-2015-KhotS #approximate
Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FMFM-2015-0001K #bound #model checking
Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FMFM-2015-AlTurkiA #distributed #framework #towards #verification #𝕂
Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-MirandaMR #automation #design #generative #testing #verification
Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FMFM-2015-Nakajima #behaviour #energy #maude #realtime
Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
RTARTA-2015-AvanziniST #certification #complexity #proving
Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
SEFMSEFM-2015-JonesY #abstraction #reasoning
Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFMSEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing
Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFMSEFM-2015-SavaryFLL #modelling #robust #testing
Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
AIIDEAIIDE-2015-StanescuBB #predict
Using Lanchester Attrition Laws for Combat Prediction in StarCraft (MAS, NAB, MB), pp. 86–92.
CHI-PLAYCHI-PLAY-2015-CollinsELG #2d #artificial reality #game studies #platform
Alaska Steve: Using Virtual Reality to Enhance a 2D Platforming Game (LC, SE, JL, TCNG), pp. 767–770.
CHI-PLAYCHI-PLAY-2015-HarpsteadA #analysis #design #education #empirical #game studies #learning
Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
CHI-PLAYCHI-PLAY-2015-HicksG #game studies
Exploring Casual Exergames with Kids Using Wheelchairs (KH, KG), pp. 541–546.
CHI-PLAYCHI-PLAY-2015-KeumRMCLBC #composition #development #game studies
Exergame Development Using Body Composition Data for Obesity Care (JK, JHR, YJM, HC, NL, BCB, JDC), pp. 577–582.
CHI-PLAYCHI-PLAY-2015-Schwind0HK #generative
Determining the Characteristics of Preferred Virtual Faces Using an Avatar Generator (VS, KW0, NH, OK), pp. 221–230.
CoGCIG-2015-Garcia-SanchezT #automation #generative #programming #search-based #towards
Towards automatic StarCraft strategy generation using genetic programming (PGS, APT, AMM, GS, JJMG), pp. 284–291.
CoGCIG-2015-OliveiraM #game studies #performance #realtime
Creating efficient walls using potential fields in real-time strategy games (CFdO, CAGM), pp. 138–145.
CoGCIG-2015-RunarssonL #approximate #evaluation #game studies #on the
On imitating Connect-4 game trajectories using an approximate n-tuple evaluation function (TPR, SML), pp. 208–213.
CoGCIG-2015-SatoIW #estimation #monte carlo #multi
Estimation of player's preference for cooperative RPGs using multi-strategy Monte-Carlo method (NS, KI, TW), pp. 51–59.
DiGRADiGRA-2015-BartonSQMKK #bias #design #game studies #reduction
The Use of Theory in Designing a Serious Game for the Reduction of Cognitive Biases (MB, CS, MMQ, CKM, KSK, JK).
DiGRADiGRA-2015-MarczakSH #comprehension #experience #matrix #similarity
Understanding Player Experience Through the Use of Similarity Matrix (RM, GS, PH).
DiGRADiGRA-2015-Warpefelt #visual notation
Cues and insinuations: Indicating affordances of non-player character using visual indicators (HW).
FDGFDG-2015-IsaksenGN #analysis #game studies
Exploring Game Space Using Survival Analysis (AI, DG, AN).
FDGFDG-2015-KaoH15b #game studies #learning
Exploring the Construction, Play, Use of Virtual Identities in a STEM Learning Game (DK, DFH).
FDGFDG-2015-Martens #game studies #proving
Using Proof Theory to Study Game Mechanics (CM).
FDGFDG-2015-ReuterGS #automation #detection #game studies #multi #petri net
Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
FDGFDG-2015-RyanKMW15a #analysis #game studies #semantics #tool support
Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
CoGVS-Games-2015-BrichRFWBMDRS0 #game studies #named #research
LiverDefense: Using a Tower Defense Game as a Customisable Research Tool (JB, KR, JF, MW, AB, SM, TD, VR, CS, MW0), pp. 1–8.
CoGVS-Games-2015-Cejka #detection
Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
CoGVS-Games-2015-DiazDHS #development #game studies #learning #multi #online #video
Explicit Fun, Implicit Learning in Multiplayer Online Battle Arenas: Methodological Proposal for Studying the Development of Cognitive Skills Using Commercial Video Games (CMCD, BD, HH, JWS), pp. 1–3.
CoGVS-Games-2015-DiazWLT #game studies #visitor
Your Answer Will Make an Impression. Using Quiz Game Mechanics for the Collection of Visitor Data at an Exhibition (MGAD, UW, ML, MT), pp. 1–4.
CoGVS-Games-2015-RobbWW #design #development #game studies
The Development of TASTER, a Cognitive Training Game Using Human-Centered Design, Tailored for Children with Global and Specific Cognitive Impairments (NR, AW, KW), pp. 1–2.
CoGVS-Games-2015-WilhelmssonEBO #design #game studies #visual notation
Accessible Game Culture Using Inclusive Game Design - Participating in a Visual Culture That You Cannot See (UW, HE, JB, PAÖ), pp. 1–8.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #policy
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGTICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination
Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-WeberDP #formal method #graph transformation #monitoring
Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHICHI-2015-AsenieroWLRTC #named #release planning #visualisation
STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHICHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation
Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHICHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer
A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHICHI-2015-BentleyC #composition #mobile
The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHICHI-2015-DaltonCM
Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHICHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-FleckCR #bound #multi
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-GerlingML #game studies #video
Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHICHI-2015-GoelZVP #detection #flexibility #gesture #named
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-GrevetG #prototype #scalability #social
Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHICHI-2015-GunaratneN #behaviour #performance #user interface
Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHICHI-2015-HaqueNV #named
Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHICHI-2015-HiguchiCCZL #experience #named
ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHICHI-2015-HolzBK #identification #mobile #named
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHICHI-2015-HourcadeMWP #analysis #exclamation
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HydeCKH #interactive #persuasion
Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHICHI-2015-JonesCDTPDH #delphi #information management
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-KatanGF #development #interactive #interface #machine learning #people
Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHICHI-2015-KosmallaDK #automation #metric #named #recognition
ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHICHI-2015-LeeLCWSK #education #interactive #online #social
Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHICHI-2015-LugerURG #design #game studies #process
Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHICHI-2015-MaiorPSW #human-computer #reliability
Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHICHI-2015-MariakakisGAPW #mobile #named
SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHICHI-2015-ParkPN
The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHICHI-2015-PatelO
Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHICHI-2015-PfeifferDSAR
Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHICHI-2015-PreistJ #education #game studies #motivation
The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHICHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics
Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHICHI-2015-SlegersRVD #elicitation #game studies #research #user interface
Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHICHI-2015-TholanderN #experience #performance
Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHICHI-2015-VertanenMERK #mobile #named #performance
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHICHI-2015-WangGXZYB #interactive #named #privacy #visualisation
VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHICHI-2015-ZugerF #developer #predict
Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCWCSCW-2015-ChangHT #recommendation
Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCWCSCW-2015-FreitasD15a #detection #multi
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCWCSCW-2015-KaziunasBJCHA #health
Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCWCSCW-2015-MaddockSASOM #behaviour #multi #online
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCWCSCW-2015-ProstMT #design #energy #towards
From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCWCSCW-2015-XuRDB #design #feedback #process
A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
HCIDHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition
Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
HCIDHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition
Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
HCIDHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process
Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
HCIDHM-EH-2015-MeryS #modelling #requirements
Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
HCIDHM-EH-2015-NakamuraKKMK #development #self #student
Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhengBISEL #behaviour #monitoring
Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
HCIDHM-HM-2015-FurukawaTKG #evaluation #image
Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
HCIDUXU-DD-2015-AsthanaS #modelling #named #testing #usability #xml
Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
HCIDUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media
Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
HCIDUXU-IXD-2015-DasBRD #co-evolution #design #generative
The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
HCIDUXU-IXD-2015-HalbeyKZ
Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-UI-2015-AyanogluBTD #artificial reality #case study
Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
HCIDUXU-UI-2015-DuWDXJ #case study #metric
Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
HCIDUXU-UI-2015-LiHF #quality #requirements #scalability #user interface
Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCIHCI-DE-2015-Hensely-Schinkinger #design
The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCIHCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #visualisation
Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCIHCI-DE-2015-SantosST #interactive #open source #visualisation
Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCIHCI-DE-2015-SchutzSO
Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCIHCI-DE-2015-SugiuraSO #implementation #metric #security
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCIHCI-DE-2015-WatsonS #assessment
Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCIHCI-IT-2015-BandeiraCXK #gesture #interface
Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCIHCI-IT-2015-FukumotoTE #detection
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-IT-2015-GuXCZ
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HakodaKSST #bound #gesture #mobile #named
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCIHCI-IT-2015-KondoTT #communication #smarttech
Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCIHCI-IT-2015-KuribaraST
Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCIHCI-IT-2015-MullerLBSKSW #data-driven #network #overview #predict
Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCIHCI-IT-2015-MurataM #analysis #eye tracking
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-Nagaraju #framework #gesture
Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCIHCI-UC-2015-AzhariF #approach #experience #social #social media #user interface
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-ClarkeBK #experience #question #what
What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCIHCI-UC-2015-OhJK #approach #human-computer #simulation
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHCI-UC-2015-Ujita #analysis #reliability
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-FilhoHTJM #smarttech
Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-ItaiM #development #interactive
Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HCIHIMI-IKC-2015-KajitaTMI #3d #design
Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-MayerBPGV #automation #generative #process #visualisation
Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HCIHIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation
A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-TogawaK #collaboration #framework
Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HCIHIMI-IKC-2015-UeokaK #interactive
Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HCIHIMI-IKC-2015-UjitokoH #interface
Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HCIHIMI-IKD-2015-AraiOM #web
A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HCIHIMI-IKD-2015-ChouSW #case study #quality
Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HCIHIMI-IKD-2015-ItouNM #information management #twitter
Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HCIHIMI-IKD-2015-IwamotoH #induction
Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HCIHIMI-IKD-2015-KalkattawiN #ubiquitous
Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HCIHIMI-IKD-2015-KastratiIY #classification #documentation #framework
A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HCIHIMI-IKD-2015-KotaniIAS #interface #variability
Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HCIHIMI-IKD-2015-MatsunoAIMM
Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HCIHIMI-IKD-2015-MorizumiA #analysis
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HCIHIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour
Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HCIHIMI-IKD-2015-YoshinoO
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
HCILCT-2015-BoonbrahmKB #artificial reality #learning #student
Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
HCILCT-2015-DalipiYK #analysis #performance #semantics
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCILCT-2015-HiramatsuIISS #case study #communication #mobile
A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
HCILCT-2015-IbanezN #design #implementation #multi
Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
HCILCT-2015-PyperLWJ #mobile #personalisation
The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
HCILCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous
Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
HCILCT-2015-SebilloTVPG #artificial reality #interface
The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
HCILCT-2015-Sein-EchaluceBG #education #information management #social
A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
HCISCSM-2015-KastratiIYD #analysis #network #online #social
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-ManssourSSFS #image #network #social #visualisation
Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
CAiSECAiSE-2015-Francescomarino #workflow
Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSECAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEISICEIS-v1-2015-BorgesDRAS #approach #generative
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-BouakkazLO #distance #named #similarity
GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-Marques-LucenaA #framework #information management
Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEISICEIS-v1-2015-MpindaMSR #database #graph #simulation
Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEISICEIS-v1-2015-RezendeJ #concurrent #process #workflow
Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEISICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation
Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEISICEIS-v1-2015-SarmentoCG #network #streaming
Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEISICEIS-v1-2015-VaroneA #multi
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v2-2015-AizebojeP #approach #pointer
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEISICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #web
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEISICEIS-v2-2015-KamalKVB #delivery #performance
Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEISICEIS-v2-2015-MagnavitaNM #evolution
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEISICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEISICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #visualisation
VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEISICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml
Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing
Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-NyameB #information management
The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEISICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process
BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEISICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling
An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
CIKMCIKM-2015-BagdouriO #microblog #set
Profession-Based Person Search in Microblogs: Using Seed Sets to Find Journalists (MB, DWO), pp. 593–602.
CIKMCIKM-2015-BuchA #approximate #learning #string
Approximate String Matching by End-Users using Active Learning (LB, AA0), pp. 93–102.
CIKMCIKM-2015-JeongKL #on the fly
A Flash-aware Buffering Scheme using On-the-fly Redo (KSJ, SWK, SL), pp. 1683–1686.
CIKMCIKM-2015-MaGWLW #detection #information management #microblog #social
Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
CIKMCIKM-2015-MishraH #clustering #learning #multi
Learning Task Grouping using Supervised Task Space Partitioning in Lifelong Multitask Learning (MM, JH), pp. 1091–1100.
CIKMCIKM-2015-ParkHL #nearest neighbour #performance
A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection (YP, HH, SgL), pp. 1883–1886.
CIKMCIKM-2015-RoychoudhuryKB #documentation #ontology #process
Analyzing Document Intensive Business Processes using Ontology (SR, VK, NB), pp. 1899–1902.
CIKMCIKM-2015-SiersdorferKAZ #how #network #scalability #social
Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
CIKMCIKM-2015-Teevan #information retrieval
Slow Search: Improving Information Retrieval Using Human Assistance (JT), p. 1.
CIKMCIKM-2015-TuarobTSR #modelling #network #social
Modeling Individual-Level Infection Dynamics Using Social Network Information (ST, CST, MS, NR), pp. 1501–1510.
CIKMCIKM-2015-WangSL #distance #learning #summary
Update Summarization using Semi-Supervised Learning Based on Hellinger Distance (DW0, SS, TL0), pp. 1907–1910.
CIKMCIKM-2015-ZhangSWFW #crowdsourcing #quality
Improving Label Quality in Crowdsourcing Using Noise Correction (JZ0, VSS, JW0, XF, XW0), pp. 1931–1934.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-ChongDL #modelling #predict #topic
Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIRECIR-2015-Dutta #approximate #mining #named #statistics #string
MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIRECIR-2015-GogMP #identification #on the #statistics
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIRECIR-2015-HagenPBS #classification #detection #sentiment #twitter
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-JameelLB #modelling #parametricity #topic
Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIRECIR-2015-LiC #effectiveness
Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIRECIR-2015-LimCLK #community #constraints #detection
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-LuoZDY #design
Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIRECIR-2015-MaddalenaMST #estimation
Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICMLICML-2015-AvronH #community #detection #personalisation #rank
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #detection #semantics
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-LeC #learning #metric
Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICMLICML-2015-SnoekRSKSSPPA #network #optimisation #scalability
Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICMLICML-2015-Sohl-DicksteinW #learning
Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICMLICML-2015-SrivastavaMS #learning #video
Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICMLICML-2015-SunQW #optimisation #taxonomy
Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-ZhuE #approach #hybrid #probability #random
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-AhnKLRW #distributed #matrix #probability #scalability
Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDDKDD-2015-GleichM #algorithm #graph #learning
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-IkonomovskaJD #predict #realtime
Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDDKDD-2015-JohanssonD #geometry #graph #learning #similarity
Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDDKDD-2015-KotziasDFS
From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDDKDD-2015-MayaMMAY #clustering
Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDDKDD-2015-MomtazpourZRSR #cyber-physical #invariant
Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDDKDD-2015-Ojjeh #open source #realtime
Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDDKDD-2015-PengKLC #approximate #clustering #rank
Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDDKDD-2015-SethiYRVR #classification #machine learning #scalability
Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDDKDD-2015-ShanahanD #distributed #scalability
Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDDKDD-2015-SomanchiALEG #predict
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDDKDD-2015-WangYLXXCR #predict
Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDDKDD-2015-WeiLMCRS #predict
Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDDKDD-2015-YuanBM #process #re-engineering
Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDDKDD-2015-ZhengYX #composition #linear #modelling #topic
Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDMMLDM-2015-Babu #classification #identification
Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDMMLDM-2015-CostaFK #multi
Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDMMLDM-2015-GovadaJMS #approach #hybrid #induction #learning
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-MoldovanM #data mining #learning #mining #performance
Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDMMLDM-2015-PatchalaBG #email
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDMMLDM-2015-TreechalongRW #clustering
Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSysRecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation
Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSysRecSys-2015-BanksRS #game studies #recommendation
The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSysRecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social
A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSysRecSys-2015-MagnusonDM #process #recommendation #twitter
Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
SEKESEKE-2015-CaoHH #design #evaluation #quality
Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKESEKE-2015-ChavezM #information retrieval #ontology #query
An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKESEKE-2015-DingZ #modelling #petri net
Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKESEKE-2015-GoswamiWS #learning #performance
Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKESEKE-2015-ManiPW #co-evolution #modelling #performance
Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NetoSZD #network
Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards
Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKESEKE-2015-Tasse #analysis #identification #metric
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TrinkenreichSCS #metric #process #towards
Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKESEKE-2015-TunnellA #fault #modelling #predict #release planning
Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKESEKE-2015-XuB #multi #reliability
A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIRSIGIR-2015-AlbakourMO #data type #identification #metadata #topic
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial
Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIRSIGIR-2015-CapraACV #complexity #difference
Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIRSIGIR-2015-HaraSKF #recommendation
Reducing Hubness: A Cause of Vulnerability in Recommender Systems (KH, IS, KK, KF), pp. 815–818.
SIGIRSIGIR-2015-Kiseleva #behaviour #information management
Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIRSIGIR-2015-LiLZS #matrix #modelling #multi #retrieval
Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIRSIGIR-2015-LiuAH #information retrieval #probability
Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIRSIGIR-2015-Lu #statistics
Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIRSIGIR-2015-MehrotraY #learning #query #rank
Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIRSIGIR-2015-Mitra #distributed #query
Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIRSIGIR-2015-NovakBZ #image #retrieval #scalability
Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIRSIGIR-2015-ParkC #concept #retrieval
Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIRSIGIR-2015-WeiG #summary #twitter
Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIRSIGIR-2015-YaoSQWSH #recommendation #social
Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
SKYSKY-2015-Oliveira #learning
Learning the Meaning of Language and using It Creatively (HGO), p. 3.
ECMFAECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism
Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMTAMT-2015-HilkenBGV #development #modelling
Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
ICMTICMT-2015-CriadoMIC #model transformation #reuse
Enabling the Reuse of Stored Model Transformations Through Annotations (JC, SMP, LI, JC), pp. 43–58.
ICMTICMT-2015-MooijEHW #effectiveness #industrial #modelling
Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models (AJM, GE, JH, HvW), pp. 66–81.
MoDELSMoDELS-2015-Fernandez-SaezC #documentation #industrial #maintenance #on the #overview #uml
On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELSMoDELS-2015-LuddeckeSSS #modelling #network
Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELSMoDELS-2015-SchottleK #api #modelling #reuse
Concern-oriented interfaces for model-based reuse of APIs (MS, JK), pp. 286–291.
MoDELSMoDELS-2015-StephanC #clone detection #detection #identification
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
SPLCSPLC-2015-BeekFGM #analysis #product line
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeucheH #lifecycle #product line
Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLCSPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi
Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLCSPLC-2015-DimovskiABW #model checking #off the shelf
Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-DudderRH #composition #design #staged #type safety
Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLCSPLC-2015-PatelS #as a service #automation #testing #variability
Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
OnwardOnward-2015-CitoLGDKR #developer #feedback #metric #runtime
Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLAOOPSLA-2015-VoelterDKE #c #case study #embedded
Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
PLATEAUPLATEAU-2015-KristenssonL #lightweight #visualisation
Aiding programmers using lightweight integrated code visualization (POK, CLL), pp. 17–24.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
LOPSTRLOPSTR-2015-CaballeroMKH #automation #generative #java #testing
Checking Java Assertions Using Automated Test-Case Generation (RC0, MM, HK, VvH), pp. 221–226.
LOPSTRLOPSTR-2015-MantelMPW #analysis #automaton #composition #data flow #network
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
PADLPADL-2015-BassedaK #logic #transaction
State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
PLDIPLDI-2015-BarowyGHZ #named #relational #spreadsheet
FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDIPLDI-2015-CraryS #peer-to-peer
Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDIPLDI-2015-GonnordMR #ranking #synthesis
Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
POPLPOPL-2015-BastaniAA #context-free grammar #reachability #specification
Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
PPDPPPDP-2015-RondogiannisT #logic programming
Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
SASSAS-2015-AdjeGM #generative #invariant #optimisation #polynomial
Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
ASEASE-2015-CarinoA #optimisation #testing #user interface
Dynamically Testing GUIs Using Ant Colony Optimization (T) (SC, JHA), pp. 138–148.
ASEASE-2015-ChoetkiertikulD #classification #predict
Predicting Delays in Software Projects Using Networked Classification (T) (MC, HKD, TT, AG), pp. 353–364.
ASEASE-2015-DeweyRH #fuzzing #rust
Fuzzing the Rust Typechecker Using CLP (T) (KD, JR, BH), pp. 482–493.
ASEASE-2015-KhatchadourianR #detection
Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
ASEASE-2015-LemieuxB #behaviour #ltl #mining #specification
Investigating Program Behavior Using the Texada LTL Specifications Miner (CL, IB), pp. 870–875.
ASEASE-2015-MaAZSGR15a #automation #generative #named #program analysis
GRT: An Automated Test Generator Using Orchestrated Program Analysis (LM, CA, CZ, HS, JG, RR), pp. 842–847.
ASEASE-2015-MercerAVS #model checking #parallel #source code
Model Checking Task Parallel Programs Using Gradual Permissions (N) (EGM, PA, NV, VS), pp. 535–540.
ASEASE-2015-NardoPAB #modelling #robust #testing
Evolutionary Robustness Testing of Data Processing Systems Using Models and Data Mutation (T) (DDN, FP, AA, LCB), pp. 126–137.
ASEASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics
Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
ASEASE-2015-SohanAM #api #automation #documentation #named #rest
SpyREST: Automated RESTful API Documentation Using an HTTP Proxy Server (N) (SMS, CA, FM), pp. 271–276.
ASEASE-2015-Vargas-Baldrich #automation #bytecode #dependence
Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
ASEASE-2015-WangD #architecture #behaviour #message passing
A Message-Passing Architecture without Public Ids Using Send-to-Behavior (ESSW, ZD), pp. 902–905.
ESEC-FSEESEC-FSE-2015-HammoudiBBR #debugging #on the #web
On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-NorthBSC #developer #named
GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSEESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation
MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSEESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing
Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSEESEC-FSE-2015-XuKB #ubiquitous
Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSEICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSEICSE-v1-2015-PetrosyanRM #api #classification #information management
Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSEICSE-v1-2015-YangXALXE #behaviour #mobile #named
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSEICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSEICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval
The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSEICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #video
scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSEICSE-v2-2015-CamilloniVA #evaluation #re-engineering
Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSEICSE-v2-2015-Cornu #debugging #named #null
Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSEICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library
Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSEICSE-v2-2015-GveroK #interactive #query #synthesis
Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSEICSE-v2-2015-HerzigN #detection #empirical
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-LutellierCGTRMK #architecture #dependence
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering
Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SACSAC-2015-BarrosCMP #education #learning #repository #reuse
Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
SACSAC-2015-BolockA #automation #constraints #generative #towards
Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SACSAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-ByunC #automation #constraints #operating system #safety #testing
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SACSAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social
Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SACSAC-2015-ChaudhuriMG #network #predict
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SACSAC-2015-CorcoglionitiRM #rdf #sorting #streaming
Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SACSAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SACSAC-2015-DabainMT #design pattern #detection
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-DarabiG #personalisation #summary #video
Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SACSAC-2015-DasK
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SACSAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-HamataniUH #smarttech
Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-HublerRFS #data flow #named
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SACSAC-2015-JeongYAYP #algorithm #interactive #network #search-based
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SACSAC-2015-Jo #algorithm #image #interactive #search-based
Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SACSAC-2015-KimK #scalability
Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SACSAC-2015-KimL #diagrams #qvt #sequence chart
Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LeTN #requirements #verification
Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SACSAC-2015-LiuI #clustering #framework #optimisation #parallel
An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SACSAC-2015-MainiS #communication #distributed #multi
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SACSAC-2015-OliveiraQMM #community #complexity #detection
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-PintoMCS #process
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SACSAC-2015-Rekha #big data #detection #performance
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SACSAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-RodriguesJD #recommendation
Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SACSAC-2015-SilvaBAR #clustering #multi #prototype
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SACSAC-2015-SilvaMR #algorithm #approach #problem
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-SilvaSBVS #assessment #framework #process
Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SACSAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SACSAC-2015-TizzeiABC #architecture #case study #product line #tool support
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SACSAC-2015-XuanLXT #empirical #fault #metric #predict #set
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SACSAC-2015-XuYYHHK #multi #predict
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
GPCEGPCE-2015-InostrozaS #algebra #composition
Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCEGPCE-2015-SeidlSS #design pattern #development #generative #product line #variability
Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
SLESLE-2015-GammaitoniKG #design
Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLESLE-2015-OchoaRT #feature model #modelling
Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
ASPLOSASPLOS-2015-OrrCYBHW
Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOSASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOSASPLOS-2015-TanQCAP #named #network
DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CASECASE-2015-AmriBARF #multi #robust
Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASECASE-2015-ArdakaniORJ #generative #predict #realtime
Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASECASE-2015-BergagardF #automation #on the
On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASECASE-2015-CarliDEAV #automation #evaluation
Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASECASE-2015-CarliDPR #energy #multi #optimisation #performance
Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChengHL #automation #petri net #robust #synthesis
Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASECASE-2015-ChenH #assembly #automation #distributed #petri net
Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASECASE-2015-DobslawGZ #challenge #industrial #network
Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASECASE-2015-FarhanPWL #algorithm #machine learning #predict
Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism
A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASECASE-2015-FerreiraBGV #framework
Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASECASE-2015-ForstnerM #optimisation #safety
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASECASE-2015-GiulianiC #optimisation #problem
Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASECASE-2015-JiaJCS #locality #named
SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASECASE-2015-KaipaTSKLG #automation
Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASECASE-2015-KeroglouH #communication #constraints #distributed
Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASECASE-2015-KimCLJ #design #estimation
Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASECASE-2015-KreutzerRREL #automation #detection #metric
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-LeeKK #online #parametricity
Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASECASE-2015-LiangSQLY #agile #assessment #development
Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASECASE-2015-LinZW #predict #realtime
Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASECASE-2015-LiuC #algorithm #evaluation #performance #quality
A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-MillerM #locality
Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASECASE-2015-ParisACAR #behaviour #learning #markov #smarttech
Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASECASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming
Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASECASE-2015-QuangTH #adaptation
FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASECASE-2015-RoyelYLLH #identification #optimisation #parametricity
A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASECASE-2015-SaksenaNKK #2d #assembly #automation #parametricity
Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASECASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling
Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASECASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASECASE-2015-TorresP #multi
Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASECASE-2015-WahrburgMCMD #estimation
Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASECASE-2015-WareS #synthesis
Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASECASE-2015-Yen #realtime
Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASECASE-2015-ZafarKSMJA #health #monitoring #process
Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASECASE-2015-ZhangTYL #assessment #markov #reliability
CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASECASE-2015-ZhuCS #energy #linear #process #recognition
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASECASE-2015-ZonEHJVSB #delivery #detection #multi #realtime
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
DACDAC-2015-AsadJ #programming #verification
Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DACDAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-Engblom #integration #platform
Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DACDAC-2015-HanKL #design #evaluation
Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DACDAC-2015-HelalBH #parallel #simulation
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-HerdtLD #simulation #verification
Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DACDAC-2015-LahiouelZT #smt #towards
Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based
Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DACDAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis
Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DACDAC-2015-TashjianD #identification #on the
On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DACDAC-2015-TsaiYPLTCC #design #energy #in memory #memory management
Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DACDAC-2015-XuLP #adaptation #modelling #physics #statistics
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #detection #embedded #hardware
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DACDAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation
An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATEDATE-2015-AhsanK #architecture #optimisation #quantum
Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATEDATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BarraganL #case study #feature model
Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATEDATE-2015-BillointSRVBFRC #2d #3d #design
A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATEDATE-2015-CakirM #clustering #correlation #detection #hardware
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-ChangD #analysis #model checking #modelling
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics
Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATEDATE-2015-CuiZSW #towards
Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATEDATE-2015-DarkeCVSM #approximate #bound #model checking
Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATEDATE-2015-ErolOSPB #metric
On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATEDATE-2015-FernandoWNKC #agile #algorithm #design #synthesis
(AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATEDATE-2015-HashemianSWWCP #array #authentication #robust
A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATEDATE-2015-HerberRWH #realtime #scheduling
Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATEDATE-2015-JiRML #hardware #implementation #logic #network #probability
A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATEDATE-2015-KauerNLSC #geometry #optimisation #programming
Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATEDATE-2015-LiaperdosSATAL #deployment #performance
Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATEDATE-2015-LiJHWCGLKW #design #optimisation
Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATEDATE-2015-LiXWNP #fine-grained #multi #power management #reduction
Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATEDATE-2015-LourencoMH
Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATEDATE-2015-MadhukarSWKM #abstraction #lazy evaluation #verification
Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATEDATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability
MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATEDATE-2015-PaulinoFBC #configuration management #execution #hardware
Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATEDATE-2015-RanjanRVPRR #configuration management #memory management #named
DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATEDATE-2015-SaifhashemiHBB #equivalence #logic #tool support
Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATEDATE-2015-SalfelderH #adaptation #evaluation #simulation
Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATEDATE-2015-ShutoYS #architecture #case study #comparative
Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATEDATE-2015-StrobelBOSP #named
Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATEDATE-2015-SunKPE #algebra #geometry #verification
Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATEDATE-2015-TanLF #memory management #reliability
Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATEDATE-2015-TeysseyreNOCCG #performance #set #simulation
Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATEDATE-2015-VenkataramanKSE #design #heuristic
Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATEDATE-2015-WengCCHW
Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATEDATE-2015-YuSHEAB #library #multi #statistics
Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATEDATE-2015-ZhuM #linear #machine learning #optimisation #programming
Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
HPCAHPCA-2015-HungerKRDVT #comprehension
Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCAHPCA-2015-LoCIS #monitoring #runtime
Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCAHPCA-2015-WuGLJC #estimation #machine learning #performance
GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDCHPDC-2015-HeSSI #cost analysis #online
Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMMISMM-2015-OsterlundL #concurrent #protocol
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
LCTESLCTES-2015-BardizbanyanSWL #data access #performance
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PDPPDP-2015-El-KazzazE #detection #framework #scalability #ubiquitous
A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
PDPPDP-2015-GianariaG #image #realtime #simulation
Real-Time Simulation of Radiological Images Using CUDA Technology (EG, EG), pp. 669–673.
PDPPDP-2015-HernandezCBTA #case study #experience #simulation
Experiences of Using Cassandra for Molecular Dynamics Simulations (RH, CC, YB, JT, EA), pp. 288–295.
PDPPDP-2015-MiwaN #thread
Progression of MPI Non-blocking Collective Operations Using Hyper-Threading (MM, KN), pp. 163–171.
PDPPDP-2015-SimonetCFF
Using Active Data to Provide Smart Data Surveillance to E-Science Users (AS, KC, GF, ITF), pp. 269–273.
PDPPDP-2015-TrahayBBL
Selecting Points of Interest in Traces Using Patterns of Events (FT, EB, MMB, JL), pp. 70–77.
PPoPPPPoPP-2015-RamachandranM #concurrent #named #performance
CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSPSOSP-2015-ChenZCCKZ #file system #hoare #logic
Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSPSOSP-2015-RaychevMM #execution #symbolic computation
Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSPSOSP-2015-WeiSCCC #in memory #performance #transaction
Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
FASEFASE-2015-AndriescuMI #automaton #data type
Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
STOCSTOC-2015-AggarwalDRS #problem
Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOCSTOC-2015-Czumaj #network #permutation #random
Random Permutations using Switching Networks (AC), pp. 703–712.
TACASTACAS-2015-BransenBCD #attribute grammar #order #scheduling
Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-KriouileS #formal method #verification
Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACASTACAS-2015-Thierry-Mieg #model checking
Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
CADECADE-2015-GransdenWR #automaton #named #proving
SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADECADE-2015-MaricJM #correctness #higher-order #proving
Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADECADE-2015-Paulson #automaton #finite #formal method #set
A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADECADE-2015-TiwariGD #synthesis
Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAVCAV-2015-BacchusK #satisfiability #set
Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAVCAV-2015-CernyCHRRST #scheduling #synthesis
From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAVCAV-2015-DeshmukhMP #consistency #metric
Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAVCAV-2015-ErezN #automation #bound #graph #smt
Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLPICLP-2015-Charwat #diagrams #programming #research #summary
Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC), pp. 301–310.
ICLPICLP-2015-LeeWZ #automation #programming #reasoning #set
Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ), pp. 247–259.
ICLPICLP-2015-LiVPSB #debugging
Debugging ASP using ILP (TL, MDV, JP, KS, TB), pp. 100–113.
ICLPICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code
Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLPICLP-J-2015-KoponenOJS #optimisation #programming #set
Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICSTICST-2015-0001YPGS #analysis #generative #testing
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-BaiSP #fault #named
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICSTICST-2015-Felbinger #assessment #model inference #quality #testing
Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICSTICST-2015-LeottaSRT #multi #robust #testing #web
Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICSTICST-2015-MahajanH #detection #html #locality
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-NoguchiWFSO #black box #optimisation #testing
History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICSTICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml
Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICSTICST-2015-SantosC #agile #challenge #industrial #mobile #testing
Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICTSSICTSS-2015-GrozSPO #finite #identification #sequence #state machine
Inferring Finite State Machines Without Reset Using State Identification Sequences (RG, AdSS, AP, CO), pp. 161–177.
ICTSSICTSS-2015-GunicenJY #adaptation #generative #multi #sequence
Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation (CG, GVJ, HY), pp. 19–34.
ICTSSICTSS-2015-HentzVM #cost analysis #grammarware #testing
Reducing the Cost of Grammar-Based Testing Using Pattern Coverage (CH, JJV, AMM), pp. 71–85.
ISSTAISSTA-2015-JiaGY #constraints #execution #reuse #symbolic computation
Enhancing reuse of constraint solutions to improve symbolic execution (XJ, CG, SY), pp. 177–187.
ISSTAISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ICSTSAT-2015-AnsoteguiGLS #community #detection
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAPTAP-2015-AthanasiouLS #concurrent #generative #testing
Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAIVMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAIVMCAI-2015-NagarS #analysis
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSECBSE-2014-BenedittoW #configuration management #runtime
Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSECBSE-2014-MateescuSY #model checking #parallel #process
Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #policy
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSAQoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance
Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSAQoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution
Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
DocEngDocEng-2014-Fan0N
Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEngDocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEngDocEng-2014-SouzaMH #metadata #named
ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRRDRR-2014-BanerjeeC #locality #video
Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRRDRR-2014-JainOD #documentation #image #retrieval #scalability
Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRRDRR-2014-KleberDS #classification #retrieval #word
Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRRDRR-2014-LemaitreCC #image #segmentation
Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRRDRR-2014-ParkerFF #documentation #heuristic #image #robust
Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRRDRR-2014-TaoTX #documentation #learning #random
Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HTHT-2014-AbbasiTL #learning #scalability
Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HTHT-2014-NoorianMV #adaptation #feedback #self
Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
JCDLJCDL-2014-BatjargalKKM #database #identification #image #multi
Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages (BB, TK, FK, AM), pp. 193–196.
JCDLJCDL-2014-ChenF #education #metadata
Using ACM DL paper metadata as an auxiliary source for building educational collections (YC, EAF), pp. 137–140.
JCDLJCDL-2014-ChoiLD #automation #classification #what
What is this song about anyway?: Automatic classification of subject using user interpretations and lyrics (KC, JHL, JSD), pp. 453–454.
JCDLJCDL-2014-DibieMS #approach #behaviour #comprehension #education #online #predict
A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDLJCDL-2014-GuoGL #education
Using affective embodied agents in information literacy education (YG, DHLG, BL), pp. 389–398.
JCDLJCDL-2014-KellyNW14a #experience #named #web
Mink: Integrating the live and archived web viewing experience using web browsers and memento (MK, MLN, MCW), pp. 469–470.
JCDLJCDL-2014-MeuschkeG #detection #retrieval
Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
JCDLJCDL-2014-PereiraSE
Disambiguating publication venue titles using association rules (DAP, EEBdS, AAAE), pp. 77–86.
SIGMODSIGMOD-2014-DyresonBG #query
Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMODSIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters
SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMODSIGMOD-2014-KalininCZ #data analysis #interactive #semantics
Interactive data exploration using semantic windows (AK, , SBZ), pp. 505–516.
SIGMODSIGMOD-2014-LevinK #network #pipes and filters #social
Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMODSIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation
Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDBVLDB-2014-FuOPZ #component #declarative #javascript #named
FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDBVLDB-2014-SarmaHC #clustering #framework #named #similarity
ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDBVLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability
Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDBVLDB-2014-YangDCC #keyword #knowledge base
Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDBVLDB-2014-YuMS #random
Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDBVLDB-2014-ZhangJSR #big data #recommendation
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDBVLDB-2015-Li0QYZ014 #query #set
Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDBVLDB-2015-WangZZLW14 #correlation #estimation #streaming
Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDBVLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability
MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEETCSEET-2014-AkpolatS #gamification #programming #re-engineering #student
Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEETCSEET-2014-Lethbridge #development #education #effectiveness #modelling
Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEETCSEET-2014-SedelmaierL #modelling #process #requirements
Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEETCSEET-2014-ShankararamanD #challenge #delivery #design #education #re-engineering
Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
EDMEDM-2014-EaglePMB #logic #student
Exploration of Student's Use of Rule Application References in a Propositional Logic Tutor (ME, VP, BM, TB), pp. 249–252.
EDMEDM-2014-FuentesRGV #data mining #mining #self #student
Accepting or Rejecting Students_ Self-grading in their Final Marks by using Data Mining (JF, CR, CGM, SV), pp. 327–328.
EDMEDM-2014-GerykP #analysis #student #visual notation
Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
EDMEDM-2014-KimPSJ #comparison #learning #linear #online #predict #student
Predicting students' learning achievement by using online learning patterns in blended learning environments: Comparison of two cases on linear and non-linear model (JK, YP, JS, IHJ), pp. 407–408.
EDMEDM-2014-Lang #predict #student
The Use of Student Confidence for Prediction & Resolving Individual Student Knowledge Structure (CL), pp. 438–440.
EDMEDM-2014-NiznanPR #detection #problem
Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
EDMEDM-2014-PeddycordHB #generative #problem #programming
Generating Hints for Programming Problems Using Intermediate Output (BWPI, AH, TB), pp. 92–98.
EDMEDM-2014-RayBR #data mining #mining
Using Data Mining to Automate ADDIE (FR, KWB, RR), pp. 429–430.
EDMEDM-2014-SaarelaK #education
Discovering Gender-Specific Knowledge from Finnish Basic Education using PISA Scale Indices (MS, TK), pp. 60–67.
EDMEDM-2014-SchneiderB #gesture #interactive #interface #recognition #student
Unraveling Students' Interaction Around a Tangible Interface Using Gesture Recognition (BS, PB), pp. 320–323.
EDMEDM-2014-ToussaintLT #automation #behaviour #detection #similarity #towards
Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDMEDM-2014-WorsleyB #learning #multimodal
Using Multimodal Learning Analytics to Study Learning Mechanisms (MW, PB), pp. 431–432.
EDMEDM-2014-XuCYM
Using EEG in Knowledge Tracing (YX, KmC, YY, JM), pp. 361–362.
EDMEDM-2014-ZhengP #algorithm #learning
Dynamic Re-Composition of Learning Groups Using PSO-Based Algorithms (ZZ, NP), pp. 357–358.
ITiCSEITiCSE-2014-BenottiMS #student
Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-GibsonM #collaboration #tool support
A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSEITiCSE-2014-Kann
Using reflections in a program integrating course (VK), p. 350.
ITiCSEITiCSE-2014-MedinaSGG #learning #student
Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSEITiCSE-2014-MI14a #principle #problem
Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSEITiCSE-2014-StrieweG14a #runtime
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
SIGITESIGITE-2014-DekhaneJ #mobile #programming #student
Using mobile apps to support novice programming students (SD, CJ), pp. 133–134.
SIGITESIGITE-2014-Halper #android #education #framework #platform #programming
Using android as a platform for programming in the IT curriculum (MH), pp. 127–132.
SIGITESIGITE-2014-Trabelsi #approach #comprehension #education #network #security
Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
SANERCSMR-WCRE-2014-Grosjean #biology #maintenance #question
Using biology and ecology as inspiration for software maintenance? (PG), p. 1.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
SANERCSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support
Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-KulkarniM #framework #obfuscation
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPCICPC-2014-ThungLOC #classification #design #diagrams #metric #network
Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSMEICSME-2014-EddyK #code search #query #source code
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-MorenoTMS #debugging #locality #on the #stack
On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSMEICSME-2014-Reiss #code search #testing #towards
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based
Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSMEICSME-2014-ShangNHJ #comprehension #development
Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-StevensR #query
Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSMEICSME-2014-VieiraFC #embedded #maintenance #metric #performance
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSMEICSME-2014-WangG #design #recommendation #refactoring
Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSMEICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #visualisation
Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSRMSR-2014-FukushimaKMYU #empirical #fault #modelling #predict
An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSRMSR-2014-LazarRS #debugging #detection #metric #similarity
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
CIAACIAA-2014-AmorimMR #canonical #finite #linear #transducer
Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
ICALPICALP-v1-2014-Lampis #approximate #graph
Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALPICALP-v1-2014-PrabhakaranSW
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FMFM-2014-LakshmiAK #analysis #liveness #reachability
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-SanatiMM #decidability #guidelines #logic #metric
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FMFM-2014-ShanWFZZWQC #verification
Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
HOFMHOFM-2014-BagheriSH #development #maintenance #modelling
Using Z in the Development and Maintenance of Computational Models of Real-World Systems (SMB, GS, JH), pp. 36–53.
HOFMHOFM-2014-BeckertGB #evaluation #interactive #proving #theorem proving #usability
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups (BB, SG, FB), pp. 3–19.
IFMIFM-2014-BrideKP #constraints #specification #theorem proving #verification #workflow
Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFMSEFM-2014-BianculliGK #logic #metric #pipes and filters
Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFMSEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction
Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFMSEFM-2014-DuboisR #functional
Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFMSEFM-2014-HajisheykhiEK #fault #modelling
Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFMSEFM-2014-ReicherdtG #matlab #modelling #verification
Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
FLOPSFLOPS-2014-Bahr #compilation #correctness #graph #proving
Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPSFLOPS-2014-Riesco #debugging #declarative #maude #semantics
Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
ICFPICFP-2014-Fisher #formal method
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
AIIDEAIIDE-2014-Abou-ZleikhaS #authoring #design #matrix #named
PaTux: An Authoring Tool for Level Design through Pattern Customisation Using Non-Negative Matrix Factorization (MAZ, NS).
AIIDEAIIDE-2014-CernyBBA #constraints #exclamation #simulation
Spice It Up! Enriching Open World NPC Simulation Using Constraint Satisfaction (MC0, CB, RB, MA).
AIIDEAIIDE-2014-SnodgrassO #approach #generative #markov
A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
AIIDEAIIDE-2014-ZhaoS #behaviour #game studies #scheduling
Using Cyclic Scheduling to Generate Believable Behavior in Games (RZ, DS).
CHI-PLAYCHI-PLAY-2014-BahamonLWGLY #game studies #generative
IC-CRIME snapshots: training crime scene photographers using procedural content generation in games (JCB, ML, PW, RG, KL, RMY), pp. 403–404.
CHI-PLAYCHI-PLAY-2014-GaoGMS #behaviour #game studies
Decreasing sedentary behaviours in pre-adolescents using casual exergames at school (YG, KMG, RLM, KGS), pp. 97–106.
CHI-PLAYCHI-PLAY-2014-GerlingB #game studies
Last tank rolling: exploring shared motion-based play to empower persons using wheelchairs (KMG, LB), pp. 415–416.
CHI-PLAYCHI-PLAY-2014-GoldmanLZ #comprehension #game studies #video
Using video games to facilitate understanding of attention deficit hyperactivity disorder: a feasibility study (TAG, FJL, JZ), pp. 115–120.
CHI-PLAYCHI-PLAY-2014-MoranMG #game studies
IRC quest: using the commons dilemma to support a single-screen game for hundreds of players (DJM, CM, TCNG), pp. 359–362.
CHI-PLAYCHI-PLAY-2014-Richards #game studies
Using an invisible coach to help players achieve fitness goals in exergames while retaining immersion (CR), pp. 299–302.
CHI-PLAYCHI-PLAY-2014-SajjadiGTT #artificial reality #collaboration #game studies
Maze commander: a collaborative asynchronous game using the oculus rift & the sifteo cubes (PS, EOCG, ST, ODT), pp. 227–236.
CHI-PLAYCHI-PLAY-2014-SheininG #contest #game studies
Jelly polo: increasing richness and competition in sports games using small-scale exertion (MS, CG), pp. 367–370.
CHI-PLAYCHI-PLAY-2014-SmithJ #game studies #quote
“Toru”: a game that reverses the wisdom of age using mosquito sound (JS, KJ), pp. 375–378.
CHI-PLAYCHI-PLAY-2014-Wood #game studies #lens #physics
Using play as a lens to bridge the physical with the digital (GW), pp. 307–310.
CoGCIG-2014-BauckhageSDTH #behaviour #clustering #game studies #heatmap
Beyond heatmaps: Spatio-temporal clustering using behavior-based partitioning of game levels (CB, RS, AD, CT, FH), pp. 1–8.
CoGCIG-2014-KimYK #geometry #graph #monte carlo #representation
Solving Geometry Friends using Monte-Carlo Tree Search with directed graph representation (HTK, DMY, KJK), pp. 1–2.
CoGCIG-2014-LabrancheSCB #automation #game studies #simulation
Using partial satisfaction planning to automatically select NPCs' goals and generate plans in a simulation game (SL, NS, SC, EB), pp. 1–8.
CoGCIG-2014-LanctotWPS #heuristic #monte carlo
Monte Carlo Tree Search with heuristic evaluations using implicit minimax backups (ML, MHMW, TP, NRS), pp. 1–8.
CoGCIG-2014-LeeceJ #game studies #markov #modelling #random
Opponent state modeling in RTS games with limited information using Markov random fields (MAL, AJ), pp. 1–7.
CoGCIG-2014-LimH #approach #automation #evaluation #game studies #generative
An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
CoGCIG-2014-ParkK #game studies #learning
Learning to play fighting game using massive play data (HSP, KJK), pp. 1–2.
CoGCIG-2014-PenaVMLP #3d
Designer-driven 3D buildings generated using Variable Neighborhood Search (JMPS, JV, SM, AL, LP), pp. 1–8.
CoGCIG-2014-SanseloneSSPD #game studies #monte carlo
Constrained control of non-playing characters using Monte Carlo Tree Search (MS, SS, CS, DP, YD), pp. 1–8.
CoGCIG-2014-YamamotoMCT #algorithm #deduction #game studies #nearest neighbour
Deduction of fighting-game countermeasures using the k-nearest neighbor algorithm and a game simulator (KY, SM, CYC, RT), pp. 1–5.
DiGRADiGRA-2014-SchottMN #experience #game studies #what
Exploring the Cause of Game (Derived) Arousal: What biometric accounts of player experience revealed (GS, RM, LN).
FDGFDG-2014-BroeckhovenT #aspect-oriented #game studies #learning #specification
Specifying the pedagogical aspects of narrative-based digital learning games using annotations (FVB, ODT).
FDGFDG-2014-CanossaBN #design pattern #game studies #named
X-COM: UFO Defense vs. XCOM: Enemy Unknown - Using gameplay design patterns to understand game remakes (AC, SB, MJN).
FDGFDG-2014-GeishauserCN #prototype #simulation #social
A prototype using territories and an affordance tree for social simulation gameplay (TG, YGC, MJN).
FDGFDG-2014-SchutterA #design #game studies
Gradequest - Evaluating the impact of using game design techniques in an undergraduate course (BDS, VVA).
FDGFDG-2014-SnodgrassO #generative #markov
Experiments in map generation using Markov chains (SS, SO).
FDGFDG-2014-TomaiF #adaptation #behaviour #learning
Adapting in-game agent behavior by observation of players using learning behavior trees (ET, RF).
FDGFDG-2014-ZhaoS #architecture #behaviour #scheduling
Virtual character behavior architecture using cyclic scheduling (RZ, DS).
CoGVS-Games-2014-BugejaDSC #distributed
High-Fidelity Graphics for Dynamically Generated Environments Using Distributed Computing (KB, KD, SS, AC), pp. 1–8.
CoGVS-Games-2014-CassolaPFMACCM #artificial reality #multi #named
Online-Gym: Multiuser Virtual Gymnasium Using RINIONS and Multiple Kinect Devices (FC, HP, BF, PM0, SA, FC, FdC, LM), pp. 1–4.
CoGVS-Games-2014-NinausKFNW #learning
The Potential Use of Neurophysiological Signals for Learning Analytics (MN, SEK, EVCF, CN, GW), pp. 1–5.
GT-VMTGT-VMT-2014-WangBL #alloy #graph #model transformation #verification
Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHICHI-2014-AferganPSJHBCJ #metric
Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHICHI-2014-BalataCM #2d #on the
On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHICHI-2014-DancuFF #navigation
Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHICHI-2014-FeinbergCB #database #design #interactive
Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHICHI-2014-FritzHMZ #case study #persuasion #process
Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHICHI-2014-GerlingMBMO #game studies #people #persuasion #towards
The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHICHI-2014-GoelLAPBHB #interactive #multi #named
SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHICHI-2014-HachisuF #feedback #interactive #interface #named
VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHICHI-2014-HarbachHWS #communication #privacy #security
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHICHI-2014-HarpsteadMAM #design #education #game studies
Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHICHI-2014-HayashiMH #gesture #identification
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHICHI-2014-HeoGL
Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHICHI-2014-HongA #modelling #performance #predict #recommendation #user interface
Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHICHI-2014-HuangTTTYCHC #named
TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHICHI-2014-HuangYWZLMLZS #named
FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHICHI-2014-KihmGKM #interactive #power management #symmetry
Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHICHI-2014-LaseckiWFB #dependence
Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHICHI-2014-LiR #online
Using annotations in online group chats (NL, MBR), pp. 863–866.
CHICHI-2014-LuFL #gesture
Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHICHI-2014-MarananASPSB #design #modelling
Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHICHI-2014-MorrisSGK #named #smarttech
RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHICHI-2014-MottW #lens
Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHICHI-2014-NielsenH #case study
Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHICHI-2014-PasqualW #predict
Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHICHI-2014-PedersenSH #scalability
Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHICHI-2014-PikeMPSW #protocol
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHICHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #video
Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHICHI-2014-PuciharCA #visual notation
The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHICHI-2014-SchildLM #3d #behaviour #design #game studies #video
Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHICHI-2014-SchwarzXMHH #classification #probability
Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHICHI-2014-SerranoEI
Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHICHI-2014-Smith-ClarkeMC #communication #mobile #network
Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHICHI-2014-SoloveyZPRM #performance
Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHICHI-2014-SuhPHK #design #evaluation #twitter
@BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHICHI-2014-SunDLLG #case study
Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHICHI-2014-TanSLC #collaboration #visual notation
Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHICHI-2014-UzorB #game studies
Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHICHI-2014-WangL #communication #gesture #similarity
Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHICHI-2014-WeiMZ #social
Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CSCWCSCW-2014-CastilloEPS #lifecycle #online #social #social media
Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCWCSCW-2014-LiuJPP #feedback #visual notation
Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCWCSCW-2014-NakazatoYSNTH #realtime #video
Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCWCSCW-2014-XuHB #design #feedback #generative #named #visual notation
Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCWCSCW-2014-YueHH #collaboration #modelling #process #web
Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
HCIDHM-2014-DuWZHM #evolution #image
Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
HCIDHM-2014-Kull
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-Luo #artificial reality #case study #metric #re-engineering
Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
HCIDHM-2014-MamessierDO #artificial reality #assessment #online
Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
HCIDHM-2014-RasoolSPK #image
Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
HCIDHM-2014-SantosST #information management #ontology #semantics #web
Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
HCIDHM-2014-YoganathanK
ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
HCIDUXU-DI-2014-BarrosSF
Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
HCIDUXU-DI-2014-EschrichKKHG #mobile
Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
HCIDUXU-DI-2014-SchusterHBRJ #experience #how
Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-ItoHN #design #interface #social
Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
HCIDUXU-DP-2014-SilvaPS #analysis #concept
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-ELAS-2014-Chunpir0B #comprehension
Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
HCIDUXU-ELAS-2014-GeabelJHABA #identification
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-ELAS-2014-KamiyaKASNMF #design
Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
HCIDUXU-ELAS-2014-MontAlvao #health #overview
Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
HCIDUXU-ELAS-2014-VilarDRNV #artificial reality #case study
A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface
Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCIHCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition
The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCIHCI-AIMT-2014-ChakravartyC #artificial reality #identification
Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCIHCI-AIMT-2014-KuribaraMOST #named
HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCIHCI-AIMT-2014-Man #hardware #video
Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCIHCI-AIMT-2014-NiLF #interactive
Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCIHCI-AIMT-2014-ReddyC #artificial reality #process #recognition
Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCIHCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TsurudaHYI #mobile
Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCIHCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive
“Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCIHCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality
Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCIHCI-AS-2014-DotencoGG #smarttech
Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCIHCI-AS-2014-KadomuraITRS #named #visualisation
AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCIHCI-AS-2014-LeeYJ #predict
Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCIHCI-AS-2014-OgataII #smarttech
Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCIHCI-TMT-2014-BrownTBKLMCEGA #design
Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCIHCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability
ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCIHCI-TMT-2014-HankiewiczB #performance #quality #source code #word
Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCIHCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface
Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCIHCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net
PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCIHCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface
Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HCIHIMI-AS-2014-AlkhateebHH #comprehension
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-IizukaG #mobile
Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HCIHIMI-AS-2014-MakiY #3d #image #multi
3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HCIHIMI-AS-2014-TanakaTH #development #education
Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HCIHIMI-AS-2014-TogawaK #collaboration #framework #smarttech
Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HCIHIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards
Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HCIHIMI-DE-2014-HottaOM #user interface
Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HCIHIMI-DE-2014-JungAK #interface #web
A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HCIHIMI-DE-2014-KatoM #deployment #modelling #quality
Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HCIHIMI-DE-2014-KhodaskarL #image #retrieval #semantics
Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HCIHIMI-DE-2014-SakaguchiIH #development #performance
Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HCIHIMI-DE-2014-SakuraiKNTH #pseudo
Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining
User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HCIHIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support
Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
HCILCT-NLE-2014-NicolaouC
Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
HCILCT-NLE-2014-OrehovackiBJ #education #quality #web
Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
HCILCT-TRE-2014-HafnerHO #artificial reality #physics
Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
HCILCT-TRE-2014-HiramatsuIFS #development #learning
Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
HCILCT-TRE-2014-SofticVMWE #research
Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
HCILCT-TRE-2014-TzanavariMCP #experience #performance #user interface
User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
HCISCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named
Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
HCISCSM-2014-AbdallaY #network #online #overview #process #social
A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
HCISCSM-2014-Ahangama #detection #realtime #social #social media #twitter
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-HuangG #empirical #health #network #social
Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
HCISCSM-2014-MendesFFC #analysis #classification #how #social
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
HCISCSM-2014-OtakeSOSUS #gamification #motivation
A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
HCISCSM-2014-PensasVGKKCV #communication #network #social
Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
HCISCSM-2014-RayaRRP #adaptation #game studies
Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
HCISCSM-2014-SchaarVZELJ #motivation #network #social
Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFTVISSOFT-2014-SchotsW #framework #visualisation
Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSECAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics
Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSECAiSE-2014-PikaWFHLA #behaviour #framework
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSECAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval
Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSECAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #variability
Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSECAiSE-2014-VergneS #community #markov #network #open source
Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEISICEIS-v1-2014-CoelhoAABB #network
Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEISICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap
Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEISICEIS-v1-2014-KleinSRF #formal method #integration #on the
On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEISICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based
The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEISICEIS-v1-2014-MamcenkoG #mobile #predict
Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEISICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel
An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEISICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring
Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation
Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEISICEIS-v2-2014-FonsecaC #concept #reuse
Reuse of Service Concepts Based on Service Patterns (WRF, PLPC), pp. 290–297.
ICEISICEIS-v2-2014-GippMBPN #detection #semantics #similarity #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-KaramtiTG #image #network #process #retrieval
Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEISICEIS-v2-2014-MeloS #design #modelling #uml
Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEISICEIS-v2-2014-OtonBGGB #learning #metadata
Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEISICEIS-v2-2014-ThommazoRROHWF #traceability
Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEISICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy
Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEISICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process
Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEISICEIS-v3-2014-NunoG #in the cloud #outsourcing
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEISICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEISICEIS-v3-2014-ZacepinsBA
Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKMCIKM-2014-AgrawalGKK #concept #graph #similarity
Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKMCIKM-2014-CarmelMPS #analysis #community
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-DavletovAC #predict
High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKMCIKM-2014-FangQHZ #composition #overview #ranking #sentiment #summary
Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKMCIKM-2014-HanWP #classification
Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKMCIKM-2014-HustonC #comparison #dependence #modelling #retrieval
A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKMCIKM-2014-LiuLK #classification #information management #performance
Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKMCIKM-2014-NguyenTT #crowdsourcing #similarity
Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKMCIKM-2014-PfeifferNB #learning #network #probability
Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKMCIKM-2014-RahmanH #network #strict
Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKMCIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability
Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKMCIKM-2014-YangLLLH #automation #clustering #detection #multi #social
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKMCIKM-2014-ZhuMHZC #social #social media #topic
Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIRECIR-2014-Aly #normalisation #parametricity
Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIRECIR-2014-GaoWO #comparison
Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIRECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #video
Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIRECIR-2014-KapteinKVB #semantics #web
Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIRECIR-2014-LefortierSRR #case study #video #web
Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIRECIR-2014-Lommatzsch #realtime #recommendation
Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIRECIR-2014-PanemBGV #detection #realtime #topic #twitter
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchuthSWR #case study #optimisation
Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIRECIR-2014-YangPSS #case study #e-commerce #query #scalability
A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics
Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICMLICML-c2-2014-ChagantyL #modelling #visual notation
Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICMLICML-c2-2014-Chen0 #big data #learning #modelling #topic
Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICMLICML-c2-2014-Cherian #nearest neighbour
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-GalG #parallel #process
Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICMLICML-c2-2014-JohanssonJDB #geometry #graph #kernel
Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICMLICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random
A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SchwingHPU #algorithm #convergence #parallel
Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-TamarMX #approximate #robust #scalability
Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPRICPR-2014-AlathariNB #segmentation
Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPRICPR-2014-AlemdarKNME #behaviour #modelling
A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPRICPR-2014-AlmogahedK #game studies #named
NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPRICPR-2014-AzizWH #graph #kernel
Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPRICPR-2014-BashbaghiGSB #multi
Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BekhetA #video
Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPRICPR-2014-BeraM #multi #realtime
Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPRICPR-2014-BicegoRFRG #behaviour
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BogunKCR #interactive #recognition
Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPRICPR-2014-BorgiLEA14a #multi #recognition
Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPRICPR-2014-BrownFP #detection #self
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNK #graph #music
Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPRICPR-2014-BuiNLYK #detection #order #statistics
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-ByeonLB #2d #classification #network
Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPRICPR-2014-CaliskanA
Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPRICPR-2014-ChanK #geometry #identification #image
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPRICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry
Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPRICPR-2014-ChenK #gesture #recognition
Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPRICPR-2014-ChenLHLLH #detection
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenWLHI #image #robust #segmentation
Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPRICPR-2014-ChevallierCA #estimation #image #metric #orthogonal
Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPRICPR-2014-ChironGM #behaviour #parametricity
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-Climent-PerezMR #detection #multi
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-DahlCB #image #multi #segmentation
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DominguesMMSR #information management #recommendation #topic
Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPRICPR-2014-DongPHLDJ #classification #network
Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPRICPR-2014-DuanHZCZ #image #segmentation
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-DuDA #modelling #topic
Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPRICPR-2014-DuHZWD #case study #classification #design #network #online #recognition
A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPRICPR-2014-ElmikatyS #detection #image #multi
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-EvangelidisSH #recognition
Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPRICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech
Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPRICPR-2014-GavriilidisT #classification #kernel #random
Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPRICPR-2014-GeXYS #image #synthesis
Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPRICPR-2014-GhoraiC #algorithm #composition #higher-order #image
An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPRICPR-2014-GiordanoPS #estimation #kernel #modelling
Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPRICPR-2014-GognaSM #matrix
Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPRICPR-2014-Gonzalez-CastroDC #adaptation #classification
Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPRICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition
Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPRICPR-2014-GuptaBVS #on the
On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPRICPR-2014-HafemannOC #network #recognition
Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPRICPR-2014-HaoXPSK #automation #semantics #topic
Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPRICPR-2014-HaqBBA #modelling #segmentation
Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPRICPR-2014-HasnatAT #clustering #image
Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPRICPR-2014-HeDY0PJ #multi #random #visual notation
Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPRICPR-2014-HuangZPZ #canonical #correlation #recognition #robust
Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPRICPR-2014-HusainDT #random
Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPRICPR-2014-HuWSC #detection #framework #robust
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-HuynhCM #3d #constraints #geometry #video
Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPRICPR-2014-IoannidisCL #clustering #modelling #multi
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPRICPR-2014-ItohIS #2d #image #linear
Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPRICPR-2014-JangLSK #automation #classification #multi #video
Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPRICPR-2014-JinIHS #approach
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-JoshiGG #automation #predict #visual notation
Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPRICPR-2014-JudV
Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPRICPR-2014-KacheleZMS #feature model #quality #recognition
Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPRICPR-2014-KapsourasN #approach #recognition
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KarM #fuzzy
Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPRICPR-2014-KeceliC #approach #multimodal
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-KimP14a #3d #interactive #physics
Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPRICPR-2014-KramarevZWL #categorisation #composition #image #representation
Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPRICPR-2014-KuangOA #estimation
Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, ), pp. 2419–2423.
ICPRICPR-2014-KumarA2 #stack
Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-KurtekS #analysis #segmentation
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LaiSTH #3d
3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPRICPR-2014-LandgrenOH #image #segmentation
A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPRICPR-2014-LeeSL #3d #invariant #recognition #self
View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPRICPR-2014-LeNVOT #documentation #retrieval
Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LinH #analysis
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiRPV #modelling #topic
Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPRICPR-2014-LuoZW #image #segmentation
Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPRICPR-2014-LuYXYWP #recognition
Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPRICPR-2014-MaHXP #3d #approach #robust
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MatsuoSY #detection #image
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MittalKKK #recognition
Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPRICPR-2014-MiyanS #consistency #image
Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPRICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition
Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MolderCCH #automation #detection #reduction
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MollerPB #analysis #quantifier
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKNK #detection #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MoyouIP #3d #estimation #performance #retrieval
LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPRICPR-2014-MuddamsettySTM #detection
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NakashikaHTA #3d #recognition
3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPRICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval
Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPRICPR-2014-NguyenGVP #framework #parametricity #process #recognition
A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPRICPR-2014-NguyenP #linear #multi
Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPRICPR-2014-NieJ #learning #linear
Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPRICPR-2014-NieKZ #learning #recognition
Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPRICPR-2014-Nilsson #polynomial
Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPRICPR-2014-NilssonAGF #detection
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NishimuraOAN #image #modelling #speech #web
Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPRICPR-2014-OhyamaYWK #recognition
Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPRICPR-2014-OtteSZ #algorithm #named
ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPRICPR-2014-PandaKC #graph #random #scalability #summary #video
Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPRICPR-2014-PaudelDHV #2d #3d #locality
Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPRICPR-2014-PerinaKB #array #classification #kernel
Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPRICPR-2014-QureshiHA #probability
A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPRICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #video
Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPRICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance
Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPRICPR-2014-RazavianASC #smarttech
Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPRICPR-2014-RenL #gender #recognition
Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPRICPR-2014-RingLRE #assessment
A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPRICPR-2014-RosaCJPFT #clustering #network #on the
On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPRICPR-2014-SaitoAFRSGC #learning
Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPRICPR-2014-SamantaC #classification
Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPRICPR-2014-SariE #analysis #detection #fault #independence
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SavakisRP #difference #gesture #learning
Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPRICPR-2014-SaygiliMH #metric #similarity
Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPRICPR-2014-SeckDT #3d #analysis #geometry
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-Shirakawa #multi #performance #similarity
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-SlitiHBA #analysis #robust
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-SongLZC #adaptation #performance
Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPRICPR-2014-SuLTLT #recognition
Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPRICPR-2014-SunTL #online
Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPRICPR-2014-TabiaV #3d #classification
3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPRICPR-2014-TaniH #detection #robust
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TegenWHOJMNA #image #segmentation #semantics
Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, ), pp. 2281–2286.
ICPRICPR-2014-TerissiPG #classification #random
Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPRICPR-2014-VuEIYY #image
Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPRICPR-2014-WangCH #hybrid #markov #multi #random #video
Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPRICPR-2014-WangGJ #learning
Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPRICPR-2014-WangS #automation #dataset #multi #segmentation
Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPRICPR-2014-WangWJ14a #markov #modelling #recognition
Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPRICPR-2014-WangYLZF #independence #recognition
Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPRICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition
View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPRICPR-2014-XiaoCJF #recognition
Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPRICPR-2014-XuS #learning #network
Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPRICPR-2014-YamadaM #approach #behaviour
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-YamashitaW #classification
k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPRICPR-2014-YangD #identification #novel
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPRICPR-2014-YangTL #energy #image #recognition
Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPRICPR-2014-YingWMYZ #problem
The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPRICPR-2014-YuCK #distance #recognition #set
Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPRICPR-2014-YuGZ #3d #recognition
Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPRICPR-2014-YuncuHB #automation #modelling #recognition #speech
Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhangT #recognition #word
Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPRICPR-2014-ZhangWGZZ #analysis #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPRICPR-2014-ZhangWL #video
Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDDKDD-2014-GaddeAO #graph #learning
Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDDKDD-2014-JinKSDGCPR #community #geometry #modelling #network #social
Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDDKDD-2014-QianHJPZ #approach #distance #learning #metric
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source
“Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDDKDD-2014-SintosT #network #social
Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDDKDD-2014-SrikantA #machine learning #programming
A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDDKDD-2014-TayebiEGB #embedded #learning #predict
Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDDKDD-2014-WangZQZ
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-WangZX #estimation
Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDDKDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #video
Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDDKDD-2014-Yoshida #adaptation #algorithm #linear #sketching
Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-AlahmadiJM #classification #concept #representation
Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIRKDIR-2014-BarcanteJDCCS #identification #mining
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-BatistaCRF #ambiguity #wiki
Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIRKDIR-2014-Bleiweiss #execution #machine learning
SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIRKDIR-2014-KudamaL #random #semantics
Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIRKDIR-2014-MorenoGV #data mining #mining #recognition #word
Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIRKDIR-2014-NagwanshiM #detection #semantics #sentiment
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-SatoNS #classification #kernel
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEODKEOD-2014-DogduKG #information management #ontology
Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEODKEOD-2014-OlszewskaSM #design #ontology #owl #uml
Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEODKEOD-2014-TarakciC #recommendation
Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMISKMIS-2014-FrancoisMA #communication #design #email #problem #traceability
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMISKMIS-2014-Grim-Yefsah #case study #information management #process #requirements
A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KRKR-2014-ClercqBSCN #game studies #programming #set
Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KRKR-2014-Dyrkolbotn #how #set
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition
Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDMMLDM-2014-JavedA #classification #dataset #network #social
Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-LarinSKKHC #classification #parametricity #representation
Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDMMLDM-2014-SandovalH #learning #network
Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDMMLDM-2014-SchraagenK #consistency #graph
Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSysRecSys-2014-BachrachFGKKNP #recommendation
Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSysRecSys-2014-BhagatWIT #learning #matrix #recommendation
Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSysRecSys-2014-LercheJ #feedback #personalisation #ranking
Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSysRecSys-2014-LiuGWB #power of
Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKESEKE-2014-ChenHQJ #performance #static analysis
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-JiangCKZD #model transformation #source code #testing
Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKESEKE-2014-KaurKF #low cost #mining #web
Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKESEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named
CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKESEKE-2014-ParkSHSHB #algorithm #resource management #search-based
Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-SinghS #machine learning #requirements
Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKESEKE-2014-SouzaRS #empirical #predict
A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKESEKE-2014-TianWHZG #feedback #recommendation #web #web service
Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKESEKE-2014-Wang #composition #web #web service
QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKESEKE-2014-WangGZ #network #predict
Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKESEKE-2014-XuL #approach #architecture #automation #synthesis
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKESEKE-2014-XuL14a #ontology #reasoning #semantics
Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIRSIGIR-2014-AnilSS #evolution #kernel #modelling #network #social
Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIRSIGIR-2014-CeroniTKN
Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIRSIGIR-2014-DaltonDA #knowledge base #query
Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIRSIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIRSIGIR-2014-Ifada #modelling #personalisation #recommendation #topic
A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIRSIGIR-2014-KeikhaPC #metric #summary
Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIRSIGIR-2014-KharazmiSSV #difference
Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIRSIGIR-2014-KumarJF #detection #twitter
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-LivneGTDA #difference #named #recommendation
CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIRSIGIR-2014-RoitmanHK
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIRSIGIR-2014-RoyVGC #query #segmentation #sequence
Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIRSIGIR-2014-Sebastian #clustering #predict #semantics
Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIRSIGIR-2014-WuKS #behaviour #online
Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKYSKY-2014-Ben-Av #algebra #generative #multi #ontology
Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards
Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
SPLCSPLC-2014-KnappRS #development #modelling #on the #product line #testing
On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLCSPLC-2014-Lantz #agile #case study #development #modelling
Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
ECOOPECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #virtual machine
Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
OOPSLAOOPSLA-2014-Desai0M #proving #reduction #source code
Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-VoraKG #algorithm #consistency #named #parallel
ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PEPMPEPM-J-2013-Simon14 #type inference
Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PADLPADL-2014-CampeottoPDFP #constraints #theorem proving
Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADLPADL-2014-LakinP #compilation #functional #programming language
Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
PLDIPLDI-2014-DeVitoRFAH #generative #runtime
First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDIPLDI-2014-PekQM #c #data type #logic #proving
Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
POPLPOPL-2014-ChaudhuriCS #proving #synthesis
Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
PPDPPPDP-2014-Schopp #low level #source code
Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPLQAPL-2014-Feng #distributed #hybrid #modelling #probability
Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
SASSAS-2014-ChenHTWW #recursion #source code #verification
Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
RERE-2014-AntonelliRLO
Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-PorterLS #case study #experience #feedback #framework #requirements
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RERE-2014-SlavinLNB #diagrams #feature model #requirements #security
Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQREFSQ-2014-OjameruayeB #requirements
Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
ASEASE-2014-Borg #debugging #re-engineering
Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-DeweyRH #constraints #fuzzing #logic programming
Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASEASE-2014-DingesA #execution #generative
Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASEASE-2014-HamidiAL #adaptation
Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASEASE-2014-LutzD #comparison #data flow #difference #interactive #programming #visual notation
Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASEASE-2014-MaezawaNWH #ajax #validation
Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASEASE-2014-MahajanH #comparison #html #image
Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASEASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing
MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASEASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring
Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASEASE-2014-OsterlundL #component #concurrent
Concurrent transformation components using contention context sensors (, WL), pp. 223–234.
ASEASE-2014-RajanSSK #execution
Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASEASE-2014-RanganathVG #comparison #testing
Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASEASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management
Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
FSEFSE-2014-LalQ #verification
Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSEFSE-2014-VakiliD #infinity #modelling #smt #verification
Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSEFSE-2014-YeBL #debugging #learning #rank
Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSEICSE-2014-ChenSJHNF #anti #detection #performance
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-FritzBMYZ #development #metric
Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-MinkuY #estimation #how #question
How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSEICSE-2014-MiyashitaTA #modelling #spreadsheet
Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SingerFS #developer #how #re-engineering #twitter
Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSEICSE-2014-ZayanAC #comprehension #empirical
Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SACSAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech
A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SACSAC-2014-Al-RefaiCF #modelling #runtime
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-AnderssonDA #artificial reality #identification
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SACSAC-2014-BergamascoN #3d #approach #feature model #retrieval
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming
Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SACSAC-2014-BoghratiHK #framework #process
Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SACSAC-2014-ChangHL #adaptation #clustering #optimisation
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SACSAC-2014-ChoiKK #modelling #ontology
Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SACSAC-2014-Daniel #communication #protocol
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-EngielCL #approach #concept #elicitation
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-GomesACHS #agile #development #framework #game studies #platform
Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SACSAC-2014-HoritaHSNTO #approach #modelling #refinement
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #approach #identification #modelling
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JunAK #detection
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #detection #multimodal #process #smarttech
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KrikavaCF14a #domain-specific language #modelling
Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SACSAC-2014-LiMZ #visualisation
Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SACSAC-2014-ManhaesCZ #architecture #named #predict
WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SACSAC-2014-OmatuY #classification #smell
Smell classification using weakly responding data (SO, MY), pp. 213–214.
SACSAC-2014-PalVCS #detection #smarttech
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-ParkKC #framework #kernel #memory management #online #platform
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SACSAC-2014-PedrosaP
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SACSAC-2014-PengYYHKH #3d #detection #multi
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-RossiLR #algorithm #classification #network
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-SypeS #case study #online #requirements #social
Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SACSAC-2014-TragatschnigTZ #impact analysis
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-WijenayakeP #estimation #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SACSAC-2014-YokoyamaKM
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SACSAC-2014-YoonY #authentication #network
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SACSAC-2014-ZardariBE
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SACSAC-2014-Zheng #matrix
Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
SLESLE-J-2012-GuizzardiZ #concept #modelling #ontology
Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
GPCEGPCE-2014-Asai #compilation
Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
SLESLE-2014-Ridge #combinator #context-free grammar #parsing #performance
Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOSASPLOS-2014-SantosRSW #mobile #runtime
Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CASECASE-2014-ChenLL #adaptation #design #predict
Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASECASE-2014-ChenS #approach #markov #modelling #novel
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-FeyzabadiC #markov #process
Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASECASE-2014-GaoLWA #monitoring #petri net #problem #sequence
A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASECASE-2014-GlorieuxDSL #approach #optimisation
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HsiehHP #generative #predict
Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASECASE-2014-HuCLY #approach #automation #comparative #petri net
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-KernWGBM #estimation #machine learning
COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASECASE-2014-LeePP #locality
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LinHC #gesture #network #recognition
Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASECASE-2014-LinWF
Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASECASE-2014-LiWC
Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASECASE-2014-MahlerKLSMKPWFAG #learning #process
Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASECASE-2014-NagataO #approach #multi
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-ParkLH #generative #performance
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-WahrburgZMD #assembly #estimation
Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
CCCC-2014-Dinechin #code generation
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SurendranBZS #array
Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
DACDAC-2014-AdirGGS #generative #network #testing
Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-ChangJC #configuration management #functional
Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DACDAC-2014-GebalaMMRT #on the
On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DACDAC-2014-KhosraviRGT #multi #optimisation #reliability
Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DACDAC-2014-LiuCTKD #component #realtime
Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DACDAC-2014-LiuFC #process #self
Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DACDAC-2014-LuCCSHTC #named
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-MaoWZCL #architecture #memory management
Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DACDAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art
Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DACDAC-2014-PrussKE #abstraction #equivalence #scalability #verification
Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DACDAC-2014-RaoEST #multi
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RenMRZ #fault tolerance #network
Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DACDAC-2014-RoyKCBC #streaming
Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DACDAC-2014-StoermerT #functional #interface #mockup #standard
Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DACDAC-2014-TsaiCYYHCCC #energy
Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DACDAC-2014-VaidyanathanDP #detection #reliability #stack
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-WeiWNP #physics #reverse engineering
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DACDAC-2014-YuSHEAB #metric #parametricity
Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATEDATE-2014-AhariAKT #architecture #configuration management #power management
A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATEDATE-2014-AlaghiH #performance #probability
Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-Braak #adaptation #embedded #scalability
Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATEDATE-2014-CannellaBS #approach #realtime #scheduling #streaming
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-CasparLH #automation #strict #testing
Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATEDATE-2014-ConosMDP #coordination #energy #power management
Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATEDATE-2014-DoanJP #flexibility #implementation #multi #scalability
Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-FriedlerKMNS #effectiveness #locality #slicing
Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATEDATE-2014-KamalGAP #approximate #performance
Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATEDATE-2014-LagraaTP #data mining #mining #scalability #simulation
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATEDATE-2014-LeeA #architecture #hybrid #novel #power management
A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATEDATE-2014-MahmoodPM #performance #reduction
Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATEDATE-2014-MarianiPZS #design #named #predict #scheduling #simulation
DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATEDATE-2014-MoralesHBHV #energy #implementation
Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATEDATE-2014-NarayananDCCLW #video
Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATEDATE-2014-ReimerSSB
Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATEDATE-2014-Sadri0WWB #3d #energy #optimisation
Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATEDATE-2014-SarafBLR #probability
IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATEDATE-2014-ShinPM #architecture #hybrid
Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATEDATE-2014-TurkyilmazCRBC #3d #integration
3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATEDATE-2014-VartziotisKCPJ #multi #optimisation
Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-YangMPOP #logic
Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATEDATE-2014-ZangenehJ #design #feedback #logic
Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
HPCAHPCA-2014-KhanAWMJ #clustering #performance
Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCAHPCA-2014-KimLJK #architecture #gpu #memory management #named
GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDCHPDC-2014-XiangMA #matrix #pipes and filters #scalability
Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMMISMM-2014-LiDL #liveness #modelling
Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMMISMM-2014-Printezis #perspective #twitter #virtual machine
Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTESLCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence
Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PDPPDP-2014-AshrafP #multi #web
Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment (AA, IP), pp. 482–489.
PDPPDP-2014-BrownJHSIG #parallel #performance #refactoring #tool support
Agricultural Reform: More Efficient Farming Using Advanced Parallel Refactoring Tools (CB, VJ, KH, HS, KI, CWG), pp. 36–43.
PDPPDP-2014-BuiFVHHLPH #parallel #scalability
Scalable Parallel I/O on a Blue Gene/Q Supercomputer Using Compression, Topology-Aware Data Aggregation, and Subfiling (HB, HF, VV, SH, KH, JL, MEP, KH), pp. 107–111.
PDPPDP-2014-BuonoMMV #architecture #hardware #manycore #message passing #optimisation #thread
Optimizing Message-Passing on Multicore Architectures Using Hardware Multi-threading (DB, TDM, GM, MV), pp. 262–270.
PDPPDP-2014-ChervenakSGSH #adaptation #performance #resource management #staging
Efficient Data Staging Using Performance-Based Adaptation and Policy-Based Resource Allocation (ALC, AS, JG, RS, NH), pp. 244–247.
PDPPDP-2014-DalKT #graph #performance #scalability
Fast Diameter Computation of Large Sparse Graphs Using GPUs (GHD, WAK, FWT), pp. 632–639.
PDPPDP-2014-DavtyanPGS #coordination
Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast (SD, RDP, CG, AAS), pp. 17–26.
PDPPDP-2014-FarahnakianLP #energy #learning #virtual machine
Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning (FF, PL, JP), pp. 500–507.
PDPPDP-2014-ItoF #analysis #hardware #problem #resource management
An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
PDPPDP-2014-KerteszMD #distributed #logic #multi
Multi-job Meta-brokering in Distributed Computing Infrastructures Using Pliant Logic (AK, GM, JDD), pp. 138–145.
PDPPDP-2014-Kwedlo #algorithm #modelling #parallel
A Parallel EM Algorithm for Gaussian Mixture Models Implemented on a NUMA System Using OpenMP (WK), pp. 292–298.
PDPPDP-2014-NaughtonEVB #development #message passing #simulation
Supporting the Development of Resilient Message Passing Applications Using Simulation (TN, CE, GV, SB), pp. 271–278.
PDPPDP-2014-ONeillMMK #named #platform #scheduling
SHEPARD: Scheduling on Heterogeneous Platforms Using Application Resource Demands (EO, JM, PM, PK), pp. 213–217.
PPoPPPPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing
Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPPPPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management
Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
ESOPESOP-2014-MatosGR #fault #named
REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOPESOP-2014-PercontiA #compilation #multi #semantics #verification
Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASEFASE-2014-AnjorinSLS #graph grammar #refinement
Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASEFASE-2014-MasciZJCT #user interface #verification
Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-StruberRTC #crawling #information retrieval #modelling
Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
STOCSTOC-2014-MillerS #protocol #quantum #robust
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-SalemDKT #automaton #invariant #model checking #testing
Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACASTACAS-2014-WijsB #manycore #named #on the fly
GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLAWRLA-2014-BaeM #infinity #model checking
Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
CAVCAV-2014-0001A #invariant #random
From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAVCAV-2014-BinghamL #bound #fault #simulation #verification
Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-LarrazNORR #proving
Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLPICLP-J-2014-BartakZ #logic programming #problem
Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLPICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation
Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLPICLP-J-2014-CominiTV #linear #logic
Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSSICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing
Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCARIJCAR-2014-GoreOT #calculus #implementation
Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCARIJCAR-2014-GoreTW #logic #proving #theorem proving
A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTAISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTAISSTA-2014-YandrapallyTSC #automation #robust #testing
Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTAISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing
Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
ICSTSAT-2014-BelovHM #proving
MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
ICSTSAT-2014-HeymanSMLA
Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
ICSTSAT-2014-WetzlerHH #named #performance #proving
DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAPTAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml
Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis
Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSECBSE-2013-BurtonS #correctness #data type #mixin
Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSECBSE-2013-GortonLLED #case study #component #delivery #experience #platform
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSAQoSA-2013-DurdikR #design pattern #documentation #on the
On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
DocEngDocEng-2013-DoTT #documentation #taxonomy
Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEngDocEng-2013-NourashrafeddinMA #clustering #documentation #interactive
Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEngDocEng-2013-SatkhozhinaAA #random #recognition
Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEngDocEng-2013-TorabiDT
Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEngDocEng-2013-Vion-Dury #documentation #integration #owl #semantics
Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRRDRR-2013-AriesON #algorithm #automation #classification #clustering #summary
Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRRDRR-2013-KumarPR13a #composition #documentation #evaluation
Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRRDRR-2013-KumarWGS #framework #keyword
Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRRDRR-2013-MedjkouneMPV #approach #online #recognition
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SrihariKTB #verification
Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRRDRR-2013-ZhuHZ #image #recognition #retrieval
Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HTHT-2013-WolffMC #data flow #named
Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HTHT-2013-WuCH #recommendation
Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDARICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval
Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDARICDAR-2013-AhmedSLD #segmentation
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-AlaeiDG #detection #probability #representation
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BaechlerLI #classification
Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDARICDAR-2013-BaiYL #correlation #locality
Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDARICDAR-2013-BaroniaN #reduction
Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDARICDAR-2013-BouillonLAR #gesture #learning
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDARICDAR-2013-BreuelUAS #network
High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDARICDAR-2013-ChengSAT #classification #data fusion #image #visual notation
Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDARICDAR-2013-ChowdhuryBP #distance #metric #online #recognition
Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDARICDAR-2013-DuAD #multi #scalability
Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDARICDAR-2013-FeildLS #probability #recognition
Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDARICDAR-2013-FielS #identification #retrieval #visual notation
Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDARICDAR-2013-Furukawa #composition
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-GotoIFU #graph #scalability #set
Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDARICDAR-2013-HamdaniMN #composition #recognition
Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDARICDAR-2013-HerzogSN #graph #retrieval
Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDARICDAR-2013-HuC #classification #pseudo #verification
Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDARICDAR-2013-HuZ #multi
Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features (LH, RZ), pp. 1180–1184.
ICDARICDAR-2013-ItaniHI
Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDARICDAR-2013-JainD13a #identification
Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
ICDARICDAR-2013-KasarBACP #detection #documentation #image #learning
Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDARICDAR-2013-KieuJVMD #3d #documentation #generative #image
Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes (VCK, NJ, MV, RM, JPD), pp. 489–493.
ICDARICDAR-2013-KimLT #classification #heuristic #identification
Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
ICDARICDAR-2013-KirbyH #analysis
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-KrayemSEO #recognition #word
Holistic Arabic Whole Word Recognition Using HMM and Block-Based DCT (AK, NS, LJE, TO), pp. 1120–1124.
ICDARICDAR-2013-KunzeKYK #documentation #eye tracking #image #mobile #retrieval #word
The Wordometer — Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking (KK, HK, KY, KK), pp. 25–29.
ICDARICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition
Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDARICDAR-2013-LuoOWK #approach #automation #classification
Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDARICDAR-2013-MalikRPK #documentation #retrieval
Handwritten Musical Document Retrieval Using Music-Score Spotting (RM, PPR, UP, FK), pp. 832–836.
ICDARICDAR-2013-Martin-AlboRV #feedback #interactive #online
Interactive Off-Line Handwritten Text Transcription Using On-Line Handwritten Text as Feedback (DMA, VR, EV), pp. 1280–1284.
ICDARICDAR-2013-MiyoshiNS #image
Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDARICDAR-2013-OpreanLPM #recognition #web #word
Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition (CO, LLS, AP, CM), pp. 989–993.
ICDARICDAR-2013-ParvezM #recognition #reduction
Lexicon Reduction Using Segment Descriptors for Arabic Handwriting Recognition (MTP, SAM), pp. 1265–1269.
ICDARICDAR-2013-PrumVFO #approach #modelling #online #recognition
A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDARICDAR-2013-RayCC #random #recognition
Character Recognition Using Conditional Random Field Based Recognition Engine (AR, AC, SC), pp. 18–22.
ICDARICDAR-2013-RazaSDE #detection #multi
Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDARICDAR-2013-RoeM #documentation #image
Binarization of Color Historical Document Images Using Local Image Equalization and XDoG (ER, CABM), pp. 205–209.
ICDARICDAR-2013-RoySSJ #documentation #n-gram #segmentation
Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ICDARICDAR-2013-Saabni #distance #embedded #image #performance #retrieval #word
Efficient Word Image Retrieval Using Earth Movers Distance Embedded to Wavelets Coefficients Domain (RS), pp. 314–318.
ICDARICDAR-2013-SunBOK #detection
Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDARICDAR-2013-TatawRK #clustering
Clustering of Symbols Using Minimal Description Length (OMT, TR, EJK), pp. 180–184.
ICDARICDAR-2013-TianLST #recognition
Scene Text Recognition Using Co-occurrence of Histogram of Oriented Gradients (ST, SL, BS, CLT), pp. 912–916.
ICDARICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo
Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDARICDAR-2013-WemhoenerYM #multi
Creating an Improved Version Using Noisy OCR from Multiple Editions (DW, IZY, RM), pp. 160–164.
ICDARICDAR-2013-YadavCK
Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
ICDARICDAR-2013-ZagorisP #detection #image #modelling
Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDARICDAR-2013-ZhouTLW #markov #random #recognition
Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
ICDARICDAR-2013-ZhuSSGN #2d #online #recognition #word
Online Handwritten Cursive Word Recognition Using Segmentation-Free MRF in Combination with P2DBMN-MQDF (BZ, AS, SS, VG, MN), pp. 349–353.
ICDARICDAR-2013-ZhuZ #detection #image #recognition
Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
ICDARICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
JCDLJCDL-2013-BeckerD #benchmark #corpus #metric #modelling #set
Free benchmark corpora for preservation experiments: using model-driven engineering to generate data sets (CB, KD), pp. 349–358.
JCDLJCDL-2013-GollapalliMG #graph #ranking #topic
Ranking experts using author-document-topic graphs (SDG, PM, CLG), pp. 87–96.
JCDLJCDL-2013-HeMNS #identification
Identification of works of manga using LOD resources: an experimental FRBRization of bibliographic data of comic books (WH, TM, MN, SS), pp. 253–256.
JCDLJCDL-2013-SchererLS #multi #query #repository #research
Visual-interactive querying for multivariate research data repositories using bag-of-words (MS, TvL, TS), pp. 285–294.
JCDLJCDL-2013-TuarobPG #automation #metadata #modelling #probability #recommendation #topic
Automatic tag recommendation for metadata annotation using probabilistic topic modeling (ST, LCP, CLG), pp. 239–248.
SIGMODSIGMOD-2013-AbiteboulAMST #development #rule-based
Rule-based application development using Webdamlog (SA, ÉA, GM, JS, JT), pp. 965–968.
SIGMODSIGMOD-2013-CaiVPAHJ #markov #simulation
Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
SIGMODSIGMOD-2013-Cohen #distance #edit distance
Indexing for subtree similarity-search using edit distance (SC), pp. 49–60.
SIGMODSIGMOD-2013-DeshpandeLTDSRHD #knowledge base #maintenance
Building, maintaining, and using knowledge bases: a report from the trenches (OD, DSL, MT, SD, SS, AR, VH, AD), pp. 1209–1220.
SIGMODSIGMOD-2013-FernandezMKP #fault tolerance
Integrating scale out and fault tolerance in stream processing using operator state management (RCF, MM, EK, PP), pp. 725–736.
SIGMODSIGMOD-2013-GiannikisMAK #optimisation
Workload optimization using SharedDB (GG, DM, GA, DK), pp. 1045–1048.
SIGMODSIGMOD-2013-WhangYYSKK #approach #named #parallel
ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMODSIGMOD-2013-YangWQWL #string
Improving regular-expression matching on strings using negative factors (XY, BW, TQ, YW, CL), pp. 361–372.
SIGMODSIGMOD-2013-ZhangGBFRP #named #statistics
GeoDeepDive: statistical inference using familiar data-processing languages (CZ, VG, JB, TF, CR, SP), pp. 993–996.
SIGMODSIGMOD-2013-ZhangXYZW #algorithm #named #search-based
PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
TPDLTPDL-2013-CauteruccioI
A Domain Meta-wrapper Using Seeds for Intelligent Author List Extraction in the Domain of Scholarly Articles (FC, GI), pp. 309–314.
TPDLTPDL-2013-FedoryszakTB #scalability
Large Scale Citation Matching Using Apache Hadoop (MF, DT, LB), pp. 362–365.
TPDLTPDL-2013-HallC #library #scalability #visualisation
Exploring Large Digital Library Collections Using a Map-Based Visualisation (MMH, PDC), pp. 216–227.
TPDLTPDL-2013-KemmanKM #eye tracking #interface
Eye Tracking the Use of a Collapsible Facets Panel in a Search Interface (MK, MK, JM), pp. 405–408.
TPDLTPDL-2013-KohnckeB #library #ranking
Context-Sensitive Ranking Using Cross-Domain Knowledge for Chemical Digital Libraries (BK, WTB), pp. 285–296.
TPDLTPDL-2013-MenesesBSFS #documentation #semantics
Restoring Semantically Incomplete Document Collections Using Lexical Signatures (LM, HB, SS, RF, FS), pp. 321–332.
TPDLTPDL-2013-SalahEldeenN #social #web
Resurrecting My Revolution — Using Social Link Neighborhood in Bringing Context to the Disappearing Web (HS, MLN), pp. 333–345.
VLDBVLDB-2013-0002GJ #correlation #markov #modelling
Travel Cost Inference from Sparse, Spatio-Temporally Correlated Time Series Using Markov Models (BY, CG, CSJ), pp. 769–780.
VLDBVLDB-2013-DengJLLY #concept #knowledge base #scalability #web
Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases (DD, YJ, GL, JL, CY), pp. 1606–1617.
VLDBVLDB-2013-KondaKRS #data analysis #enterprise #feature model
Feature Selection in Enterprise Analytics: A Demonstration using an R-based Data Analytics System (PK, AK, CR, VS), pp. 1306–1309.
VLDBVLDB-2013-KotsakosSKG #health #monitoring #named #smarttech
SmartMonitor: Using Smart Devices to Perform Structural Health Monitoring (DK, PS, VK, DG), pp. 1282–1285.
VLDBVLDB-2013-MahmoudNPAA #commit #database #multi
Low-Latency Multi-Datacenter Databases using Replicated Commit (HAM, FN, AP, DA, AEA), pp. 661–672.
VLDBVLDB-2013-OgdenTP #automaton #parallel #query #scalability #transducer #xml
Scalable XML Query Processing using Parallel Pushdown Transducers (PO, DBT, PP), pp. 1738–1749.
VLDBVLDB-2013-ParkMS #parallel #pipes and filters #query
Parallel Computation of Skyline and Reverse Skyline Queries Using MapReduce (YP, JKM, KS), pp. 2002–2013.
VLDBVLDB-2013-SimoesGG #algorithm #approximate #information management #performance
When Speed Has a Price: Fast Information Extraction Using Approximate Algorithms (GS, HG, LG), pp. 1462–1473.
VLDBVLDB-2013-StoicaA #performance
Improving Flash Write Performance by Using Update Frequency (RS, AA), pp. 733–744.
VLDBVLDB-2013-SundaramTSMIMD #parallel #similarity #streaming #twitter
Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing (NS, AT, NS, TM, PI, SM, PD), pp. 1930–1941.
VLDBVLDB-2013-YuanL013a
Making Updates Disk-I/O Friendly Using SSDs (MS, KAR, MC, BB), pp. 997–1008.
CSEETCSEET-2013-ArdisBCVI #education #re-engineering #source code
Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
CSEETCSEET-2013-CookDSSCH #ide #reasoning #specification #web
Specification and reasoning in SE projects using a Web IDE (CTC, SDS, YSS, MS, JCC, JEH), pp. 229–238.
CSEETCSEET-2013-FortalezaVJPC #collaboration #communication #development #distributed
Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study (LLF, SRCV, OOMJ, RP, TC), pp. 139–148.
ITiCSEITiCSE-2013-Alabdulqader #visualisation
Visualizing computer ethics using infographics (EA), p. 355.
ITiCSEITiCSE-2013-Baumgartner #approach #case study #delivery #design #education #information management
Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSEITiCSE-2013-BeltranGP #architecture #concept #in the cloud
Using CloudSim to learn cloud computing architecture/system concepts in a graduate course (MB, AG, MP), pp. 82–87.
ITiCSEITiCSE-2013-BuckD #authentication #education #modelling
Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
ITiCSEITiCSE-2013-EllisHD
Developing HFOSS projects using integrated teams across levels and institutions (HJCE, GWH, JD), p. 349.
ITiCSEITiCSE-2013-Law #interactive
Interactive lectures using quick response codes (RL), p. 317.
ITiCSEITiCSE-2013-Law13a #feedback #game studies #programming #student
Using screencasts to enhance coursework feedback for game programming students (RL), p. 329.
ITiCSEITiCSE-2013-MedinaPGR #data mining #education #learning #mining #programming
Assistance in computer programming learning using educational data mining and learning analytics (CFM, JRPP, VMÁG, MdPPR), pp. 237–242.
ITiCSEITiCSE-2013-MellodgeR #arduino #case study #experience #framework #learning #platform #student
Using the arduino platform to enhance student learning experiences (PM, IR), p. 338.
ITiCSEITiCSE-2013-RowanD #learning #mobile #overview
A systematic literature review on using mobile computing as a learning intervention (MR, JD), p. 339.
ITiCSEITiCSE-2013-TrabelsiA #education #generative #network
Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
ITiCSEITiCSE-2013-VihavainenVLP #learning #student
Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
SIGITESIGITE-2013-BrannockN #android #development
An early introduction to android app development for CS1 using sofia (EB, NPN), pp. 135–136.
SIGITESIGITE-2013-Cold #case study #experience
Partially flipped: experiences using POGIL (SJC), pp. 133–134.
SIGITESIGITE-2013-EllisJBHD
Developing HFOSS projects using integrated teams across levels and institutions (HJCE, SJ, DB, GWH, JD), pp. 139–140.
SIGITESIGITE-2013-GasparLBT #overview #programming #student #testing
A preliminary review of undergraduate programming students’ perspectives on writing tests, working with others, & using peer testing (AG, SL, NRB, RT), pp. 109–114.
SIGITESIGITE-2013-HeinonenHLV #agile #learning #re-engineering
Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
SIGITESIGITE-2013-HillC #development #education #framework #hardware #low cost #open source #platform #programming #student
Using a low-cost open source hardware development platform in teaching young students programming skills (LWH, SC), pp. 63–68.
SIGITESIGITE-2013-KawashD #assembly #development #game studies #programming #student #video
Using video game development to engage undergraduate students of assembly language programming (JK, RDC), pp. 71–76.
SIGITESIGITE-2013-LiG #communication #empirical #social #social media #student
Can you hear me now?: an empirical study on using social media to improve student-instructor communication (LL, RG), pp. 147–148.
SIGITESIGITE-2013-Lutz #3d #education
Enhancing information technology education (ITE) with the use of 3D printer technology (RL), pp. 157–158.
SIGITESIGITE-2013-PackR #student
Training cyber-defense and securing information assets using student blue teams (SJP, DCR), pp. 3–6.
SIGITESIGITE-2013-StokerAM #learning #virtual machine
Using virtual machines to improve learning and save resources in an introductory IT course (GS, TA, PM), pp. 91–96.
CSMRCSMR-2013-AsgharMSS #metric #requirements #traceability
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMRCSMR-2013-NerellaMW #approach #optimisation #query
An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
CSMRCSMR-2013-OuniKS #refactoring #search-based
Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMRCSMR-2013-PanichellaMMPOPL #how #traceability
When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
CSMRCSMR-2013-ScannielloECG #gpu
Using the GPU to Green an Intensive and Massive Computation System (GS, UE, GC, CG), pp. 384–387.
CSMRCSMR-2013-SnajberkHB #component #visualisation
Visualization of Component-Based Applications Structure Using AIVA (JS, LH, PB), pp. 409–412.
CSMRCSMR-2013-TothNFS #source code #version control
Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPCICPC-2013-DiazBMOTL #traceability
Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICSMEICSM-2013-CruzIP #development #empirical #validation
An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves (AECC, HI, NP), pp. 468–471.
ICSMEICSM-2013-DitMVP #component #library #maintenance #research
Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library (BD, EM, MLV, DP), pp. 330–339.
ICSMEICSM-2013-KhanBEL #evolution #named
eCITY: A Tool to Track Software Structural Changes Using an Evolving City (TK, HB, AE, PL), pp. 492–495.
ICSMEICSM-2013-NordOSDGK #architecture
Variations on Using Propagation Cost to Measure Architecture Modifiability Properties (RLN, IO, RSS, JD, MAG, PK), pp. 400–403.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
ICSMEICSM-2013-TabaKZHN #debugging #predict
Predicting Bugs Using Antipatterns (SEST, FK, YZ, AEH, MN), pp. 270–279.
ICSMEICSM-2013-WrightJKCW #automation #refactoring #scalability
Large-Scale Automated Refactoring Using ClangMR (HKW, DJ, MK, CC, ZW), pp. 548–551.
MSRMSR-2013-AlaliBNM #detection #distance #metric
A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSRMSR-2013-AllamanisS13a #mining #modelling #repository #source code
Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-HuW #fault #predict
Using citation influence to predict software defects (WH, KW), pp. 419–428.
MSRMSR-2013-NaguibNBH #debugging #process #recommendation
Bug report assignee recommendation using activity profiles (HN, NN, BB, DH), pp. 22–30.
MSRMSR-2013-RobbesR #developer #interactive #metric
Using developer interaction data to compare expertise metrics (RR, DR), pp. 297–300.
MSRMSR-2013-VasquezDP #analysis #development #mobile #stack overflow
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
MSRMSR-2013-WangKZ #correlation #debugging #locality
Improving bug localization using correlations in crash reports (SW, FK, YZ), pp. 247–256.
SCAMSCAM-2013-NicolayNRM #javascript #type inference
Determining dynamic coupling in JavaScript using object type inference (JN, CN, CDR, WDM), pp. 126–135.
SCAMSCAM-2013-PapadakisDT #analysis #fault #mutation testing #named
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
WCREWCRE-2013-KomondoorBDK #domain model #modelling
Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCREWCRE-2013-SalesTMV #dependence #recommendation #refactoring #set
Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
CIAACIAA-2013-BelliB #testing
Using Regular Grammars for Event-Based Testing (FB, MB), pp. 48–59.
ICALPICALP-v2-2013-BachrachP #big data #performance #pseudo #recommendation #sketching
Sketching for Big Data Recommender Systems Using Fast Pseudo-random Fingerprints (YB, EP), pp. 459–471.
IFMIFM-2013-MorgensternGS #game studies #incremental #induction
Solving Games Using Incremental Induction (AM, MG, KS), pp. 177–191.
IFMIFM-2013-SavaryFL #bytecode #detection #modelling #testing #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
IFMIFM-2013-VekrisLDM #specification #verification
Verification of EB3 Specifications Using CADP (DV, FL, CD, RM), pp. 61–76.
RTARTA-2013-BaeEM #infinity #logic #model checking
Abstract Logical Model Checking of Infinite-State Systems Using Narrowing (KB, SE, JM), pp. 81–96.
SEFMSEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt
Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
SEFMSEFM-2013-SuryadevaraSMP #behaviour #verification
Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
TLCATLCA-2013-SalvatiW #modelling #recursion
Using Models to Model-Check Recursive Schemes (SS, IW), pp. 189–204.
HaskellHaskell-2013-ClaessenP #encryption #generative #pseudo
Splittable pseudorandom number generators using cryptographic hashing (KC, MHP), pp. 47–58.
ICFPICFP-2013-AxelssonC #functional #higher-order #source code #syntax
Using circular programs for higher-order syntax: functional pearl (EA, KC), pp. 257–262.
ICFPICFP-2013-Dolan #algebra #functional #linear
Fun with semirings: a functional pearl on the abuse of linear algebra (SD), pp. 101–110.
AIIDEAIIDE-2013-ComanM #automation #generative #nondeterminism
Automated Generation of Diverse NPC-Controlling FSMs Using Nondeterministic Planning Techniques (AC, HMA).
AIIDEAIIDE-2013-DragertKV #composition #game studies #reuse
Scythe AI: A Tool for Modular Reuse of Game AI (CD, JK, CV).
AIIDEAIIDE-2013-SchenkLCGDMDZSCS #framework #independence #platform
ScriptEase II: Platform Independent Story Creation Using High-Level Patterns (KS, AL, MC, EG0, JD, RM, ND, RZ, DS, MC, JS).
CoGCIG-2013-AdrianL #approach #design #generative
An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
CoGCIG-2013-AlayedFN #behaviour #detection #machine learning #online
Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
CoGCIG-2013-AlhejaliL #heuristic #monte carlo #programming #search-based
Using genetic programming to evolve heuristics for a Monte Carlo Tree Search Ms Pac-Man agent (AMA, SML), pp. 1–8.
CoGCIG-2013-BallingerL #injection #robust
Finding robust strategies to defeat specific opponents using case-injected coevolution (CAB, SJL), pp. 1–8.
CoGCIG-2013-EfthymiadisK
Using plan-based reward shaping to learn strategies in StarCraft: Broodwar (KE, DK), pp. 1–8.
CoGCIG-2013-Harrell #case study #modelling #network #social
Modeling player preferences in avatar customization using social network data: A case-study using virtual items in Team Fortress 2 (CUL, DFH), pp. 1–8.
CoGCIG-2013-LiuLN #behaviour #effectiveness #game studies
Using CIGAR for finding effective group behaviors in RTS game (SL0, SJL, MNN), pp. 1–8.
CoGCIG-2013-MaycockT #navigation
Enhancing touch-driven navigation using informed search in Ms. Pac-Man (SM, TT), pp. 1–2.
CoGCIG-2013-Polceanu #behaviour #named
MirrorBot: Using human-inspired mirroring behavior to pass a turing test (MP), pp. 1–8.
DiGRADiGRA-2013-SiG #interactive #social
Embodied Interactive Characters using Social Robots (MS, MGB).
DiGRADiGRA-2013-WarpefeltJV #behaviour #game studies #matrix
Analyzing the believability of game character behavior using the Game Agent Matrix (HW, MJ, HV).
FDGFDG-2013-PapahristouR #game studies #named
AnyGammon: Playing backgammon variants using any board size (NP, IR), pp. 410–412.
FDGFDG-2013-RyanSVC #education #game studies #network #security
Network Nightmares: Using games to teach networks and security (WR, JS, DV, JC), pp. 413–416.
CoGVS-Games-2013-ParaskevopoulosT #artificial reality #framework #game studies
Use of Gaming Sensors and Customised Exergames for Parkinson's Disease Rehabilitation: A Proposed Virtual Reality Framework (IP, ET), pp. 1–5.
CoGVS-Games-2013-Pignot #design #game studies #logic
Is Serious Games Design Political? The Competing Logics When Using a Game Engine (EP), pp. 1–2.
GT-VMTGT-VMT-2013-RungeKH #contract #generative #testing #visual notation
Test Case Generation Using Visual Contracts (OR, TAK, RH).
CHICHI-2013-BanNFSITH #artificial reality
Augmented endurance: controlling fatigue while handling objects by affecting weight perception using augmented reality (YB, TN, TF, SS, JI, TT, MH), pp. 69–78.
CHICHI-2013-BirnbaumBFDK #behaviour #identification
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-BranzelHHSKLM0B13a #named #smarttech
GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor (AB, CH, DH, DS, MK, PL, RM, SR, PB), pp. 725–734.
CHICHI-2013-CassidyAR #game studies #mobile
Using an open card sort with children to categorize games in a mobile phone application store (BC, DSA, JCR), pp. 2287–2290.
CHICHI-2013-ChenGS #multi #student
Graduate student use of a multi-slate reading system (NC, FG, AS), pp. 1799–1808.
CHICHI-2013-CoughlanPM #collaboration #education #reuse
Building open bridges: collaborative remixing and reuse of open educational resources across organisations (TC, RP, PM), pp. 991–1000.
CHICHI-2013-DoornSG #design #experience #research #user interface
Design research by proxy: using children as researchers to gain contextual knowledge about user experience (FvD, PJS, MG), pp. 2883–2892.
CHICHI-2013-DowGW #case study
A pilot study of using crowds in the classroom (SD, EG, AW), pp. 227–236.
CHICHI-2013-GoelJMPW #mobile #named
ContextType: using hand posture information to improve mobile touch screen text entry (MG, AJ, TM, SNP, JOW), pp. 2795–2798.
CHICHI-2013-GuHHKL #named
LongPad: a touchpad using the entire area below the keyboard of a laptop computer (JG, SH, JH, SK, GL), pp. 1421–1430.
CHICHI-2013-HeklerKFB #behaviour #human-computer #research
Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
CHICHI-2013-HongYKAA #independence #network #social
Investigating the use of circles in social networks to support independence of individuals with autism (HH, SY, JGK, GDA, RIA), pp. 3207–3216.
CHICHI-2013-HuFM #community #social #social media
Whoo.ly: facilitating information seeking for hyperlocal communities using social media (YH, SDF, AMH), pp. 3481–3490.
CHICHI-2013-LomasPFK #challenge #design #education #game studies #optimisation #scalability
Optimizing challenge in an educational game using large-scale design experiments (DL, KP, JF, KRK), pp. 89–98.
CHICHI-2013-LucaZPH
Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
CHICHI-2013-MankoffRF #research
Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHICHI-2013-MassungCCJP #community #crowdsourcing
Using crowdsourcing to support pro-environmental community activism (EM, DC, KFC, MJ, CP), pp. 371–380.
CHICHI-2013-MollersDLB #scalability
Improving touch accuracy on large tabletops using predecessor and successor (MM, ND, SL, JOB), pp. 755–758.
CHICHI-2013-NancelCPYIB #scalability
High-precision pointing on large wall displays using small handheld devices (MN, OC, EP, XDY, PPI, MBL), pp. 831–840.
CHICHI-2013-OneyHOW #named
ZoomBoard: a diminutive qwerty soft keyboard using iterative zooming for ultra-small devices (SO, CH, AO, JW), pp. 2799–2802.
CHICHI-2013-Ortega #3d #automation
3D object position using automatic viewpoint transitions (MO), pp. 193–196.
CHICHI-2013-ParkBN
The roles of touch during phone conversations: long-distance couples’ use of POKE in their homes (YP, KMB, TJN), pp. 1679–1688.
CHICHI-2013-PeckYOJC #interface #visualisation
Using fNIRS brain sensing to evaluate information visualization interfaces (EMP, BFY, AO, RJKJ, RC), pp. 473–482.
CHICHI-2013-PriorWBK #agile #development
Use of an agile bridge in the development of assistive technology (SP, AW, RB, TK), pp. 1579–1588.
CHICHI-2013-RoudautRSPLB #feedback #gesture
Gesture output: eyes-free output using a force feedback touch surface (AR, AR, CS, MP, PL, PB), pp. 2547–2556.
CHICHI-2013-ShiXC #bound #network #social
Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CHICHI-2013-SpauldingF #design #prototype
Design-driven narrative: using stories to prototype and build immersive design worlds (ES, HF), pp. 2843–2852.
CHICHI-2013-SutcliffeIFPSG
Improving digital handoff using the space above the table (SWTS, ZI, DRF, AP, IS, CG), pp. 735–744.
CHICHI-2013-TausczikP #feedback #realtime
Improving teamwork using real-time language feedback (YRT, JWP), pp. 459–468.
CHICHI-2013-WisemanCBGO #detection #fault
Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCWCSCW-2013-Barlow #chat
Emergent roles in decision-making tasks using group chat (JBB), pp. 1505–1514.
CSCWCSCW-2013-BatemanGM #navigation #social
Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear (SB, CG, GIM), pp. 955–966.
CSCWCSCW-2013-BurkeK #difference #facebook
Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CSCWCSCW-2013-ChoiHHLS #communication #mining #social
Mining social relationship types in an organization using communication patterns (JC, SH, JH, GL, JS), pp. 295–302.
CSCWCSCW-2013-GeigerH #wiki
Using edit sessions to measure participation in wikipedia (RSG, AH), pp. 861–870.
CSCWCSCW-2013-HuangF #consistency #evaluation #reliability
Enhancing reliability using peer consistency evaluation in human computation (SWH, WTF), pp. 639–648.
CSCWCSCW-2013-JungLDAHB
Engaging robots: easing complex human-robot teamwork using backchanneling (MFJ, JJL, ND, SOA, PJH, CB), pp. 1555–1566.
CSCWCSCW-2013-RobsonHKP #network #social
Comparing the use of social networking and traditional media channels for promoting citizen science (CR, MAH, CK, JSP), pp. 1463–1468.
CSCWCSCW-2013-SmithQC #analysis #identification
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
CSCWCSCW-2013-ThayerSL
Recalibrating the ratio: enacting accountability in intimate relationships using shared calendars (AT, BS, CPL), pp. 203–214.
CSCWCSCW-2013-YaroshTMA #communication #quote
“Almost touching”: parent-child remote communication using the sharetable system (SY, AT, SM, GDA), pp. 181–192.
HCIDHM-HB-2013-CaoJHK #assessment #modelling
Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
HCIDHM-HB-2013-HuhK #estimation #image
Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
HCIDHM-HB-2013-KeyvaniLBO #database #metric
Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, ), pp. 343–352.
HCIDHM-HB-2013-KuzMMS #human-computer #industrial #interactive #morphism
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part I) (SK, MPM, SM, CMS), pp. 76–85.
HCIDHM-HB-2013-MayerKS #human-computer #industrial #interactive #morphism
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part II) (MPM, SK, CMS), pp. 93–100.
HCIDHM-HB-2013-NakamuraKOOHNAKMK #artificial reality #learning #self #student #towards
The Relationship between Nursing Students’ Attitudes towards Learning and Effects of Self-learning System Using Kinect (MN, YK, JO, TO, ZH, AN, KA, NK, JM, MKP), pp. 111–116.
HCIDHM-SET-2013-BaptistaSVQCD #interactive
Using Digital Interactive Television to Promote Healthcare and Wellness Inclusive Services (AB, ÁDS, IV, CQ, MC, MJD), pp. 150–156.
HCIDHM-SET-2013-BrooksB #game studies #video
Facilitators’ Intervention Variance and Outcome Influence When Using Video Games with Fibromyalgia Patients (ALB, EPB), pp. 163–172.
HCIDHM-SET-2013-KosugeIM #case study #multi
A Study for Conducting Waves by Using the Multi-channel Surface EMG (TK, NI, KM), pp. 223–231.
HCIDHM-SET-2013-MurataKEH #behaviour #metric #predict
Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
HCIDHM-SET-2013-MurataKMH
Proposal of Automotive 8-directional Warning System That Makes Use of Tactile Apparent Movement (AM, SK, MM, TH), pp. 98–107.
HCIDHM-SET-2013-PuchWFP #evaluation #interactive #simulation
Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
HCIDHM-SET-2013-YangYF #safety
Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
HCIDUXU-CXC-2013-BamasakBAAAA #artificial reality #social
Improving Autistic Children’s Social Skills Using Virtual Reality (OB, RB, HAT, SAH, GAS, MAH), pp. 342–351.
HCIDUXU-CXC-2013-LawrenceMPFSB #interactive #visualisation
Investigation of Interaction Modalities Designed for Immersive Visualizations Using Commodity Devices in the Classroom (KL, AM, NP, TF, JS, AUB), pp. 209–218.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIDUXU-CXC-2013-Said #network #social
Young Egyptians Use of Social Networks and the January 2011 Revolution (GRES), pp. 38–43.
HCIDUXU-NTE-2013-AyanogluRDNT #artificial reality #design
Using Virtual Reality to Examine Hazard Perception in Package Design (HA, FR, ED, PN, LT), pp. 30–39.
HCIDUXU-NTE-2013-DinisDNTVR #artificial reality #case study #design
Evaluating Emotional Responses to the Interior Design of a Hospital Room: A Study Using Virtual Reality (SD, ED, PN, LT, EV, FR), pp. 475–483.
HCIDUXU-NTE-2013-FeijsKSL #design
Design for Relaxation during Milk Expression Using Biofeedback (LMGF, JK, NHvS, MvL), pp. 494–503.
HCIDUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive
Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
HCIDUXU-NTE-2013-KulkarniW #energy
Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
HCIDUXU-NTE-2013-Lam #interactive
Creating Instantly Disappearing Prints Using Thermochromic Paint and Thermal Printer in an Interactive Art Installation (MLL), pp. 290–295.
HCIDUXU-NTE-2013-ReisDR #usability
Main Usability Issues in Using Virtual Environments for Older Population Warning Studies (LR, ED, FR), pp. 189–198.
HCIDUXU-NTE-2013-Shieh #design #segmentation
Designing a Product Satisfaction Model Using Customer Segmentation and Information Consolidation (MDS), pp. 568–577.
HCIDUXU-PMT-2013-BuchdidPB #design
Designing iDTV Applications from Participatory Use of Patterns (SBB, RP, MCCB), pp. 459–468.
HCIDUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability
Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
HCIDUXU-PMT-2013-JiangL #adaptation #effectiveness #matrix
Understand System’s Relative Effectiveness Using Adapted Confusion Matrix (NJ, HL), pp. 294–302.
HCIDUXU-PMT-2013-KitamuraKNSYM #community
Community Participation Support Using an ICF-Based Community Map (SK, KK, YN, KIS, JY, HM), pp. 516–524.
HCIDUXU-PMT-2013-PrisacariH #design
Using Eye-Tracking to Test and Improve Website Design (AP, TH), pp. 389–398.
HCIDUXU-WM-2013-GencerBZV #framework #machine learning #mobile
A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
HCIDUXU-WM-2013-Iitaka
ARS Module of Contents Management System Using Cell Phones (TI), pp. 682–690.
HCIDUXU-WM-2013-KondoK #development #evaluation #image #interactive #prototype #visual notation
Trial of Diagnostic to Find Preferable Job Using the Visual Image Information Interaction: Prototype Development and Evaluation in Global Human Resources Matching Site (AK, NK), pp. 525–532.
HCIDUXU-WM-2013-MinJ #functional #named
TRIGGER: Maximizing Functional Effect of Using Products (KBM, ECJ), pp. 385–391.
HCIHCI-AMTE-2013-AkiyoshiT #estimation #eye tracking #framework #interface #learning
An Estimation Framework of a User Learning Curve on Web-Based Interface Using Eye Tracking Equipment (MA, HT), pp. 159–165.
HCIHCI-AMTE-2013-Bevan #documentation #industrial
Using the Common Industry Format to Document the Context of Use (NB), pp. 281–289.
HCIHCI-AMTE-2013-GuWYL #design #interactive
A Color Schemer for Webpage Design Using Interactive Mood Board (ZG, ZW, JY, JL), pp. 555–564.
HCIHCI-AMTE-2013-HirataY #design pattern #logic #user interface
A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCIHCI-AMTE-2013-HumayounEE #case study #framework #mobile #platform
Developing Mobile Apps Using Cross-Platform Frameworks: A Case Study (SRH, SE, AE), pp. 371–380.
HCIHCI-AS-2013-BergmansS #behaviour #mobile #persuasion
Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
HCIHCI-AS-2013-CharoenpitO #biology
A New E-learning System Focusing on Emotional Aspect Using Biological Signals (SC, MO), pp. 343–350.
HCIHCI-AS-2013-DePaloPS #documentation #summary
Healthcare Interoperability: CDA Documents Consolidation Using Transport Record Summary (TRS) Construction (PD, KEP, YTS), pp. 56–65.
HCIHCI-AS-2013-HarunBON #learning
Refining Rules Learning Using Evolutionary PD (AFH, SB, CO, NLMN), pp. 376–385.
HCIHCI-AS-2013-HuseyinovT #algebra #evaluation #fuzzy
Evaluation of Computer Algebra Systems Using Fuzzy AHP at the Universities of Cyprus (IH, FST), pp. 391–397.
HCIHCI-AS-2013-KrauseB #information management #process
Subjective Ratings in an Ergonomic Engineering Process Using the Example of an In-Vehicle Information System (MK, KB), pp. 596–605.
HCIHCI-AS-2013-KroesS #mobile #persuasion
Empowering Young Adolescents to Choose the Healthy Lifestyle: A Persuasive Intervention Using Mobile Phones (LK, SS), pp. 117–126.
HCIHCI-AS-2013-LimaRSBSO #learning
Innovation in Learning — The Use of Avatar for Sign Language (TL, MSR, TAS, AB, ES, HSdO), pp. 428–433.
HCIHCI-AS-2013-MatsumotoAK #development #email #learning #word
Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
HCIHCI-AS-2013-Rauch #enterprise #gamification
Best Practices for Using Enterprise Gamification to Engage Employees and Customers (MR), pp. 276–283.
HCIHCI-AS-2013-TakahashiISUSHO #biology #eye tracking
Proposal for Driver Distraction Indexes Using Biological Signals Including Eye Tracking (NT, SI, HS, SU, YS, KH, MO), pp. 647–653.
HCIHCI-AS-2013-TsumoriN #design #evaluation
Design and Evaluation of Training System for Numerical Calculation Using Questions in SPI2 (ST, KN), pp. 511–520.
HCIHCI-AS-2013-YajimaG
The Proposal of the Remote Consultation Service System Using the Outline Function for Consultation (HY, TG), pp. 216–225.
HCIHCI-III-2013-AnKK #development #interface #usability
Development of a Virtual Keyboard System Using a Bio-signal Interface and Preliminary Usability Test (KOA, DHK, JK), pp. 3–9.
HCIHCI-III-2013-HeLWG #image #segmentation
Semi-supervised Remote Sensing Image Segmentation Using Dynamic Region Merging (NH, KL, YW, YG), pp. 153–162.
HCIHCI-III-2013-IteyaMK #analysis #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-MiwaWS #feedback #recognition #reliability #robust
Robust Face Recognition System Using a Reliability Feedback (SM, SW, MS), pp. 178–185.
HCIHCI-III-2013-SakamotoSYO #3d #metric
Evaluating Emotional State during 3DTV Viewing Using Psychophysiological Measurements (KS, SS, KY, AO), pp. 353–361.
HCIHCI-III-2013-ShinKS #image #probability #retrieval
Affect-Based Retrieval of Landscape Images Using Probabilistic Affective Model (YS, EYK, TES), pp. 362–371.
HCIHCI-III-2013-TsurudaHYI #generative #mobile
Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
HCIHCI-III-2013-Yang-MaoLLZW #evaluation #image
Evaluation of Mono/Binocular Depth Perception Using Virtual Image Display (SFYM, YTL, MHL, WJZ, YlW), pp. 483–490.
HCIHCI-III-2013-YangZZJXW #detection #multi #realtime
Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCIHCI-III-2013-ZhanZSY #image #multi #re-engineering #visual notation
Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders (YZ, JZ, SS, LY), pp. 491–497.
HCIHCI-IMT-2013-EbisawaF #detection #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHCI-IMT-2013-HammerB #realtime #robust
Robust Hand Tracking in Realtime Using a Single Head-Mounted RGB Camera (JHH, JB), pp. 252–261.
HCIHCI-IMT-2013-LeeBN #visual notation
Use of Reference Frame in Haptic Virtual Environments: Implications for Users with Visual Impairments (JYL, SB, CSN), pp. 610–617.
HCIHCI-IMT-2013-LeeT #gesture #interactive
Finger Controller: Natural User Interaction Using Finger Gestures (UL, JT), pp. 281–290.
HCIHCI-IMT-2013-MurataHMH #case study #interface
Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCIHCI-IMT-2013-PinoTIK #2d #3d #artificial reality #evaluation #performance
Using Kinect for 2D and 3D Pointing Tasks: Performance Evaluation (AP, ET, NI, GK), pp. 358–367.
HCIHCI-IMT-2013-SakairiTKG #editing #multi #visual notation
Multi-layer Control and Graphical Feature Editing Using Server-Side Rendering on Ajax-GIS (TS, TT, KK, YG), pp. 722–729.
HCIHCI-IMT-2013-SakamotoTT #music
A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCIHCI-IMT-2013-ShimizuNS #algorithm #generative #search-based
System of Generating Japanese Sound Symbolic Expressions Using Genetic Algorithm (YS, TN, MS), pp. 126–134.
HCIHCI-IMT-2013-SrivastavaT #analysis #realtime
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-IMT-2013-TungGKM #human-computer #interactive #multimodal
Multi-party Human-Machine Interaction Using a Smart Multimodal Digital Signage (TT, RG, TK, TM), pp. 408–415.
HCIHCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech
A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
HCIHCI-IMT-2013-YoshikawaMKST
A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
HCIHCI-UC-2013-ItouTM #communication #development #interface
Development of Communication Support System at Mealtimes Using Tabletop Interface (JI, ST, JM), pp. 174–182.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-LinHW #learning #visual notation
Establishing a Cognitive Map of Public Place for Blind and Visual Impaired by Using IVEO Hands-On Learning System (QWL, SLH, JLW), pp. 193–198.
HCIHCI-UC-2013-OkiTS #named
AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCIHCI-UC-2013-TsaiHCL #communication #named #network #online #product line #social
Memotree: Using Online Social Networking to Strengthen Family Communication (THT, YLH, HTC, YWL), pp. 359–367.
HCIHIMI-D-2013-AsaoSK #estimation
Estimation of Driver’s Steering Intention by Using Mechanical Impedance (TA, SS, KK), pp. 3–11.
HCIHIMI-D-2013-EnokidaKSAII #information management #metric
Assessing Mental Workload of In-Vehicle Information Systems by Using Physiological Metrics (SE, KK, SS, TA, TI, KI), pp. 584–593.
HCIHIMI-D-2013-IizukaNG #case study #interactive #scalability
A Study for Personal Use of the Interactive Large Public Display (SI, WN, KG), pp. 55–61.
HCIHIMI-D-2013-KotaniKSA #analysis #development #memory management
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-ManiwaKSA
Changes in Posture of the Upper Extremity Through the Use of Various Sizes of Tablets and Characters (HM, KK, SS, TA), pp. 89–96.
HCIHIMI-D-2013-MorodomeSAK #biology #metric
Non-contact Measurement of Biological Signals Using Microwave Radar (HM, SS, TA, KK), pp. 117–125.
HCIHIMI-D-2013-NakanoOM #3d #artificial reality
Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
HCIHIMI-D-2013-ShengLD #comprehension #eye tracking
Eyes Don’t Lie: Understanding Users’ First Impressions on Websites Using Eye Tracking (HS, NSL, SD), pp. 635–641.
HCIHIMI-D-2013-SugayaSNT #recognition
Basic Investigation into Hand Shape Recognition Using Colored Gloves Taking Account of the Peripheral Environment (TS, TS, HN, HT), pp. 133–142.
HCIHIMI-D-2013-UedaA #people #predict
Prediction of the Concern of People Using CGM (YU, YA), pp. 284–292.
HCIHIMI-D-2013-YanagimotoSY #classification #estimation #network #sentiment #word
Word Classification for Sentiment Polarity Estimation Using Neural Network (HY, MS, AY), pp. 669–677.
HCIHIMI-HSM-2013-Campbell #safety #simulation
Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
HCIHIMI-HSM-2013-ChunJHJSLCJ #natural language
Pathway Construction and Extension Using Natural Language Processing (HWC, SJJ, MNH, CHJ, SKS, SL, SPC, HJ), pp. 32–38.
HCIHIMI-HSM-2013-DamrongratKI #multi #ontology #representation #simulation
Increasing Situational Awareness of Indoor Emergency Simulation Using Multilayered Ontology-Based Floor Plan Representation (CD, HK, MI), pp. 39–45.
HCIHIMI-HSM-2013-KimuraHTN #evaluation #performance
Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
HCIHIMI-HSM-2013-LeeJ #analysis #simulation
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-MiyataWI #development
Development of a Chest X-ray Examination Support System for Foreigners Using a Personal Digital Assistant (MM, CW, MI), pp. 285–290.
HCIHIMI-HSM-2013-SaitohI #detection #learning #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HCIHIMI-HSM-2013-SakuradaH #interface #physics
A New Presence Display System Using Physical Interface Running on IP-Phones (TS, YH), pp. 411–420.
HCIHIMI-HSM-2013-SasakiHAI #simulation
Train Ride Simulation Using Assist Strap Device (TS, KH, TA, YI), pp. 189–197.
HCIHIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation
Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HCIHIMI-LCCB-2013-AntolosLLV #analysis
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-BrynielssonJL #communication #design #process #prototype #social #social media #video
Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool (JB, FJ, SL), pp. 559–568.
HCIHIMI-LCCB-2013-ItaiEM #design
Design of Space for Expression Media with the Use of Fog (SI, YE, YM), pp. 210–218.
HCIHIMI-LCCB-2013-KometaniTFA #education #feedback #student #video
Video Feedback System for Teaching Improvement Using Students’ Sequential and Overall Teaching Evaluations (YK, TT, TF, TA), pp. 79–88.
HCIHIMI-LCCB-2013-NahTRV #education #game studies #gamification
Gamification of Education Using Computer Games (FFHN, VRT, SR, PRV), pp. 99–107.
HCIHIMI-LCCB-2013-NakaI #3d #communication #gesture #web
Consideration of the Effect of Gesture Exaggeration in Web3D Communication Using 3DAgent (TN, TI), pp. 511–520.
HCIHIMI-LCCB-2013-TakahashiA #mining
User Needs Search Using Text Mining (YT, YA), pp. 607–615.
HCIHIMI-LCCB-2013-YoshidaOSNSH #assessment #comprehension #concept
Instantaneous Assessment of Learners’ Comprehension for Lecture by Using Kit-Build Concept Map System (KY, TO, KS, YN, MS, TH), pp. 175–181.
HCIOCSC-2013-BourimiK #case study #collaboration #community #experience #online
Experiences by Using AFFINE for Building Collaborative Applications for Online Communities (MB, DK), pp. 345–354.
HCIOCSC-2013-FardounZC #collaboration #education #facebook #process
Using Facebook for Collaborative Academic Activities in Education (HMF, BZ, APC), pp. 137–146.
HCIOCSC-2013-KashimaMM #content management
Effects of Sharing Farmers’ Information Using Content Management System (TK, SM, TM), pp. 296–303.
HCIOCSC-2013-WangA #network #social
Adult Learners and Their Use of Social Networking Sites (Y(W, JA), pp. 222–229.
HCIOCSC-2013-YuanOXS #classification #overview #sentiment #web
Sentiment Classification of Web Review Using Association Rules (MY, YO, ZX, HS), pp. 442–450.
VISSOFTVISSOFT-2013-GouveiaCA #fault #html #locality #visualisation
Using HTML5 visualizations in software fault localization (CG, JC, RA), pp. 1–10.
VISSOFTVISSOFT-2013-Wehrwein #lightweight #matrix #reverse engineering #visualisation
Lightweight software reverse engineering using augmented matrix visualizations (BW), pp. 1–4.
CAiSECAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net
Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #trust
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOCEDOC-2013-PlataniotisKP #architecture #design #enterprise #graph
Relating Decisions in Enterprise Architecture Using Decision Design Graphs (GP, SdK, HAP), pp. 139–146.
EDOCEDOC-2013-SelwayGMS #approach #formal method #natural language #specification
Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEISICEIS-J-2013-KalsingITN13a #incremental #legacy #mining #modelling #process
Re-learning of Business Process Models from Legacy System Using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 314–330.
ICEISICEIS-v1-2013-DombiD #modelling
Modelling Complex Systems using the Pliant Cognitive Map (JDD, JD), pp. 506–512.
ICEISICEIS-v1-2013-IsmailHQDE #clustering #evaluation #query #simulation
Clustering using Hypergraph for P2P Query Routing — Simulation and Evaluation (AI, MH, MQ, ND, MES), pp. 247–254.
ICEISICEIS-v1-2013-MaghrabyFRA #grid #image #retrieval
A Grid based Medical Image Retrieval System using Alchemi (FM, HMF, MR, MA), pp. 224–230.
ICEISICEIS-v1-2013-MoritaN #classification
Classification Model using Contrast Patterns (HM, MN), pp. 334–339.
ICEISICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-SimrinAD #heuristic #problem
A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEISICEIS-v2-2013-KalsingITN #incremental #learning #legacy #mining #modelling #process
Evolutionary Learning of Business Process Models from Legacy Systems using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 58–69.
ICEISICEIS-v2-2013-LiL #agile #network #object-oriented #predict #process
Predicting Fault-proneness of Object-Oriented System Developed with Agile Process using Learned Bayesian Network (LL, HL), pp. 5–16.
ICEISICEIS-v2-2013-Milosz #case study #enterprise #legacy #performance #testing
Performance Testing of New Enterprise Applications using Legacy Load Data — A HIS Case Study (MM), pp. 151–156.
ICEISICEIS-v2-2013-OliveiraS #aspect-oriented #modelling #requirements
Modeling Aspects in Requirements using SysML Extensions (KSdO, MdSS), pp. 126–133.
ICEISICEIS-v2-2013-PradoB #evolution
Perspectives on using Actor-Network Theory and Organizational Semiotics to Address Organizational Evolution (ABP, MCCB), pp. 173–181.
ICEISICEIS-v2-2013-SantaN #framework #learning #modelling
Modeling the Creation of a Learning Organization by using the Learning Organization Atlas Framework (MS, SN), pp. 278–285.
ICEISICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework
Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, ), pp. 427–434.
ICEISICEIS-v2-2013-TounsiHKKD #design pattern #modelling #specification
Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns (IT, ZH, MHK, AHK, KD), pp. 294–301.
ICEISICEIS-v3-2013-ChinoRAOGTT #collaboration #framework #gesture #information management #interactive
The NInA Framework — Using Gesture to Improve Interaction and Collaboration in Geographical Information Systems (DYTC, LASR, LPSA, WDO, RRdVG, CTJ, AJMT), pp. 58–66.
ICEISICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling
A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEISICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #web
Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKMCIKM-2013-AyadiTDJH #correlation #image #modelling #query #retrieval
Correlating medical-dependent query features with image retrieval models using association rules (HA, MT, MD, MBJ, JXH), pp. 299–308.
CIKMCIKM-2013-ChanLKLBR #graph #matrix
Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation (JC, WL, AK, CL, JB, KR), pp. 811–816.
CIKMCIKM-2013-ChenMLHCG #topic
Discovering coherent topics using general knowledge (ZC, AM, BL, MH, MC, RG), pp. 209–218.
CIKMCIKM-2013-ChuklinSHSR
Evaluating aggregated search using interleaving (AC, AS, KH, PS, MdR), pp. 669–678.
CIKMCIKM-2013-HermanssonKJJD #ambiguity #graph #kernel
Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
CIKMCIKM-2013-KharitonovMSO
Using historical click data to increase interleaving sensitivity (EK, CM, PS, IO), pp. 679–688.
CIKMCIKM-2013-NguyenLT #code review #performance #set
Using micro-reviews to select an efficient set of reviews (TSN, HWL, PT), pp. 1067–1076.
CIKMCIKM-2013-ShirakawaNHN #metric #probability #semantics #similarity #wiki
Probabilistic semantic similarity measurements for noisy short texts using Wikipedia entities (MS, KN, TH, SN), pp. 903–908.
CIKMCIKM-2013-SordoniHN #information retrieval #interactive #modelling #quantum #topic
Modeling latent topic interactions using quantum interference for information retrieval (AS, JH, JYN), pp. 1197–1200.
CIKMCIKM-2013-VanderbauwhedeFACM #throughput
High throughput filtering using FPGA-acceleration (WV, AF, LA, SRC, MM), pp. 1245–1248.
CIKMCIKM-2013-WijayaTM #named #ontology #web
PIDGIN: ontology alignment using web text as interlingua (DTW, PPT, TMM), pp. 589–598.
ECIRECIR-2013-AlhindiKF #case study #interactive #summary
A Pilot Study on Using Profile-Based Summarisation for Interactive Search Assistance (AA, UK, CF), pp. 672–675.
ECIRECIR-2013-AnderssonMHR #retrieval
Exploring Patent Passage Retrieval Using Nouns Phrases (LA, PM, AH, AR), pp. 676–679.
ECIRECIR-2013-ChenC #analysis #multi #network #topic
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-ChuklinSR #behaviour
Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
ECIRECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics
Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIRECIR-2013-JeongM #classification #dependence #recognition
Using WordNet Hypernyms and Dependency Features for Phrasal-Level Event Recognition and Type Classification (YJ, SHM), pp. 267–278.
ECIRECIR-2013-LagnierDGG #information management #network #predict #social
Predicting Information Diffusion in Social Networks Using Content and User’s Profiles (CL, LD, ÉG, PG), pp. 74–85.
ECIRECIR-2013-MorenoD #clustering #image #interface #mobile #web
Using Text-Based Web Image Search Results Clustering to Minimize Mobile Devices Wasted Space-Interface (JGM, GD), pp. 532–544.
ECIRECIR-2013-NguyenTT #classification #learning #rank
Folktale Classification Using Learning to Rank (DN, DT, MT), pp. 195–206.
ECIRECIR-2013-RaiberK #effectiveness #metric #predict
Using Document-Quality Measures to Predict Web-Search Effectiveness (FR, OK), pp. 134–145.
ICMLICML-c1-2013-ChenLYY #functional #matrix
General Functional Matrix Factorization Using Gradient Boosting (TC, HL, QY, YY), pp. 436–444.
ICMLICML-c1-2013-GilboaSCG #approximate #multi #process #scalability
Scaling Multidimensional Gaussian Processes using Projected Additive Approximations (EG, YS, JPC, EG), pp. 454–461.
ICMLICML-c1-2013-LiLSHD #generative #learning
Learning Hash Functions Using Column Generation (XL, GL, CS, AvdH, ARD), pp. 142–150.
ICMLICML-c1-2013-WulsinFL #correlation #markov #parsing #process
Parsing epileptic events using a Markov switching process model for correlated time series (DW, EBF, BL), pp. 356–364.
ICMLICML-c3-2013-HockingRVB #detection #learning
Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICMLICML-c3-2013-IshtevaPS #order
Unfolding Latent Tree Structures using 4th Order Tensors (MI, HP, LS), pp. 316–324.
ICMLICML-c3-2013-WanZZLF #network
Regularization of Neural Networks using DropConnect (LW, MDZ, SZ, YL, RF), pp. 1058–1066.
KDDKDD-2013-AltinigneliPB #parallel
Massively parallel expectation maximization using graphics processing units (MCA, CP, CB), pp. 838–846.
KDDKDD-2013-JhaSP #algorithm #performance #streaming
A space efficient streaming algorithm for triangle counting using the birthday paradox (MJ, CS, AP), pp. 589–597.
KDDKDD-2013-JinSSBWR #modelling #named
Forex-foreteller: currency trend modeling using news articles (FJ, NS, PS, PB, WW, NR), pp. 1470–1473.
KDDKDD-2013-KuoYHKL #network #predict #social #statistics
Unsupervised link prediction using aggregative statistics on heterogeneous social networks (TTK, RY, YYH, PHK, SDL), pp. 775–783.
KDDKDD-2013-LeeAC #realtime #twitter
Real-time disease surveillance using Twitter data: demonstration on flu and cancer (KL, AA, ANC), pp. 1474–1477.
KDDKDD-2013-LiuYK #adaptation #modelling #process
Adaptive collective routing using gaussian process dynamic congestion models (SL, YY, RK), pp. 704–712.
KDDKDD-2013-LuceyOCRM
Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
KDDKDD-2013-MukherjeeKLWHCG #behaviour
Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
KDDKDD-2013-Neumann #big data #problem
Using “big data” to solve “small data” problems (CN), p. 1140.
KDDKDD-2013-RaederPDSP #clustering #reduction #scalability
Scalable supervised dimensionality reduction using clustering (TR, CP, BD, OS, FJP), pp. 1213–1221.
KDDKDD-2013-StitelmanPDHRP #detection #network #online #scalability
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDDKDD-2013-Vatsavai #approach #learning #multi
Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDDKDD-2013-WangS #classification #multi #relational #social
Multi-label relational neighbor classification using social context features (XW, GS), pp. 464–472.
KDIRKDIR-KMIS-2013-BaliBBG #information management #tool support
Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
KDIRKDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax
Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-DuarteFD #clustering #constraints #validation
Data Clustering Validation using Constraints (JMMD, ALNF, FJFD), pp. 17–27.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-ItalaH #behaviour #diagrams #process
Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
KDIRKDIR-KMIS-2013-Lindner #constraints #parsing #random
Using Conditional Random Fields with Constraints to Train Support Vector Machines — Locating and Parsing Bibliographic References (SL), pp. 28–36.
KDIRKDIR-KMIS-2013-NartTF #automation #personalisation #recommendation
Personalized Recommendation and Explanation by using Keyphrases Automatically extracted from Scientific Literature (DDN, CT, FF), pp. 96–103.
KDIRKDIR-KMIS-2013-RauchS #case study #mining
Using Domain Knowledge in Association Rules Mining — Case Study (JR, MS), pp. 104–111.
KDIRKDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification
Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
KDIRKDIR-KMIS-2013-SousaM #tool support #web
Diagnosis of the Use of Web 2.0 Tools in the Portuguese Financial Institutions (CS, PM), pp. 368–372.
KDIRKDIR-KMIS-2013-SucaS #approach #documentation #ontology
An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEODKEOD-2013-AlirezaieL #abduction #automation #data type #reasoning
Automatic Annotation of Sensor Data Streams using Abductive Reasoning (MA, AL), pp. 345–354.
KEODKEOD-2013-CostaFML #approach #classification #information management #ontology
Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEODKEOD-2013-DaramolaAAO #information management #ontology
Using Ontology-based Information Extraction for Subject-based Auto-grading (JOD, IA, IA, OOO), pp. 373–378.
KEODKEOD-2013-TimonenPT #fuzzy #modelling #ontology #safety
Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
KEODKEOD-2013-ZouhaierDA #automation #generative #reasoning
Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
MLDMMLDM-2013-AmalamanER #detection
Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDMMLDM-2013-CastroSAE #automation #classification #database #web
Automatic Classification of Web Databases Using Domain-Dictionaries (HMMC, VJSS, ILA, HJEB), pp. 340–351.
MLDMMLDM-2013-DincA #classification #evaluation #image #random
Evaluation of Hyperspectral Image Classification Using Random Forest and Fukunaga-Koontz Transform (SD, RSA), pp. 234–245.
MLDMMLDM-2013-GaoD #data mining #distributed #mining #performance
Improving the Efficiency of Distributed Data Mining Using an Adjustment Work Flow (JG, JD), pp. 69–83.
MLDMMLDM-2013-LeeBZ #fuzzy #logic #multi #summary #topic
Multi-document Text Summarization Using Topic Model and Fuzzy Logic (SL, SB, YZ), pp. 159–168.
MLDMMLDM-2013-ParraL #clustering #dataset
Unsupervised Tagging of Spanish Lyrics Dataset Using Clustering (FLP, EL), pp. 130–143.
MLDMMLDM-2013-PohlZ #automation #n-gram #recognition #speech
Using Part of Speech N-Grams for Improving Automatic Speech Recognition of Polish (AP, BZ), pp. 492–504.
MLDMMLDM-2013-PrieditisL #bound #classification #performance #problem
When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
RecSysRecSys-2013-AdamopoulosT #collaboration #predict #recommendation
Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSysRecSys-2013-AlanaziB #markov #modelling #recommendation
A people-to-people content-based reciprocal recommender using hidden markov models (AA, MB), pp. 303–306.
RecSysRecSys-2013-HammarKN #e-commerce #recommendation
Using maximum coverage to optimize recommendation systems in e-commerce (MH, RK, BJN), pp. 265–272.
RecSysRecSys-2013-KaminskasRS #hybrid #music #recommendation
Location-aware music recommendation using auto-tagging and hybrid matching (MK, FR, MS), pp. 17–24.
RecSysRecSys-2013-KhroufT #hybrid #linked data #open data #recommendation
Hybrid event recommendation using linked data and user diversity (HK, RT), pp. 185–192.
RecSysRecSys-2013-LiuAYB #generative
Generating supplemental content information using virtual profiles (HL, MSA, BY, AB), pp. 295–302.
RecSysRecSys-2013-OstrikovRS #collaboration #metadata
Using geospatial metadata to boost collaborative filtering (AO, LR, BS), pp. 423–426.
RecSysRecSys-2013-SchelterBSAM #distributed #matrix #pipes and filters
Distributed matrix factorization with mapreduce using a series of broadcast-joins (SS, CB, MS, AA, VM), pp. 281–284.
RecSysRecSys-2013-TianJ #graph #recommendation
Recommending scientific articles using bi-relational graph-based iterative RWR (GT, LJ), pp. 399–402.
RecSysRecSys-2013-ZhangSKH #artificial reality #recommendation
Improving augmented reality using recommender systems (ZZ, SS, SRK, PH), pp. 173–176.
SEKESEKE-2013-Al-JamimiA #design pattern #detection #prolog
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-AlviD #classification #fuzzy #image
Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
SEKESEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-AsuncionSPPDM #information management
Using Change Entries to Collect Software Project Information (HUA, MS, RP, KP, ND, WJMJ), pp. 184–189.
SEKESEKE-2013-CorralSS #mobile #quality
Using a Partially Instantiated GQM to Measure the Quality of Mobile Applications (LC, AS, GS), pp. 520–524.
SEKESEKE-2013-DelfimG #coordination #mining #multi #slicing
Multiple Coordinated Views to Support Aspect Mining Using Program Slicing (FMD, REG), pp. 531–536.
SEKESEKE-2013-DengWH #algorithm #combinator #identification #multi
Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
SEKESEKE-2013-Lou0 #artificial reality #gesture #interactive #personalisation #realtime
A Real-time Personalized Gesture Interaction System Using Wii Remote and Kinect for Tiled-Display Environment (YL, WW), pp. 131–136.
SEKESEKE-2013-MaffortVBHAM #design pattern #mining
Mining Architectural Patterns Using Association Rules (CAM, MTV, RdSB, AH, NA, JM), pp. 375–380.
SEKESEKE-2013-MarcalGCJ #identification #mining #repository
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (IM, REG, RCMC, COJ), pp. 338–343.
SEKESEKE-2013-MoshirpourEF #approach #automation #ontology
Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
SEKESEKE-2013-ShahinLL #architecture #concept #documentation
Recovering Software Architectural Knowledge from Documentation using Conceptual Model (MS, PL, ZL), pp. 556–561.
SEKESEKE-2013-ShamsHK #estimation #network
Software Effort Estimation using Regularized Radial Basis Function Neural Networks (KMS, HSH, AK), pp. 473–478.
SEKESEKE-2013-SouzaSPFF #case study #generative
Generation of Thematic Maps using WPS-Cartographer: An experimental study (FCMS, ACCdS, VP, EF, VRTF), pp. 500–503.
SEKESEKE-2013-SunSJ #architecture #maintenance
Using Architecture to Support the Collaborations in Software Maintenance (YS, HS, WJ), pp. 362–357.
SEKESEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SEKESEKE-2013-ZhangLK #debugging #on the #statistics
On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
SIGIRSIGIR-2013-AgeevLA #behaviour #summary
Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
SIGIRSIGIR-2013-AlyHD #named
Taily: shard selection using the tail of score distributions (RA, DH, TD), pp. 673–682.
SIGIRSIGIR-2013-BouadjenekHBV #documentation #personalisation #representation #social
Using social annotations to enhance document representation for personalized search (MRB, HH, MB, AV), pp. 1049–1052.
SIGIRSIGIR-2013-GaoXX #query #random
Query expansion using path-constrained random walks (JG, GX, JX), pp. 563–572.
SIGIRSIGIR-2013-HassanWW #query #self #towards
Toward self-correcting search engines: using underperforming queries to improve search (AHA, RWW, YMW), pp. 263–272.
SIGIRSIGIR-2013-LeeC #social #social media #web
Building a web test collection using social media (CJL, WBC), pp. 757–760.
SIGIRSIGIR-2013-MahdabiGHC #ambiguity #concept #proximity #query #retrieval
Leveraging conceptual lexicon: query disambiguation using proximity information for patent retrieval (PM, SG, JXH, FC), pp. 113–122.
SIGIRSIGIR-2013-MaxwellC #query #topic
Compact query term selection using topically related text (KTM, WBC), pp. 583–592.
SIGIRSIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback
An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIRSIGIR-2013-RaiberK #clustering #documentation #markov #random #ranking
Ranking document clusters using markov random fields (FR, OK), pp. 333–342.
SIGIRSIGIR-2013-Rodriguez-VaamondeTF #documentation #image #web #what
What can pictures tell us about web pages?: improving document search using images (SRV, LT, AWF), pp. 849–852.
SIGIRSIGIR-2013-RossiMCS #performance #query
Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
SIGIRSIGIR-2013-SappelliVK #personalisation #recommendation
Recommending personalized touristic sights using google places (MS, SV, WK), pp. 781–784.
SIGIRSIGIR-2013-SekiM #feedback #social
Finding impressive social content creators: searching for SNS illustrators using feedback on motifs and impressions (YS, KM), pp. 1041–1044.
SIGIRSIGIR-2013-WangZS #modelling #semantics #topic
Semantic hashing using tags and topic modeling (QW, DZ, LS), pp. 213–222.
SIGIRSIGIR-2013-Wu #behaviour #how #online #predict
How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
SIGIRSIGIR-2013-Yeniterzi #effectiveness #social #social media
Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
SKYSKY-2013-Gomes #how #ontology #recommendation #representation
Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
SKYSKY-2013-RineF #complexity #information management #metric #quality #representation #requirements
Requirements Quality Knowledge Representation using Chunking Complexity Measurement: Prior to Formal Inspections (DCR, AF), pp. 3–13.
SKYSKY-2013-SuarezMFM #automation #generative #natural language #semantics
Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
AMTAMT-2013-FinotMSD #metamodelling #testing
Using Meta-model Coverage to Qualify Test Oracles (OF, JMM, GS, TD), pp. 12–21.
ECMFAECMFA-2013-SunCDF
Using Model Types to Support Contract-Aware Model Substitutability (WS, BC, SD, RBF), pp. 118–133.
ICMTICMT-2013-HermannGNBMPE #automation #graph grammar #on the
On an Automated Translation of Satellite Procedures Using Triple Graph Grammars (FH, SG, NN, BB, GM, AP, TE), pp. 50–51.
MODELSMoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml
Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MODELSMoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing
Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
MODELSMoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml
Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
OOPSLAOOPSLA-2013-ShiBH #optimisation
Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
AdaEuropeAdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety
Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
HILTHILT-2013-CourtieuACZRBHG #coq #formal method #runtime #semantics #towards
Towards the formalization of SPARK 2014 semantics with explicit run-time checks using coq (PC, MVA, TC, ZZ, R, JB, JH, JG, TJ), pp. 21–22.
HILTHILT-2013-LarsonHFD #fault #modelling #safety
Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
HILTHILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
PADLPADL-2013-MachadoAD #declarative #parallel #performance #programming
Parallel Performance of Declarative Programming Using a PGAS Model (RM, SA, DD), pp. 244–260.
PADLPADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
PEPMPEPM-2013-AlpuenteFV #automation #logic #specification
Automatic inference of specifications using matching logic (MA, MAF, AV), pp. 127–136.
PEPMPEPM-2013-Simon #type inference
Deriving a complete type inference for hindley-milner and vector sizes using expansion (AS), pp. 13–22.
PLDIPLDI-2013-GaoSBMBL #runtime #smarttech
Using managed runtime systems to tolerate holes in wearable memories (TG, KS, SMB, KSM, DB, JRL), pp. 297–308.
PLDIPLDI-2013-GveroKKP
Complete completion using types and weights (TG, VK, IK, RP), pp. 27–38.
POPLPOPL-2013-UpadrastaC #scheduling
Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
PPDPPPDP-2013-MontenegroPS #analysis #functional #regular expression
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
SASSAS-2013-WhiteM #algebra #analysis #memory management #optimisation
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
RERE-2013-Cleland-HuangCH #design #empirical #requirements
Using tracelab to design, execute, and baseline empirical requirements engineering experiments (JCH, AC, JHH), pp. 338–339.
RERE-2013-FeldererB #fault #industrial #requirements #taxonomy #validation
Using defect taxonomies for requirements validation in industrial projects (MF, AB), pp. 296–301.
REFSQREFSQ-2013-BreauxG #analysis #requirements #specification #traceability
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
REFSQREFSQ-2013-FerrariGT #clustering #documentation #natural language #requirements
Using Clustering to Improve the Structure of Natural Language Requirements Documents (AF, SG, GT), pp. 34–49.
ASEASE-2013-AvazpourGG #automation #model transformation #specification #tool support #visualisation
Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASEASE-2013-Fard #behaviour #detection #distributed #independence
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-HuangMM #proving #smt
Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASEASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing
Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASEASE-2013-KukrejaHT #game studies #testing
Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASEASE-2013-PalombaBPOLP #detection #smell #source code
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-SaadaHNS #model transformation #multi #optimisation
Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASEASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing
Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASEASE-2013-SahaLKP #debugging #information retrieval #locality
Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASEASE-2013-ScannielloGMM #clustering #fault #predict
Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASEASE-2013-Servant #analysis #debugging
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-VanciuA #architecture #constraints
Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #analysis #data flow
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-InozemtsevaHH #fault #reduction
Using fault history to improve mutation reduction (LI, HH, RH), pp. 639–642.
ESEC-FSEESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation
Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
ESEC-FSEESEC-FSE-2013-Lopez #ecosystem #evolution #modelling #topic
Using topic models to understand the evolution of a software ecosystem (NL), pp. 723–726.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-GargIBMG #c #c++ #execution #generative #testing
Feedback-directed unit test generation for C/C++ using concolic execution (PG, FI, GB, NM, AG), pp. 132–141.
ICSEICSE-2013-HaoLHG #energy #mobile #program analysis
Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSEICSE-2013-Jonsson #machine learning #performance #scalability
Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
ICSEICSE-2013-PaasivaaraLDRS #agile #distributed #education #re-engineering #student
Teaching students global software engineering skills using distributed scrum (MP, CL, DD, PR, AS), pp. 1128–1137.
ICSEICSE-2013-Rimba #assurance #platform #security
Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
ICSEICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSEICSE-2013-Souza #predict
A proposal for the improvement of project’s cost predictability using EVM and historical data of cost (ADdS), pp. 1447–1449.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
SACSAC-2013-AlnusairZY #automation #design #recognition #semantics
Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
SACSAC-2013-AraujoGA #artificial reality #identification #towards
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SACSAC-2013-BanerjeeSS #detection #monitoring
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SACSAC-2013-BlondelSU #classification #constraints #learning
Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
SACSAC-2013-CamposFHV #personalisation #query #ranking #xml
XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SACSAC-2013-CapelleHHF #recommendation #semantics
Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
SACSAC-2013-ChanHN #layout #semantics #wiki #word
Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
SACSAC-2013-ChocklerIMRS #satisfiability
Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
SACSAC-2013-CohenA #composition #refactoring
Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
SACSAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements
On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
SACSAC-2013-HeckelerSK #component #execution #robust #testing
Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
SACSAC-2013-InzingerHSLD #identification #implementation
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SACSAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling
Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
SACSAC-2013-JungWKO #architecture #automation #interactive
Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
SACSAC-2013-KalyanC #analysis #navigation
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KannanMDS #navigation #predict
Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
SACSAC-2013-KimHCYWNPC #similarity
Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
SACSAC-2013-KimM #algorithm #detection #hybrid #search-based
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SACSAC-2013-LeitaoC #adaptation #detection #optimisation #performance #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SACSAC-2013-LeoniA #mining #process
Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
SACSAC-2013-MadeoLP #gesture #rest #segmentation
Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
SACSAC-2013-MartinaP #induction #multi #protocol #security #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-MehtaRCN #approach #dependence
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SACSAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech
A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
SACSAC-2013-MendesW #navigation #realtime
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SACSAC-2013-PapadakisT #classification #mutation testing #testing
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SACSAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SACSAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction
Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
SACSAC-2013-Sobieski0 #maude #sql #term rewriting
Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
SACSAC-2013-SrivastavaSM #clustering #graph
Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
SACSAC-2013-TeixeiraRG #detection #locality #parallel
Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SACSAC-2013-TragatschnigZ #enterprise #integration
Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
GPCEGPCE-2013-GerakiosBS #java #parametricity
Reified type parameters using Java annotations (PG, AB, YS), pp. 61–64.
GPCEGPCE-2013-KramerOKC #product line #user interface
Using document-oriented GUIs in dynamic software product lines (DK, SO, PK, TC), pp. 85–94.
SLESLE-2013-DialloCL #approach #formal method #modelling
A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOSASPLOS-2013-AhnDT #alias #named
DeAliaser: alias speculation using atomic region support (WA, YD, JT), pp. 167–180.
ASPLOSASPLOS-2013-CuiHWY #execution #symbolic computation #verification
Verifying systems rules using rule-directed symbolic execution (HC, GH, JW, JY), pp. 329–342.
ASPLOSASPLOS-2013-KadavRS #fault tolerance #fine-grained
Fine-grained fault tolerance using device checkpoints (AK, MJR, MMS), pp. 473–484.
ASPLOSASPLOS-2013-SahooCGA #automation #fault #invariant #locality
Using likely invariants for automated software fault localization (SKS, JC, CG, VSA), pp. 139–152.
CASECASE-2013-BagchiBNVSS
Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASECASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-BjorkenstamGBCL #energy #industrial #performance
Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASECASE-2013-ChenZS #metric
A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASECASE-2013-FerreiraL #generative #multi #tool support
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-FerreiraR #comparison #design #layout #performance #simulation
Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASECASE-2013-Fries #agile #automation #fault #fuzzy #multi
Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASECASE-2013-Geldmann #image #monte carlo #simulation
Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASECASE-2013-GrosbardKTR #composition #network
A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASECASE-2013-HuZL #automation #performance #petri net #synthesis
Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASECASE-2013-IsmailH #3d #anti #higher-order
Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASECASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning
Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LingoR #design
A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASECASE-2013-LuSXPO #automation #graph #multi
Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASECASE-2013-MarturiDP #image #performance
Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASECASE-2013-MohajeraniMF #automaton #composition #finite #verification
Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASECASE-2013-NammotoKH #assembly #modelling
Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation
Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASECASE-2013-ShisheieJBC #design #string
Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASECASE-2013-SoviziK #matrix #nondeterminism #parallel #random
Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASECASE-2013-WangBR #modelling #monitoring
Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASECASE-2013-XuJLYL #energy #optimisation
Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASECASE-2013-YueH #concurrent #robust
Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASECASE-2013-ZhangPJST #energy #interface #monitoring #scalability
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASECASE-2013-ZhangYZH #design
Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
CCCC-2013-MooreC #automation #generative #machine learning #policy
Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
CGOCGO-2013-BardizbanyanGWSLMS #data access #performance
Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
CGOCGO-2013-HuangJBJA #automation #parallel #runtime
Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
CGOCGO-2013-KulkarniCWS #automation #heuristic #machine learning
Automatic construction of inlining heuristics using machine learning (SK, JC, CW, DS), p. 12.
DACDAC-2013-DevWR #3d #integration #testing
High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DACDAC-2013-GaillardonMABSLM #towards
Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DACDAC-2013-KarthikR #approximate #linear #modelling #named
ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DACDAC-2013-LeGHD #simulation #verification
Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DACDAC-2013-LiuYLC #named
DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DACDAC-2013-MillerVG #modelling #physics #statistics
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DACDAC-2013-SchurmansZALACW #architecture #automation #communication #modelling
Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DACDAC-2013-SekitaniYTSS
Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DACDAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics
Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DACDAC-2013-WangK #control flow #detection #hardware #kernel #named #performance
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-YuLJC #classification #detection #feature model
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AhmadyanKV #algorithm #incremental #runtime #verification
Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATEDATE-2013-AnanthanarayananGP #detection #fault #low cost #set
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-BackesR #reachability
Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATEDATE-2013-BakshiH #reduction #smt
LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATEDATE-2013-BernasconiCTV
Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATEDATE-2013-BertaccoCBFVKP #on the
On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATEDATE-2013-BrandonW
Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATEDATE-2013-BraojosAA #classification #embedded #random
A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATEDATE-2013-ChenD #parallel #predict #simulation
Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATEDATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis
On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATEDATE-2013-DeutschC #multi
Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATEDATE-2013-EbrahimiDP #3d #algorithm #fault tolerance
Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-GaoGB #fault tolerance #scheduling
Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATEDATE-2013-Gomez-PradoCT #latency #optimisation
FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HelmstetterCGMV #performance #simulation
Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATEDATE-2013-HuNRK #detection #hardware #multimodal
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-JooyaB #power management
Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATEDATE-2013-LotfianJ #architecture #hardware #power management #smarttech
An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATEDATE-2013-LukasiewyczSC #programming
Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-PaternaR #problem
Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATEDATE-2013-PontarelliOEW #detection #fault
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-QianJBTMM #analysis #named #performance
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-RustLP #architecture #complexity
Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATEDATE-2013-ShreejithVFL #approach #configuration management #network
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TzouBHC #bound #composition
Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATEDATE-2013-UnutulmazDF #optimisation
Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATEDATE-2013-VenkatesanSRR #energy #named #performance
DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATEDATE-2013-WangXZWYWNW
Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATEDATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-ZakharenkoAM #cpu #gpu #performance
Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATEDATE-2013-ZhouZY #design #energy #memory management #network
The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
HPCAHPCA-2013-ArdestaniR #manycore #named #performance
ESESC: A fast multicore simulator using Time-Based Sampling (EKA, JR), pp. 448–459.
HPCAHPCA-2013-GoswamiCL #architecture #memory management #throughput
Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
HPCAHPCA-2013-KhanAWKJ #architecture #manycore #performance
Improving multi-core performance using mixed-cell cache architecture (SMK, ARA, CW, JK, DAJ), pp. 119–130.
HPCAHPCA-2013-KrishnaCKP #latency
Breaking the on-chip latency barrier using SMART (TK, CHOC, WCK, LSP), pp. 378–389.
HPCAHPCA-2013-SudanBLXMLB #architecture #lightweight #novel #web
A novel system architecture for web scale applications using lightweight CPUs and virtualized I/O (KS, SB, SL, MX, DM, GL, RB), pp. 167–178.
HPDCHPDC-2013-SuAWMWA #dataset #distributed
Taming massive distributed datasets: data sampling using bitmap indices (YS, GA, JW, KM, JW, JPA), pp. 13–24.
HPDCHPDC-2013-YinLBGN #dataset #order #performance #pipes and filters
Efficient analytics on ordered datasets using MapReduce (JY, YL, MB, LG, AN), pp. 125–126.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-KhudiaM #control flow #low cost
Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
LCTESLCTES-2013-WangCSCH #api #embedded #manycore
Portable mapping of openMP to multicore embedded systems using MCA APIs (CW, SC, PS, BMC, JH), pp. 153–162.
PDPPDP-2013-ColmenaresODFR #equation
Solving the Linearized Poisson-Boltzmann Equation on GPUs Using CUDA (JC, JO, SD, AF, WR), pp. 420–426.
PDPPDP-2013-DemirizBA #architecture #constraints #design #named #programming
CPNoC: On Using Constraint Programming in Design of Network-on-Chip Architecture (AD, NB, AA), pp. 486–493.
PDPPDP-2013-EskandariKBJ #algorithm #constraints #optimisation #quality
Quality of Service Optimization for Network-on-Chip Using Bandwidth-Constraint Mapping Algorithm (AE, AK, NB, MJ), pp. 504–508.
PDPPDP-2013-GuptaGV #3d #gpu #linear #simulation
3D Bubbly Flow Simulation on the GPU — Iterative Solution of a Linear System Using Sub-domain and Level-Set Deflation (RG, MBvG, CV), pp. 359–366.
PDPPDP-2013-LavilleMLPM #gpu #multi #simulation
Using GPU for Multi-Agent Soil Simulation (GL, KM, CL, LP, NM), pp. 392–399.
PDPPDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #protocol
Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
PPoPPPPoPP-2013-DiceLLLM #algorithm #hardware #memory management #transaction
Using hardware transactional memory to correct and simplify and readers-writer lock algorithm (DD, YL, YL, VL, MM), pp. 261–270.
PPoPPPPoPP-2013-EdmondsWL #algorithm #graph
Expressing graph algorithms using generalized active messages (NE, JW, AL), pp. 289–290.
SOSPSOSP-2013-RoyMZ #graph #named #streaming
X-Stream: edge-centric graph processing using streaming partitions (AR, IM, WZ), pp. 472–488.
FASEFASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards
Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
FASEFASE-2013-MacedoC #alloy #bidirectional #implementation #model transformation #qvt
Implementing QVT-R Bidirectional Model Transformations Using Alloy (NM, AC), pp. 297–311.
STOCSTOC-2013-JainNS #matrix #rank
Low-rank matrix completion using alternating minimization (PJ, PN, SS), pp. 665–674.
STOCSTOC-2013-LeeRS #approach
A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
STOCSTOC-2013-LenzenP #performance
Fast routing table construction using small messages: extended abstract (CL, BPS), pp. 381–390.
STOCSTOC-2013-Miller #graph #optimisation #problem #scalability
Solving large optimization problems using spectral graph theory (GLM), p. 981.
STOCSTOC-2013-Sherstov #bound #communication
Communication lower bounds using directional derivatives (AAS), pp. 921–930.
TACASTACAS-2013-FalkeMS #bound #c #contest #model checking #named #source code
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACASTACAS-2013-VizelGS #analysis #reachability
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
CADECADE-2013-ClaessenJRS #automation #induction #proving
Automating Inductive Proofs Using Theory Exploration (KC, MJ, DR, NS), pp. 392–406.
CADECADE-2013-HawblitzelKLR #automation #proving #source code #theorem proving #towards
Towards Modularly Comparing Programs Using Automated Theorem Provers (CH, MK, SKL, HR), pp. 282–299.
CAVCAV-2013-BrimCDS #model checking #parametricity #probability
Exploring Parameter Space of Stochastic Biochemical Systems Using Quantitative Model Checking (LB, MC, SD, DS), pp. 107–123.
CAVCAV-2013-ChagantyLNR #learning #relational #smt
Combining Relational Learning with SMT Solvers Using CEGAR (ATC, AL, AVN, SKR), pp. 447–462.
CAVCAV-2013-ColangeBKT #diagrams #distributed #model checking #towards
Towards Distributed Software Model-Checking Using Decision Diagrams (MC, SB, FK, YTM), pp. 830–845.
CAVCAV-2013-LaarmanODLP #abstraction #automaton #manycore
Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction (AL, MCO, AED, KGL, JvdP), pp. 968–983.
CAVCAV-2013-PiskacWZ #automation #logic #smt
Automating Separation Logic Using SMT (RP, TW, DZ), pp. 773–789.
CAVCAV-2013-SosnovichGN #network #protocol #security
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
CSLCSL-2013-Rieg
Extracting Herbrand trees in classical realizability using forcing (LR), pp. 597–614.
ICLPICLP-J-2013-ArbelaezTC #parallel #predict #runtime #satisfiability
Using sequential runtime distributions for the parallel speedup prediction of SAT local search (AA, CT, PC), pp. 625–639.
ICSTICST-2013-AfshanMS #evolution #natural language #string #testing
Evolving Readable String Test Inputs Using a Natural Language Model to Reduce Human Oracle Cost (SA, PM, MS), pp. 352–361.
ICSTICST-2013-ArafeenD #clustering #testing
Test Case Prioritization Using Requirements-Based Clustering (MJA, HD), pp. 312–321.
ICSTICST-2013-LinD #concurrent #java
CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
ICSTICST-2013-MossigeGM #constraints #generative #integration #programming #testing
Test Generation for Robotized Paint Systems Using Constraint Programming in a Continuous Integration Environment (MM, AG, HM), pp. 489–490.
ICSTICST-2013-TangHYW #metric #quality
Test Quality Measurement Using TBPP-R (JT, RH, JY, SW), pp. 48–55.
ICSTICST-2013-Torsel #domain-specific language #model checking #modelling #testing #web
A Testing Tool for Web Applications Using a Domain-Specific Modelling Language and the NuSMV Model Checker (AMT), pp. 383–390.
ICSTICST-2013-YeolekarUAKV #generative #model checking #scalability #testing
Scaling Model Checking for Test Generation Using Dynamic Inference (AY, DU, VA, SK, RV), pp. 184–191.
ICTSSICTSS-2013-EnoiuSP #diagrams #logic #testing
Using Logic Coverage to Improve Testing Function Block Diagrams (EPE, DS, PP), pp. 1–16.
ICTSSICTSS-2013-MauserKH #programming #towards #user interface
Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ICTSSICTSS-2013-SapraMCGC #execution #fault #python #source code #symbolic computation
Finding Errors in Python Programs Using Dynamic Symbolic Execution (SS, MM, SC, AG, EMC), pp. 283–289.
ICTSSICTSS-2013-StepienP #challenge #testing
Challenges of Testing Periodic Messages in Avionics Systems Using TTCN-3 (BS, LP), pp. 207–222.
ISSTAISSTA-2013-Buda #database #generative #testing
Generation of test databases using sampling methods (TSB), pp. 366–369.
ISSTAISSTA-2013-GligoricGZSAM #test coverage #testing
Comparing non-adequate test suites using coverage criteria (MG, AG, CZ, RS, MAA, DM), pp. 302–313.
ISSTAISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair
Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
LICSLICS-2013-Colcombet #logic #monad #set #word
Magnitude Monadic Logic over Words and the Use of Relative Internal Set Theory (TC), p. 123.
LICSLICS-2013-Halpern #first-order #logic #proving #security
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
ICSTSAT-2013-FingerLGS #constraints #probability #satisfiability
Solutions for Hard and Soft Constraints Using Optimized Probabilistic Satisfiability (MF, RL, CPG, BS), pp. 233–249.
TAPTAP-2013-InsaSR #algorithm #debugging #execution
Speeding Up Algorithmic Debugging Using Balanced Execution Trees (DI, JS, AR), pp. 133–151.
VMCAIVMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
VMCAIVMCAI-2013-ZhengS0LD0 #network #partial order #reduction
State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
QoSAQoSA-2012-EklundB #architecture #ecosystem #framework #multi #platform
Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
WICSA-ECSAWICSA-ECSA-2012-ElorantaHVK #architecture #documentation #generative #knowledge base #named #topic
TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents (VPE, OH, TV, KK), pp. 191–195.
WICSA-ECSAWICSA-ECSA-2012-HilliardMMP #architecture #composition #framework #on the #reuse
On the Composition and Reuse of Viewpoints across Architecture Frameworks (RH, IM, HM, PP), pp. 131–140.
WICSA-ECSAWICSA-ECSA-2012-MiesbauerW #architecture #information management #maintenance
Capturing and Maintaining Architectural Knowledge Using Context Information (CM, RW), pp. 206–210.
WICSA-ECSAWICSA-ECSA-2012-RathfelderBKR #email #monitoring #performance #predict #scalability
Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2012-ThatSO #design pattern
Using Architectural Patterns to Define Architectural Decisions (MTTT, SS, FO), pp. 196–200.
WICSA-ECSAWICSA-ECSA-2012-WoodsB #architecture #case study #experience #industrial #information management #scalability
Using an Architecture Description Language to Model a Large-Scale Information System — An Industrial Experience Report (EW, RB), pp. 239–243.
DocEngDocEng-2012-MahlowGHS #framework #retrieval #xquery
A framework for retrieval and annotation in digital humanities using XQuery full text and update in BaseX (CM, CG, AH, MHS), pp. 195–204.
DocEngDocEng-2012-PeroniSV #documentation #lens #semantics
Faceted documents: describing document characteristics using semantic lenses (SP, DS, FV), pp. 191–194.
DRRDRR-2012-ChandaFP #clustering #documentation
Clustering document fragments using background color and texture information (SC, KF, UP).
DRRDRR-2012-FengY #component #composition #detection #documentation
Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRRDRR-2012-LinGTHL #documentation #embedded #identification
Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
DRRDRR-2012-RashwanRAAK #2d #pseudo #robust
A robust omnifont open-vocabulary arabic OCR system using pseudo-2D-HMM (AMR, MR, AAH, SA, AHK).
DRRDRR-2012-Silva #algorithm #detection #evaluation
Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
DRRDRR-2012-TangSS #distance
Handwriting individualization using distance and rarity (YT, SNS, HS).
HTHT-2012-CravinoDF #clustering #community #network
Using the overlapping community structure of a network of tags to improve text clustering (NC, JLD, ÁF), pp. 239–244.
HTHT-2012-LevacherLW #adaptation #hypermedia #named #reuse
Slicepedia: providing customized reuse of open-web resources for adaptive hypermedia (KL, SL, VW), pp. 23–32.
HTHT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
HTHT-2012-WeningerZH #web
Building enriched web page representations using link paths (TW, CZ, JH), pp. 53–62.
JCDLJCDL-2012-LeeH #classification #generative #music
Generating ground truth for music mood classification using mechanical turk (JHL, XH), pp. 129–138.
JCDLJCDL-2012-OhLMY #ranking
Evaluating and ranking patents using weighted citations (SO, ZL, PM, JY), pp. 281–284.
JCDLJCDL-2012-TuarobMG #algorithm #network
Improving algorithm search using the algorithm co-citation network (ST, PM, CLG), pp. 277–280.
SIGMODSIGMOD-2012-El-HelwFI #information management
Just-in-time information extraction using extraction views (AEH, MHF, IFI), pp. 613–616.
SIGMODSIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance
Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
TPDLTPDL-2012-DamnjanovicH #content management #generative #interactive #library
Generating Content for Digital Libraries Using an Interactive Content Management System (UD, SH), pp. 474–479.
TPDLTPDL-2012-GeelNN #approach #named
PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
TPDLTPDL-2012-HallCS #automation #clustering #library
Evaluating the Use of Clustering for Automatically Organising Digital Library Collections (MMH, PDC, MS), pp. 323–334.
TPDLTPDL-2012-KapidakisMP #query
Query Expansion of Zero-Hit Subject Searches: Using a Thesaurus in Conjunction with NLP Techniques (SK, AM, MP), pp. 433–438.
TPDLTPDL-2012-LlewellynGOH #analysis #tool support
Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
TPDLTPDL-2012-LoizidesVIZ #interactive #repository
Collaboratively Creating a Thematic Repository Using Interactive Table-Top Technology (FL, CV, AI, PZ), pp. 512–516.
TPDLTPDL-2012-TryfouT #image #semantics #visual notation #web
Using Visual Cues for the Extraction of Web Image Semantic Information (GT, NT), pp. 396–401.
TPDLTPDL-2012-ZhangKB #metadata #tool support
The CMDI MI Search Engine: Access to Language Resources and Tools Using Heterogeneous Metadata Schemas (JZ, MKS, HB), pp. 492–495.
TPDLTPDL-2012-ZhouLW #personalisation #social #web
Web Search Personalization Using Social Data (DZ, SL, VW), pp. 298–310.
VLDBVLDB-2012-CandanRSW #constraints #named
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments (KSC, RR, MLS, XW), pp. 1519–1530.
VLDBVLDB-2012-CautisK #complexity #probability #query #xml
Answering Queries using Views over Probabilistic XML: Complexity and Tractability (BC, EK), pp. 1148–1159.
VLDBVLDB-2012-IseleB #learning #programming #search-based
Learning Expressive Linkage Rules using Genetic Programming (RI, CB), pp. 1638–1649.
VLDBVLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy
Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
VLDBVLDB-2012-LiKNC #estimation #query #robust #sql #statistics
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
VLDBVLDB-2012-LuSCO #nearest neighbour #performance #pipes and filters
Efficient Processing of k Nearest Neighbor Joins using MapReduce (WL, YS, SC, BCO), pp. 1016–1027.
VLDBVLDB-2012-PimplikarS #keyword #query #web
Answering Table Queries on the Web using Column Keywords (RP, SS), pp. 908–919.
VLDBVLDB-2012-SachanB #mining #statistics #string
Mining Statistically Significant Substrings using the Chi-Square Statistic (MS, AB), pp. 1052–1063.
VLDBVLDB-2012-ZhangCW #multi #performance #pipes and filters
Efficient Multi-way Theta-Join Processing Using MapReduce (XZ, LC, MW), pp. 1184–1195.
CSEETCSEET-2012-BollinHS #concept #education #experience #project management #simulation
Teaching Software Project Management using Simulations — The AMEISE Environment: from Concepts to Class Room Experience (AB, EH, LS), pp. 85–86.
CSEETCSEET-2012-TillmannMHFX #education #mobile #student
Engage Your Students by Teaching Computer Science Using Only Mobile Devices with TouchDevelop (NT, MM, JdH, MF, TX), pp. 87–89.
ITiCSEITiCSE-2012-CooperNS
Initial results of using an intelligent tutoring system with Alice (SC, YJN, LS), pp. 138–143.
ITiCSEITiCSE-2012-GoldweberDJ #hardware #operating system
Supporting operating systems projects using the μMPS2 hardware simulator (MG, RD, TJ), pp. 63–68.
ITiCSEITiCSE-2012-Impagliazzo
Using professional and ethical themes (JI), p. 374.
ITiCSEITiCSE-2012-Law #interactive #student
Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSEITiCSE-2012-Santos12a #education #java
Developing contexts for teaching Java using AGUIA/J (ALS), p. 378.
SIGITESIGITE-2012-AhmadzadehM #algorithm #clustering #education #programming #research
A feasibility study on using clustering algorithms in programming education research (MA, EM), pp. 145–150.
SIGITESIGITE-2012-AndersonG #case study #experience #programming #student
Engaging undergraduate programming students: experiences using lego mindstorms NXT (MA, CG), pp. 139–144.
SIGITESIGITE-2012-BrannockN #development #testing
Real-world testing: using FOSS for software development courses (EB, NPN), pp. 87–88.
SIGITESIGITE-2012-GirtonGMY #development #overview #perspective #student
Using student professional development planning to inform program review (AG, SG, JRM, DWY), pp. 71–74.
SIGITESIGITE-2012-KercherR #risk management #student
Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
SIGITESIGITE-2012-SeolSK #learning #mobile #student #towards
Use of a mobile application to promote scientific discovery learning: students’ perceptions towards and practical adoption of a mobile application (SS, AS, PK), pp. 121–126.
TFPIETFPIE-2012-ODonnell #education #functional #hardware
Connecting the Dots: Computer Systems Education using a Functional Hardware Description Language (JTO), pp. 20–39.
CSMRCSMR-2012-BettenburgTH #code search #fuzzy #source code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMRCSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-GrantCS #maintenance #modelling #topic
Using Topic Models to Support Software Maintenance (SG, JRC, DBS), pp. 403–408.
CSMRCSMR-2012-HosseiniNG #debugging #predict
A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes (HH, RN, MWG), pp. 149–158.
CSMRCSMR-2012-JaszSBOG #impact analysis
Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMRCSMR-2012-Koschke #clone detection #detection #scalability
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMRCSMR-2012-MoghadamC #automation #design #difference #refactoring
Automated Refactoring Using Design Differencing (IHM, MÓC), pp. 43–52.
CSMRCSMR-2012-PetersZ #mining #repository #smell
Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-AliSGA #empirical #requirements #traceability
An empirical study on requirements traceability using eye-tracking (NA, ZS, YGG, GA), pp. 191–200.
ICSMEICSM-2012-KobayashiKKYM #clustering #composition #dependence
Feature-gathering dependency-based software clustering using Dedication and Modularity (KK, MK, KK, KY, AM), pp. 462–471.
ICSMEICSM-2012-KoutersVSB #gnome #repository
Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
ICSMEICSM-2012-QiML #automation #performance #scalability #source code
Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
ICSMEICSM-2012-QuAR #impact analysis #testing
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RupakhetiH #constraints #fault #modelling #similarity #theorem proving
Finding errors from reverse-engineered equality models using a constraint solver (CRR, DH), pp. 77–86.
MSRMSR-2012-ChenTNH #fault #modelling #topic
Explaining software defects using topic models (THC, SWT, MN, AEH), pp. 189–198.
SCAMSCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support
Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAMSCAM-2012-AliSGA #debugging
Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
SCAMSCAM-2012-HillRK #debugging #java #locality #on the
On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
SCAMSCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
WCREWCRE-2012-DaviesRW #debugging #locality #similarity
Using Bug Report Similarity to Enhance Bug Localisation (SD, MR, MW), pp. 125–134.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCREWCRE-2012-RomanoRPK #fine-grained #source code
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
WCREWCRE-2012-SteidlHJ #analysis #network #recommendation
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
WCREWCRE-2012-ZiftciK #data mining #feature model #mining
Feature Location Using Data Mining on Existing Test-Cases (CZ, IK), pp. 155–164.
ICALPICALP-v1-2012-JefferyKM #complexity #graph #matrix #multi #quantum #query
Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision (SJ, RK, FM), pp. 522–532.
ICALPICALP-v1-2012-KrauthgamerZ
Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
FMFM-2012-BenkiraneNSS #algebra #process
Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra (SB, RN, ES, CS), pp. 101–115.
FMFM-2012-HieronsMN #distributed #order #testing
Using Time to Add Order to Distributed Testing (RMH, MGM, MN), pp. 232–246.
FMFM-2012-OsaiweranFGR #case study #component #design #experience #formal method
Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FMFM-2012-PlaggeL #validation
Validating B, Z and TLA + Using ProB and Kodkod (DP, ML), pp. 372–386.
FMFM-2012-SongT #detection #model checking #performance
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
FMFM-2012-YangKK #formal method #lightweight
Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
IFMIFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling
Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFMIFM-2012-RochaBCN #bound #comprehension #debugging #model checking #programming
Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFMSEFM-2012-BicknellRBCS #approach #verification
A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFMSEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing
An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFMSEFM-2012-MatichukM #automation #proving #specification
Extensible Specifications for Automatic Re-use of Specifications and Proofs (DM, TCM), pp. 333–341.
HaskellHaskell-2012-AdamsD #haskell #performance #programming
Template your boilerplate: using template haskell for efficient generic programming (MDA0, TD), pp. 13–24.
ICFPICFP-2012-Danielsson #monad #semantics
Operational semantics using the partiality monad (NAD), pp. 127–138.
AIIDEAIIDE-2012-DesaiS #behaviour
Enhancing the Believability of Character Behaviors Using Non-Verbal Cues (ND, DS).
AIIDEAIIDE-2012-MullerHBS #game studies
Glengarry Glen Ross: Using BDI for Sales Game Dialogues (TJM, AH, KvdB, IS).
AIIDEAIIDE-2012-ShakerYTNO #evolution #personalisation
Evolving Personalized Content for Super Mario Bros Using Grammatical Evolution (NS, GNY, JT, MN, MO0).
CoGCIG-2012-BenbassatS #evolution #programming #search-based
Evolving both search and strategy for Reversi players using genetic programming (AB, MS), pp. 47–54.
CoGCIG-2012-BrandstetterA #information retrieval #programming #search-based
Reactive control of Ms. Pac Man using information retrieval based on Genetic Programming (MFB, SA), pp. 250–256.
CoGCIG-2012-ShakerNYTO #evolution
Evolving levels for Super Mario Bros using grammatical evolution (NS, MN, GNY, JT, MO0), pp. 304–311.
FDGFDG-2012-IsbisterKF #exclamation
Scoop!: using movement to reduce math anxiety and affect confidence (KI, MK, JF), pp. 228–230.
FDGFDG-2012-ScerboB #design #game studies
Design issues when using commodity gaming devices for virtual object manipulation (SS, DAB), pp. 294–295.
FDGFDG-2012-SimmonsDG #development #game studies #programming
Using game development to reveal programming competency (SS, BJD, MG), pp. 89–96.
FDGFDG-2012-YinRB #interactive #novel #visual notation
Using an interactive visual novel to promote patient empowerment through engagement (LY, LR, TWB), pp. 41–48.
CoGVS-Games-2012-AsteriadisKSY #behaviour #clustering #detection #towards #visual notation
Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
CoGVS-Games-2012-HaugePR #education #game studies
Workshop on the Use of Serious Games in the Education of Engineers (JBH, BP, JckhR), pp. 341–342.
CoGVS-Games-2012-OostendorpK #3d #navigation
Using a Cognitive Model of Web-Navigation to Generate Support for 3D Virtual Navigation (HvO, SK), pp. 283–284.
ICGTICGT-2012-Ong #graph transformation #multi #programming language #rule-based
Multi-scale Rule-Based Graph Transformation Using the Programming Language XL (YO), pp. 417–419.
CHICHI-2012-AndrewsBEK #branch #interactive
Creating and using interactive narratives: reading and writing branching comics (DA, CB, SE, MK), pp. 1703–1712.
CHICHI-2012-Barkhuus #human-computer #privacy
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
CHICHI-2012-BullingAS #security #visual notation
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
CHICHI-2012-CohnMPT #interactive #named #realtime
Humantenna: using the body as an antenna for real-time whole-body interaction (GC, DM, SP, DST), pp. 1901–1910.
CHICHI-2012-DearmanGT #mobile
Determining the orientation of proximate mobile devices using their back facing camera (DD, RTG, KNT), pp. 2231–2234.
CHICHI-2012-DearmanT
Evaluating the implicit acquisition of second language vocabulary using a live wallpaper (DD, KNT), pp. 1391–1400.
CHICHI-2012-DixonFW #analysis #interface #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-FallahABF #navigation #visual notation
The user as a sensor: navigating users with visual impairments in indoor spaces using tactile landmarks (NF, IA, KEB, EF), pp. 425–432.
CHICHI-2012-GhomiFHCB
Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHICHI-2012-GoelFW #mobile #named
WalkType: using accelerometer data to accomodate situational impairments in mobile touch screen text entry (MG, LF, JOW), pp. 2687–2696.
CHICHI-2012-GuptaMPT #gesture #named
SoundWave: using the doppler effect to sense gestures (SG, DM, SP, DST), pp. 1911–1914.
CHICHI-2012-HarrisonH #2d #interactive
Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
CHICHI-2012-HayashiPOH #named
WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CHICHI-2012-HenzeRB #behaviour #mobile #type system
Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
CHICHI-2012-HietanenSAL #image
: helping the legal use of creative commons images (HH, AS, KA, YL), pp. 599–608.
CHICHI-2012-HuhnKLK #evaluation #on the
On the use of virtual environments for the evaluation of location-based applications (AEH, VJK, AL, PK), pp. 2569–2578.
CHICHI-2012-KjeldskovSPP #case study #mobile
Using mobile phones to support sustainability: a field study of residential electricity consumption (JK, MBS, JP, RP), pp. 2347–2356.
CHICHI-2012-KlempererLMSUBCGR #data access #exclamation
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHICHI-2012-KumarRTAK #game studies #mobile #speech
Improving literacy in developing countries using speech recognition-supported games on mobile devices (AK, PR, AT, RA, MK), pp. 1149–1158.
CHICHI-2012-LicoppeI #case study #mobile #quote
“Timid encounters”: a case study in the use of proximity-based mobile technologies (CL, YI), pp. 2759–2768.
CHICHI-2012-LindsayJSO #design #people
Engaging older people using participatory design (SL, DJ, GS, PO), pp. 1199–1208.
CHICHI-2012-NicolauJ #comprehension #type system
Touch typing using thumbs: understanding the effect of mobility and hand posture (HN, JAJ), pp. 2683–2686.
CHICHI-2012-QiB #memory management
Animating paper using shape memory alloys (JQ, LB), pp. 749–752.
CHICHI-2012-SchwarzKHDW #ad hoc #mobile #scalability
Phone as a pixel: enabling ad-hoc, large-scale displays using mobile devices (JS, DK, CH, PD, AW), pp. 2235–2238.
CHICHI-2012-TangMHRIZC #interactive #lightweight #video
Time travel proxy: using lightweight video recordings to create asynchronous, interactive meetings (JCT, JM, AH, AR, KI, CZ, XC), pp. 3111–3120.
CHICHI-2012-VardoulakisKMSGT #mobile
Using mobile phones to present medical information to hospital patients (LPV, AKK, DM, GS, JG, DST), pp. 1411–1420.
CHICHI-2012-YataniBT #feedback #named #people #representation #visual notation
SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback (KY, NB, KNT), pp. 415–424.
CHICHI-2012-YemKYSYY
Assisting hand skill transfer of tracheal intubation using outer-covering haptic display (VY, HK, NY, RS, HY, JY), pp. 3177–3180.
CSCWCSCW-2012-BoltonKV #comparison #performance
A comparison of competitive and cooperative task performance using spherical and flat displays (JB, KK, RV), pp. 529–538.
CSCWCSCW-2012-FollmerBRSI #interactive #people
People in books: using a FlashCam to become part of an interactive book for connected reading (SF, RB, HR, MS, HI), pp. 685–694.
CSCWCSCW-2012-JuAL #game studies #low cost
Using low cost game controllers to capture data for 6th grade science labs (WJ, UA, SL), pp. 1115–1124.
CSCWCSCW-2012-NagpalHJL #personalisation #social #web
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search (AN, SH, RRJ, MSL), pp. 461–470.
CSCWCSCW-2012-RobinsonJVM #authoring #collaboration #named
PicoTales: collaborative authoring of animated stories using handheld projectors (SR, MJ, EV, GM), pp. 671–680.
CAiSECAiSE-2012-SchalerLRS #database #information management
Building Information System Variants with Tailored Database Schemas Using Features (MS, TL, MR, GS), pp. 597–612.
CAiSECAiSE-2012-ZawawyKMM #analysis #logic #markov #network
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
ICEISICEIS-J-2012-FabbriHTBZS12a #mining #visualisation
Using Information Visualization and Text Mining to Facilitate the Conduction of Systematic Literature Reviews (SF, EMH, ADT, AB, AZ, CS), pp. 243–256.
ICEISICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse
Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEISICEIS-v1-2012-AmarGMHLN #concept analysis
Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEISICEIS-v1-2012-AyresS #fuzzy #mining #ontology #similarity
Mining Generalized Association Rules using Fuzzy Ontologies with Context-based Similarity (RMJA, MTPS), pp. 74–83.
ICEISICEIS-v1-2012-KosorusBK #query #semantics #similarity #taxonomy
Semantic Similarity between Queries in QA System using a Domain-specific Taxonomy (HK, AB, JK), pp. 241–246.
ICEISICEIS-v1-2012-TertiltBK #algorithm #enterprise #modelling #performance #scalability
Modeling the Performance and Scalability of a SAP ERP System using an Evolutionary Algorithm (DT, AB, HK), pp. 112–118.
ICEISICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process
Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
ICEISICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification
Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
ICEISICEIS-v2-2012-FonteBCGH #evaluation #program analysis
Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEISICEIS-v2-2012-FrancaS #aspect-oriented #evaluation #metric #overview #programming
A Systematic Review on Evaluation of Aspect Oriented Programming using Software Metrics (JMSF, MdSS), pp. 77–83.
ICEISICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics
Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
ICEISICEIS-v2-2012-PantojaC #approach #development
A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEISICEIS-v2-2012-ReichelR #process #requirements
Prioritization of Product Requirements using the Analytic Hierarchy Process (TR, GR), pp. 70–76.
ICEISICEIS-v2-2012-YiasemisA #automation #fault #locality #mutation testing #testing
Dynamic Localisation and Automatic Correction of Software Faults using Evolutionary Mutation Testing (PSY, ASA), pp. 15–26.
ICEISICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
ICEISICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
ICEISICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy
A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
CIKMCIKM-2012-AgarwalCW #multi #ranking
Multi-faceted ranking of news articles using post-read actions (DA, BCC, XW), pp. 694–703.
CIKMCIKM-2012-BaeJKL #detection
Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKMCIKM-2012-BambaSGBF #concept #recommendation #scalability
The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function (PB, JS, CG, NB, JF), pp. 2275–2278.
CIKMCIKM-2012-BannourH #image #semantics
Hierarchical image annotation using semantic hierarchies (HB, CH), pp. 2431–2434.
CIKMCIKM-2012-CheungSM #recommendation #social #synthesis
Using program synthesis for social recommendations (AC, ASL, SM), pp. 1732–1736.
CIKMCIKM-2012-ChiangWD #clustering #network #normalisation #scalability
Scalable clustering of signed networks using balance normalized cut (KYC, JJW, ISD), pp. 615–624.
CIKMCIKM-2012-ChongCZSQZ #pattern matching #rdf
RDF pattern matching using sortable views (ZC, HC, ZZ, HS, GQ, AZ), pp. 315–324.
CIKMCIKM-2012-Chung
Finding food entity relationships using user-generated data in recipe service (YjC), pp. 2611–2614.
CIKMCIKM-2012-CosciaR #how #web
Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
CIKMCIKM-2012-GopalakrishnanIMRS
Matching product titles using web-based enrichment (VG, SPI, AM, RR, SHS), pp. 605–614.
CIKMCIKM-2012-HuangCLL #predict #probability #process #social
Predicting aggregate social activities using continuous-time stochastic process (SH, MC, BL, DL), pp. 982–991.
CIKMCIKM-2012-HwangLKL #on the #performance #recommendation
On using category experts for improving the performance and accuracy in recommender systems (WSH, HJL, SWK, ML), pp. 2355–2358.
CIKMCIKM-2012-KhabsaTG
Entity resolution using search engine results (MK, PT, CLG), pp. 2363–2366.
CIKMCIKM-2012-KimYK #equation #query #retrieval #word
Mathematical equation retrieval using plain words as a query (SK, SY, YK), pp. 2407–2410.
CIKMCIKM-2012-LinDH0S #automation #image #random #visual notation
Automatic image annotation using tag-related random search over visual neighbors (ZL, GD, MH, JW, JS), pp. 1784–1788.
CIKMCIKM-2012-LinTCXS #effectiveness #performance #sentiment
Effective and efficient?: bilingual sentiment lexicon extraction using collocation alignment (ZL, ST, XC, XX, WS), pp. 1542–1546.
CIKMCIKM-2012-LongCZZ #classification #named
TCSST: transfer classification of short & sparse text using external data (GL, LC, XZ, CZ), pp. 764–772.
CIKMCIKM-2012-LongGXK #approach #design
A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKMCIKM-2012-McCreadieMOGJ #crowdsourcing #web
An examination of content farms in web search using crowdsourcing (RM, CM, IO, JG, FJ), pp. 2551–2554.
CIKMCIKM-2012-MendesMZB #graph #similarity
Measuring website similarity using an entity-aware click graph (PNM, PM, HZ, RB), pp. 1697–1701.
CIKMCIKM-2012-NegahbanRG #learning #multi #performance #scalability #statistics
Scaling multiple-source entity resolution using statistically efficient transfer learning (SN, BIPR, JG), pp. 2224–2228.
CIKMCIKM-2012-NoroziAV #documentation #wiki
Contextualization using hyperlinks and internal hierarchical structure of Wikipedia documents (MAN, PA, APdV), pp. 734–743.
CIKMCIKM-2012-QureshiOP #n-gram #wiki
Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKMCIKM-2012-RaiberKT #estimation #web
Content-based relevance estimation on the web using inter-document similarities (FR, OK, MT), pp. 1769–1773.
CIKMCIKM-2012-SiposSSJ #corpus #summary #word
Temporal corpus summarization using submodular word coverage (RS, AS, PS, TJ), pp. 754–763.
CIKMCIKM-2012-SrinivasanBC #modelling
Segmenting web-domains and hashtags using length specific models (SS, SB, RC), pp. 1113–1122.
CIKMCIKM-2012-TsatsaronisVN #documentation #named #semantics
SemaFor: semantic document indexing using semantic forests (GT, IV, KN), pp. 1692–1696.
CIKMCIKM-2012-WangQD #automation #clustering #documentation
Improving document clustering using automated machine translation (XW, BQ, ID), pp. 645–653.
CIKMCIKM-2012-WangWLL #graph #keyword #ranking #wiki
Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
CIKMCIKM-2012-WangZCM #network #retrieval
Top-k retrieval using conditional preference networks (HW, XZ, WC, PM), pp. 2075–2079.
CIKMCIKM-2012-WeiFLC #canonical #dependence
Model the complex dependence structures of financial variables by using canonical vine (WW, XF, JL, LC), pp. 1382–1391.
CIKMCIKM-2012-WongCTP #web
Mixed-initiative conversational system using question-answer pairs mined from the web (WW, LC, JT, LP), pp. 2707–2709.
CIKMCIKM-2012-YanGLCW #clustering #matrix
Clustering short text using Ncut-weighted non-negative matrix factorization (XY, JG, SL, XC, YW), pp. 2259–2262.
CIKMCIKM-2012-YangZW #collaboration #incremental #predict #scalability
Scalable collaborative filtering using incremental update and local link prediction (XY, ZZ, KW), pp. 2371–2374.
CIKMCIKM-2012-YuSNMH #network #similarity
User guided entity similarity search using meta-path selection in heterogeneous information networks (XY, YS, BN, TM, JH), pp. 2025–2029.
ECIRECIR-2012-BoudinND #predict #query
Using a Medical Thesaurus to Predict Query Difficulty (FB, JYN, MD), pp. 480–484.
ECIRECIR-2012-MantrachR12a #multi #query
A Mailbox Search Engine Using Query Multi-modal Expansion and Community-Based Smoothing (AM, JMR), pp. 576–577.
ECIRECIR-2012-NawabSC #documentation #query
Retrieving Candidate Plagiarised Documents Using Query Expansion (RMAN, MS, PDC), pp. 207–218.
ECIRECIR-2012-OghinaBTR #predict #social #social media
Predicting IMDB Movie Ratings Using Social Media (AO, MB, MT, MdR), pp. 503–507.
ECIRECIR-2012-TholpadiDBS #clustering #corpus #multi
Cluster Labeling for Multilingual Scatter/Gather Using Comparable Corpora (GT, MKD, CB, SKS), pp. 388–400.
ECIRECIR-2012-ZucconAZW #analysis #retrieval
Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICMLICML-2012-Araya-LopezBT
Near-Optimal BRL using Optimistic Local Transitions (MAL, OB, VT), p. 70.
ICMLICML-2012-Ben-DavidLSS #classification #fault
Minimizing The Misclassification Error Rate Using a Surrogate Convex Loss (SBD, DL, NS, KS), p. 16.
ICMLICML-2012-BoukouvalasBC #process
Gaussian Process Quantile Regression using Expectation Propagation (AB, RB, DC), p. 123.
ICMLICML-2012-Busa-FeketeBK #classification #graph #performance
Fast classification using sparse decision DAGs (RBF, DB, BK), p. 99.
ICMLICML-2012-DhillonRFU #modelling #word
Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICMLICML-2012-HaiderS #clustering #graph
Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
ICMLICML-2012-JalaliS12a #clustering #optimisation
Clustering using Max-norm Constrained Optimization (AJ, NS), p. 205.
ICMLICML-2012-JiangLS #3d #learning
Learning Object Arrangements in 3D Scenes using Human Context (YJ, ML, AS), p. 119.
ICMLICML-2012-LeRMDCCDN #learning #scalability
Building high-level features using large scale unsupervised learning (QVL, MR, RM, MD, GC, KC, JD, AYN), p. 69.
ICMLICML-2012-SejdinovicGSF #kernel #testing
Hypothesis testing using pairwise distances and associated kernels (DS, AG, BKS, KF), p. 104.
ICMLICML-2012-ShanKRBSR #matrix #predict #probability
Gap Filling in the Plant Kingdom — Trait Prediction Using Hierarchical Probabilistic Matrix Factorization (HS, JK, PBR, AB, FS, MR), p. 47.
ICMLICML-2012-SilverC #composition #modelling
Compositional Planning Using Optimal Option Models (DS, KC), p. 165.
ICMLICML-2012-YuSL #network #speech
Conversational Speech Transcription Using Context-Dependent Deep Neural Networks (DY, FS, GL), p. 1.
ICMLICML-2012-ZhaiHBW #image #modelling #process
Modeling Images using Transformed Indian Buffet Processes (KZ, YH, JLBG, SW), p. 118.
ICPRICPR-2012-0001ZP #segmentation
Unsupervised dynamic texture segmentation using local descriptors in volumes (JC, GZ, MP), pp. 3622–3625.
ICPRICPR-2012-AfzalBKSB #documentation #image #parametricity #robust
Robust stereo matching for document images using parameter selection of text-line extraction (MZA, SSB, MK, FS, TMB), pp. 331–334.
ICPRICPR-2012-AhmedA #gesture #modelling
Flow Modeling and skin-based Gaussian pruning to recognize gestural actions using HMM (ORA, AAH), pp. 3488–3491.
ICPRICPR-2012-AliGBPNP #biology #classification
Classification of biological cells using bio-inspired descriptors (WBHA, DG, MB, PP, RN, TP), pp. 3353–3357.
ICPRICPR-2012-AotoTSMY #estimation
Position estimation of near point light sources using a clear hollow sphere (TA, TT, TS, YM, NY), pp. 3721–3724.
ICPRICPR-2012-AryafarJS #automation #classification
Automatic musical genre classification using sparsity-eager support vector machines (KA, SJ, AS), pp. 1526–1529.
ICPRICPR-2012-AttamimiNN #markov #multi #recognition
Hierarchical multilevel object recognition using Markov model (MA, TN, TN), pp. 2963–2966.
ICPRICPR-2012-AydemirEGK #summary #video
Video summarization using simple action patterns (MSA, UE, AG, MEK), pp. 2047–2050.
ICPRICPR-2012-AzizWH
Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPRICPR-2012-BaiHHR #clustering #complexity #graph
Graph clustering using graph entropy complexity traces (LB, ERH, LH, PR), pp. 2881–2884.
ICPRICPR-2012-BaiHR #graph #kernel
Jensen-Shannon graph kernel using information functionals (LB, ERH, PR), pp. 2877–2880.
ICPRICPR-2012-BanerjeeN #kernel #learning #multi #process #recognition
Pose based activity recognition using Multiple Kernel learning (PB, RN), pp. 445–448.
ICPRICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation
3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPRICPR-2012-BespalovQBS #classification #image #scalability
Large-scale image classification using supervised spatial encoder (DB, YQ, BB, AS), pp. 581–584.
ICPRICPR-2012-BicegoL #2d #biology #recognition #sequence #tool support
2D shape recognition using biological sequence alignment tools (MB, PL), pp. 1359–1362.
ICPRICPR-2012-BoomHHF #clustering #dataset #image
Supporting ground-truth annotation of image datasets using clustering (BJB, PXH, JH, RBF), pp. 1542–1545.
ICPRICPR-2012-BougesCBL #classification #nearest neighbour
Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
ICPRICPR-2012-BoulmerkaA #segmentation
Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
ICPRICPR-2012-BuchholzKWW #3d #image #locality
3D object localization using single camera images (DB, DK, SW, FMW), pp. 821–824.
ICPRICPR-2012-ChangDZDW #representation #sketching #synthesis
Smoothness-constrained face photo-sketch synthesis using sparse representation (LC, XD, MZ, FD, ZW), pp. 3025–3029.
ICPRICPR-2012-ChenHCHC #analysis
Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPRICPR-2012-ChenLL #artificial reality #image
Depth image enhancement for Kinect using region growing and bilateral filter (LC, HL, SL), pp. 3070–3073.
ICPRICPR-2012-ChenXF #approximate
Compression of GPS trajectories using optimized approximation (MC, MX, PF), pp. 3180–3183.
ICPRICPR-2012-CheungP #detection
Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPRICPR-2012-ChowdhuryBP #detection
Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPRICPR-2012-ChowdhuryKPD #design #graph #video
Video storyboard design using Delaunay graphs (ASC, SKK, RP, MND), pp. 3108–3111.
ICPRICPR-2012-CrandallFP #modelling #probability #visual notation
Layer-finding in radar echograms using probabilistic graphical models (DJC, GCF, JP), pp. 1530–1533.
ICPRICPR-2012-DattaBFP #identification #modelling
Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
ICPRICPR-2012-DoTT #multi #representation
Text/graphic separation using a sparse representation with multi-learned dictionaries (THD, ST, ORT), pp. 689–692.
ICPRICPR-2012-EdmundsonS #image #performance #retrieval
Fast JPEG image retrieval using optimised Huffman tables (DE, GS), pp. 3188–3191.
ICPRICPR-2012-El-GaalyT #kernel #multi #recognition
RGBD object pose recognition using local-global multi-kernel regression (TEG, MT), pp. 2468–2471.
ICPRICPR-2012-ElnakibNCPGE #3d #analysis #quantifier
Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPRICPR-2012-ErsoyBPP #classification #image
HEp-2 cell classification in IIF images using Shareboost (IE, FB, JP, KP), pp. 3362–3365.
ICPRICPR-2012-FernandezT #documentation #segmentation
Document segmentation using Relative Location Features (FCF, ORT), pp. 1562–1565.
ICPRICPR-2012-Gao12a #clustering #estimation #multi
Facial age estimation using Clustered Multi-task Support Vector Regression Machine (PXG), pp. 541–544.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GlodekSPS #classification #markov #multi #network
Multi-modal Fusion based on classifiers using reject options and Markov Fusion Networks (MG, MS, GP, FS), pp. 1084–1087.
ICPRICPR-2012-GonfausGGRG #classification #geometry
Edge classification using photo-geometric features (JMG, TG, AG, FXR, JG), pp. 1497–1500.
ICPRICPR-2012-GujraniyaM #classification #modelling #performance #topic
Efficient classification using phrases generated by topic models (DG, MNM), pp. 2331–2334.
ICPRICPR-2012-HaraKMM #3d #generative #video
Fast-accurate 3D face model generation using a single video camera (TH, HK, AM, SM), pp. 1269–1272.
ICPRICPR-2012-HeLL #image
Single image super-resolution using Gaussian Mixture Model (HH, JL, XL), pp. 1916–1919.
ICPRICPR-2012-HesseGGE #multi #recognition
Multi-view facial expression recognition using local appearance features (NH, TG, HG, HKE), pp. 3533–3536.
ICPRICPR-2012-HsuNWC #component
Pedestrian tracking in low contrast regions using aggregated background model and Silhouette Components (GSH, HPN, CHW, SLC), pp. 3680–3683.
ICPRICPR-2012-HuangH #invariant
Binary invariant cross color descriptor using galaxy sampling (GHH, CRH), pp. 2610–2613.
ICPRICPR-2012-HuiC #robust #towards
Towards a robust hand-eye calibration using normal flows (TWH, RC), pp. 2545–2548.
ICPRICPR-2012-IkemuraF #detection
Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPRICPR-2012-Imajo #algorithm #performance
Fast Gaussian filtering algorithm using splines (KI), pp. 489–492.
ICPRICPR-2012-InoueSK #representation
Local intensity compensation using sparse representation (KI, HS, YK), pp. 951–954.
ICPRICPR-2012-IshidaKKN #generative #recognition
Road marking recognition for map generation using sparse tensor voting (HI, KK, YK, TN), pp. 1132–1135.
ICPRICPR-2012-ItohTA #3d #graph #image #sequence
3D tracking of soccer players using time-situation graph in monocular image sequence (HI, TT, YA), pp. 2532–2536.
ICPRICPR-2012-IwamotoHSTXC #image #representation #self
Super-resolution of MR volumetric images using sparse representation and self-similarity (YI, XHH, SS, KT, WX, YWC), pp. 3758–3761.
ICPRICPR-2012-KananA #order #pseudo #recognition
Recognition of facial expressions using locally weighted and adjusted order Pseudo Zernike Moments (HRK, MA), pp. 3419–3422.
ICPRICPR-2012-KataokaSM #detection
Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPRICPR-2012-KawabataK #approach #multi
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-KawaiMHIY #identification
Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-KrijtheHL #classification
Improving cross-validation based classifier selection using meta-learning (JHK, TKH, ML), pp. 2873–2876.
ICPRICPR-2012-KuriharaA #correlation #image
Motion blur free photometric stereo using correlation image sensor (TK, SA), pp. 1872–1875.
ICPRICPR-2012-KusumaSLL #recognition #sequence
Appearance-based object recognition using weighted longest increasing subsequence (GPK, AS, YL, JAL), pp. 3668–3671.
ICPRICPR-2012-LamSS #image #statistics
Denoising hyperspectral images using spectral domain statistics (AL, IS, YS), pp. 477–480.
ICPRICPR-2012-LeeCP #estimation
Articulated hand configuration and rotation estimation using extended torus manifold embedding (CSL, SYC, SWP), pp. 441–444.
ICPRICPR-2012-LeeLCY #lightweight #random #representation
Lightweight Random Ferns using binary representation (SL, SWL, YNC, HSY), pp. 1342–1345.
ICPRICPR-2012-LinnerS #comparison #normalisation #quality
Comparison of restoration quality on square and hexagonal grids using normalized convolution (EL, RS), pp. 3046–3049.
ICPRICPR-2012-LinSCLH #recognition
Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPRICPR-2012-LiPMH #classification #email #incremental #learning
Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
ICPRICPR-2012-LiST #locality
Accurate iris localization using contour segments (HL, ZS, TT), pp. 3398–3401.
ICPRICPR-2012-LiuLS #documentation #image #modelling #probability #visual notation
Document image matching using probabilistic graphical models (LL, YL, CYS), pp. 637–640.
ICPRICPR-2012-LiuWZL
Pan-sharpening using weighted red-black wavelet (QL, YW, ZZ, LL), pp. 1908–1911.
ICPRICPR-2012-LiuXAR #geometry #recognition
Hand posture recognition using finger geometric feature (LL, JX, HA, XR), pp. 565–568.
ICPRICPR-2012-LiVBB #clustering #learning
Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
ICPRICPR-2012-LiW #encoding #matrix #recognition
Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
ICPRICPR-2012-LiYLKZL #classification #multi
Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification (KL, JY, ZL, XK, RZ, WL), pp. 170–173.
ICPRICPR-2012-LuHLC #recognition
Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPRICPR-2012-LuLZSCO
Learning-based deformable registration using weighted mutual information (YL, RL, LZ, YS, CC, SHO), pp. 2626–2629.
ICPRICPR-2012-LuoKM #3d
Endoscope 3-D motion tracking using an aggressive particle filtering for boosting electromagnetic guidance endoscopy (XL, TK, KM), pp. 117–120.
ICPRICPR-2012-MaLXS #detection #image
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPRICPR-2012-MartinezS #monitoring
Breath rate monitoring during sleep using near-ir imagery and PCA (MM, RS), pp. 3472–3475.
ICPRICPR-2012-McCloskeyD #detection #metadata #process #video
Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPRICPR-2012-MinKCK #approach #detection #higher-order
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MoriyamaAS #analysis
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-MotlicekSWMM #authentication #mobile #modelling #variability
Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
ICPRICPR-2012-MujumdarVK #framework #multi #novel #segmentation
A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
ICPRICPR-2012-NaitoKSS
Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPRICPR-2012-NakazawaMMNHYY #multi #re-engineering
Dynamic scene reconstruction using asynchronous multiple Kinects (MN, IM, YM, HN, HH, HY, YY), pp. 469–472.
ICPRICPR-2012-NarayanR #segmentation
Motion segmentation using curve fitting on Lagrangian particle trajectories (SN, KRR), pp. 3692–3695.
ICPRICPR-2012-NegrelPG #categorisation #image
Using spatial pyramids with compacted VLAT for image categorization (RN, DP, PHG), pp. 2460–2463.
ICPRICPR-2012-NgC #verification
Face verification using temporal affective cues (ESN, AYSC), pp. 1249–1252.
ICPRICPR-2012-NguyenVC #multi #recognition
Face recognition using Multi-modal Binary Patterns (TPN, NSV, AC), pp. 2343–2346.
ICPRICPR-2012-NiigakiSM #detection
Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPRICPR-2012-NikanA #recognition
Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
ICPRICPR-2012-OumerP #3d #estimation #image
3D point tracking and pose estimation of a space object using stereo images (NWO, GP), pp. 796–800.
ICPRICPR-2012-PalenichkaPKL #image #modelling #multi
Model-based extraction of image area descriptors using a multi-scale attention operator (RMP, MP, YK, AL), pp. 853–856.
ICPRICPR-2012-PerdigotoA #3d #image #re-engineering
Reconstruction of 3D lines from a single axial catadioptric image using cross-ratio (LP, HA), pp. 857–860.
ICPRICPR-2012-PerezMMSV #recognition
Combining gradient histograms using orientation tensors for human action recognition (EdAP, VFM, LMM, DOS, MBV), pp. 3460–3463.
ICPRICPR-2012-PhanST #detection #symmetry
Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPRICPR-2012-PorwalZG #network #recognition
Handwritten Arabic text recognition using Deep Belief Networks (UP, YZ, VG), pp. 302–305.
ICPRICPR-2012-RebagliatiSPS #distance #edit distance #graph #set
Computing the graph edit distance using dominant sets (NR, ASR, MP, FS), pp. 1080–1083.
ICPRICPR-2012-ReinbacherRB #game studies #named
RoμNect: Hand mounted depth sensing using a commodity gaming sensor (CR, MR, HB), pp. 461–464.
ICPRICPR-2012-RiechertZMK #estimation #hybrid #realtime #recursion
Real-time disparity estimation using line-wise hybrid recursive matching and cross-bilateral median up-sampling (CR, FZ, MM, PK), pp. 3168–3171.
ICPRICPR-2012-RodriguesPBPM #image #multi #segmentation #towards
Towards breast ultrasound image segmentation using multi-resolution pixel descriptors (RR, AMGP, RB, MP, JM), pp. 2833–2836.
ICPRICPR-2012-RohithK #3d #estimation #modelling
Augmenting monocular motion estimation using intermittent 3D models from depth sensors (MVR, CK), pp. 473–476.
ICPRICPR-2012-RoyH #classification #component #detection #documentation #image
Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPRICPR-2012-SankaranJ #network #recognition
Recognition of printed Devanagari text using BLSTM Neural Network (NS, CVJ), pp. 322–325.
ICPRICPR-2012-SantosPTGPF #classification #image #multi #visual notation #word
Improving texture description in remote sensing image multi-scale classification tasks by using visual words (JAdS, OABP, RdST, PHG, SPF, AXF), pp. 3090–3093.
ICPRICPR-2012-SchmeingJ #optimisation
Faithful Spatio-Temporal disocclusion filling using local optimization (MS, XJ), pp. 3799–3802.
ICPRICPR-2012-SchuldhausKJESL #classification
Classification of surfaces and inclinations during outdoor running using shoe-mounted inertial sensors (DS, PK, UJ, BE, HS, ML), pp. 2258–2261.
ICPRICPR-2012-ShenZ #3d #recognition
Hyperspectral face recognition using 3D Gabor wavelets (LS, SZ), pp. 1574–1577.
ICPRICPR-2012-ShibataK #modelling #recognition
Emotion recognition modeling of sitting postures by using pressure sensors and accelerometers (TS, YK), pp. 1124–1127.
ICPRICPR-2012-ShinPJB #detection
Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPRICPR-2012-SimoesSW #detection #image
Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPRICPR-2012-SoranHLS #detection
Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPRICPR-2012-SuLT #documentation #framework #image #learning #markov #random
A learning framework for degraded document image binarization using Markov Random Field (BS, SL, CLT), pp. 3200–3203.
ICPRICPR-2012-SuYLW #bound #classification #editing
Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPRICPR-2012-SvarmSEO #image
Point track creation in unordered image collections using Gomory-Hu trees (LS, ZS, OE, CO), pp. 2116–2119.
ICPRICPR-2012-TajimaIA #3d #correlation
A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPRICPR-2012-TangS #independence #learning #network #performance #testing
Efficient and accurate learning of Bayesian networks using chi-squared independence tests (YT, SNS), pp. 2723–2726.
ICPRICPR-2012-ThanhMNMY #detection #recognition #robust
Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPRICPR-2012-TianC12a #image #optimisation
Depth image up-sampling using ant colony optimization (JT, LC), pp. 3795–3798.
ICPRICPR-2012-TsuboshitaKFO #adaptation #image
Image annotation using adapted Gaussian mixture model (YT, NK, MF, MO), pp. 1346–1350.
ICPRICPR-2012-TsuruKO
Mixed-reality snapshot system using environmental depth sensors (HT, IK, YO), pp. 97–100.
ICPRICPR-2012-UddinCKS
Accurate genomic signal recovery using compressed sensing (BU, MEC, HAK, GS), pp. 3144–3147.
ICPRICPR-2012-Ugurlu #detection
Head posture detection using skin and hair information (YU), pp. 1–4.
ICPRICPR-2012-ValevY #classification #clustering #graph
Classification using graph partitioning (VV, NY), pp. 1261–1264.
ICPRICPR-2012-VaradarajanV #semantics #visual notation
Semantic saliency using k-TR theory of visual perception (KMV, MV), pp. 3676–3679.
ICPRICPR-2012-VillamizarGSM #learning #online #random
Online human-assisted learning using Random Ferns (MV, AG, AS, FMN), pp. 2821–2824.
ICPRICPR-2012-VitaladevuniCPN #detection #documentation #image
Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPRICPR-2012-WangCCP #detection #realtime
Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPRICPR-2012-WangHWZ #classification #gender
Facial image-based gender classification using Local Circular Patterns (CW, DH, YW, GZ), pp. 2432–2435.
ICPRICPR-2012-WangOJBK
Tracking Tetrahymena pyriformis cells using decision trees (QW, YO, AAJ, KLB, MK), pp. 1843–1847.
ICPRICPR-2012-WeibelDWR #detection #graph
Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPRICPR-2012-WittW #programming
Sparse stereo by edge-based search using dynamic programming (JW, UW), pp. 3631–3635.
ICPRICPR-2012-XiaSF #towards #verification #visual notation
Toward kinship verification using visual attributes (SX, MS, YF), pp. 549–552.
ICPRICPR-2012-XuanSCS #algorithm
An Enhanced EM algorithm using maximum entropy distribution as initial condition (GX, YQS, PC, PS), pp. 849–852.
ICPRICPR-2012-XuGN #image
Morphological filtering in shape spaces: Applications using tree-based image representations (YX, TG, LN), pp. 485–488.
ICPRICPR-2012-YagiMM #online #retrieval #robust #similarity
Robust on-line handwritten object retrieval using a similarity measure based on overlap area of circles (TY, HM, MM), pp. 721–724.
ICPRICPR-2012-YangZLP #3d #optimisation
Coupled 3D tracking and pose optimization of rigid objects using particle filter (HY, YZ, XL, IP), pp. 1451–1454.
ICPRICPR-2012-YlioinasHP #classification
Age Classification in Unconstrained Conditions Using LBP Variants (JY, AH, MP), pp. 1257–1260.
ICPRICPR-2012-Yu #locality #video
Localization and extraction of the four clock-digits using the knowledge of the digital video clock (XY), pp. 1217–1220.
ICPRICPR-2012-ZarifFR #image #multi #performance #similarity
Fast and efficient multichannel image completion using local similarity (SZ, IF, DR), pp. 3116–3119.
ICPRICPR-2012-ZhangFWZJ #image #scalability
Scalable image co-segmentation using color and covariance features (SZ, WF, LW, JZ, JJ), pp. 3708–3711.
ICPRICPR-2012-ZhangH #feature model #recognition
Face recognition using semi-supervised spectral feature selection (ZZ, ERH), pp. 1294–1297.
ICPRICPR-2012-ZhangH12b #estimation
Simultaneous reflectance estimation and surface shape recovery using polarisation (LZ, ERH), pp. 1876–1879.
ICPRICPR-2012-ZhangL #detection
Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPRICPR-2012-ZhangLM #composition #multi #recognition
Multi-subregion face recognition using coarse-to-fine Quad-tree decomposition (CZ, XL, TM), pp. 1004–1007.
ICPRICPR-2012-ZhangXSS #modelling #process #recognition #representation #smarttech
Sparse representation for motion primitive-based human activity modeling and recognition using wearable sensors (MZ, WX, AAS, MS), pp. 1807–1810.
ICPRICPR-2012-ZhuoCQYX #algorithm #classification #image #learning
Image classification using HTM cortical learning algorithms (WZ, ZC, YQ, ZY, YX), pp. 2452–2455.
ICPRICPR-2012-ZhuW #gesture #kernel #recognition
Single-frame hand gesture recognition using color and depth kernel descriptors (XZ, KYKW), pp. 2989–2992.
ICPRICPR-2012-ZillyRMWSK #multi
Multi-camera rectification using linearized trifocal tensor (FZ, CR, MM, WW, TS, PK), pp. 2727–2731.
ICPRICPR-2012-ZouKR #image #segmentation #semantics
Semantic image segmentation using region bank (WZ, KK, JR), pp. 922–925.
KDDKDD-2012-BoleyMG #linear
Linear space direct pattern sampling using coupling from the past (MB, SM, TG), pp. 69–77.
KDDKDD-2012-CorreaL #clustering #graph
Locally-scaled spectral clustering using empty region graphs (CDC, PL), pp. 1330–1338.
KDDKDD-2012-GunnemannFS #clustering #modelling #multi
Multi-view clustering using mixture models in subspace projections (SG, IF, TS), pp. 132–140.
KDDKDD-2012-HiraiY #clustering #detection #normalisation
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-KimLX #image #multi #predict #process #web
Web image prediction using multivariate point processes (GK, FFL, EPX), pp. 1068–1076.
KDDKDD-2012-LiLP #coordination #performance
Fast bregman divergence NMF using taylor expansion and coordinate descent (LL, GL, HP), pp. 307–315.
KDDKDD-2012-RamG
Maximum inner-product search using cone trees (PR, AGG), pp. 931–939.
KDDKDD-2012-YuanZX
Discovering regions of different functions in a city using human mobility and POIs (JY, YZ, XX), pp. 186–194.
KDIRKDIR-2012-ArbelaitzGLMPP #adaptation #clustering #mining #navigation #profiling
Adaptation of the User Navigation Scheme using Clustering and Frequent Pattern Mining Techiques for Profiling (OA, IG, AL, JM, JMP, IP), pp. 187–192.
KDIRKDIR-2012-BallEC #named #open source #social
Undermining — Social Engineering using Open Source Intelligence Gathering (LB, GE, NC), pp. 275–280.
KDIRKDIR-2012-BhattacharjeeBG #data mining #mining #network #optimisation
Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization (SB, FB, RDG), pp. 319–323.
KDIRKDIR-2012-ChueaphunKMC #nearest neighbour #random #recognition
Lanna Dharma Printed Character Recognition using k-Nearest Neighbor and Conditional Random Fields (CC, AK, SM, JC), pp. 169–174.
KDIRKDIR-2012-DuarteFD #clustering #constraints
Evidence Accumulation Clustering using Pairwise Constraints (JMMD, ALNF, FJFD), pp. 293–299.
KDIRKDIR-2012-FormosoFCC #performance #recommendation
Using Neighborhood Pre-computation to Increase Recommendation Efficiency (VF, DF, FC, VC), pp. 333–335.
KDIRKDIR-2012-IkebeKT #learning #predict #smarttech
Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
KDIRKDIR-2012-MedinaFRF #semantics #wiki
Measuring Entity Semantic Relatedness using Wikipedia (LASM, ALNF, RR, JF), pp. 431–437.
KDIRKDIR-2012-Potuzak #algorithm #network #optimisation #search-based
Issues of Optimization of a Genetic Algorithm for Traffic Network Division using a Genetic Algorithm (TP), pp. 340–343.
KEODKEOD-2012-AbdelazzizN #ontology #recommendation
Enhancing the Results of Recommender Systems using Implicit Ontology Relations (LA, KN), pp. 5–14.
KEODKEOD-2012-DiasMS #enterprise #health #ontology
Using Enterprise Ontology for Improving the National Health System — Demonstrated in the Case of a Pharmacy and an Emergency Department (DGD, CM, MMdS), pp. 441–451.
KEODKEOD-2012-GirardiAG #framework #independence #ontology
An Ontology-based Data Acquisition Infrastructure — Using Ontologies to Create Domain-independent Software Systems (DG, KA, MG), pp. 155–160.
KEODKEOD-2012-HmidaCBN #3d #logic
From 9-IM Topological Operators to Qualitative Spatial Relations using 3D Selective Nef Complexes and Logic Rules for Bodies (HBH, CC, FB, CN), pp. 208–213.
KEODKEOD-2012-KawtrakulMCRPNK #latency #social #social media
Improving Disaster Responsiveness using a Mix of Social Media and e-Government (AK, IM, HC, SR, KP, MN, VK), pp. 423–426.
KEODKEOD-2012-KhairMZ #data mining #education #mining #roadmap #student
Creating an Educational Roadmap for Engineering Students via an Optimal and Iterative Yearly Regression Tree using Data Mining (MK, CEM, WZ), pp. 43–52.
KEODKEOD-2012-LiangCI #approach #development
A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEODKEOD-2012-MendesASS
Using DEMO-based SLAs for Improving City Council Services (CM, MA, NS, MMdS), pp. 431–440.
KEODKEOD-2012-NogueiraG #programming #set
Recall-driven Product Tracing and Supply Chain Tracking using Answer Set Programming (MLN, NPG), pp. 125–133.
KEODKEOD-2012-SchlenoffFB #approach #ontology #recognition
An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEODKEOD-2012-SuzukiF #overview #segmentation #similarity #word
Segmentation of Review Texts by using Thesaurus and Corpus-based Word Similarity (YS, FF), pp. 381–384.
KMISKMIS-2012-Borchardt #information management #social #social media
Using Social Media for Knowledge Management in SME (UB), pp. 31–39.
KMISKMIS-2012-HamadaAS #generative #learning
A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMISKMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #platform #scalability #tool support
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMISKMIS-2012-NgocIC #case study #modelling
Modeling of Indicators using UTL — A Study Case with Hop3x System (DPTN, SI, CC), pp. 269–272.
KMISKMIS-2012-OtsukiAS
An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KRKR-2012-ChaudhriS #knowledge base #programming #reasoning #set #specification
Specifying and Reasoning with Underspecified Knowledge Bases Using Answer Set Programming (VKC, TCS).
KRKR-2012-MorettiT #ranking #set
Ranking Sets of Possibly Interacting Objects Using Shapley Extensions (SM, AT).
MLDMMLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation
EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDMMLDM-2012-CarvalhoPS #classification #image
Classification of Breast Tissues in Mammographic Images in Mass and Non-mass Using McIntosh’s Diversity Index and SVM (PMdSC, ACdP, ACS), pp. 482–494.
MLDMMLDM-2012-KalpakisYHMSSS #analysis #permutation #predict
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDMMLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-Moreira-MatiasMGB #categorisation #classification #matrix
Text Categorization Using an Ensemble Classifier Based on a Mean Co-association Matrix (LMM, JMM, JG, PB), pp. 525–539.
MLDMMLDM-2012-NascimentoPS #classification #image
Lung Nodules Classification in CT Images Using Shannon and Simpson Diversity Indices and SVM (LBN, ACdP, ACS), pp. 454–466.
MLDMMLDM-2012-SapkotaBS #grammar inference #principle
Unsupervised Grammar Inference Using the Minimum Description Length Principle (US, BRB, APS), pp. 141–153.
MLDMMLDM-2012-SinghCS #approach #hybrid #performance #recognition
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDMMLDM-2012-TaTB #approach #clustering #data type
Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDMMLDM-2012-VlaseMI #clustering #metadata
Improvement of K-means Clustering Using Patents Metadata (MV, DM, AI), pp. 293–305.
MLDMMLDM-2012-XuCG #concept #learning #multi
Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy (TX, DKYC, IG), pp. 169–182.
RecSysRecSys-2012-BelloginP #clustering #collaboration #graph
Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
RecSysRecSys-2012-DeDGM #difference #learning
Local learning of item dissimilarity using content and link structure (AD, MSD, NG, PM), pp. 221–224.
RecSysRecSys-2012-Lathia #health
Using ratings to profile your health (NL), pp. 303–304.
RecSysRecSys-2012-Ninaus #heuristic #recommendation #requirements
Using group recommendation heuristics for the prioritization of requirements (GN), pp. 329–332.
RecSysRecSys-2012-PhelanMS #named #realtime #twitter
Yokie: explorations in curated real-time search & discovery using twitter (OP, KM, BS), pp. 307–308.
RecSysRecSys-2012-YangSGL #network #on the #recommendation #social
On top-k recommendation using social networks (XY, HS, YG, YL), pp. 67–74.
SEKESEKE-2012-AlbuquerquePL #approach #case study #experience #natural language #requirements #reuse
Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKESEKE-2012-AlvesGBMA #named
SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
SEKESEKE-2012-DagninoSR #fault #machine learning
Forecasting Fault Events in Power Distribution Grids Using Machine Learning (AD, KS, LR), pp. 458–463.
SEKESEKE-2012-DingS #architecture #collaboration #mobile
Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
SEKESEKE-2012-El-SherifFE #concept #learning #multi #network #social
Using Social Networks for Learning New Concepts in Multi-Agent Systems (SMES, BHF, AE), pp. 261–266.
SEKESEKE-2012-FarfelederMK #elicitation #locality #requirements #semantics
Using Semantic Relatedness and Locality for Requirements Elicitation Guidance (SF, TM, AK), pp. 19–24.
SEKESEKE-2012-FreireCAK #monitoring #process #statistics #workflow
Software Process Monitoring Using Statistical Process Control Integrated in Workflow Systems (MAF, DAdC, EA, UK), pp. 557–562.
SEKESEKE-2012-HumayunG #empirical #trust
An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SEKESEKE-2012-JangidPE #analysis #mobile #predict #sentiment
A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKESEKE-2012-Lozano-FuentesGBSEWHGT
Using Cell Phones for Mosquito Vector Surveillance and Control (SLF, SG, JMB, DS, LE, FW, EHG, JGR, DTC), pp. 763–767.
SEKESEKE-2012-MarchettiG #framework #logic #model transformation
Model Transformation for Frameworks Using Logical Planning (GAM, ESG), pp. 563–569.
SEKESEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-PittoliSN #monitoring #network
Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software Projects (FP, ALRdS, DJN), pp. 570–573.
SEKESEKE-2012-RiveroC #usability #web
Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKESEKE-2012-SalamahEO #automaton #consistency #ltl
Consistency Checks of System Properties Using LTL and Büchi Automata (SS, ME, OO), pp. 39–44.
SEKESEKE-2012-SalamiA #algorithm #diagrams #framework #retrieval #search-based
A Framework for Class Diagram Retrieval Using Genetic Algorithm (HOS, MAA), pp. 737–740.
SEKESEKE-2012-ShinKKJR #configuration management #dependence #impact analysis
Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
SEKESEKE-2012-SunLTZ #impact analysis #testing
Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
SEKESEKE-2012-VieiraVNC #elicitation #empirical
Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
SEKESEKE-2012-ZhuLLCZJ #continuation #difference #logic #verification
HybridUML Based Verification of CPS Using Differential Dynamic Logic (MZ, BL, JL, QC, XZ, SJ), pp. 235–238.
SIGIRSIGIR-2012-BenderskyC #dependence #higher-order #information retrieval #modelling #query
Modeling higher-order term dependencies in information retrieval using query hypergraphs (MB, WBC), pp. 941–950.
SIGIRSIGIR-2012-ChaC #analysis #modelling #topic
Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIRSIGIR-2012-ChandarC #documentation #novel #retrieval
Using preference judgments for novel document retrieval (PC, BC), pp. 861–870.
SIGIRSIGIR-2012-ChandarC12a #rank
Using PageRank to infer user preferences (PC, BC), pp. 1167–1168.
SIGIRSIGIR-2012-Cummins #modelling #monte carlo #performance #predict #simulation
Investigating performance predictors using monte carlo simulation and score distribution models (RC), pp. 1097–1098.
SIGIRSIGIR-2012-Ghosh #information retrieval
Improving e-discovery using information retrieval (KG), p. 996.
SIGIRSIGIR-2012-HuangWBW #modelling #process
Improving searcher models using mouse cursor activity (JH, RWW, GB, KW), pp. 195–204.
SIGIRSIGIR-2012-HuO #classification #dataset
Genre classification for million song dataset using confidence-based classifiers combination (YH, MO), pp. 1083–1084.
SIGIRSIGIR-2012-Khatiban #mining #trust
Building reputation and trust using federated search and opinion mining (SK), p. 994.
SIGIRSIGIR-2012-Ko #case study #classification
A study of term weighting schemes using class information for text classification (YK), pp. 1029–1030.
SIGIRSIGIR-2012-LieblingBW
Anticipatory search: using context to initiate search (DJL, PNB, RWW), pp. 1035–1036.
SIGIRSIGIR-2012-LiuBC #behaviour #interactive #personalisation
Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
SIGIRSIGIR-2012-MahdabiAKC #automation #concept #predict #query #refinement
Automatic refinement of patent queries using concept importance predictors (PM, LA, MK, FC), pp. 505–514.
SIGIRSIGIR-2012-MarquesL #information retrieval #java #visual notation
Visual information retrieval using Java and LIRE (OM, ML), p. 1193.
SIGIRSIGIR-2012-MinLLSJ #image #multi #platform
Multi-platform image search using tag enrichment (JM, CL, JL, DS, GJFJ), p. 1018.
SIGIRSIGIR-2012-ONeil #ranking #sentiment
Entity sentiment extraction using text ranking (JO), p. 1024.
SIGIRSIGIR-2012-ShuklaLT
Parallelizing ListNet training using spark (SS, ML, AT), pp. 1127–1128.
SIGIRSIGIR-2012-Sun #classification #word
Short text classification using very few words (AS), pp. 1145–1146.
SIGIRSIGIR-2012-TranF #information retrieval #interactive
Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
ECMFAECMFA-2012-BurtonPRKPS #modelling #problem
Solving Acquisition Problems Using Model-Driven Engineering (FRB, RFP, LMR, DSK, SMP, SS), pp. 428–443.
ICMTICMT-2012-SenMTC #model transformation #modelling
Using Models of Partial Knowledge to Test Model Transformations (SS, JMM, MT, JC), pp. 24–39.
ICMTICMT-2012-VallecilloG #model transformation #type system
Typing Model Transformations Using Tracts (AV, MG), pp. 56–71.
MODELSMoDELS-2012-AranegaEM #feature model #model transformation
Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
MODELSMoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MODELSMoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #verification
On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
PLEASEPLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
PLEASEPLEASE-2012-QuintonDHMC #feature model #modelling
Using feature modelling and automations to select among cloud solutions (CQ, LD, PH, SM, EC), pp. 17–20.
SPLCSPLC-2012-HeiderRGL #impact analysis #modelling #testing #variability
Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
OOPSLAOOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management
Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
OOPSLAOOPSLA-2012-BocqD #monad #named #network #process #streaming #virtual machine
Molecule: using monadic and streaming I/O to compose process networks on the JVM (SB, KD), pp. 315–334.
OOPSLAOOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem
Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
OOPSLAOOPSLA-2012-RosuS #logic #reachability
Checking reachability using matching logic (GR, AS), pp. 555–574.
OOPSLAOOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation
Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
TOOLSTOOLS-EUROPE-2012-MehnertA #type system #verification
Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
TOOLSTOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language
Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
AdaEuropeAdaEurope-2012-GregertsenS #execution #hardware #performance
Improving the Performance of Execution Time Control by Using a Hardware Time Management Unit (KNG, AS), pp. 177–192.
HILTHILT-2012-BeltCHR #ada #automation #contract #verification
Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan (JB, PC, JH, R), pp. 3–4.
HILTHILT-2012-Leino12a #proving #verification #why
Program proving using intermediate verification languages (IVLs) like boogie and why3 (KRML), pp. 25–26.
HILTHILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial
Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
PADLPADL-2012-BalducciniL #aspect-oriented #tool support
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools (MB, YL), pp. 78–92.
PADLPADL-2012-GillN #logic
Handshaking in Kansas Lava Using Patch Logic (AG, BN), pp. 212–226.
PADLPADL-2012-HaveC #performance #program transformation
Efficient Tabling of Structured Data Using Indexing and Program Transformation (CTH, HC), pp. 93–107.
PEPMPEPM-2012-HirzelG #metaprogramming
Streams that compose using macros that oblige (MH, BG), pp. 141–150.
PLDIPLDI-2012-DilligDA #abduction #automation #fault
Automated error diagnosis using abductive inference (ID, TD, AA), pp. 181–192.
PPDPPPDP-2012-SulzmannL #regular expression
Regular expression sub-matching using partial derivatives (MS, KZML), pp. 79–90.
QAPLQAPL-2012-BelardinelliGL #automation #protocol #quantum #verification
Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
SASSAS-2012-HoweK #analysis #parametricity
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-SanchezSSC #generative #invariant #self
Invariant Generation for Parametrized Systems Using Self-reflection — (Extended Version) (AS, SS, CS, BYEC), pp. 146–163.
RERE-2012-BerenbachSN #industrial #modelling #requirements
The use of a requirements modeling language for industrial applications (BB, FS, HN), pp. 285–290.
RERE-2012-FerrariG #detection
Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RERE-2012-Ott #fault #legacy #natural language #specification
Defects in natural language requirement specifications at Mercedes-Benz: An investigation using a combination of legacy data and expert opinion (DO), pp. 291–296.
REFSQREFSQ-2012-DaramolaMSB #perspective #reasoning #requirements #research #semantics
Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview (OD, TM, GS, SB), pp. 172–178.
SACSAC-PL-J-2009-J-CervelleFLR12 #implementation #parsing
Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers (JC, RF, GL, GR), pp. 990–1005.
ASEASE-2012-AlmorsyGI #analysis #automation
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-AlmorsyGI12a #automation #re-engineering
Supporting automated software re-engineering using re-aspects (MA, JG, ASI), pp. 230–233.
ASEASE-2012-AmalfitanoFTCM #android #automation #testing #user interface
Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
ASEASE-2012-FaunesSB #algorithm #generative #model transformation
Generating model transformation rules from examples using an evolutionary algorithm (MF, HAS, MB), pp. 250–253.
ASEASE-2012-GopinathZK #effectiveness #fault #locality #specification
Improving the effectiveness of spectra-based fault localization using specifications (DG, RNZ, SK), pp. 40–49.
ASEASE-2012-HarmanLJWAC #challenge #programming #search-based #source code
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (MH, WBL, YJ, DRW, AA, JAC), pp. 1–14.
ASEASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-KahkonenSH #automation #parallel #source code #testing #thread
Using unfoldings in automated testing of multithreaded programs (KK, OS, KH), pp. 150–159.
ASEASE-2012-LuCC #fault #learning #predict #reduction
Software defect prediction using semi-supervised learning with dimension reduction (HL, BC, MC), pp. 314–317.
ASEASE-2012-Lutz0D #collaboration #mobile #requirements
Using mobile devices for collaborative requirements engineering (RL, SS, SD), pp. 298–301.
ASEASE-2012-NijjarB #bound #smt #verification
Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
ASEASE-2012-RubinC #difference #set
Locating distinguishing features using diff sets (JR, MC), pp. 242–245.
FSEFSE-2012-ZaeemK #generative #programming
Test input generation using dynamic programming (RNZ, SK), p. 34.
ICSEICSE-2012-AlkhalafBG #analysis #string #validation #verification
Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSEICSE-2012-Bavota #refactoring #semantics
Using structural and semantic information to support software refactoring (GB), pp. 1479–1482.
ICSEICSE-2012-Chioasca #automation #machine learning #model transformation #requirements
Using machine learning to enhance automated requirements model transformation (EVC), pp. 1487–1490.
ICSEICSE-2012-CookHSS #compilation #composition #specification #verification
Specification engineering and modular verification using a web-integrated verifying compiler (CTC, HKH, HS, MS), pp. 1379–1382.
ICSEICSE-2012-DevosPDBMA #case study #industrial #performance #reuse #smarttech
Efficient reuse of domain-specific test knowledge: An industrial case in the smart card domain (ND, CP, JCD, RB, BM, GA), pp. 1123–1132.
ICSEICSE-2012-Dilshener #concept #information retrieval
Improving information retrieval-based concept location using contextual relationships (TD), pp. 1499–1502.
ICSEICSE-2012-Ghardallou #analysis #invariant #termination
Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSEICSE-2012-Johnson #case study #question #static analysis #tool support #why
A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
ICSEICSE-2012-KimKKJ #approach #case study #industrial #testing
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
ICSEICSE-2012-Mendes #case study #elicitation #estimation #industrial #lessons learnt #web
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies (EM), pp. 1112–1121.
ICSEICSE-2012-NaganoNKAHUF #mining #repository #scalability
Using the GPGPU for scaling up Mining Software Repositories (RN, HN, YK, BA, KH, NU, AF), pp. 1435–1436.
ICSEICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial
Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
ICSEICSE-2012-SamirniSAMTH #automation #constraints #fault #generative #html #php #string #theorem proving
Automated repair of HTML generation errors in PHP applications using string constraint solving (HS, MS, SA, TDM, FT, LJH), pp. 277–287.
ICSEICSE-2012-Shang #developer
Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSEICSE-2012-SingerS #re-engineering #social
Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
ICSEICSE-2012-SongPF #interactive #named
iTree: Efficiently discovering high-coverage configurations using interaction trees (CS, AP, JSF), pp. 903–913.
ICSEICSE-2012-SusB #education #integration #re-engineering
Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSEICSE-2012-TreudeGGS #development #interactive #named #visualisation
WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment (CT, PG, LG, MADS), pp. 1399–1402.
ICSEICSE-2012-VakilianCNRBJ #automation #refactoring
Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
ICSEICSE-2012-Vetro #automation #identification #static analysis #technical debt
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSEICSE-2012-Yu #analysis #identification
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SACSAC-2012-AbdullahRTN #performance
Efficient matching of SPARQL subscriptions using rete (HA, MR, ST, EN), pp. 372–377.
SACSAC-2012-BernardiH #contract #modelling
Modelling session types using contracts (GB, MH), pp. 1941–1946.
SACSAC-2012-CarvalhoSG #adaptation #fuzzy #segmentation
Texture fuzzy segmentation using adaptive affinity functions (BMC, TSS, EG), pp. 51–53.
SACSAC-2012-ChenGZG #metric #network #similarity
Discovering missing links in networks using vertex similarity measures (HHC, LG, X(Z, CLG), pp. 138–143.
SACSAC-2012-ChenZD #algorithm #effectiveness #search-based #segmentation
Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm (ZC, BZ, SD), pp. 54–55.
SACSAC-2012-ChhelLGS #biology #multi
Minimum multiple characterization of biological data using partially defined boolean formulas (FC, FL, AG, FS), pp. 1399–1405.
SACSAC-2012-ChoeYYR #algorithm #automation #realtime #scheduling #search-based
Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm (RC, HY, YY, KRR), pp. 238–243.
SACSAC-2012-ChunM #health #integration #semantics #social #web
Social health data integration using semantic Web (SAC, BM), pp. 392–397.
SACSAC-2012-DasguptaK #analysis #precise
Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SACSAC-2012-DavtyanKMRS #encryption
Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
SACSAC-2012-DayehH #biology #network
Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
SACSAC-2012-DiasDHS #sorting #symmetry
Sorting genomes using almost-symmetric inversions (ZD, UD, LSH, JCS), pp. 1368–1374.
SACSAC-2012-FkiJST #approach #composition #flexibility
A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
SACSAC-2012-FouqueLV #fault
Using faults for buffer overflow effects (PAF, DL, FV), pp. 1638–1639.
SACSAC-2012-HasegawaT #distance #invariant
Affine invariant shape matching using radon transform and dynamic time warping distance (MH, ST), pp. 777–781.
SACSAC-2012-HopRFH #ontology #visualisation
Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW (WH, SdR, FF, FH), pp. 304–311.
SACSAC-2012-JeonC #javascript #jit #reuse
Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
SACSAC-2012-KamieHK #clustering #effectiveness #video #web
Effective web video clustering using playlist information (MK, TH, HK), pp. 949–956.
SACSAC-2012-KangJC #3d #scalability #video
Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SACSAC-2012-KuttyCN #modelling #recommendation
A people-to-people recommendation system using tensor space models (SK, LC, RN), pp. 187–192.
SACSAC-2012-MaamarFLH #implementation #social #specification #web #web service
Specifying and implementing social Web services operation using commitments (ZM, NF, ML, SH), pp. 1955–1960.
SACSAC-2012-MahdianGTM #smarttech
Location based routing using smartphones in an infrastructureless environment (AM, HG, ST, SM), pp. 594–599.
SACSAC-2012-MajchrzakS #agile #development #testing #web
Using spring Roo for the test-driven development of Web applications (TAM, AS), pp. 664–671.
SACSAC-2012-MaloneG #case study #groovy
A case study in the use of Groovy and Grails (KM, JG), pp. 1254–1255.
SACSAC-2012-MaruhashiTT #identification
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-MbarekKPA #design #modelling #power management
Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design (OM, AK, AP, MA), pp. 1580–1587.
SACSAC-2012-MenorPB #kernel #predict #probability
Probabilistic prediction of protein phosphorylation sites using kernel machines (MM, GP, KB), pp. 1393–1398.
SACSAC-2012-NagarAB #functional #graph #similarity
Computing gene functional similarity using combined graphs (AN, HAM, SB), pp. 1381–1386.
SACSAC-2012-OliveiraCS #bound #on the
On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SACSAC-2012-OSullivanWL #design #integer
Designing data storage tier using Integer Programing (MJO, CGW, DL), pp. 426–433.
SACSAC-2012-ParraRMRDS #adaptation #constraints #optimisation #self #variability
Using constraint-based optimization and variability to support continuous self-adaptation (CAP, DR, SM, RR, LD, LS), pp. 486–491.
SACSAC-2012-QiCLHW #collaboration
Using inferred tag ratings to improve user-based collaborative filtering (QQ, ZC, JL, CH, QW), pp. 2008–2013.
SACSAC-2012-RajeDFRR #data access #implementation #ontology
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SACSAC-2012-SchluterC #correlation #detection #markov #modelling #predict
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
SACSAC-2012-SouzaPEMOW #navigation #network
Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks (JRS, GP, GBE, CCTM, FSO, DFW), pp. 280–285.
SACSAC-2012-SwainCNB #analysis #markov #performance
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SACSAC-2012-WickerPK #classification #composition #matrix #multi
Multi-label classification using boolean matrix decomposition (JW, BP, SK), pp. 179–186.
SACSAC-2012-ZaraketNSJ #architecture #library #parallel #source code
Portable Parallel Programs using architecture-aware libraries (FAZ, MN, MS, AJ), pp. 1922–1924.
SLESLE-2012-AfroozehBBJMMS #gll #grammarware #semiparsing
Island Grammar-Based Parsing Using GLL and Tom (AA, JCB, MvdB, AJ, MM, PEM, ES), pp. 224–243.
SLESLE-2012-Storey #challenge #design #ontology #social
Addressing Cognitive and Social Challenges in Designing and Using Ontologies in the Biomedical Domain (MADS), pp. 1–3.
ASPLOSASPLOS-2012-ClementsKZ #scalability
Scalable address spaces using RCU balanced trees (ATC, MFK, NZ), pp. 199–210.
ASPLOSASPLOS-2012-LeeS #architecture #scheduling
Region scheduling: efficiently using the cache architectures via page-level affinity (ML, KS), pp. 451–462.
ASPLOSASPLOS-2012-LinWLZ #named #power management #smarttech
Reflex: using low-power processors in smartphones without knowing them (FXL, ZW, RL, LZ), pp. 13–24.
CASECASE-2012-Chang #detection #fault #feature model #process
Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASECASE-2012-ChowdhuryTWSLG #automation #biology
Automated indirect transport of biological cells with optical tweezers using planar gripper formations (SC, AT, CW, PS, WL, SKG), pp. 267–272.
CASECASE-2012-DinhamF #detection
Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASECASE-2012-DotoliFIR #agile #modelling #simulation
A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASECASE-2012-FelekisWMRBSN #automation
Automated stiffness characterization of living tobacco BY2 cells using the Cellular Force Microscope (DF, AW, SM, ALRK, FB, RSS, BJN), pp. 285–290.
CASECASE-2012-FrankHEFDV #automation #modelling #realtime #requirements
Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems (TF, TH, KE, AF, CD, BVH), pp. 851–856.
CASECASE-2012-HeZWZ #identification
Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
CASECASE-2012-IsmailDH #higher-order
Observer-based trajectory tracking for a class of underactuated Lagrangian systems using higher-order sliding modes (RMTRI, TDN, QPH), pp. 1204–1209.
CASECASE-2012-JoKOO #feedback
Contact force control of a robotic hand using F/T sensory feedback with a rigid object (JJ, SKK, YO, SRO), pp. 436–441.
CASECASE-2012-JungCKM #detection
Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASECASE-2012-KawarazakiY #recognition #speech
Remote control system of home electrical appliances using speech recognition (NK, TY), pp. 761–764.
CASECASE-2012-KimKHHL #framework #platform
A robot platform for unmanned weeding in a paddy field using sensor fusion (GHK, SCK, YKH, KSH, SGL), pp. 904–907.
CASECASE-2012-KimKS #algorithm #detection #recognition
Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASECASE-2012-KimKYOO #navigation
Actionable topological mapping for navigation using nearby objects (JK, JK, SY, YO, SO), pp. 1162–1167.
CASECASE-2012-KimYSP #detection #visual notation
Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASECASE-2012-KurzDP
Sampling Decision System in semiconductor manufacturing using Virtual Metrology (DK, CDL, JP), pp. 74–79.
CASECASE-2012-LeeB #execution #framework #lifecycle #simulation
Executable simulation lifecycle management framework using extensible and interoperable simulation language (HL, AB), pp. 237–242.
CASECASE-2012-LeeHJKL #matlab #simulation
Dynamic simulation of radial active magnetic bearing system for high speed rotor using ADAMS and MATLAB co-simulation (KCL, DKH, YHJ, CYK, MCL), pp. 880–885.
CASECASE-2012-LiK #automation #automaton #finite #generative #modelling #testing
Model-based automatic test generation for Simulink/Stateflow using extended finite automaton (ML, RK), pp. 857–862.
CASECASE-2012-LuiP #assembly #difference #evolution #flexibility #scheduling
Scheduling Flexible Assembly Lines using variants of Differential Evolution (WHVL, SGP), pp. 594–599.
CASECASE-2012-Ralston #automation
Automated longwall shearer horizon control using thermal infrared-based seam tracking (JCR), pp. 20–25.
CASECASE-2012-RyuOC
COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
CASECASE-2012-ShinPB #2d #3d #estimation
6DOF pose estimation using 2D-3D sensor fusion (YDS, JHP, MB), pp. 714–717.
CASECASE-2012-TangLY #nondeterminism
Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-WuY #estimation #linear #markov #metric
State estimation for Markovian Jump Linear System using quantized measurements (HW, HY), pp. 527–531.
CASECASE-2012-ZhangWZX #fault #memory management
A dynamic memory model for mechanical fault diagnosis using one-class support vector machine (QZ, JW, JZ, GX), pp. 497–501.
CASECASE-2012-ZhaoLKH #data fusion #locality #simulation
A simulation study of sensor data fusion using UKF for bucket wheel reclaimer localization (SZ, TFL, BK, AH), pp. 1192–1197.
CGOCGO-2012-ParkCA #graph #modelling #predict
Using graph-based program characterization for predictive modeling (EP, JC, MAA), pp. 196–206.
CGOCGO-2012-VankaT #data flow #dependence #performance #profiling
Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
DACDAC-2012-ChangJC #configuration management #optimisation
Timing ECO optimization using metal-configurable gate-array spare cells (HYC, IHRJ, YWC), pp. 802–807.
DACDAC-2012-CropPC #detection #logic #throughput
Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DACDAC-2012-DonkohLS #adaptation #design #hybrid #predict
A hybrid and adaptive model for predicting register file and SRAM power using a reference design (ED, AL, ES), pp. 62–67.
DACDAC-2012-ForoutanSP #3d #interface #low cost
Cost-efficient buffer sizing in shared-memory 3D-MPSoCs using wide I/O interfaces (SF, AS, FP), pp. 366–375.
DACDAC-2012-HamzehSV #morphism #named
EPIMap: using epimorphism to map applications on CGRAs (MH, AS, SBKV), pp. 1284–1291.
DACDAC-2012-HuangLR #energy #hardware #trade-off
A methodology for energy-quality tradeoff using imprecise hardware (JH, JL, GR), pp. 504–509.
DACDAC-2012-HuLWR #array #hardware
Hardware realization of BSB recall function using memristor crossbar arrays (MH, HL, QW, GSR), pp. 498–503.
DACDAC-2012-JungSB #off the shelf
Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
DACDAC-2012-KumarBKV #analysis #predict #source code
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LinMK #logic #satisfiability
Boolean satisfiability using noise based logic (PCKL, AM, SPK), pp. 1260–1261.
DACDAC-2012-MalburgFF #automation #design #hardware #locality #metric
Automated feature localization for hardware designs using coverage metrics (JM, AF, GF), pp. 941–946.
DACDAC-2012-MeirR #analysis #biology #named #network #performance
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-MorrisBZP #logic #named
mLogic: ultra-low voltage non-volatile logic circuits using STT-MTJ devices (DM, DB, JG(Z, LTP), pp. 486–491.
DACDAC-2012-ParkGMRR #architecture #design #energy #performance
Future cache design using STT MRAMs for improved energy efficiency: devices, circuits and architecture (SPP, SKG, NNM, AR, KR), pp. 492–497.
DACDAC-2012-SasanianWM #quantum
Realizing reversible circuits using a new class of quantum gates (ZS, RW, DMM), pp. 36–41.
DACDAC-2012-Suto #design
Rule agnostic routing by using design fabrics (GS), pp. 471–475.
DACDAC-2012-YuCSJC #design #detection
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DACDAC-2012-ZhangTT #identification
Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
DATEDATE-2012-0002EGB #performance
Area efficient asynchronous SDM routers using 2-stage Clos switches (WS, DAE, JDG, WJB), pp. 1495–1500.
DATEDATE-2012-AridhiZT #order #reduction #simulation #towards
Towards improving simulation of analog circuits using model order reduction (HA, MHZ, ST), pp. 1337–1342.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATEDATE-2012-ChatziparaskevasBP #difference #finite #parallel
An FPGA-based parallel processor for Black-Scholes option pricing using finite differences schemes (GC, AB, IP), pp. 709–714.
DATEDATE-2012-CordesM #algorithm #parallel #search-based
Multi-objective aware extraction of task-level parallelism using genetic algorithms (DC, PM), pp. 394–399.
DATEDATE-2012-Gamatie #design #streaming
Design of streaming applications on MPSoCs using abstract clocks (AG), pp. 763–768.
DATEDATE-2012-KatzRZ #csp #generative
Generating instruction streams using abstract CSP (YK, MR, AZ), pp. 15–20.
DATEDATE-2012-LeMKV #debugging #satisfiability
Non-solution implications using reverse domination in a modern SAT-based debugging environment (BL, HM, BK, AGV), pp. 629–634.
DATEDATE-2012-MarianiSPZSB #architecture #configuration management #design #multi #resource management #runtime
Using multi-objective design space exploration to enable run-time resource management for reconfigurable architectures (GM, VMS, GP, VZ, CS, KB), pp. 1379–1384.
DATEDATE-2012-MaricauJG #analysis #learning #multi #reliability
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinMLB #design #incremental #verification
Verification of partial designs using incremental QBF solving (PM, CM, MDTL, BB), pp. 623–628.
DATEDATE-2012-MillerVG #automation #cyber-physical #mockup #named #testing
MEDS: Mockup Electronic Data Sheets for automated testing of cyber-physical systems using digital mockups (BM, FV, TG), pp. 1417–1420.
DATEDATE-2012-NarayananDZT #design #verification
Verifying jitter in an analog and mixed signal design using dynamic time warping (RN, AD, MHZ, ST), pp. 1413–1416.
DATEDATE-2012-QianTT #configuration management #self
A flit-level speedup scheme for network-on-chips using self-reconfigurable bi-directional channels (ZQ, YFT, CYT), pp. 1295–1300.
DATEDATE-2012-RoxEG #analysis #design #network
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SabrySA #3d
Thermal balancing of liquid-cooled 3D-MPSoCs using channel modulation (MMS, AS, DA), pp. 599–604.
DATEDATE-2012-ShahRK #bound #scheduling
Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
DATEDATE-2012-ShoaibJV
Enabling advanced inference on sensor nodes through direct use of compressively-sensed signals (MS, NKJ, NV), pp. 437–442.
DATEDATE-2012-StattelmannGCBR #hybrid #modelling #simulation
Hybrid source-level simulation of data caches using abstract cache models (SS, GG, CC, OB, WR), pp. 376–381.
DATEDATE-2012-WilleDOO #automation #design #power management #synthesis
Automatic design of low-power encoders using reversible circuit synthesis (RW, RD, CO, AGO), pp. 1036–1041.
HPCAHPCA-2012-BalakrishnanS #behaviour #named #probability
WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
HPCAHPCA-2012-BattleHHR #flexibility
Flexible register management using reference counting (SJB, ADH, MH, AR), pp. 273–284.
HPDCHPDC-2012-DelamareFKL #distributed #named
SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures (SD, GF, DK, OL), pp. 173–186.
HPDCHPDC-2012-LeeWF #distributed #named #resource management
PonD: dynamic creation of HTC pool on demand using a decentralized resource discovery system (KL, DW, RJOF), pp. 161–172.
ISMMISMM-2012-OCallahan #memory management #question #web #why
Why is your web browser using so much memory? (RO), pp. 1–2.
LCTESLCTES-2012-KhudiaWM #embedded #fault #performance
Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
LCTESLCTES-2012-KyleBFLT #embedded #manycore #set #simulation
Efficiently parallelizing instruction set simulation of embedded multi-core processors using region-based just-in-time dynamic binary translation (SCK, IB, BF, HL, NPT), pp. 21–30.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
PDPPDP-2012-GrutzLFVHDK #parallel
Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL (RG, BL, NKF, FV, AH, FD, DK), pp. 596–602.
PDPPDP-2012-HernandezGCGIS #estimation
Accelerating Fibre Orientation Estimation from Diffusion Weighted Magnetic Resonance Imaging Using GPUs (MH, GDG, JMC, JMG, AI, SNS), pp. 622–626.
PPoPPPPoPP-2012-TaoBB #development #gpu #kernel #scalability
Using GPU’s to accelerate stencil-based computation kernels for the development of large scale scientific applications on heterogeneous systems (JT, MB, SRB), pp. 287–288.
FASEFASE-2012-SalayFC #independence #modelling #refinement
Language Independent Refinement Using Partial Modeling (RS, MF, MC), pp. 224–239.
FASEFASE-2012-ShiCD #composition #execution #integration #product line #symbolic computation #testing
Integration Testing of Software Product Lines Using Compositional Symbolic Execution (JS, MBC, MBD), pp. 270–284.
FASEFASE-2012-UsaolaML #reduction #testing
Reduction of Test Suites Using Mutation (MPU, PRM, BPL), pp. 425–438.
FoSSaCSFoSSaCS-2012-PreugschatW #automaton #effectiveness #logic
Effective Characterizations of Simple Fragments of Temporal Logic Using Prophetic Automata (SP, TW), pp. 135–149.
STOCSTOC-2012-AbrahamN
Using petal-decompositions to build a low stretch spanning tree (IA, ON), pp. 395–406.
STOCSTOC-2012-KelnerMP #approximate #multi #performance
Faster approximate multicommodity flow using quadratically coupled flows (JAK, GLM, RP), pp. 1–18.
TACASTACAS-2012-FehnkerGHMPT #analysis #automation
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-HolzerKSTV #contest #proving #reachability
Proving Reachability Using FShell — (Competition Contribution) (AH, DK, CS, MT, HV), pp. 538–541.
TACASTACAS-2012-LangM #equation #lts #model checking #network
Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems (FL, RM), pp. 141–156.
TACASTACAS-2012-ZaeemGKM #data type #satisfiability
History-Aware Data Structure Repair Using SAT (RNZ, DG, SK, KSM), pp. 2–17.
WRLAWRLA-2012-Riesco #maude #specification
Using Narrowing to Test Maude Specifications (AR), pp. 201–220.
CAVCAV-2012-EsparzaGK #probability #proving #source code #termination
Proving Termination of Probabilistic Programs Using Patterns (JE, AG, SK), pp. 123–138.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICLPICLP-2012-SchandaB #development #programming #set
Using Answer Set Programming in the Development of Verified Software (FS, MB), pp. 72–85.
ICLPICLP-2012-ZomboriCS #constraints #logic programming #static typing #type inference
Static Type Inference for the Q language using Constraint Logic Programming (ZZ, JC, PS), pp. 119–129.
ICLPICLP-J-2012-AreiasR #concurrent #multi #thread #towards
Towards multi-threaded local tabling using a common table space (MA, RR), pp. 427–443.
ICLPICLP-J-2012-BliemMW #declarative #named #problem #programming
D-FLAT: Declarative problem solving using tree decompositions and answer-set programming (BB, MM, SW), pp. 445–464.
ICSTICST-2012-AlesioGNB #constraints #optimisation #realtime #testing
Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
ICSTICST-2012-BorjessonF #automation #case study #comparative #industrial #testing #tool support #user interface #visual notation
Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry (EB, RF), pp. 350–359.
ICSTICST-2012-DucheneGRR #detection #fuzzing #model inference
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICSTICST-2012-EnderlinDGB #grammarware #php #testing
Grammar-Based Testing Using Realistic Domains in PHP (IE, FD, AG, FB), pp. 509–518.
ICSTICST-2012-GotliebHB #constraints #programming
Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
ICSTICST-2012-GrooteOW #formal method
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICSTICST-2012-JonssonBSE #automation #scalability #towards
Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
ICSTICST-2012-LiuNT #bound #case study #smt #verification
Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
ICSTICST-2012-MalikK #analysis #graph
Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICSTICST-2012-MalzJG #fuzzy #logic #testing
Prioritization of Test Cases Using Software Agents and Fuzzy Logic (CM, NJ, PG), pp. 483–486.
ICSTICST-2012-McMinnSS #data type #generative #query #search-based #string #web
Search-Based Test Input Generation for String Data Types Using the Results of Web Queries (PM, MS, MS), pp. 141–150.
ICSTICST-2012-Nguyen #comprehension #detection #performance #scalability
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICSTICST-2012-PapadakisT #fault
Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
ICSTICST-2012-RaposD #execution #generative #incremental #modelling #symbolic computation #testing #uml
Incremental Test Case Generation for UML-RT Models Using Symbolic Execution (EJR, JD), pp. 962–963.
ICSTICST-2012-ShakyaXLLKK #classification #combinator #testing
Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (KS, TX, NL, YL, RK, DRK), pp. 620–623.
ICSTICST-2012-WehbiOB #monitoring #security
Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
ICSTICST-2012-Wotawa #challenge #constraints #fault #open science #research #source code
Open Research Challenges of Localizing Faults in Programs Using Constraints (FW), pp. 770–771.
ICTSSICTSS-2012-LahamiKBJ #adaptation #architecture #design #distributed #problem
Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems (ML, MK, MB, MJ), pp. 103–118.
ICTSSICTSS-2012-TaylorHBD #behaviour #testing
Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
IJCARIJCAR-2012-JacquelBDD #automation #deduction #modulo theories #proving #theorem proving #verification
Tableaux Modulo Theories Using Superdeduction — An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover (MJ, KB, DD, CD), pp. 332–338.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICSLICS-2012-GrigorieffV #algorithm #bound
Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
ICSTSAT-2012-TanjoTB #csp #encoding #named #order #satisfiability
Azucar: A SAT-Based CSP Solver Using Compact Order Encoding — (TT, NT, MB), pp. 456–462.
TAPTAP-2012-BengoleaAMF #bound #test coverage #testing
Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
TAPTAP-2012-SenniF #constraints #data type #generative #logic programming #testing
Generation of Test Data Structures Using Constraint Logic Programming (VS, FF), pp. 115–131.
CBSECBSE-2011-TambeG #component #distributed #embedded #realtime
Rectifying orphan components using group-failover in distributed real-time and embedded systems (ST, ASG), pp. 139–148.
ECSAECSA-2011-BruckmannGP #architecture #enterprise #monitoring #realtime #towards
Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers (TB, VG, MP), pp. 287–294.
ECSAECSA-2011-NavarroCPR #architecture #model transformation
Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
ECSAECSA-2011-SilvaB #architecture #specification
A Model for Specifying Rationale Using an Architecture Description Language (LdS, DB), pp. 319–327.
ECSAECSA-2011-TibermacineZ #evolution #quality #requirements #web #web service
Supervising the Evolution of Web Service Orchestrations Using Quality Requirements (CT, TZ), pp. 1–16.
WICSAWICSA-2011-TsakirisKM #case study #evaluation #hybrid #industrial #plugin #quality
Evaluation of the Use of Quality Attribute Scenarios in a Plug-In Hybrid Electric Vehicle Controls System — Industrial Case Study (AT, JK, RM), pp. 66–72.
WICSAWICSA-2011-Woods #architecture #assessment #industrial
Industrial Architectural Assessment Using TARA (EW), pp. 56–65.
DocEngDocEng-2011-RossiR #representation #topic
Building a topic hierarchy using the bag-of-related-words representation (RGR, SOR), pp. 195–204.
DRRDRR-2011-BallS #automation #statistics #tool support
Statistical characterization of handwriting characteristics using automated tools (GRB, SNS), pp. 1–10.
DRRDRR-2011-BukhariSB #algorithm #documentation #image #multi #segmentation
Improved document image segmentation algorithm using multiresolution morphology (SSB, FS, TMB), pp. 1–10.
DRRDRR-2011-ChenCL #constraints #identification
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
DRRDRR-2011-CutterBSB #identification
Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
DRRDRR-2011-HamdaniAHMA #optimisation #recognition
Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization (MH, HEA, TMH, VM, AMA), pp. 1–10.
DRRDRR-2011-KimLT #automation #identification
Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
DRRDRR-2011-KunduHBCFJM #online #recognition #tablet
Online medical symbol recognition using a Tablet PC (AK, QH, SB, CC, RF, SJ, SM), pp. 1–10.
DRRDRR-2011-LiuZ #image #mobile
Segmenting texts from outdoor images taken by mobile phones using color features (ZL, HZ), pp. 1–10.
DRRDRR-2011-PengSGS #approach #documentation
Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
DRRDRR-2011-SaabniE #distance #documentation #word
Word spotting for handwritten documents using Chamfer Distance and Dynamic Time Warping (RS, JES), pp. 1–10.
HTHT-2011-Contractor #multi #network #web
From disasters to WOW: using web science to understand and enable 21st century multidimensional networks (NSC), pp. 1–2.
HTHT-2011-GoedeMNW #network #social #summary
Succinct summaries of narrative events using social networks (BdG, MM, AN, JvW), pp. 299–304.
HTHT-2011-SahW #automation #fuzzy #metadata #mining
Automatic mining of cognitive metadata using fuzzy inference (MS, VW), pp. 37–46.
HTHT-2011-SeroussiBZ #modelling #personalisation #predict #rating
Personalised rating prediction for new users using latent factor models (YS, FB, IZ), pp. 47–56.
HTHT-2011-SolisA #experience #hypermedia #wiki
An experience using a spatial hypertext Wiki (CS, NA), pp. 133–142.
HTHT-2011-TakahashiOYIOT #analysis #wiki
Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDARICDAR-2011-AbediF #analysis #documentation #image #locality #string
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDARICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition
Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
ICDARICDAR-2011-AtanasiuLV #novel #retrieval
Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
ICDARICDAR-2011-BaechlerI #analysis #layout #multi
Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDARICDAR-2011-BarbozaLP #automation #documentation #summary
Using Readers’ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization (RdSB, RDL, VMdSP), pp. 212–216.
ICDARICDAR-2011-BuiVPO #identification #recognition #word
Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
ICDARICDAR-2011-BukhariSB #set
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters (SSB, FS, TMB), pp. 579–583.
ICDARICDAR-2011-CaoPN11a #identification #markov #modelling #recognition
Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
ICDARICDAR-2011-CelikY #2d #graph grammar #probability #recognition
Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar (MC, BAY), pp. 161–166.
ICDARICDAR-2011-ColuttoG #difference #performance #recognition #word
Efficient Word Recognition Using a Pixel-Based Dissimilarity Measure (SC, BG), pp. 1110–1114.
ICDARICDAR-2011-CoustatyBBL #algorithm #image #ontology #semantic gap
Using Ontologies to Reduce the Semantic Gap between Historians and Image Processing Algorithms (MC, AB, KB, GL), pp. 156–160.
ICDARICDAR-2011-CoustatyO #documentation #image
Discrimination of Old Document Images Using Their Style (MC, JMO), pp. 389–393.
ICDARICDAR-2011-DuHSS
Snap and Translate Using Windows Phone (JD, QH, LS, JS), pp. 809–813.
ICDARICDAR-2011-EmilieBA #constraints #network #physics #recognition #semantics
Use of Semantic and Physical Constraints in Bayesian Networks for Form Recognition (EP, YB, AB), pp. 946–950.
ICDARICDAR-2011-Epshtein #documentation
Determining Document Skew Using Inter-line Spaces (BE), pp. 27–31.
ICDARICDAR-2011-GarzSD #analysis #layout
Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDARICDAR-2011-HaddadHKA #adaptation #network #online #recognition
Improvement of On-line Recognition Systems Using a RBF-Neural Network Based Writer Adaptation Module (LH, TMH, MK, AMA), pp. 284–288.
ICDARICDAR-2011-HamamuraINOS #clustering #concurrent #optimisation #recognition #word
Concurrent Optimization of Context Clustering and GMM for Offline Handwritten Word Recognition Using HMM (TH, BI, TN, NO, SS), pp. 523–527.
ICDARICDAR-2011-HassanCG #distance #documentation #edit distance #image
Document Image Indexing Using Edit Distance Based Hashing (EH, SC, MG), pp. 1200–1204.
ICDARICDAR-2011-HuangYCL #documentation #keyword #statistics
Keyword Spotting in Offline Chinese Handwritten Documents Using a Statistical Model (LH, FY, QHC, CLL), pp. 78–82.
ICDARICDAR-2011-HuZ #online #recognition
HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature (LH, RZ), pp. 457–462.
ICDARICDAR-2011-IndermuhleFFB #documentation #keyword #network #online
Keyword Spotting in Online Handwritten Documents Containing Text and Non-text Using BLSTM Neural Networks (EI, VF, AF, HB), pp. 73–77.
ICDARICDAR-2011-IwamuraKK #image #multi #recognition
Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features (MI, TK, KK), pp. 1409–1413.
ICDARICDAR-2011-JainD #identification
Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
ICDARICDAR-2011-JiangDLW #algorithm #markov #novel #segmentation #string
A Novel Short Merged Off-line Handwritten Chinese Character String Segmentation Algorithm Using Hidden Markov Model (ZJ, XD, CL, YW), pp. 668–672.
ICDARICDAR-2011-KatoDTIM #recognition
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
ICDARICDAR-2011-KimO #documentation #image #segmentation
Script-Free Text Line Segmentation Using Interline Space Model for Printed Document Images (MK, ISO), pp. 1354–1358.
ICDARICDAR-2011-KleberDS #estimation
Scale Space Binarization Using Edge Information Weighted by a Foreground Estimation (FK, MD, RS), pp. 1180–1184.
ICDARICDAR-2011-KluznerT
Page Curling Correction for Scanned Books Using Local Distortion Information (VK, AT), pp. 890–894.
ICDARICDAR-2011-KonyaES
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting (IVK, SE, CS), pp. 936–940.
ICDARICDAR-2011-KumarD #image #performance
Fast Rule-Line Removal Using Integral Images and Support Vector Machines (JK, DSD), pp. 584–588.
ICDARICDAR-2011-KumarPD #classification #documentation #image #learning #multi
Document Image Classification and Labeling Using Multiple Instance Learning (JK, JP, DSD), pp. 1059–1063.
ICDARICDAR-2011-KunwarR #geometry #online #recognition
Online Handwriting Recognition of Tamil Script Using Fractal Geometry (RK, AGR), pp. 1389–1393.
ICDARICDAR-2011-LeBS #documentation #image
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators (THNL, TDB, CYS), pp. 114–118.
ICDARICDAR-2011-LiuLS #graph #image #retrieval
Retrieval of Envelope Images Using Graph Matching (LL, YL, CYS), pp. 99–103.
ICDARICDAR-2011-MandalRP #documentation #random #segmentation
Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDARICDAR-2011-MarinaiMS11a #distance #retrieval
Using Earth Mover’s Distance in the Bag-of-Visual-Words Model for Mathematical Symbol Retrieval (SM, BM, GS), pp. 1309–1313.
ICDARICDAR-2011-NeumannM #image #locality
Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search (LN, JM), pp. 687–691.
ICDARICDAR-2011-PanZSN #invariant
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
ICDARICDAR-2011-PengCPN #random #video
Text Extraction from Video Using Conditional Random Fields (XP, HC, RP, PN), pp. 1029–1033.
ICDARICDAR-2011-PinsonB #component
Connected Component Level Discrimination of Handwritten and Machine-Printed Text Using Eigenfaces (SJP, WAB), pp. 1394–1398.
ICDARICDAR-2011-RahnemoonfarA #documentation #image
Restoration of Arbitrarily Warped Historical Document Images Using Flow Lines (MR, AA), pp. 905–909.
ICDARICDAR-2011-RoyRR #documentation #retrieval #word
Word Retrieval in Historical Document Using Character-Primitives (PPR, JYR, NR), pp. 678–682.
ICDARICDAR-2011-SaabniE #independence
Language-Independent Text Lines Extraction Using Seam Carving (RS, JES), pp. 563–568.
ICDARICDAR-2011-SaldarriagaC #network #online #word
Indexing On-line Handwritten Texts Using Word Confusion Networks (SPS, MC), pp. 197–201.
ICDARICDAR-2011-SituLT #image #locality #probability #web
Text Localization in Web Images Using Probabilistic Candidate Selection Model (LS, RL, CLT), pp. 1359–1363.
ICDARICDAR-2011-SunK #retrieval #visual notation
Similar Manga Retrieval Using Visual Vocabulary Based on Regions of Interest (WS, KK), pp. 1075–1079.
ICDARICDAR-2011-TaoLJG #learning #locality #recognition
Similar Handwritten Chinese Character Recognition Using Discriminative Locality Alignment Manifold Learning (DT, LL, LJ, YG), pp. 1012–1016.
ICDARICDAR-2011-VincentNP #algorithm #documentation
Document Recto-verso Registration Using a Dynamic Time Warping Algorithm (VR, NJ, JPD), pp. 1230–1234.
ICDARICDAR-2011-WakaharaK #clustering #image #string
Binarization of Color Character Strings in Scene Images Using K-Means Clustering and Support Vector Machines (TW, KK), pp. 274–278.
ICDARICDAR-2011-WangWZ #graph #online #verification
On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
ICDARICDAR-2011-XiaWL #clustering #keyword #knowledge-based
Chinese Keyword Spotting Using Knowledge-Based Clustering (YX, KW, ML), pp. 789–793.
ICDARICDAR-2011-XuYWL #analysis
Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
ICDARICDAR-2011-YouADGT #detection
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDARICDAR-2011-ZanibbiY #documentation #image #query
Math Spotting: Retrieving Math in Technical Documents Using Handwritten Query Images (RZ, LY), pp. 446–451.
ICDARICDAR-2011-ZhangLYDW #random #recognition
An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDARICDAR-2011-ZhouYWWNL #random
Transcript Mapping for Handwritten Text Lines Using Conditional Random Fields (XDZ, FY, DHW, QFW, MN, CLL), pp. 58–62.
ICDARICDAR-2011-ZhuN #online #optimisation #parametricity #recognition
On-line Handwritten Japanese Characters Recognition Using a MRF Model with Parameter Optimization by CRF (BZ, MN), pp. 603–607.
ICDARICDAR-2011-ZhuN11b #online #recognition
Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
JCDLJCDL-2011-FreireJ
Using national bibliographies for rights clearance (NF, AJ), pp. 167–174.
JCDLJCDL-2011-GippMB #comparative #detection #evaluation
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag (BG, NM, JB), pp. 255–258.
JCDLJCDL-2011-KawaseH #classification #folksonomy
Classification of user interest patterns using a virtual folksonomy (RK, EH), pp. 105–108.
JCDLJCDL-2011-KleinWN #web
Rediscovering missing web pages using link neighborhood lexical signatures (MK, JW, MLN), pp. 137–140.
JCDLJCDL-2011-LiZYWWW #gpu #recommendation #social
A social network-aware top-N recommender system using GPU (RL, YZ, HY, XW, JW, BW), pp. 287–296.
JCDLJCDL-2011-MarshallS #reuse #visual notation
The ownership and reuse of visual media (CCM, FMSI), pp. 157–166.
JCDLJCDL-2011-MartinHRF
Indexing musical pieces using their major repetition (BM, PH, MR, PF), pp. 153–156.
JCDLJCDL-2011-MurthyLHFPDT #identification
Use of subimages in fish species identification: a qualitative study (UM, LTL, EH, EAF, MAPQ, LMLD, RdST), pp. 185–194.
JCDLJCDL-2011-SaadG #case study #web
Archiving the web using page changes patterns: a case study (MBS, SG), pp. 113–122.
JCDLJCDL-2011-SanchezCRNLB #collaboration #library #network #visualisation
Visualizing collaboration networks implicit in digital libraries using OntoStarFish (JAS, OC, AR, MAMN, JCL, EB), pp. 213–222.
JCDLJCDL-2011-SchererBS #multi #repository #research #retrieval
Retrieval and exploratory search in multivariate research data repositories using regressional features (MS, JB, TS), pp. 363–372.
PODSPODS-2011-CohenK
Get the most out of your sample: optimal unbiased estimators using partial information (EC, HK), pp. 13–24.
SIGMODSIGMOD-2011-ArasuKL #constraints #declarative #generative
Data generation using declarative constraints (AA, RK, JL), pp. 685–696.
SIGMODSIGMOD-2011-DoZPDNH
Turbocharging DBMS buffer pool using SSDs (JD, DZ, JMP, DJD, JFN, AH), pp. 1113–1124.
SIGMODSIGMOD-2011-KohlerYZ #parallel #performance
Efficient parallel skyline processing using hyperplane projections (HK, JY, XZ), pp. 85–96.
SIGMODSIGMOD-2011-LiMDMS #framework #pipes and filters #platform #scalability
A platform for scalable one-pass analytics using MapReduce (BL, EM, YD, AM, PJS), pp. 985–996.
SIGMODSIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMODSIGMOD-2011-OkcanR #pipes and filters
Processing theta-joins using MapReduce (AO, MR), pp. 949–960.
TPDLTPDL-2011-BronHR #documentation
Linking Archives Using Document Enrichment and Term Selection (MB, BH, MdR), pp. 360–371.
TPDLTPDL-2011-CeccarelliGLNT #experience #query
Improving Europeana Search Experience Using Query Logs (DC, SG, CL, FMN, GT), pp. 384–395.
TPDLTPDL-2011-KnothRZ #mining #repository #semantics
Connecting Repositories in the Open Access Domain Using Text Mining and Semantic Data (PK, VR, ZZ), pp. 483–487.
TPDLTPDL-2011-SaadPG #crawling #navigation #web
Coherence-Oriented Crawling and Navigation Using Patterns for Web Archives (MBS, ZP, SG), pp. 421–433.
TPDLTPDL-2011-SmithOG #capacity #case study #named
CloudCAP: A Case Study in Capacity Planning Using the Cloud (JAS, JFO, JRG), pp. 110–117.
VLDBVLDB-2011-AliCFWDR #online #visualisation
Online Visualization of Geospatial Stream Data using the WorldWide Telescope (MHA, BC, JF, CW, SMD, BSR), pp. 1379–1382.
VLDBVLDB-2011-AoZWSWLLL #algorithm #parallel #performance
Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units (NA, FZ, DW, DSS, GW, XL, JL, SL), pp. 470–481.
VLDBVLDB-2011-ArasuKL #constraints #declarative #generative #named
DataSynth: Generating Synthetic Data using Declarative Constraints (AA, RK, JL), pp. 1418–1421.
VLDBVLDB-2011-DasNAA #database #lightweight #migration #named
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration (SD, SN, DA, AEA), pp. 494–505.
VLDBVLDB-2011-KimRA #algebra #pipes and filters
From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra (HK, PR, KA), pp. 1426–1429.
VLDBVLDB-2011-KocR #classification #incremental #maintenance
Incrementally maintaining classification using an RDBMS (MLK, CR), pp. 302–313.
VLDBVLDB-2011-LeeNS #estimation #locality #similarity
Similarity Join Size Estimation using Locality Sensitive Hashing (HL, RTN, KS), pp. 338–349.
VLDBVLDB-2011-NiuRDS #logic #markov #named #network #scalability #statistics
Tuffy: Scaling up Statistical Inference in Markov Logic Networks using an RDBMS (FN, CR, AD, JWS), pp. 373–384.
VLDBVLDB-2011-RaoST #consistency #scalability
Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore (JR, EJS, ST), pp. 243–254.
VLDBVLDB-2012-KruegerKGSSCPDZ11 #database #manycore #performance
Fast Updates on Read-Optimized Databases Using Multi-Core CPUs (JK, CK, MG, NS, DS, JC, HP, PD, AZ), pp. 61–72.
VLDBVLDB-2012-KumarR11 #probability
Probabilistic Management of OCR Data using an RDBMS (AK, CR), pp. 322–333.
VLDBVLDB-2012-RuttenbergS11 #distance
Indexing the Earth Mover’s Distance Using Normal Distributions (BER, AKS), pp. 205–216.
CSEETCSEET-2011-BollinHM #education #project management #simulation
Teaching software project management using simulations (AB, EH, RTM), pp. 81–90.
CSEETCSEET-2011-LethbridgeMFB #education #programming #uml
Teaching UML using umple: Applying model-oriented programming in the classroom (TCL, GM, AF, OBB), pp. 421–428.
CSEETCSEET-2011-LongstreetC #education #game studies #re-engineering #student
Using games in software engineering education to increase student success and retention (CSL, KMLC), p. 554.
CSEETCSEET-2011-LuLL #analysis
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-OffuttLAX #abstraction #design #education #web
Using abstraction and Web applications to teach criteria-based test design (JO, NL, PA, WX), pp. 227–236.
CSEETCSEET-2011-RadermacherW #empirical #interactive #programming #student
Investigating student-instructor interactions when using pair programming: An empirical study (AR, GSW), pp. 41–50.
CSEETCSEET-2011-RoshandelGL #education #re-engineering
Using community-based projects in software engineering education (RR, JG, RL), pp. 472–476.
CSEETCSEET-2011-Scharff #agile #assurance #development #quality
Guiding global software development projects using Scrum and Agile with quality assurance (CS), pp. 274–283.
ITiCSEITiCSE-2011-BackCMM #case study #modelling #student
A study in engaging female students in computer science using role models (JB, PC, CM, PWM), pp. 63–67.
ITiCSEITiCSE-2011-GuimaraesSA #education #game studies #security #video
Using video games to teach security (MAMG, HES, RA), p. 346.
ITiCSEITiCSE-2011-Harms #api #implementation #java
A Java implementation of the myro API for using personal robots in CS1 (DEH), p. 338.
ITiCSEITiCSE-2011-HarrachA #collaboration #learning #optimisation #process #recommendation
Optimizing collaborative learning processes by using recommendation systems (SH, MA), p. 389.
ITiCSEITiCSE-2011-KleinKT #analysis #assessment #automation #semantics
Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ITiCSEITiCSE-2011-LangeFL
An update on the use of community-based non-profit organizations in capstone projects (DKL, RCF, PML), p. 372.
ITiCSEITiCSE-2011-Law #development #documentation #student
Using student blogs for documentation in software development projects (RL), p. 366.
ITiCSEITiCSE-2011-MarkhamB #bound #twitter
Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ITiCSEITiCSE-2011-MesserK #problem #process
The use of mediating artifacts in embedding problem solving processes in an e-learning environment (OMM, AK), p. 390.
ITiCSEITiCSE-2011-StrieweG11a #automation #programming #runtime
Using run time traces in automated programming tutoring (MS, MG), pp. 303–307.
ITiCSEITiCSE-2011-VilnerZT #education #inheritance
Using greenfoot in teaching inheritance in CS1 (TV, EZ, ST), p. 342.
ITiCSEITiCSE-2011-WittmannBK #programming
Using the SCORE software package to analyse novice computer graphics programming (MRAW, MB, MKT), pp. 118–122.
SIGITESIGITE-2011-Li #concept #framework #open source
Introducing virtualization management concepts using open source cloud infrastructure managers (PL), pp. 309–310.
SIGITESIGITE-2011-SettleWS #design #evaluation #game studies #student
Engaging game design students using peer evaluation (AS, CW, CS), pp. 73–78.
SIGITESIGITE-2011-VillaromanRS #artificial reality #education #interactive
Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor (NV, DR, BS), pp. 227–232.
CSMRCSMR-2011-CorazzaMMS #clustering
Investigating the Use of Lexical Information for Software System Clustering (AC, SDM, VM, GS), pp. 35–44.
CSMRCSMR-2011-CoutoVF #case study #compilation #product line
Extracting Software Product Lines: A Case Study Using Conditional Compilation (MVC, MTV, EF), pp. 191–200.
CSMRCSMR-2011-KohlKPDM #analysis #maintenance #multi
Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
CSMRCSMR-2011-SilvaPAM #execution #on the
On the Use of Execution Trace Alignment for Driving Perfective Changes (LLS, KRP, SdA, MdAM), pp. 221–230.
ICPCICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-HouL #api #case study #framework
Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers’ Newsgroup Discussions (DH, LL), pp. 91–100.
ICPCICPC-2011-LuciaPOPP #traceability
Improving IR-based Traceability Recovery Using Smoothing Filters (ADL, MDP, RO, AP, SP), pp. 21–30.
ICPCICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code
Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICSMEICSM-2011-DraganCHM #commit
Using stereotypes to help characterize commits (ND, MLC, MH, JIM), pp. 520–523.
ICSMEICSM-2011-KhomhCZSD #fault #predict #testing
Predicting post-release defects using pre-release field testing results (FK, BC, YZ, AS, DD), pp. 253–262.
ICSMEICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
ICSMEICSM-2011-PaymalPBS #evolution #graph #metric #process
Measuring disruption from software evolution activities using graph-based metrics (PP, RP, SB, HPS), pp. 532–535.
ICSMEICSM-2011-QusefBOLB #concept #named #slicing #traceability
SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSMEICSM-2011-RomanoP #interface #java #metric #predict #source code
Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSMEICSM-2011-ShternT #clustering #multi
Evaluating software clustering using multiple simulated authoritative decompositions (MS, VT), pp. 353–361.
MSRMSR-2011-BinkleyHL #identifier #speech
Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
MSRMSR-2011-LiZ #re-engineering #semantics #web
Integrating software engineering data using semantic web technologies (YFL, HZ), pp. 211–214.
WCREWCRE-2011-AryaniPLMN #dependence #predict #question
Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
WCREWCRE-2011-Beard #debugging #information retrieval #locality
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCREWCRE-2011-MyersS #execution
Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
WCREWCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality
Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
CIAACIAA-J-2010-YuBI11 #automaton #multi #relational #string #verification
Relational String Verification Using Multi-Track Automata (FY, TB, OHI), pp. 1909–1924.
CIAACIAA-2011-CarninoF #automaton #generative #markov #random
Random Generation of Deterministic Acyclic Automata Using Markov Chains (VC, SDF), pp. 65–75.
DLTDLT-2011-KuncO #automaton #finite
Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
LATALATA-2011-LabathR #information management
Simplifying DPDA Using Supplementary Information (PL, BR), pp. 342–353.
IFMIFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification
A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
FMFM-2011-BartheCK #relational #source code #verification
Relational Verification Using Product Programs (GB, JMC, CK), pp. 200–214.
FMFM-2011-MullerR #verification
Using Debuggers to Understand Failed Verification Attempts (PM, JNR), pp. 73–87.
RTARTA-2011-FalkeKS #analysis #c #compilation #source code #termination
Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
RTARTA-2011-KochemsO #analysis #functional #linear #reachability
Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
SEFMSEFM-2011-JacquelBDD #automation #proving #theorem proving #verification
Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving (MJ, KB, DD, CD), pp. 253–268.
SEFMSEFM-2011-OnoHTNH #coq #pipes and filters #specification
Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications (KO, YH, YT, NN, MH), pp. 350–365.
SEFMSEFM-2011-Sanchez
Using System Dynamics to Assess the Role of Socio-economic Status in Tuberculosis Incidence (MAS), pp. 464–475.
ICFPICFP-2011-ChyzakD #generative #ml #runtime #web
Using camlp4 for presenting dynamic mathematics on the web: DynaMoW, an OCaml language extension for the run-time generation of mathematical contents and their presentation on the web (FC, AD), pp. 259–265.
IFLIFL-2011-Thomsen #functional #logic #optimisation
Describing and Optimising Reversible Logic Using a Functional Language (MKT), pp. 148–163.
AIIDEAIIDE-2011-FujitaIM #detection #network
Detecting Real Money Traders in MMORPG by Using Trading Network (AF, HI, HM).
AIIDEAIIDE-2011-TastanS #game studies #learning #policy
Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
CoGCIG-2011-AgapitosOBT #learning #modelling #programming #search-based
Learning environment models in car racing using stateful Genetic Programming (AA, MO0, AB, TT), pp. 219–226.
CoGCIG-2011-AlhejaliL #programming #search-based
Using a training camp with Genetic Programming to evolve Ms Pac-Man agents (AMA, SML), pp. 118–125.
CoGCIG-2011-AntonioFCP #algorithm #evaluation #game studies #optimisation #search-based
Optimization of an evaluation function of the 4-sided dominoes game using a genetic algorithm (NSA, CFFCF, MGFC, RP), pp. 24–30.
CoGCIG-2011-SarjantPDS #game studies #online #policy #relational
Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
CoGCIG-2011-ThawonmasT #automation #evolution #game studies #generative
Frame selection using iterative grammatical evolution for automatic comic generation from game logs (RT, YT), pp. 31–38.
CoGCIG-2011-UusitaloJ #approach
A reactive mutli-agent approach to car driving using artificial potential fields (TU, SJJ), pp. 203–210.
DiGRADiGRA-2011-CederholmHLSE #game studies
The Aiming Game: Using a Game with Biofeedback for Training in Emotion Regulation (HC, OH, CL, CCS, JE).
DiGRADiGRA-2011-KultimaA #game studies
Using the VNA Ideation Game at Global Game Jam (AK, KA).
DiGRADiGRA-2011-LacasaBC #game studies #online
Adolescent thinking and online writing after the use of commercial games in the classroom (PL, RMB, HdC).
DiGRADiGRA-2011-SoppittM #analysis #comprehension #experience
Understanding Player Experience using Sequential Analysis (MS, GM).
FDGFDG-2011-Consalvo #game studies #social
Using your friends: social mechanics in social games (MC), pp. 188–195.
FDGFDG-2011-FolmerLE #3d #navigation
Navigating a 3D avatar using a single switch (EF, FL, BE), pp. 154–160.
FDGFDG-2011-HaleY #detection #navigation
Using navigation meshes for collision detection (DHH, GMY), pp. 316–318.
FDGFDG-2011-HarrisonR #behaviour #predict
Using sequential observations to model and predict player behavior (BEH, DLR), pp. 91–98.
FDGFDG-2011-LavioleHS #game studies #physics #simulation
Tabletop games using real environment and physical simulation (JL, MH, CS), pp. 322–324.
FDGFDG-2011-MorelliF #game studies #gesture #realtime #video
Real-time sensory substitution to enable players who are blind to play video games using whole body gestures (TM, EF), pp. 147–153.
FDGFDG-2011-SloanKN #game studies
Feeling the ambiance: using smart ambiance to increase contextual awareness in game agents (CS, JDK, BMN), pp. 298–300.
CoGVS-Games-2011-AnagnostouV #artificial reality
Square AR: Using Augmented Reality for Urban Planning (KA, PV), pp. 128–131.
CoGVS-Games-2011-BirchallG #development #education #evaluation #game studies #named
Elemental: An Insight into the Development and Evaluation of a Secondary Education Chemistry Game Using XNA (JB, CG), pp. 32–39.
CoGVS-Games-2011-Broin #game studies
Using a Criteria-Based User Model for Facilitating Flow in Serious Games (DO), pp. 63–69.
CoGVS-Games-2011-ChilcottS #3d #learning #multi #online #web
Ageing Well and Learning through Online Immersive Participation Using a Multi-user Web 3D Environment (MC, AS), pp. 70–75.
CoGVS-Games-2011-ChristopoulosMAK
Using Virtual Environments to Tell the Story: “The Battle of Thermopylae” (DC, PM, AA, JNK), pp. 84–91.
CoGVS-Games-2011-HulusicR #education
The Use of Live Virtual Guides in Educational Applications (VH, SR), pp. 92–97.
CoGVS-Games-2011-NetoSNPF #game studies #interactive
Solis'Curse - A Cultural Heritage Game Using Voice Interaction with a Virtual Agent (JNN, RS, JPN, JMP, JF), pp. 164–167.
CoGVS-Games-2011-Schwenk #realtime
Real-Time Rendering of Dynamic Area and Volume Lights Using Hierarchical Irradiance Volumes (KS), pp. 136–139.
CHICHI-2011-ChangL #framework #migration #mobile
Deep shot: a framework for migrating tasks across devices using mobile phone cameras (THC, YL), pp. 2163–2172.
CHICHI-2011-ChiZXYW #authoring #collaboration #coordination #email
Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHICHI-2011-CohnMPT #gesture
Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
CHICHI-2011-CowanL #interactive #mobile #named
ShadowPuppets: supporting collocated interaction with mobile projector phones using hand shadows (LGC, KAL), pp. 2707–2716.
CHICHI-2011-CramerHTYH #interactive #student #visual notation
Classroom-based assistive technology: collective use of interactive visual schedules by students with autism (MC, SHH, MT, MTY, GRH), pp. 1–10.
CHICHI-2011-EllingLJ #eye tracking
Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHICHI-2011-EppLM #identification
Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHICHI-2011-Freeman #eye tracking #protocol #usability
Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CHICHI-2011-HarrisonHWFH #design #named #user interface #visual notation
Kineticons: using iconographic motion in graphical user interface design (CH, GH, KDDW, JF, SEH), pp. 1999–2008.
CHICHI-2011-HuangWD #problem
No clicks, no problem: using cursor movements to understand and improve search (JH, RWW, STD), pp. 1225–1234.
CHICHI-2011-HutamaSFG #correlation #interactive #multi
Distinguishing multiple smart-phone interactions on a multi-touch wall display using tilt correlation (WH, PS, CWF, WBG), pp. 3315–3318.
CHICHI-2011-John #design #modelling #performance #predict #recommendation #user interface
Using predictive human performance models to inspire and support UI design recommendations (BEJ), pp. 983–986.
CHICHI-2011-JunuzovicIHZTB #multimodal #overview #what
What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing (SJ, KI, RH, ZZ, JCT, CB), pp. 513–522.
CHICHI-2011-KhotSK #authentication #named #novel
MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
CHICHI-2011-KimP #reuse
Practices in the creative reuse of e-waste (SK, EP), pp. 2395–2404.
CHICHI-2011-KimS #community #health #interface #online
Using interface cues in online health community boards to change impressions and encourage user contribution (HSK, SSS), pp. 599–608.
CHICHI-2011-KuhnCQS
Using tags to encourage reflection and annotation on data during nomadic inquiry (AK, CC, CQ, SS), pp. 667–670.
CHICHI-2011-LaheyGBV #comprehension #flexibility #gesture #mobile #named
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays (BL, AG, WB, RV), pp. 1303–1312.
CHICHI-2011-Light #design #performance
Democratising technology: making transformation using designing, performance and props (AL), pp. 2239–2242.
CHICHI-2011-LuceroHJ #collaboration #mobile #named
Pass-them-around: collaborative use of mobile phones for photo sharing (AL, JH, TJ), pp. 1787–1796.
CHICHI-2011-LuL #gesture #mobile #user interface
Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
CHICHI-2011-MarshallB #case study #experience #interactive #performance
Using fast interaction to create intense experiences (JM, SB), pp. 1255–1264.
CHICHI-2011-MarshallS #social #social media #twitter
Social media ownership: using twitter as a window onto current attitudes and beliefs (CCM, FMSI), pp. 1081–1090.
CHICHI-2011-MatthewsD #mobile
In the mood: engaging teenagers in psychotherapy using mobile phones (MM, GD), pp. 2947–2956.
CHICHI-2011-NackeKLM #design #game studies #interactive
Biofeedback game design: using direct and indirect physiological control to enhance game interaction (LEN, MK, CL, RLM), pp. 103–112.
CHICHI-2011-NiKW #communication #named
AnatOnMe: facilitating doctor-patient communication using a projection-based handheld device (TN, AKK, DW), pp. 3333–3342.
CHICHI-2011-SporkaFKPHM #named #predict
CHANTI: predictive text entry using non-verbal vocal input (AJS, TF, SHK, OP, PH, ISM), pp. 2463–2472.
CHICHI-2011-TamakiMR #named
PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
CHICHI-2011-WeilenmannJ #comprehension #interactive #people
Understanding people and animals: the use of a positioning system in ordinary human-canine interaction (AW, OJ), pp. 2631–2640.
CHICHI-2011-WobbrockFGH #analysis #parametricity #rank
The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
CHICHI-2011-YangGIF #proximity
TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing (XDY, TG, PI, GWF), pp. 2585–2594.
CHICHI-2011-YataniNTT #overview #user interface #word
Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs (KY, MN, AT, KNT), pp. 1541–1550.
CHICHI-2011-ZhaoCB #multi #named #navigation #visual notation
KronoMiner: using multi-foci navigation for the visual exploration of time-series data (JZ, FC, RB), pp. 1737–1746.
CSCWCSCW-2011-FanLZTSW #game studies #gesture #social
Surprise Grabber: a co-located tangible social game using phone hand gesture (MF, XL, YZ, LT, YS, HW), pp. 625–628.
CSCWCSCW-2011-GergleC #collaboration #eye tracking #mobile #what
See what I’m saying?: using Dyadic Mobile Eye tracking to study collaborative reference (DG, ATC), pp. 435–444.
CSCWCSCW-2011-GuibourdencheVGFH #distributed #multi #process #product line
Using multiple scores for transcribing the distributed activities of a family (JG, JVR, MG, MF, YH), pp. 637–640.
CSCWCSCW-2011-KamranC #collaboration #ontology #social #social media
Defining ontology by using users collaboration on social media (SK, FC), pp. 657–660.
CSCWCSCW-2011-MarshallRP #interactive #physics
Using F-formations to analyse spatial patterns of interaction in physical environments (PM, YR, NP), pp. 445–454.
CSCWCSCW-2011-MistryNM11a #named
SPARSH: passing data using the body as a medium (PM, SN, PM), pp. 689–692.
CSCWCSCW-2011-NewmanLMRM #challenge #facebook #health #network #online #problem #social
It’s not that I don’t have problems, I’m just not putting them on facebook: challenges and opportunities in using online social networks for health (MWN, DL, SAM, PR, MEM), pp. 341–350.
HCIDHM-2011-EilersM #composition #learning #modelling
Learning the Relevant Percepts of Modular Hierarchical Bayesian Driver Models Using a Bayesian Information Criterion (ME, CM), pp. 463–472.
HCIDHM-2011-OdenthalMKKS #empirical
An Empirical Study of Disassembling Using an Augmented Vision System (BO, MPM, WK, BK, CMS), pp. 399–408.
HCIDHM-2011-QinTD #type system
The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
HCIDHM-2011-WuHYNH #parametricity
Using Physiological Parameters to Evaluate Operator’s Workload in Manual Controlled Rendezvous and Docking (RVD) (BW, FH, ZY, JN, WH), pp. 426–435.
HCIDUXU-v1-2011-BjorndalRM #industrial #lessons learnt #requirements #specification
Lessons Learned from Using Personas and Scenarios for Requirements Specification of Next-Generation Industrial Robots (PB, MJR, SM), pp. 378–387.
HCIDUXU-v1-2011-BotellaGT #evaluation #heuristic #interactive
Using Interaction Patterns in Heuristic Evaluation (FB, JAG, RT), pp. 23–32.
HCIDUXU-v1-2011-KashiwaseKKFYJ #mobile
Comparisons on Kansei Factors of Attractiveness between Initial and Long Term Use of Mobile Phone (NK, KK, HK, SF, MY, HJ), pp. 593–601.
HCIDUXU-v1-2011-OhgiS #case study #enterprise #standard
ISO Standards and Enterprise Software: A Case Study Using SUMI and SUS in an International Sale (JO, JS), pp. 178–184.
HCIDUXU-v1-2011-RitterE #segmentation
An Extensible Tool for the Annotation of Videos Using Segmentation and Tracking (MR, ME), pp. 295–304.
HCIDUXU-v1-2011-YamagishiJKKF #mobile
Proposal for Indices to Assess Attractiveness on Initial Use of Mobile Phones (MY, HJ, KK, HK, SF), pp. 696–705.
HCIDUXU-v2-2011-ChaeKN #experience
Measuring Drivers’ Dynamic Seating Experience Using Pressure Mats (SC, GK, KN), pp. 368–375.
HCIDUXU-v2-2011-ChenL11a #2d #3d #design #evaluation #interface
Design and Evaluation of the Customized Product Color Combination Interfaces Using 3D Model and 2D Illustration Display (CYC, YJL), pp. 269–275.
HCIDUXU-v2-2011-KhashmanL
Measuring Cultural Markers in Arabic Government Websites Using Hofstede’s Cultural Dimensions (NK, AL), pp. 431–439.
HCIDUXU-v2-2011-RubegniML #interactive #scalability #social
Talking to Strangers: Using Large Public Displays to Facilitate Social Interaction (ER, NM, ML), pp. 195–204.
HCIDUXU-v2-2011-ShenPC
A Solution to Revisitation Using Organic Bookmark Management (STS, SDP, KMC), pp. 46–52.
HCIHCD-2011-BurkhardtNBSK #named #semantics
SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor (DB, KN, MB, CS, AK), pp. 491–499.
HCIHCD-2011-Lin #communication #design #research #semantics
Research in the Use of Product Semantics to Communicate Product Design Information (CHL), pp. 556–565.
HCIHCI-DDA-2011-DittmarF #implementation #interactive #modelling
Intertwined Modeling and Implementation of Interactive Systems Using HOPS (AD, PF), pp. 194–203.
HCIHCI-DDA-2011-HessMT #interactive
Differentiating between Successful and Less Successful Products by Using MAInEEAC — A Model for Interaction Characterization (SH, AM, MT), pp. 238–247.
HCIHCI-DDA-2011-IglesiasT #component #representation #user interface
User Interface Representation Using Simple Components (JRI, PMTF), pp. 278–287.
HCIHCI-DDA-2011-KimJRWS #behaviour #simulation
Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
HCIHCI-DDA-2011-KogaT #recommendation #topic #twitter
Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics (HK, TT), pp. 461–470.
HCIHCI-DDA-2011-LuoY #algorithm #clustering #framework #network #novel #parallel
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework (RL, QY), pp. 598–607.
HCIHCI-DDA-2011-ShiraiT #composition #interactive #music
A Proposal of an Interactive Music Composition System Using Gibbs Sampler (AS, TT), pp. 490–497.
HCIHCI-ITE-2011-AbushamB #graph #recognition
Face Recognition Using Local Graph Structure (LGS) (EEAA, HKB), pp. 169–175.
HCIHCI-ITE-2011-AngeliniCCKM #gesture #interactive #multi #scalability
Multi-user Pointing and Gesture Interaction for Large Screen Using Infrared Emitters and Accelerometers (LA, MC, SC, OAK, EM), pp. 185–193.
HCIHCI-ITE-2011-ChoiHK #3d #estimation #gesture #interface
3D-Position Estimation for Hand Gesture Interface Using a Single Camera (SHC, JHH, JHK), pp. 231–237.
HCIHCI-ITE-2011-JayaramanB #interface
Uni-model Human System Interface Using sEMG (SJ, VB), pp. 446–453.
HCIHCI-ITE-2011-KimiokaST #multi
Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCIHCI-ITE-2011-LeeOL #recognition
Facial Expression Recognition Using AAMICPF (JSL, CMO, CWL), pp. 268–274.
HCIHCI-ITE-2011-MorieCB #case study
Report on a Preliminary Study Using Breath Control and a Virtual Jogging Scenario as Biofeedback for Resilience Training (JFM, EC, JGB), pp. 474–480.
HCIHCI-ITE-2011-NakaI #3d #communication #gesture #interface
Web-Based Nonverbal Communication Interface Using 3DAgents with Natural Gestures (TN, TI), pp. 565–574.
HCIHCI-ITE-2011-NebeKJF #interactive #multi
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCIHCI-ITE-2011-NebeMK #multi #requirements
An Investigation on Requirements for Co-located Group-Work Using Multitouch-, Pen-Based- and Tangible-Interaction (KN, TM, FK), pp. 90–99.
HCIHCI-ITE-2011-OkamotoYW #visual notation
A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCIHCI-MIIE-2011-ForutanpourR #collaboration #mobile #named
ProJest: Enabling Higher Levels of Collaboration Using Today’s Mobile Devices (BF, JR), pp. 48–58.
HCIHCI-MIIE-2011-GaoG #mobile #representation
The Effect of Time Orientation and Representation of Points of Interests on the Use of Mobile Tour Guide (FG, QG), pp. 59–68.
HCIHCI-MIIE-2011-KimHJHMJ #analysis #behaviour #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-MIIE-2011-MinKH #recognition
Spectral Subtraction Based Emotion Recognition Using EEG (JHM, HOK, KSH), pp. 569–576.
HCIHCI-MIIE-2011-PlocherJC
Using Sound Patterns to Enhance Directional Sound for Emergency Route Guidance (TP, ZJJ, FYDC), pp. 329–337.
HCIHCI-MIIE-2011-RattanyuM #biology #recognition
Emotion Recognition Using Biological Signal in Intelligent Space (KR, MM), pp. 586–592.
HCIHCI-UA-2011-BellegoBBT #smarttech
Using a Smart Phone for Information Rendering in Computer-Aided Surgery (GLB, MB, IB, JT), pp. 202–209.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHCI-UA-2011-KimCD #health
Using Pen-Based Computing in Technology for Health (HK, YSC, EYLD), pp. 192–201.
HCIHCI-UA-2011-LargeB #comparison #interface #retrieval #visualisation
A Comparison of Children’s and Adults’ Retrieval Performances and Affective Reactions When Using a Conventional Interface and an Information Visualization Interface (AL, JB), pp. 590–598.
HCIHCI-UA-2011-Levis #communication #towards #women
Working toward Women’s Economic Empowerment: Using Information and Communication Technology in Developing Areas to Market Traditional Crafts (MSL), pp. 266–273.
HCIHCI-UA-2011-LinHLYH #mining
Using Grounded Theory and Text Mining to Find Interesting Reading Materials for Slow EFL Learners (YCL, ClH, MHL, HFY, CFH), pp. 77–85.
HCIHCI-UA-2011-MaehigashiMTKMH #automation
Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
HCIHCI-UA-2011-Nesset #evaluation #visual notation
Following the Signs: Children’s Use of Visual Cues to Facilitate Website Evaluation (VN), pp. 599–606.
HCIHCI-UA-2011-OhkuraKKTESIW
Restoration Support System for a Historic Textile Market Using Virtual Environment (MO, MK, YK, ST, HE, AS, TI, YW), pp. 413–422.
HCIHCI-UA-2011-Wang11a #interactive #learning #network #student #tool support
Interactions between Human and Computer Networks: EFL College Students Using Computer Learning Tools in Remedial English Classes (ALW), pp. 107–112.
HCIHIMI-v1-2011-KinoshitaTN #visualisation
Kansei Stroll Map: Walking around a City Using Visualized Impressions of Streetscapes (YK, ST, TN), pp. 211–220.
HCIHIMI-v1-2011-KomatsuO #case study #evaluation #visual notation
Study on Evaluation of Kawaii Colors Using Visual Analog Scale (TK, MO), pp. 103–108.
HCIHIMI-v1-2011-KotaniHKA #information management
Characteristics of Information Transmission Rates Using Noncontact Tactile Display (KK, MH, NK, TA), pp. 450–453.
HCIHIMI-v1-2011-LeeKW #authentication #multi #smarttech
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
HCIHIMI-v1-2011-MitaWKM #case study #communication
A Study of Attention Control by Using Eye Communication with an Anthropomorphic Agent (TM, RW, NK, KM), pp. 603–611.
HCIHIMI-v1-2011-NakanishiY
Applicability of Touch Sense Controllers Using Warm and Cold Sensations (MN, SY), pp. 470–477.
HCIHIMI-v1-2011-TanakaYSN #comparison
Characteristics of Comfortable Sheet Switches on Control Panels of Electrical Appliances: Comparison Using Older and Younger Users (YT, YY, MS, MN), pp. 498–507.
HCIHIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #visualisation
Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
HCIHIMI-v2-2011-BagciMKKT #adaptation #recognition
Object and Scene Recognition Using Color Descriptors and Adaptive Color KLT (VHB, MGM, RK, RK, VT), pp. 355–363.
HCIHIMI-v2-2011-FagerstromG #empirical #facebook #network #social
Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
HCIHIMI-v2-2011-FukadaKKH #evaluation #information management #user interface
Evaluation of Disaster Information Management System Using Tabletop User Interfaces (HF, KK, AK, NH), pp. 373–380.
HCIHIMI-v2-2011-SagaTKTM #analysis #comparison
Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HCIHIMI-v2-2011-TanumaSNN #artificial reality #design
Comfortable Design of Task-Related Information Displayed Using Optical See-Through Head-Mounted Display (KT, TS, MN, MN), pp. 419–429.
HCIIDGD-2011-BrandND #embedded #interactive #network #social
Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
HCIIDGD-2011-SalgadoSL #design
Using Metaphors to Explore Cultural Perspectives in Cross-Cultural Design (LCdCS, CSdS, CFL), pp. 94–103.
HCIOCSC-2011-Alducin-QuinteroCMGJ #design #modelling #process
Productivity Improvement by Using Social-Annotations about Design Intent in CAD Modelling Process (GAQ, MC, JMG, DAGZ, MDJ), pp. 153–161.
HCIOCSC-2011-BaekSH #research
Meet Researcher in the Real World Using the ConAR: Context-Aware Researcher (SWB, JS, TDH), pp. 12–19.
HCIOCSC-2011-YoshinoM #communication
GAZO GAZO KUN: Photo-Sharing System Using an Anthropomorphic Photo Frame for Communication Support (TY, TM), pp. 297–305.
CAiSECAiSE-2011-BiderJS #architecture #case study #communication #experience #process
Experiences of Using Different Communication Styles in Business Process Support Systems with the Shared Spaces Architecture (IB, PJ, RS), pp. 299–313.
CAiSECAiSE-2011-GuabtniNB #correlation #graph #interactive
Using Graph Aggregation for Service Interaction Message Correlation (AG, HRMN, BB), pp. 642–656.
CAiSECAiSE-2011-LemaitreH #database #evaluation #fault #framework #quality #taxonomy
Quality Evaluation and Improvement Framework for Database Schemas — Using Defect Taxonomies (JL, JLH), pp. 536–550.
CAiSECAiSE-2011-NobauerSMZ #elicitation #enterprise #named #requirements
S3C: Using Service Discovery to Support Requirements Elicitation in the ERP Domain (MN, NS, NAMM, KZ), pp. 18–32.
CAiSECAiSE-2011-RoySSWB #design #enterprise
Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions (MR, BS, DS, IW, BB), pp. 566–581.
CAiSECAiSE-2011-SchmidtJ #analysis #design #requirements #security
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
CAiSECAiSE-2011-SpindlerLNGN
Using Synchronised Tag Clouds for Browsing Data Collections (AdS, SL, MN, MG, MCN), pp. 214–228.
EDOCEDOC-2011-AdriansyahDA #consistency #cost analysis
Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
EDOCEDOC-2011-CurleyK #case study #framework #maturity
Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
EDOCEDOC-2011-HildebrandtMS #design #graph
Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs (TTH, RRM, TS), pp. 161–170.
EDOCEDOC-2011-Hull #flexibility #towards
Towards Flexible Service Interoperation Using Business Artifacts (RH), pp. 20–21.
ICEISICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-Kim #communication #network
CRL Distribution using an Alternative Communication Media for Vehicular Networks (HK), pp. 217–222.
ICEISICEIS-v1-2011-RamirezC #fault #process
Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
ICEISICEIS-v1-2011-VaneaP #metadata #multi #ontology #semantics
Semantically Enhancing Multimedia Data Warehouses — Using Ontologies as Part of the Metadata (AV, RP), pp. 163–168.
ICEISICEIS-v2-2011-KisilevichKBTR #open source #tool support
Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (SK, DAK, RB, MT, LR), pp. 147–156.
ICEISICEIS-v2-2011-LiOAK #fault #identification #modelling #network
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
ICEISICEIS-v2-2011-TarsauliyaTS #network #search-based
Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
ICEISICEIS-v2-2011-TianZX #analysis #case study #network #social
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEISICEIS-v2-2011-ZhuXM #assessment #network #risk management
Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEISICEIS-v3-2011-BhuiyanRH #case study #modelling #multi
Supporting Business Modeling using Multiple Notations — A Case Study (MB, SR, KH), pp. 301–306.
ICEISICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEISICEIS-v3-2011-PapatheocharousTYA #agile #cost analysis #development #diagrams #estimation #modelling
Cost Modeling and Estimation in Agile Software Development Environments using Influence Diagrams (EP, DT, PSY, ASA), pp. 117–127.
ICEISICEIS-v3-2011-WangWWL #modelling #workflow
Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
ICEISICEIS-v4-2011-Ganesan #enterprise #framework #modelling #process
Composite Enterprise Process Modeling (CEProM) Framework — Setting up a Process Modeling Center of Excellence using CEProM Framework (EG), pp. 378–383.
ICEISICEIS-v4-2011-LuCGD #algorithm #multi #network #optimisation #quality
Quality of Service Optimization of Wireless Sensor Networks using a Multi-objective Immune Co-evolutionary Algorithm (XL, ZRC, LG, YD), pp. 160–164.
ICEISICEIS-v4-2011-Naderipour #ad hoc #industrial #mining #process
Mining of Ad-hoc Business Processes using Microsoft Sharepoint, Nitro & Prom 6.0 — An Industrial Practice (FN), pp. 413–418.
ICEISICEIS-v4-2011-OuazzaneAKL #design #framework #web
An e-Business Framework Design using Enhanced Web 2.0 Technology (KO, MSA, HBK, JL), pp. 97–102.
CIKMCIKM-2011-Ando #encoding #relational
Latent feature encoding using dyadic and relational data (SA), pp. 2201–2204.
CIKMCIKM-2011-BanerjeeC #distributed #feature model #privacy
Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKMCIKM-2011-BicerTN #keyword #modelling #ranking
Ranking support for keyword search on structured data using relevance models (VB, TT, RN), pp. 1669–1678.
CIKMCIKM-2011-BingLW #query #social #topic
Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKMCIKM-2011-BykauMRV #evolution #query
Supporting queries spanning across phases of evolving artifacts using Steiner forests (SB, JM, FR, YV), pp. 1649–1658.
CIKMCIKM-2011-DangXC #aspect-oriented #clustering #query
Inferring query aspects from reformulations using clustering (VD, XX, WBC), pp. 2117–2120.
CIKMCIKM-2011-GangulyLMJ #feedback #pseudo #query #reduction
Patent query reduction using pseudo relevance feedback (DG, JL, WM, GJFJ), pp. 1953–1956.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-Garcia-Alvarado0O #named #ontology #performance
ONTOCUBE: efficient ontology extraction using OLAP cubes (CGA, ZC, CO), pp. 2429–2432.
CIKMCIKM-2011-HeerschopGHFKJ #analysis
Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKMCIKM-2011-HeRSOQ #case study #generative
Generating links to background knowledge: a case study using narrative radiology reports (JH, MdR, MS, RCvO, YQ), pp. 1867–1876.
CIKMCIKM-2011-HuiHLW #statistics
Relevance weighting using within-document term statistics (KH, BH, TL, BW), pp. 99–104.
CIKMCIKM-2011-HuTL #microblog #semantics
Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
CIKMCIKM-2011-JacobDG #classification #corpus #multi #social
Classification and annotation in social corpora using multiple relations (YJ, LD, PG), pp. 1215–1220.
CIKMCIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic
Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKMCIKM-2011-KongDH #matrix #robust
Robust nonnegative matrix factorization using L21-norm (DK, CHQD, HH), pp. 673–682.
CIKMCIKM-2011-KustarevULGSS #metric
Smoothing NDCG metrics using tied scores (AK, YU, YL, EG, IS, PS), pp. 2053–2056.
CIKMCIKM-2011-LeeRK #algorithm #recognition
Named entity recognition using a modified Pegasos algorithm (CL, PMR, HK), pp. 2337–2340.
CIKMCIKM-2011-LinTC #classification #independence #sentiment #word
Language-independent sentiment classification using three common words (ZL, ST, XC), pp. 1041–1046.
CIKMCIKM-2011-LiuWZ #clustering #feature model
Feature selection using hierarchical feature clustering (HL, XW, SZ), pp. 979–984.
CIKMCIKM-2011-MagdyJ #performance
An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKMCIKM-2011-MaLL
Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKMCIKM-2011-NiuLX #graph #named #ranking
DIGRank: using global degree to facilitate ranking in an incomplete graph (XN, LL, KX), pp. 2297–2300.
CIKMCIKM-2011-OzertemVL #set
Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKMCIKM-2011-Pasca #query #web #what
Asking what no one has asked before: using phrase similarities to generate synthetic web search queries (MP), pp. 1347–1352.
CIKMCIKM-2011-PeelWZ #string
Collection-based compression using discovered long matching strings (AP, AW, JZ), pp. 2361–2364.
CIKMCIKM-2011-PilzP #distance
From names to entities using thematic context distance (AP, GP), pp. 857–866.
CIKMCIKM-2011-QuattroneCMFU #effectiveness #folksonomy #retrieval #similarity
Effective retrieval of resources in folksonomies using a new tag similarity measure (GQ, LC, PDM, EF, DU), pp. 545–550.
CIKMCIKM-2011-SoodL #detection #probability
Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKMCIKM-2011-VinzamuriK #classification #convergence #design
Designing an ensemble classifier over subspace classifiers using iterative convergence routine (BV, KK), pp. 693–698.
CIKMCIKM-2011-VirgilioM #calculus #data analysis
RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
CIKMCIKM-2011-WangZLBW #classification #multi #random
Using random walks for multi-label classification (CW, WZ, ZL, YB, JW), pp. 2197–2200.
CIKMCIKM-2011-WeichselbraunGS #game studies #sentiment
Using games with a purpose and bootstrapping to create domain-specific sentiment lexicons (AW, SG, AS), pp. 1053–1060.
CIKMCIKM-2011-WesselOVBK #3d #modelling #performance #retrieval
Efficient retrieval of 3D building models using embeddings of attributed subgraphs (RW, SO, RV, IB, RK), pp. 2097–2100.
CIKMCIKM-2011-WuQD #owl #pipes and filters
Finding all justifications of OWL entailments using TMS and MapReduce (GW, GQ, JD), pp. 1425–1434.
ECIRECIR-2011-AktolgaAS #ranking
Passage Reranking for Question Answering Using Syntactic Structures and Answer Types (EA, JA, DAS), pp. 617–628.
ECIRECIR-2011-AlbakourKNKSFR #evaluation #named #query
AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIRECIR-2011-AlonsoB #crowdsourcing #design #implementation
Design and Implementation of Relevance Assessments Using Crowdsourcing (OA, RABY), pp. 153–164.
ECIRECIR-2011-BadrinathVM #query #summary
Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
ECIRECIR-2011-BuccioMS #framework #predict #towards
Towards Predicting Relevance Using a Quantum-Like Framework (EDB, MM, DS), pp. 755–758.
ECIRECIR-2011-GeraniKCC #retrieval
Personal Blog Retrieval Using Opinion Features (SG, MK, MJC, FC), pp. 747–750.
ECIRECIR-2011-KinsellaPB #classification #metadata #social #social media #topic
Topic Classification in Social Media Using Metadata from Hyperlinked Objects (SK, AP, JGB), pp. 201–206.
ECIRECIR-2011-OhCM #classification #modelling #scalability #taxonomy
Text Classification for a Large-Scale Taxonomy Using Dynamically Mixed Local and Global Models for a Node (HSO, YC, SHM), pp. 7–18.
ECIRECIR-2011-PhelanMBS #recommendation #twitter
Terms of a Feather: Content-Based News Recommendation and Discovery Using Twitter (OP, KM, MB, BS), pp. 448–459.
ECIRECIR-2011-ZhaoJWHLYL #modelling #topic #twitter
Comparing Twitter and Traditional Media Using Topic Models (WXZ, JJ, JW, JH, EPL, HY, XL), pp. 338–349.
ICMLICML-2011-CrammerG #adaptation #classification #feedback #multi
Multiclass Classification with Bandit Feedback using Adaptive Regularization (KC, CG), pp. 273–280.
ICMLICML-2011-HockingVBJ #algorithm #clustering #named
Clusterpath: an Algorithm for Clustering using Convex Fusion Penalties (TH, JPV, FRB, AJ), pp. 745–752.
ICMLICML-2011-HuWC #coordination #kernel #learning #named #parametricity #scalability
BCDNPKL: Scalable Non-Parametric Kernel Learning Using Block Coordinate Descent (EH, BW, SC), pp. 209–216.
ICMLICML-2011-JawanpuriaNR #kernel #learning #performance
Efficient Rule Ensemble Learning using Hierarchical Kernels (PJ, JSN, GR), pp. 161–168.
ICMLICML-2011-JegelkaB11a #approximate #bound
Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICMLICML-2011-JetchevT #feedback #retrieval
Task Space Retrieval Using Inverse Feedback Control (NJ, MT), pp. 449–456.
ICMLICML-2011-KamisettyXL #approximate #correlation
Approximating Correlated Equilibria using Relaxations on the Marginal Polytope (HK, EPX, CJL), pp. 1153–1160.
ICMLICML-2011-LiuI #bound #difference
Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICMLICML-2011-Potetz #linear #problem
Estimating the Bayes Point Using Linear Knapsack Problems (BP), pp. 257–264.
ICMLICML-2011-SuSM #classification #multi #naive bayes #scalability
Large Scale Text Classification using Semisupervised Multinomial Naive Bayes (JS, JSS, SM), pp. 97–104.
ICMLICML-2011-YangR #learning #on the #visual notation
On the Use of Variational Inference for Learning Discrete Graphical Model (EY, PDR), pp. 1009–1016.
KDDKDD-2011-ApplegateDKU #clustering #distance #multi
Unsupervised clustering of multidimensional distributions using earth mover distance (DA, TD, SK, SU), pp. 636–644.
KDDKDD-2011-DalviKMR #nearest neighbour
Sampling hidden objects using nearest-neighbor oracles (NND, RK, AM, VR), pp. 1325–1333.
KDDKDD-2011-Dhurandhar #predict
Improving predictions using aggregate information (AD), pp. 1118–1126.
KDDKDD-2011-EneIM #clustering #performance #pipes and filters
Fast clustering using MapReduce (AE, SI, BM), pp. 681–689.
KDDKDD-2011-HendersonGLAETF #graph #mining #recursion
It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
KDDKDD-2011-Inchiosa #data mining #mining #scalability
Accelerating large-scale data mining using in-database analytics (MEI), p. 778.
KDDKDD-2011-LeeOYK #privacy #semantics
Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDDKDD-2011-MenonCGAK #collaboration #predict
Response prediction using collaborative filtering with hierarchies and side-information (AKM, KPC, SG, DA, NK), pp. 141–149.
KDDKDD-2011-MesterharmP #algorithm #learning #online
Active learning using on-line algorithms (CM, MJP), pp. 850–858.
KDDKDD-2011-PereiraB #classification #functional
Classification of functional magnetic resonance imaging data using informative pattern features (FP, MB), pp. 940–946.
KDDKDD-2011-SatpalBSRS #information management #logic #markov #network #web
Web information extraction using markov logic networks (SS, SB, SS, RR, PS), pp. 1406–1414.
KDDKDD-2011-SimonLJV #comprehension #image
Understanding atrophy trajectories in alzheimer’s disease using association rules on MRI images (GJS, PWL, CRJJ, PV), pp. 369–376.
KDIRKDIR-2011-ArmanoGV #concept #semantics
Semantic Enrichment of Contextual Advertising by using Concepts (GA, AG, EV), pp. 232–237.
KDIRKDIR-2011-BallesterosFDHG #analysis #dependence
Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIRKDIR-2011-BressoBSMKSND #mining #reduction
Use of Domain Knowledge for Dimension Reduction — Application to Mining of Drug Side Effects (EB, SB, MST, GM, ASK, MS, AN, MDD), pp. 271–276.
KDIRKDIR-2011-GuoK #ontology #research
Discovering Relationship Associations from the Literature Related to Research Projects in Sustainability Science using Ontology and Inference (WG, SBK), pp. 390–393.
KDIRKDIR-2011-LachetarB #algorithm #categorisation #metadata
Application of an Ant Colony Algorithm — For Song Categorising using Metadata (NL, HB), pp. 379–384.
KDIRKDIR-2011-LiVM #graph #learning #relational #visual notation
Unsupervised Handwritten Graphical Symbol Learning — Using Minimum Description Length Principle on Relational Graph (JL, CVG, HM), pp. 172–178.
KDIRKDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation
Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KDIRKDIR-2011-MauleKR #approach #automation
Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
KDIRKDIR-2011-OmerBG #algorithm #mining #motivation
A New Frequent Similar Tree Algorithm Motivated by Dom Mining — Using RTDM and its New Variant — SiSTeR (OB, RB, SG), pp. 238–243.
KDIRKDIR-2011-PrachuabsupakijS #classification #multi #set
Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
KDIRKDIR-2011-RavulaCL #dynamic analysis
Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
KDIRKDIR-2011-ReuterC #identification #learning #similarity
Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
KDIRKDIR-2011-RomeiT #process #programming #xquery
Programming the KDD Process using XQuery (AR, FT), pp. 131–139.
KEODKEOD-2011-GerberGM #ambiguity #consistency #development #ontology #standard
Using Formal Ontologies for the Development of Consistent and Unambiguous Financial Accounting Standards (MCG, AG, AvdM), pp. 419–424.
KEODKEOD-2011-KohnMSL #complexity #ontology
Use of Existing Ontologies as Input for Structural Complexity Management — Reducing the Effort for Analysing and Improving Engineering Systems (AK, MM, HXS, UL), pp. 195–201.
KEODKEOD-2011-MendesFS
Comparing Services using DEMO (CM, JF, MMdS), pp. 528–537.
KEODKEOD-2011-OkumuraH #concept
A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KEODKEOD-2011-Rios-AlvaradoLS #taxonomy #web
Structuring Taxonomies by using Linguistic Patterns and WordNet on Web Search (ABRA, ILA, VSS), pp. 273–278.
KEODKEOD-2011-SuzukiF #classification #documentation #multi
Multi-labeled Patent Document Classification using Technical Term Thesaurus (YS, FF), pp. 425–428.
KMISKMIS-2011-AlaviJY #performance
An Investigation of the Use of KMS on Clinical Performance (MA, SLJ, YY), pp. 236–240.
KMISKMIS-2011-Chebel-MorelloHZ #adaptation #modelling #reasoning
Adaptation based on Knowledge Models for Diagnostic Systems using Case-base Reasoning (BCM, MKH, NZ), pp. 223–229.
KMISKMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMISKMIS-2011-FortierS #modelling #process #requirements
Defining Information Requirements — Using Business Process Modeling for Incident Response for Chemical Facilities (SCF, GLS), pp. 411–417.
KMISKMIS-2011-Grim-YefsahRT11a #network #process #robust
Using Information of an Informal Network to Evaluate Business Process Robustness (MGY, CRS, VTG), pp. 430–435.
KMISKMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard
Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
KMISKMIS-2011-Nishioka #process
Quotation Process Management of One-of-a-kind Production using PSLX Information Model (YN), pp. 167–172.
KMISKMIS-2011-SchmidlK #information management
Using Task Histories to Support Person-to-person Knowledge Exchange — Extracting and using Contextual Overlap and Levels of Expertise to Connect Knowledge Workers (JS, HK), pp. 77–86.
MLDMMLDM-2011-AlshukriCZ #bound #detection #incremental #random
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDMMLDM-2011-CataltepeSBE #classification
Collective Classification Using Heterogeneous Classifiers (, AS, KB, AE), pp. 155–169.
MLDMMLDM-2011-ChenER #mining #parametricity
Mining Spatial Trajectories Using Non-parametric Density Functions (CSC, CFE, NJR), pp. 496–510.
MLDMMLDM-2011-Garcia-ConstantinoCNRST #classification #generative #summary
An Investigation Concerning the Generation of Text Summarisation Classifiers Using Secondary Data (MGC, FC, PJN, AR, CS, AT), pp. 387–398.
MLDMMLDM-2011-GunesCO #algorithm #classification #named #novel #relational #search-based
GA-TVRC: A Novel Relational Time Varying Classifier to Extract Temporal Information Using Genetic Algorithms (IG, , SGÖ), pp. 568–583.
MLDMMLDM-2011-Kessl #mining #parallel
Static Load Balancing of Parallel Mining of Frequent Itemsets Using Reservoir Sampling (RK), pp. 553–567.
MLDMMLDM-2011-PerezR #array #detection
Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDMMLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics
A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSysRecSys-2011-DalyG #effectiveness #recommendation #social
Effective event discovery: using location and social information for scoping event recommendations (EMD, WG), pp. 277–280.
RecSysRecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment
Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSysRecSys-2011-KatzOSRS #collaboration #wiki
Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
RecSysRecSys-2011-SekoYMM #behaviour #recommendation #representation
Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
SEKESEKE-2011-AlmeidaMA #analysis #execution #process
Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKESEKE-2011-AndradeDBW #approach #communication #documentation #retrieval
An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
SEKESEKE-2011-AntunesCCG #development #information management
Using Contextual Information to Improve Awareness in Software Development(S) (BA, JC, PC, PG), pp. 349–352.
SEKESEKE-2011-BhattacharyaCSK #enterprise
Dynamic Service Choreography using Context Aware Enterprise Service Bus (SB, JC, SS, AK), pp. 319–324.
SEKESEKE-2011-BragaD #detection #information management #tool support
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKESEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability
Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKESEKE-2011-FronzaSSV #predict
Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SEKESEKE-2011-GregoriadesLP11a #calculus #risk management
Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SEKESEKE-2011-Kaiser #concurrent #debugging #higher-order
Constructing Subtle Concurrency Bugs Using Synchronization-Centric Second-Order Mutation Operators (LWGK), pp. 244–249.
SEKESEKE-2011-MachadoAF #evolution #requirements #semantics
Using Semantic Annotations for Supporting Requirements Evolution (BNM, LdOA, RdAF), pp. 185–190.
SEKESEKE-2011-SanfordWX #analysis #modelling #security
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-ScatalonGC #approach #delivery #ontology
Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
SEKESEKE-2011-SouzaSMCSZ #concurrent #quality #reachability #testing
Using Coverage and Reachability Testing to Improve Concurrent Program Testing Quality (SdRSdS, PSLdS, MCCM, MSC, AdSS, EZ), pp. 207–212.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKESEKE-2011-SunWH #architecture #design #modelling #ontology
Design Software Architecture Models using Ontology (JS, HHW, TH), pp. 191–196.
SEKESEKE-2011-VilkomirKT #algorithm #case study #interface #testing
Interface Testing Using a Subgraph Splitting Algorithm: A Case Study (SV, AAK, NT), pp. 219–224.
SEKESEKE-2011-WagnerFF #process #security
Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
SEKESEKE-2011-WangKN #empirical #metric
An Empirical Study of Software Metrics Selection Using Support Vector Machine (HW, TMK, AN), pp. 83–88.
SIGIRSIGIR-2011-AgeevGLA #game studies #interactive #modelling #web
Find it if you can: a game for modeling different types of web search success using interaction data (MA, QG, DL, EA), pp. 345–354.
SIGIRSIGIR-2011-BennettRWY #metadata #personalisation #web
Inferring and using location metadata to personalize web search (PNB, FR, RWW, EY), pp. 135–144.
SIGIRSIGIR-2011-BlancoHHMPTT #crowdsourcing #evaluation #reliability
Repeatable and reliable search system evaluation using crowdsourcing (RB, HH, DMH, PM, JP, HST, DTT), pp. 923–932.
SIGIRSIGIR-2011-BouadjenekHBD #personalisation #query #social
Personalized social query expansion using social bookmarking systems (MRB, HH, MB, JD), pp. 1113–1114.
SIGIRSIGIR-2011-Campos #analysis #query #web
Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIRSIGIR-2011-CumminsJO #performance #predict #query #standard
Improved query performance prediction using standard deviation (RC, JMJ, CO), pp. 1089–1090.
SIGIRSIGIR-2011-DingS #documentation #performance #retrieval
Faster top-k document retrieval using block-max indexes (SD, TS), pp. 993–1002.
SIGIRSIGIR-2011-InagakiBCM #mobile #web
Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIRSIGIR-2011-JethavaCBBD #identification #multi #scalability
Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
SIGIRSIGIR-2011-LappasPS #mining #network #social
Mining tags using social endorsement networks (TL, KP, TS), pp. 195–204.
SIGIRSIGIR-2011-LeeHWHS #dataset #graph #image #learning #multi #pipes and filters #scalability
Multi-layer graph-based semi-supervised learning for large-scale image datasets using mapreduce (WYL, LCH, GLW, WHH, YFS), pp. 1121–1122.
SIGIRSIGIR-2011-Li11a #information retrieval
Domain-specific information retrieval using rcommenders (WL), pp. 1327–1328.
SIGIRSIGIR-2011-LiDS #concept #recommendation #semantics
Semantic tag recommendation using concept model (CL, AD, AS), pp. 1159–1160.
SIGIRSIGIR-2011-LiHZW #information retrieval #query #segmentation
Unsupervised query segmentation using clickthrough for information retrieval (YL, BJPH, CZ, KW), pp. 285–294.
SIGIRSIGIR-2011-LimsopathamSMO
Disambiguating biomedical acronyms using EMIM (NL, RLTS, CM, IO), pp. 1213–1214.
SIGIRSIGIR-2011-LiZMWCGX #comparative #comparison
Product comparison using comparative relations (SL, ZJZ, ZM, MW, TSC, JG, WX), pp. 1151–1152.
SIGIRSIGIR-2011-MoshfeghiPJ #collaboration #semantics
Handling data sparsity in collaborative filtering using emotion and semantic based features (YM, BP, JMJ), pp. 625–634.
SIGIRSIGIR-2011-OchiOO #predict #rating #word
Rating prediction using feature words extracted from customer reviews (MO, MO, RO), pp. 1205–1206.
SIGIRSIGIR-2011-PaikPP #algorithm #novel #statistics
A novel corpus-based stemming algorithm using co-occurrence statistics (JHP, DP, SKP), pp. 863–872.
SIGIRSIGIR-2011-SakaiS
Evaluating diversified search results using per-intent graded relevance (TS, RS), pp. 1043–1052.
SIGIRSIGIR-2011-Wang #comprehension #information management #recommendation
Understanding and using contextual information in recommender systems (LW), pp. 1329–1330.
SIGIRSIGIR-2011-WangHND #classification #information management #matrix #web
Cross-language web page classification via dual knowledge transfer using nonnegative matrix tri-factorization (HW, HH, FN, CHQD), pp. 933–942.
SIGIRSIGIR-2011-WuYLLYX #learning #rank
Learning to rank using query-level regression (JW, ZY, YL, HL, ZY, KX), pp. 1091–1092.
SIGIRSIGIR-2011-YangLSZZ #collaboration #learning #recommendation
Collaborative competitive filtering: learning recommender using context of user choice (SHY, BL, AJS, HZ, ZZ), pp. 295–304.
SIGIRSIGIR-2011-ZhaoHH #information retrieval #named #probability
CRTER: using cross terms to enhance probabilistic information retrieval (JZ, JXH, BH), pp. 155–164.
SIGIRSIGIR-2011-ZhouHH #ad hoc #estimation #probability
Enhancing ad-hoc relevance weighting using probability density estimation (XZ, JXH, BH), pp. 175–184.
BXBX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification
Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
BXBX-2011-Cleve #co-evolution #source code
Co-evolving schemas and programs using coupled transformations (AC), p. 54.
ECMFAECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements
Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
MODELSMoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml
An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
MODELSMoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml
Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
MODELSMoDELS-2011-IzukuraYOSKX #approach #development #modelling
Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MODELSMoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling
Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
PLEASEPLEASE-2011-Kulkarni #challenge #delivery
Use of SPLE to deliver custom solutions at product cost: challenges and a way forward (VK), pp. 1–5.
PLEASEPLEASE-2011-SunCGW #approach #feature model
Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
SPLCSPLC-2011-GhezziS #approach #model checking #non-functional #parametricity #performance #product line #towards #verification
Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
SPLCSPLC-2011-VolterV #domain-specific language #product line
Product Line Engineering Using Domain-Specific Languages (MV, EV), pp. 70–79.
ECOOPECOOP-2011-Duala-EkokoR #api #recommendation
Using Structure-Based Recommendations to Facilitate Discoverability in APIs (EDE, MPR), pp. 79–104.
ECOOPECOOP-2011-RichardsHBV #javascript #scalability
The Eval That Men Do — A Large-Scale Study of the Use of Eval in JavaScript Applications (GR, CH, BB, JV), pp. 52–78.
OOPSLAOOPSLA-2011-Golan-GuetaBARSY #automation
Automatic fine-grain locking using shape properties (GGG, NGB, AA, GR, MS, EY), pp. 225–242.
OOPSLAOOPSLA-2011-KeLZBJD #dependence #parallel #programming
Safe parallel programming using dynamic dependence hints (CK, LL, CZ, TB, BJ, CD), pp. 243–258.
OOPSLAOOPSLA-2011-WeeratungeZJ
Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
PLATEAUPLATEAU-2011-BarisicAGB #case study #domain-specific language #quality
Quality in use of domain-specific languages: a case study (AB, VA, MG, BB), pp. 65–72.
PLATEAUPLATEAU-2011-ShonleGL #design
Using metaphors from natural discussion to improve the design of arcum (MS, WGG, SL), pp. 39–44.
PLATEAUPLATEAU-2011-StefikSSS #comparison #empirical #perl #programming language
An empirical comparison of the accuracy rates of novices using the quorum, perl, and randomo programming languages (AS, SS, MS, KS), pp. 3–8.
AdaEuropeAdaEurope-2011-ChilAOP #ada #interface
Using Robotics as a Motivational Tool: An Ada Interface to a Pioneer Robot (RC, DA, FJO, JAP), pp. 147–159.
AdaEuropeAdaEurope-2011-OLeary #reliability #web #web service
Assuring Software Reliability While Using Web Services and Commercial Products (JO), pp. 1–16.
AdaEuropeAdaEurope-2011-SaezTC #ada #framework #multi #platform #realtime
A Real-Time Framework for Multiprocessor Platforms Using Ada 2012 (SS, ST, AC), pp. 46–60.
LOPSTRLOPSTR-2011-FioravantiPPS
Using Real Relaxations during Program Specialization (FF, AP, MP, VS), pp. 106–122.
LOPSTRLOPSTR-2011-Gallagher #analysis #logic programming #source code
Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
LOPSTRLOPSTR-2011-PilozziS #analysis #self #termination
Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
PADLPADL-2011-ChristakisS #detection #fault #message passing #static analysis
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADLPADL-2011-RedlEK #declarative #set
Declarative Belief Set Merging Using Merging Plans (CR, TE, TK), pp. 99–114.
PADLPADL-2011-SalgueiroDBA #constraints #detection
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
PEPMPEPM-2011-AlbertBGHPR
Verified resource guarantees using COSTA and KeY (EA, RB, SG, RH, GP, GRD), pp. 73–76.
PLDIPLDI-2011-BohmKKFT #compilation #parallel
Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator (IB, TJKEvK, SCK, BF, NPT), pp. 74–85.
PLDIPLDI-2011-JoseM #fault #locality #satisfiability
Cause clue clauses: error localization using maximum satisfiability (MJ, RM), pp. 437–446.
PLDIPLDI-2011-LuciaWC #comprehension #concurrent #execution #fault
Isolating and understanding concurrency errors using reconstructed execution fragments (BL, BPW, LC), pp. 378–388.
PLDIPLDI-2011-RamanKOLA #distributed #parallel
Parallelism orchestration using DoPE: the degree of parallelism executive (AR, HK, TO, JWL, DIA), pp. 26–37.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
PLDIPLDI-2011-ZengWL #concurrent #data type #monitoring #named
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures (QZ, DW, PL), pp. 367–377.
POPLPOPL-2011-DilligDA #precise #reasoning #source code
Precise reasoning for programs using containers (ID, TD, AA), pp. 187–200.
POPLPOPL-2011-Gulwani #automation #spreadsheet #string
Automating string processing in spreadsheets using input-output examples (SG), pp. 317–330.
POPLPOPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread
A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
POPLPOPL-2011-RamseyD #composition #dependent type #independence #low level #type system
Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
PPDPPPDP-2011-InabaHHKN #higher-order #logic #monad #verification
Graph-transformation verification using monadic second-order logic (KI, SH, ZH, HK, KN), pp. 17–28.
SASSAS-2011-DonaldsonHKR #verification
Software Verification Using k-Induction (AFD, LH, DK, PR), pp. 351–368.
SASSAS-2011-MadhusudanQ #performance
Efficient Decision Procedures for Heaps Using STRAND (PM, XQ), pp. 43–59.
SASSAS-2011-MonniauxG #bound #fixpoint #model checking
Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
AdaSIGAda-2011-BeltHRCHD #contract #execution #symbolic computation
Enhancing spark’s contract checking facilities using symbolic execution (JB, JH, R, PC, DH, XD), pp. 47–60.
RERE-2011-FranchMTC #framework #modelling #on the
On the joint use of i* with other modelling frameworks: A vision paper (XF, AM, JT, CC), pp. 133–142.
REFSQREFSQ-2011-DhunganaSG #elicitation #modelling #product line #requirements #research #variability
Research Preview: Supporting End-User Requirements Elicitation Using Product Line Variability Models (DD, NS, FG), pp. 66–71.
ASEASE-2011-AlshahwanH #automation #re-engineering #testing #web
Automated web application testing using search based software engineering (NA, MH), pp. 3–12.
ASEASE-2011-AlvesGJd #impact analysis #slicing
Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
ASEASE-2011-ApelSWRB #detection #feature model #interactive #verification
Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASEASE-2011-Bandyopadhyay #fault #locality #testing
Improving spectrum-based fault localization using proximity-based weighting of test cases (AB), pp. 660–664.
ASEASE-2011-GarciaPMMC #architecture
Enhancing architectural recovery using concerns (JG, DP, CM, NM, YC), pp. 552–555.
ASEASE-2011-KhalekYZMK #alloy #java #named #source code #specification #testing
TestEra: A tool for testing Java programs using alloy specifications (SAK, GY, LZ, DM, SK), pp. 608–611.
ASEASE-2011-LutzJP #assurance #modelling
Using model-based assurance to strengthen diagnostic procedures (RRL, JJ, APH), pp. 516–519.
ASEASE-2011-RathfelderKE #automation #capacity #performance #predict
Capacity planning for event-based systems using automated performance predictions (CR, SK, DE), pp. 352–361.
ASEASE-2011-SagdeoAKV #clustering #invariant #named
PRECIS: Inferring invariants using program path guided clustering (PS, VA, SK, SV), pp. 532–535.
ASEASE-2011-StehleLSRM #geometry
Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
ASEASE-2011-SunL #concept analysis
Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
ASEASE-2011-VakiliD #declarative #model checking #modelling
Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
ESEC-FSEESEC-FSE-2011-BarzilayHY #developer #social #social media
Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
ESEC-FSEESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability
Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
ESEC-FSEESEC-FSE-2011-LiCK #analysis #performance #points-to
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-PalmaST #interactive #requirements #smt
Using an SMT solver for interactive requirements prioritization (FP, AS, PT), pp. 48–58.
ESEC-FSEESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability
Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
ESEC-FSEESEC-FSE-2011-ZhengZL #api #recommendation #web
Cross-library API recommendation using web search engines (WZ, QZ, MRL), pp. 480–483.
ICSEICSE-2011-ArcuriB #algorithm #random #re-engineering #statistics #testing
A practical guide for using statistical tests to assess randomized algorithms in software engineering (AA, LCB), pp. 1–10.
ICSEICSE-2011-Bhattacharya #development #evolution #maintenance
Using software evolution history to facilitate development and maintenance (PB), pp. 1122–1123.
ICSEICSE-2011-CordeiroF #bound #concurrent #model checking #multi #smt #thread #verification
Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
ICSEICSE-2011-DietlDEMS
Building and using pluggable type-checkers (WD, SD, MDE, KM, TWS), pp. 681–690.
ICSEICSE-2011-FeinRSMGGBCLSMMSD #automation #deployment #tool support
Using MATCON to generate CASE tools that guide deployment of pre-packaged applications (EF, NR, SS, PM, SG, RG, MB, SKC, JL, VSS, SM, DM, BS, PD), pp. 1016–1018.
ICSEICSE-2011-Goeritzer #impact analysis #industrial
Using impact analysis in industry (RG), pp. 1155–1157.
ICSEICSE-2011-KamalrudinHG #case study #interactive #quality #requirements
Improving requirements quality using essential use case interaction patterns (MK, JGH, JCG), pp. 531–540.
ICSEICSE-2011-LimDF #identification #network #requirements #social
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSEICSE-2011-Malik #analysis #graph
Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSEICSE-2011-MurtazaMGL #fault
Diagnosing new faults using mutants and prior faults (SSM, NHM, MG, ZL), pp. 960–963.
ICSEICSE-2011-Smith #functional #requirements #security #testing
Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
ICSEICSE-2011-Thomas #mining #modelling #repository #topic
Mining software repositories using topic models (SWT), pp. 1138–1139.
ICSEICSE-2011-TofanGA #architecture #grid
Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
SACSAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict
Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
SACSAC-2011-BelcaidBHP #clustering #performance
Efficient clustering of populations using a minimal SNP panel (MB, KB, DH, GP), pp. 83–88.
SACSAC-2011-ChangH #approach #model transformation #multi #verification
A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
SACSAC-2011-FabreKT #lessons learnt #robust
Robustness of automotive applications using reflective computing: lessons learnt (JCF, MOK, FT), pp. 230–235.
SACSAC-2011-HeinenE #incremental #modelling
Incremental feature-based mapping from sonar data using Gaussian mixture models (MRH, PME), pp. 1370–1375.
SACSAC-2011-HuLCHXL #image #segmentation
Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
SACSAC-2011-Jamil #graph #query #unification
Computing subgraph isomorphic queries using structural unification and minimum graph structures (HMJ), pp. 1053–1058.
SACSAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech
iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SACSAC-2011-KostakisKMM #comparison #graph
Improved call graph comparison using simulated annealing (OK, JK, HM, KM), pp. 1516–1523.
SACSAC-2011-LeungJ #data type #mining #nondeterminism
Frequent itemset mining of uncertain data streams using the damped window model (CKSL, FJ), pp. 950–955.
SACSAC-2011-LinXYYZGQCG #anti #hardware #named
SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SACSAC-2011-Liu #agile #configuration management
Rapid application configuration in Amazon cloud using configurable virtual appliances (HL), pp. 147–154.
SACSAC-2011-MakanjuZM #retrieval
Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SACSAC-2011-MeerBHFK #automation #framework #web
A framework for automatic annotation of web pages using the Google rich snippets vocabulary (JvdM, FB, FH, FF, UK), pp. 765–772.
SACSAC-2011-NakajimaLYZGXYDQCG #hybrid #optimisation #virtual machine
Optimizing virtual machines using hybrid virtualization (JN, QL, SY, MZ, SG, MX, PY, YD, ZQ, KC, HG), pp. 573–578.
SACSAC-2011-SebastianC #approach #design #re-engineering #towards
Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-TranCTV #automation #modelling #process #reuse
Automatic reuse of process patterns in process modeling (HNT, BC, TDT, MHV), pp. 1431–1438.
SACSAC-2011-TrindadeR #3d #multi #navigation
Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
SACSAC-2011-VenkateshGBC #fixpoint #implementation #markov #modelling #recognition #speech
Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov models (NV, RG, RB, MGC), pp. 368–373.
SACSAC-2011-YuLGZZ #fault #modelling #multi
Locating faults using multiple spectra-specific models (KY, ML, QG, HZ, XZ), pp. 1404–1410.
SACSAC-2011-YuMGTBGGTL
System-level co-simulation of integrated avionics using polychrony (HY, YM, YG, JPT, LB, TG, PLG, AT, OL), pp. 354–359.
SACSAC-2011-ZhangWAWLL #performance
Fast lists intersection with Bloom filter using graphics processing units (FZ, DW, NA, GW, XL, JL), pp. 825–826.
SACSAC-2011-ZouaqGH #concept #graph
Ontologizing concept maps using graph theory (AZ, DG, MH), pp. 1687–1692.
LDTALDTA-2011-SoderbergH #editing #jastadd #semantics #tool support
Building semantic editors using JastAdd: tool demonstration (ES, GH), p. 11.
SLESLE-2011-JoncheereS #composition #workflow
Uniform Modularization of Workflow Concerns Using Unify (NJ, RVDS), pp. 77–96.
SLESLE-2011-StappersWRAN #case study #domain-specific language #formal method #industrial
Formalizing a Domain Specific Language Using SOS: An Industrial Case Study (FPMS, SW, MAR, SA, IN), pp. 223–242.
ASPLOSASPLOS-2011-KamruzzamanST #manycore #migration #thread
Inter-core prefetching for multicore processors using migrating helper threads (MK, SS, DMT), pp. 393–404.
CASECASE-2011-BoemPFP #clustering #distance #multi
Multi-feature trajectory clustering using Earth Mover’s Distance (FB, FAP, GF, TP), pp. 310–315.
CASECASE-2011-CabasinoGSSZ #fault #petri net
Fault diagnosis of an ABS system using Petri nets (MPC, AG, CS, AS, KZ), pp. 594–599.
CASECASE-2011-FantiSU #constraints #problem #scheduling #symmetry
Solving scheduling problems in distribution centers using symmetry breaking constraints (MPF, GS, WU), pp. 58–65.
CASECASE-2011-FeiMA #automaton #finite #modelling #resource management
Modeling sequential resource allocation systems using Extended Finite Automata (ZF, SM, ), pp. 444–449.
CASECASE-2011-GhomriA #hybrid #petri net
Continuous flow systems and control methodology using Hybrid Petri nets (LG, HA), pp. 419–424.
CASECASE-2011-HajiD #case study #simulation
A simulation case study: Reducing outpatient waiting time of otolaryngology care services using VBA (MH, HD), pp. 525–530.
CASECASE-2011-HaoD #incremental #optimisation
Optimization of tool trajectory for Incremental Sheet Forming using closed loop control (WH, SD), pp. 779–784.
CASECASE-2011-HeoOP #locality #mobile
A localization system of mobile robots using artificial landmarks (DHH, ARO, THP), pp. 139–144.
CASECASE-2011-JamesBHACC #mining #mobile
Tele-operation of a mobile mining robot using a panoramic display: an exploration of operators sense of presence (CAJ, TPB, KH, LA, CC, AC), pp. 279–284.
CASECASE-2011-JulvezMV #analysis #simulation
Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASECASE-2011-KurzKP #maintenance #network
Dynamic Maintenance in semiconductor manufacturing using Bayesian networks (DK, JK, JP), pp. 238–243.
CASECASE-2011-MohanSBKE #3d #image
3D scanning of object surfaces using structured light and a single camera image (SM, KBS, IB, VK, RDE), pp. 151–156.
CASECASE-2011-RatnakarZ #detection
An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASECASE-2011-StyliosG #fuzzy #modelling
Modeling complex logistics systems using soft computing methodology of Fuzzy Cognitive Maps (CDS, GKG), pp. 72–77.
CASECASE-2011-UrliM #industrial #realtime
Use of Ethernet communications for real-time control systems in the metals industry (LU, SM), pp. 6–11.
CASECASE-2011-XieZSL #fuzzy
Position servo control of the slider in double toggle mechanical press using Bezier curve model and fuzzy control (JX, SZ, ZS, JL), pp. 773–778.
CCCC-2011-GreweO #approach #clustering
A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
CCCC-2011-JenistaED #parallel #reachability
Using Disjoint Reachability for Parallelization (JCJ, YHE, BD), pp. 198–224.
CCCC-2011-NaeemL #alias #analysis #performance #set #summary
Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CGOCGO-2011-LiuM #analysis #locality #problem
Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGOCGO-2011-SanchezASPS #compilation
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
DACDAC-2011-GeQ #machine learning #multi
Dynamic thermal management for multimedia applications using machine learning (YG, QQ), pp. 95–100.
DACDAC-2011-GhaniN #branch #grid #power management #verification
Power grid verification using node and branch dominance (NHAG, FNN), pp. 682–687.
DACDAC-2011-HaddadN #analysis #grid #power management
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-KesturIPANC #architecture #co-evolution #design #framework #re-engineering
An algorithm-architecture co-design framework for gridding reconstruction using FPGAs (SK, KMI, SP, AAM, VN, CC), pp. 585–590.
DACDAC-2011-KuoSR #analysis #performance #reachability #source code
Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DACDAC-2011-LinH #satisfiability
Using SAT-based Craig interpolation to enlarge clock gating functions (THL, CY(H), pp. 621–626.
DACDAC-2011-MirandaRBW #design #modelling #standard #statistics
Statistical characterization of standard cells using design of experiments with response surface modeling (MM, PR, LB, GIW), pp. 77–82.
DACDAC-2011-NowrozWR #modelling
Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
DACDAC-2011-SorgenfreiS #detection
Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DACDAC-2011-TsaiZCH #bidirectional #fault tolerance
A fault-tolerant NoC scheme using bidirectional channel (WCT, DYZ, SJC, YHH), pp. 918–923.
DACDAC-2011-WangXAP #classification #learning #policy #power management
Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
DACDAC-2011-WeiP #security
Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DACDAC-2011-YangBC #detection #embedded #energy #fault
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATEDATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive
Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATEDATE-2011-AlordaTBS #embedded #optimisation
Stability optimization of embedded 8T SRAMs using Word-Line Voltage modulation (BA, GT, SAB, JS), pp. 986–991.
DATEDATE-2011-AmoryOMML #energy
Evaluating energy consumption of homogeneous MPSoCs using spare tiles (AMA, LO, CAMM, FGM, ML), pp. 1164–1167.
DATEDATE-2011-AsadiniaMTS
Supporting non-contiguous processor allocation in mesh-based CMPs using virtual point-to-point links (MA, MM, AT, HSA), pp. 413–418.
DATEDATE-2011-ButtrickK #3d #network #on the #testing
On testing prebond dies with incomplete clock networks in a 3D IC using DLLs (MB, SK), pp. 1418–1423.
DATEDATE-2011-DammHJPS #architecture #component #contract #design #integration #specification #testing
Using contract-based component specifications for virtual integration testing and architecture design (WD, HH, BJ, TP, IS), pp. 1023–1028.
DATEDATE-2011-EggersglusD #fault #generative #optimisation #pseudo #testing
As-Robust-As-Possible test generation in the presence of small delay defects using pseudo-Boolean optimization (SE, RD), pp. 1291–1296.
DATEDATE-2011-GoyalN #grid #performance #power management #verification
Efficient RC power grid verification using node elimination (AG, FNN), pp. 257–260.
DATEDATE-2011-GrammatikakisPSP #estimation
System-level power estimation methodology using cycle- and bit-accurate TLM (MDG, SP, JPS, CP), pp. 1125–1126.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KimCSY #modelling #parallel #performance #simulation
Temporal parallel simulation: A fast gate-level HDL simulation using higher level models (DK, MJC, KS, SY), pp. 1584–1589.
DATEDATE-2011-LiuHRG #optimisation #process
Global optimization of integrated transformers for high frequency microwave circuits using a Gaussian process based surrogate model (BL, YH, PR, GGEG), pp. 1101–1106.
DATEDATE-2011-LiuSTV #design #generative #towards #validation
Towards coverage closure: Using GoldMine assertions for generating design validation stimulus (LL, DS, WT, SV), pp. 173–178.
DATEDATE-2011-MeyerGCLS #cost analysis #execution #safety
Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
DATEDATE-2011-MeyerNHBSGSB #configuration management #performance
Fast Start-up for Spartan-6 FPGAs using Dynamic Partial Reconfiguration (JM, JN, MH, LB, OS, RMG, RS, JB), pp. 1542–1547.
DATEDATE-2011-NarayananZT #correctness #pattern matching #process
Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
DATEDATE-2011-SinghSG #generative #performance #testing
Testing of high-speed DACs using PRBS generation with “Alternate-Bit-Tapping” (MS, MS, SG), pp. 377–382.
DATEDATE-2011-VissersNN #interface #realtime #synthesis #tool support
Building real-time HDTV applications in FPGAs using processors, AXI interfaces and high level synthesis tools (KAV, SN, JN), pp. 848–850.
DATEDATE-2011-WangKAWMA #energy #simulation
Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
DATEDATE-2011-WangNKWRLMB #configuration management
High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches (XW, SN, ARK, FGW, SR, THL, MM, SB), pp. 1065–1070.
DATEDATE-2011-YeHL #fault #multi #on the
On diagnosis of multiple faults using compacted responses (JY, YH, XL), pp. 679–684.
HPCAHPCA-2011-CarreteroVARMG #hardware #process
Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
HPCAHPCA-2011-GhasemiDK #architecture
Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors (HRG, SCD, NSK), pp. 38–49.
HPCAHPCA-2011-MehraraHSM #javascript #parallel
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism (MM, PCH, MS, SAM), pp. 87–98.
HPCAHPCA-2011-PellauerAKPE #manycore #named #simulation
HAsim: FPGA-based high-detail multicore simulation using time-division multiplexing (MP, MA, MAK, AP, JSE), pp. 406–417.
HPDCHPDC-2011-BalkirFR #architecture #distributed #mining #pipes and filters
A distributed look-up architecture for text mining applications using mapreduce (ASB, ITF, AR), pp. 279–280.
HPDCHPDC-2011-HudsonNRWJP #case study #data-driven #experience #simulation
Experiences using smaash to manage data-intensive simulations (RH, JN, LBR, KW, GCJI, MEP), pp. 205–216.
HPDCHPDC-2011-WolinskyF #case study #distributed #experience #grid #self
Experiences with self-organizing, decentralized grids using the grid appliance (DIW, RJOF), pp. 183–194.
HPDCHPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code
Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
LCTESLCTES-2011-NavabpourBF #debugging #testing
Software debugging and testing using the abstract diagnosis theory (SN, BB, SF), pp. 111–120.
PDPPDP-2011-CorneaB #benchmark #distributed #metric #performance #predict
Performance Prediction of Distributed Applications Using Block Benchmarking Methods (BFC, JB), pp. 183–190.
PDPPDP-2011-MotokubotaIH #parametricity
Accelerating Parameter Sweep Applications Using CUDA (MM, FI, KH), pp. 111–118.
PDPPDP-2011-ReyesS #optimisation #prototype
Optimize or Wait? Using llc Fast-Prototyping Tool to Evaluate CUDA Optimizations (RR, FdS), pp. 257–261.
PDPPDP-2011-WathWL #estimation #grid #parallel
Parallel Hematopoietic Stem Cell Division Rate Estimation Using an Agent-Based Model on the Grid (RCvdW, EvdW, PL), pp. 311–317.
SOSPSOSP-2011-VeeraraghavanCFN #detection
Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
ESOPESOP-2011-GuhaSK #analysis #type system
Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
FASEFASE-2011-EhrigET #graph #version control
A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
FASEFASE-2011-KelsenMG #complexity #modelling
Models within Models: Taming Model Complexity Using the Sub-model Lattice (PK, QM, CG), pp. 171–185.
FASEFASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #visual notation
On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
STOCSTOC-2011-Goyal #constant #protocol
Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
TACASTACAS-2011-GarbervetskyGN #invariant
Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
TACASTACAS-2011-GopinathMK #program repair #satisfiability
Specification-Based Program Repair Using SAT (DG, MZM, SK), pp. 173–188.
TACASTACAS-2011-TalupurH #model checking
Biased Model Checking Using Flows (MT, HH), pp. 239–253.
CADECADE-2011-SchneiderS #automation #first-order #ontology #owl #proving #reasoning #theorem proving
Reasoning in the OWL 2 Full Ontology Language Using First-Order Automated Theorem Proving (MS, GS), pp. 461–475.
CAVCAV-2011-DudkaPV #data type #logic #named
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic (KD, PP, TV), pp. 372–378.
CAVCAV-2011-Jhala #verification
Using Types for Software Verification (RJ), p. 20.
CAVCAV-2011-JhalaMR #functional #named #source code #verification
HMC: Verifying Functional Programs Using Abstract Interpreters (RJ, RM, AR), pp. 470–485.
CAVCAV-2011-RamanK #behaviour #specification
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
CAVCAV-2011-SharmaDDA #generative #invariant
Simplifying Loop Invariant Generation Using Splitter Predicates (RS, ID, TD, AA), pp. 703–719.
CAVCAV-2011-SinghalA #simulation #verification
Using Coverage to Deploy Formal Verification in a Simulation World (VS, PA), pp. 44–49.
ICLPICLP-2011-ChishamPSW #logic programming #named #repository #web #web service
CDAOStore: A Phylogenetic Repository Using Logic Programming and Web Services (BC, EP, TCS, BW), pp. 209–219.
ICLPICLP-2011-NicholsonSS #generative #logic #music #probability
Improving the Outcome of a Probabilistic Logic Music System Generator by Using Perlin Noise (CJN, DDS, JS), pp. 231–239.
ICLPICLP-2011-OstrowskiFSA #evolution #ontology
Evolution of Ontologies using ASP (MO, GF, TS, GA), pp. 16–27.
ICLPICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination
SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLPICLP-J-2011-CorapiRVPS #design #induction #learning
Normative design using inductive learning (DC, AR, MDV, JAP, KS), pp. 783–799.
ICLPICLP-J-2011-DurzinskyMOSW #automation #network #re-engineering
Automatic network reconstruction using ASP (MD, WM, MO, TS, AW), pp. 749–766.
ICSTICST-2011-ChenCZXF #clustering #testing
Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
ICSTICST-2011-KhalekK #constraints #database #relational #testing #theorem proving
Systematic Testing of Database Engines Using a Relational Constraint Solver (SAK, SK), pp. 50–59.
ICSTICST-2011-MalikSK #constraints #data type #debugging
Constraint-Based Program Debugging Using Data Structure Repair (MZM, JHS, SK), pp. 190–199.
ICSTICST-2011-Nica #on the #testing
On the Improvement of the Mutation Score Using Distinguishing Test Cases (SN), pp. 423–426.
ICSTICST-2011-SmithW #detection #heuristic #sql #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICSTICST-2011-YuSSR #embedded #testing
Using Property-Based Oracles when Testing Embedded System Applications (TY, AS, WSa, GR), pp. 100–109.
ICTSSICTSS-2011-MammarCJMO #c #detection #source code #testing
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-MeinkeN #term rewriting #testing
Learning-Based Testing for Reactive Systems Using Term Rewriting Technology (KM, FN), pp. 97–114.
ICTSSICTSS-2011-SchwarzlAW #composition #random testing #testing
Compositional Random Testing Using Extended Symbolic Transition Systems (CS, BKA, FW), pp. 179–194.
ISSTAISSTA-2011-GuoE #automation #data analysis #persistent
Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
ISSTAISSTA-2011-NaminK #testing
The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
ISSTAISSTA-2011-SegallTF #combinator #design #diagrams
Using binary decision diagrams for combinatorial test design (IS, RTB, EF), pp. 254–264.
ICSTSAT-2011-BennettS #principle
Model Counting Using the Inclusion-Exclusion Principle (HB, SS), pp. 362–363.
ICSTSAT-2011-GableskeH #named #random #satisfiability
EagleUP: Solving Random 3-SAT Using SLS with Unit Propagation (OG, MH), pp. 367–368.
TAPTAP-2011-HeamM #approach #automaton #random testing #testing
A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
VMCAIVMCAI-2011-ChengRKB #embedded #fault tolerance #game studies #synthesis #theory and practice
Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice (CHC, HR, AK, CB), pp. 118–133.
CBSECBSE-2010-AllierSSV #component #consistency #execution #object-oriented
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces (SA, HAS, SS, SV), pp. 216–231.
CBSECBSE-2010-EichbergKMM #component #composition #feature model #modelling
Component Composition Using Feature Models (ME, KK, RM, MM), pp. 200–215.
ECSAECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality
Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
ECSAECSA-2010-ElorantaK #architecture #evaluation
Using Domain Knowledge to Boost Software Architecture Evaluation (VPE, KK), pp. 319–326.
ECSAECSA-2010-PerezDGA #agile #architecture #flexibility
Flexible Working Architectures: Agile Architecting Using PPCs (JP, JD, JG, PPA), pp. 102–117.
QoSAQoSA-2010-ChauvelSCHM #adaptation #architecture #self
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation (FC, HS, XC, GH, HM), pp. 102–118.
DocEngDocEng-2010-BeaudouxBJ #authoring #modelling
Using model driven engineering technologies for building authoring applications (OB, AB, JMJ), pp. 279–282.
DocEngDocEng-2010-KarolHHA #documentation #feature model #modelling #product line
Using feature models for creating families of documents (SK, MH, FH, UA), pp. 259–262.
DocEngDocEng-2010-NamaneSM #feature model #matrix #recognition
Degraded dot matrix character recognition using CSM-based feature extraction (AN, EHS, PM), pp. 207–210.
DocEngDocEng-2010-OllisBB #documentation
Optimized reprocessing of documents using stored processor state (JAO, DFB, SRB), pp. 135–138.
DocEngDocEng-2010-SojkaH #documentation #library #optimisation
Document engineering for a digital library: PDF recompression using JBIG2 and other optimizations of PDF documents (PS, RH), pp. 3–12.
DocEngDocEng-2010-ThaoM #data type #detection #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRRDRR-2010-BallKSN #analysis #documentation
Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
DRRDRR-2010-BianneKL #clustering #modelling #recognition #word
Context-dependent HMM modeling using tree-based clustering for the recognition of handwritten words (ALB, CK, LLS), pp. 1–10.
DRRDRR-2010-ChazalonC #definite clause grammar #documentation
Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
DRRDRR-2010-ChenMT #automation #performance #validation #word
Efficient automatic OCR word validation using word partial format derivation and language model (SC, DM, GRT), pp. 1–10.
DRRDRR-2010-PeredaT #precise #semiparsing
Date of birth extraction using precise shallow parsing (RP, KT), pp. 1–10.
DRRDRR-2010-YouADRGT #image #multimodal #retrieval
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
TPDLECDL-2010-BiaMG #library
Estimating Digitization Costs in Digital Libraries Using DiCoMo (AB, RM, JG), pp. 136–147.
TPDLECDL-2010-BiaMG10a #documentation #mindmap
Using Mind Maps to Model Semistructured Documents (AB, RM, JG), pp. 421–424.
TPDLECDL-2010-BillerbeckDFIK #query #ranking #web
Ranking Entities Using Web Search Query Logs (BB, GD, CSF, TI, RK), pp. 273–281.
TPDLECDL-2010-Black #data type #framework #metadata #pattern matching
Using Pattern Language as a Framework for Future Metadata Structure (EAB), pp. 393–396.
TPDLECDL-2010-CamargoCG #image #matrix #multimodal #visualisation
Multimodal Image Collection Visualization Using Non-negative Matrix Factorization (JEC, JCC, FAG), pp. 429–432.
HTHT-2010-ChoudhuryFAGLY #automation #social
Automatic construction of travel itineraries using social breadcrumbs (MDC, MF, SAY, NG, RL, CY), pp. 35–44.
HTHT-2010-FossC #adaptation #authoring #generative #hypermedia #tool support
The next generation authoring adaptive hypermedia: using and evaluating the MOT3.0 and PEAL tools (JGKF, AIC), pp. 83–92.
HTHT-2010-GasslerZTS #named #recommendation
SnoopyDB: narrowing the gap between structured and unstructured information using recommendations (WG, EZ, MT, GS), pp. 271–272.
JCDLJCDL-2010-AngroshCS #identification #library #random #towards
Context identification of sentences in related work sections using a conditional random field: towards intelligent digital libraries (MAA, SC, NS), pp. 293–302.
JCDLJCDL-2010-BammanBC #multi
Transferring structural markup across translations using multilingual alignment and projection (DB, AB, GRC), pp. 11–20.
JCDLJCDL-2010-MonroyFC #library #multi #ontology #taxonomy
Using an ontology and a multilingual glossary for enhancing the nautical archaeology digital library (CM, RF, FC), pp. 259–262.
JCDLJCDL-2010-TahmasebiNTR #documentation #word
Using word sense discrimination on historic document collections (NT, KN, TT, TR), pp. 89–98.
PODSPODS-2010-ReS #comprehension #estimation
Understanding cardinality estimation using entropy maximization (CR, DS), pp. 53–64.
SIGMODSIGMOD-2010-BaoDKR #workflow
An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
SIGMODSIGMOD-2010-GatterbauerS #trust
Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
SIGMODSIGMOD-2010-JinYW #classification #graph #named
GAIA: graph classification using evolutionary computation (NJ, CY, WW), pp. 879–890.
SIGMODSIGMOD-2010-ShindeGGD #locality #similarity
Similarity search and locality sensitive hashing using ternary content addressable memories (RS, AG, PG, DD), pp. 375–386.
SIGMODSIGMOD-2010-VernicaCL #parallel #performance #pipes and filters
Efficient parallel set-similarity joins using MapReduce (RV, MJC, CL), pp. 495–506.
SIGMODSIGMOD-2010-YangWLW #keyword #optimisation #web
Optimizing content freshness of relations extracted from the web using keyword search (MY, HW, LL, MW), pp. 819–830.
VLDBVLDB-2010-DyresonBM #xml
Using XMorph to Transform XML Data (CED, SSB, KM), pp. 1541–1544.
VLDBVLDB-2010-GolabKKS #quality #semantics
Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux (LG, HJK, FK, DS), pp. 1641–1644.
VLDBVLDB-2010-KazemitabarDAAS #query #sql
Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight (SJK, UD, MHA, AA, CS), pp. 1537–1540.
VLDBVLDB-2010-LimayeSC #web
Annotating and Searching Web Tables Using Entities, Types and Relationships (GL, SS, SC), pp. 1338–1347.
VLDBVLDB-2010-MiddelfartP
Using Sentinel Technology in the TARGIT BI Suite (MM, TBP), pp. 1629–1632.
VLDBVLDB-2010-TermehchyW #keyword #named #xml
EXTRUCT: Using Deep Structural Information in XML Keyword Search (AT, MW), pp. 1593–1596.
VLDBVLDB-2011-LeeH10 #clustering #named #performance
QSkycube: Efficient Skycube Computation using Point-Based Space Partitioning (JL, SwH), pp. 185–196.
CSEETCSEET-2010-LewHS #re-engineering
Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course (MWL, TBH, MS), pp. 121–128.
EDMEDM-2010-BousbiaLBR #behaviour #learning #web
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments (NB, JML, AB, IR), pp. 279–280.
EDMEDM-2010-CadeO #modelling #topic
Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
EDMEDM-2010-FalakmasirH #data mining #education #mining
Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning (MHF, JH), pp. 241–248.
EDMEDM-2010-FinchamABF #modelling
Using Neural Imaging and Cognitive Modeling to Infer Mental States while Using an Intelligent Tutoring System (JMF, JRA, SB, JLF), pp. 51–60.
EDMEDM-2010-GongBH #multi #parametricity
Using multiple Dirichlet distributions to improve parameter plausibility (YG, JEB, NTH), pp. 61–70.
EDMEDM-2010-HowardJN #mining #process
Examining Learner Control in a Structured Inquiry Cycle Using Process Mining (LH, JJ, CN), pp. 71–80.
EDMEDM-2010-JeongBJH #analysis #behaviour #effectiveness #learning #markov #modelling
Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
EDMEDM-2010-KhodeirWDH #abduction #difference #network #probability #student
Inferring the Differential Student Model in a Probabilistic Domain Using Abduction inference in Bayesian networks (NK, NMW, NMD, NH), pp. 299–300.
EDMEDM-2010-MacfadyenS #design #interactive #monitoring #online
Using LiMS (the Learner Interaction Monitoring System) to Track Online Learner Engagement and Evaluate Course Design (LM, PS), pp. 301–302.
EDMEDM-2010-MontalvoBPNG #identification #machine learning #student
Identifying Students’ Inquiry Planning Using Machine Learning (OM, RSJdB, MASP, AN, JDG), pp. 141–150.
EDMEDM-2010-PedroBMNG #behaviour #detection
Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
EDMEDM-2010-ShanabrookCWA #behaviour #identification #student
Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
EDMEDM-2010-StamperBC #knowledge base #problem
Using a Bayesian Knowledge Base for Hint Selection on Domain Specific Problems (JCS, TB, MJC), pp. 327–328.
EDMEDM-2010-YudelsonBMM #adaptation #education #integration #optimisation #semantics
Using Numeric Optimization To Refine Semantic User Model Integration Of Adaptive Educational Systems (MY, PB, AM, MM), pp. 221–230.
ITiCSEITiCSE-2010-AlaoutinenS #programming #self #student #taxonomy
Student self-assessment in a programming course using bloom’s revised taxonomy (SA, KS), pp. 155–159.
ITiCSEITiCSE-2010-AydinolG #web
Advantage of using web 2.0 applications in class (ABA, ÖG), p. 308.
ITiCSEITiCSE-2010-BasawapatnaKR #design #education #game studies #scalability
Using scalable game design to teach computer science from middle school to graduate school (ARB, KHK, AR), pp. 224–228.
ITiCSEITiCSE-2010-BasawapatnaR #feedback #how #physics #student
Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
ITiCSEITiCSE-2010-Crescenzi
Using AVs to explain NP-completeness (PC), p. 299.
ITiCSEITiCSE-2010-FinkelsteinPHDCB #game studies #named #network #social #student
SNAG: using social networking games to increase student retention in computer science (SLF, EP, AH, KD, SRC, TB), pp. 142–146.
ITiCSEITiCSE-2010-GarlickC #empirical
Using alice in CS1: a quantitative experiment (RG, ECC), pp. 165–168.
ITiCSEITiCSE-2010-GunawardenaTK #collaboration
Encouraging reading and collaboration using classroom salon (AG, AT, DK), pp. 254–258.
ITiCSEITiCSE-2010-HowardJN #behaviour #design #learning #online
Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
ITiCSEITiCSE-2010-KyrilovCT #assessment #case study #education #evaluation #online
Improving CS education at Wits using an online assessment and evaluation system: a case study (AK, JC, MT), p. 314.
ITiCSEITiCSE-2010-Larraza-MendiluzeG #game studies #learning #process #topic
Changing the learning process of the input/output topic using a game in a portable console (ELM, NGV), p. 316.
ITiCSEITiCSE-2010-MarkhamK #case study #experience
Using personal robots in CS1: experiences, outcomes, and attitudinal influences (SM, KNK), pp. 204–208.
ITiCSEITiCSE-2010-MartinezLDC #case study #experience #re-engineering
Experiences in software engineering courses using psychometrics with RAMSET (LGM, GL, ARD, JRC), pp. 244–248.
SIGITESIGITE-2010-KulgachevJ #evaluation #network #performance
802.11 networks performance evaluation using OPNET (VK, HJ), pp. 149–152.
SIGITESIGITE-2010-WangHY #education #network #security
Using VMware VCenter lab manager in undergraduate education for system administration and network security (XW, GCH, RY), pp. 43–52.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-NadiHM #predict #set
Does the Past Say It All? Using History to Predict Change Sets in a CMDB (SN, RCH, SM), pp. 97–106.
CSMRCSMR-2010-OzkayaPGC #architecture #evolution #requirements
Using Architecturally Significant Requirements for Guiding System Evolution (IO, JADP, AG, SC), pp. 127–136.
CSMRCSMR-2010-Shrinivasan #migration
Data Migration from a Product to a Data Warehouse Using ETL Tool (CS), pp. 63–65.
ICPCICPC-2010-ChenR #case study #dependence #feature model #graph
Case Study of Feature Location Using Dependence Graph, after 10 Years (KC, VR), pp. 1–3.
ICPCICPC-2010-RevelleDP #data fusion #feature model #mining #web
Using Data Fusion and Web Mining to Support Feature Location in Software (MR, BD, DP), pp. 14–23.
ICPCICPC-2010-ScannielloDDD #algorithm #clustering
Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering (GS, AD, CD, TD), pp. 180–189.
ICSMEICSM-2010-AbdallahMG #robust #slicing
Certifying software robustness using program slicing (MA, MM, KG), pp. 1–2.
ICSMEICSM-2010-CanforaCCP #detection #empirical #logic #multi
Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSMEICSM-2010-DajsurenGM #legacy
Modernizing legacy software using a System Grokking technology (YD, MG, DM), pp. 1–7.
ICSMEICSM-2010-GethersP #modelling #object-oriented #relational #topic
Using Relational Topic Models to capture coupling among classes in object-oriented software systems (MG, DP), pp. 1–10.
ICSMEICSM-2010-HindleGH #process
Software process recovery using Recovered Unified Process Views (AH, MWG, RCH), pp. 1–10.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSMEICSM-2010-KameiMMMAH #debugging #modelling #predict
Revisiting common bug prediction findings using effort-aware models (YK, SM, AM, KiM, BA, AEH), pp. 1–10.
ICSMEICSM-2010-SaleckerG #graph #testing
Pairwise test set calculation using k-partite graphs (ES, SG), pp. 1–5.
ICSMEICSM-2010-SavageDGP #named #source code #topic
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
ICSMEICSM-2010-Wilson #concept #ontology
Using ontology fragments in concept location (LAW), pp. 1–2.
MSRMSR-2010-JuzgadoV #difference #re-engineering
Using differences among replications of software engineering experiments to gain knowledge (NJJ, SV).
MSRMSR-2010-PentaGA #approach #identification
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
SCAMSCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming
Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
SCAMSCAM-2010-ThomasAHB #evolution #modelling #topic #validation
Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
WCREWCRE-2010-BittencourtSGM #automation #information retrieval #modelling
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
WCREWCRE-2010-GratiSP #diagrams #execution #interactive #sequence chart #visualisation
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization (HG, HAS, PP), pp. 87–96.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCREWCRE-2010-SelimFZ #clone detection #detection #representation
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
CIAACIAA-2010-Johnson #natural language
Uniformizing Rational Relations for Natural Language Applications Using Weighted Determinization (JHJ), pp. 173–180.
CIAACIAA-2010-Jonoska #automaton #self
Using Automata to Describe Self-Assembled Nanostructures (NJ), pp. 1–3.
CIAACIAA-2010-YuBI #automaton #multi #relational #string #verification
Relational String Verification Using Multi-track Automata (FY, TB, OHI), pp. 290–299.
DLTDLT-2010-Head #algebra #parallel
Using Light to Implement Parallel Boolean Algebra (TH), pp. 231–242.
ICALPICALP-v1-2010-BojanczykP #automaton #evaluation #nondeterminism #performance
Efficient Evaluation of Nondeterministic Automata Using Factorization Forests (MB, PP), pp. 515–526.
ICALPICALP-v2-2010-FontaineLV #algebra #approach #automaton
Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
LATALATA-2010-KasprzikK #learning #string
String Extension Learning Using Lattices (AK, TK), pp. 380–391.
LATALATA-2010-LetichevskySS #automaton #equivalence #finite #multi #problem #proving
The Equivalence Problem of Deterministic Multitape Finite Automata: A New Proof of Solvability Using a Multidimensional Tape (AAL, ASS, SKS), pp. 392–402.
LATALATA-2010-Penaloza #reasoning #standard
Using Sums-of-Products for Non-standard Reasoning (RP), pp. 488–499.
IFMIFM-2010-LanoR #model transformation #specification #uml #verification
Specification and Verification of Model Transformations Using UML-RSDS (KL, SKR), pp. 199–214.
SEFMSEFM-2010-GothelG #automation #invariant #network #realtime #towards #verification
Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants (TG, SG), pp. 310–314.
SEFMSEFM-2010-LindsayWY #assessment #behaviour #model checking #safety
Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
SEFMSEFM-2010-ScannielloRT #architecture #empirical #evaluation #semantics
Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation (GS, MR, GT), pp. 103–112.
SEFMSEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing
A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
FLOPSFLOPS-2010-MorihataM #automation #parallel #quantifier #recursion
Automatic Parallelization of Recursive Functions Using Quantifier Elimination (AM, KM), pp. 321–336.
FLOPSFLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
HaskellHaskell-2010-Morris #case study #design #experience
Experience report: using hackage to inform language design (JGM), pp. 61–66.
ICFPICFP-2010-BradyH #domain-specific language #implementation #partial evaluation
Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation (EB, KH), pp. 297–308.
ICFPICFP-2010-Pop #case study #experience #haskell #python
Experience report: Haskell as a reagent: results and observations on the use of Haskell in a python project (IP), pp. 369–374.
ICFPICFP-2010-ScottSGM #functional #industrial #programming
Using functional programming within an industrial product group: perspectives and perceptions (DJS, RS, TG, AM), pp. 87–92.
IFLIFL-2010-BjornsonTG #f# #user interface
Composing Reactive GUIs in F# Using WebSharper (JB, AT, AG), pp. 203–216.
LISPILC-2010-YuasaY #low level #validation
Validating low-level instructions for fixnums using BDDs (SY, MY), pp. 11–20.
AIIDEAIIDE-2010-GoldO #game studies
Using Machine Translation to Convert Between Difficulties in Rhythm Games (KG, AO).
AIIDEAIIDE-2010-HeckelY #behaviour #coordination #multi
Multi-Agent Coordination Using Dynamic Behavior-Based Subsumption (FWPH, GMY).
AIIDEAIIDE-2010-SharifiZS #behaviour #game studies #learning
Learning Companion Behaviors Using Reinforcement Learning in Games (AS, RZ, DS).
AIIDEAIIDE-2010-YoungbloodHHC #agile #behaviour #development #game studies
Rapid Development of Characters in FPS/3PS Games Using Visually-Specified Behavior-based Control (GMY, FWPH, DHH, AC).
CoGCIG-2010-BeaudryBCK #challenge #game studies #markov
Using Markov decision theory to provide a fair challenge in a roll-and-move board game (EB, FB, SC, FK), pp. 1–8.
CoGCIG-2010-BenbassatS #evolution #programming #search-based
Evolving Lose-Checkers players using genetic programming (AB, MS), pp. 30–37.
CoGCIG-2010-CardamoneLLB #algorithm #search-based
Searching for the optimal racing line using genetic algorithms (LC, DL, PLL, APB), pp. 388–394.
CoGCIG-2010-LevillainORB #experience #fuzzy
Characterizing player's experience from physiological signals using fuzzy decision trees (FL, JOO, MR, BBM), pp. 75–82.
CoGCIG-2010-MawhorterM #generative
Procedural level generation using occupancy-regulated extension (PAM, MM), pp. 351–358.
CoGCIG-2010-OnievaCLL #fuzzy #logic
Overtaking opponents with blocking strategies using fuzzy logic (EO, LC, DL, PLL), pp. 123–130.
CoGCIG-2010-RawalRM #behaviour
Constructing competitive and cooperative agent behavior using coevolution (AR, PR, RM), pp. 107–114.
CoGCIG-2010-SmithAHL #education
Using co-evolved RTS opponents to teach spatial tactics (GS, PA, RH, SJL), pp. 146–153.
FDGFDG-2010-BoyceB #game studies #learning #motivation
BeadLoom Game: using game elements to increase motivation and learning (AKB, TB), pp. 25–31.
FDGFDG-2010-SheldonPKOCTR #approach #game studies #learning #mobile #named #student
Weatherlings: a new approach to student learning using web-based mobile games (JS, JP, EK, JO, VHHC, PWT, LR), pp. 203–208.
FDGFDG-2010-TreanorMW #design #exclamation #game studies #logic #visual notation
Kaboom! is a many-splendored thing: an interpretation and design methodology for message-driven games using graphical logics (MT, MM, NWF), pp. 224–231.
CoGVS-Games-2010-YusoffCG #game studies #validation
Validation of Serious Games Attributes Using the Technology Acceptance Model (AY, RC, LG), pp. 45–51.
ICGTICGT-2010-Qayum #automation #graph transformation #refactoring #search-based
Automated Assistance for Search-Based Refactoring Using Unfolding of Graph Transformation Systems (FQ), pp. 407–409.
ICGTICGT-2010-SpicherMG #declarative
Declarative Mesh Subdivision Using Topological Rewriting in MGS (AS, OM, JLG), pp. 298–313.
ICGTICGT-2010-Zambon #abstraction #graph transformation #verification
Using Graph Transformations and Graph Abstractions for Software Verification (EZ), pp. 416–418.
CHICHI-2010-BillingsW #comprehension #online
Understanding dispute resolution online: using text to reflect personal and substantive issues in conflict (MB, LAW), pp. 1447–1456.
CHICHI-2010-ChangYM #testing #user interface
GUI testing using computer vision (THC, TY, RCM), pp. 1535–1544.
CHICHI-2010-ChevalierDBF #documentation #navigation
Using text animated transitions to support navigation in document histories (FC, PD, AB, JDF), pp. 683–692.
CHICHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
CHICHI-2010-DixonPH #feedback #named #recognition #sketching
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces (DD, MP, TH), pp. 897–906.
CHICHI-2010-DruinFHGH #interface #keyword
Children’s roles using keyword search interfaces at home (AD, EF, HH, EG, LH), pp. 413–422.
CHICHI-2010-HeerB #crowdsourcing #design #visual notation #visualisation
Crowdsourcing graphical perception: using mechanical turk to assess visualization design (JH, MB), pp. 203–212.
CHICHI-2010-HogganB #interface #multimodal #named #testing
Crosstrainer: testing the use of multimodal interfaces in situ (EEH, SAB), pp. 333–342.
CHICHI-2010-HuhNS #comprehension #reuse
Finding the lost treasure: understanding reuse of used computing devices (JH, KN, NS), pp. 1875–1878.
CHICHI-2010-LankST #documentation #fault #injection
Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
CHICHI-2010-McGookinRB #graph #interactive
Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
CHICHI-2010-SongGGF #interactive #mobile #named
MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector (HS, FG, TG, GWF), pp. 2451–2460.
CHICHI-2010-VertanenM #performance #speech
Speech dasher: fast writing using speech and gaze (KV, DJCM), pp. 595–598.
CHICHI-2010-Villamarin-SalomonB #behaviour
Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
CHICHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order
An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CHICHI-2010-WuDM #detection #enterprise #network #social
Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
CHICHI-2010-YukselDTS #human-computer #interface #multi #novel
A novel brain-computer interface using a multi-touch surface (BFY, MD, JT, AS), pp. 855–858.
CSCWCSCW-2010-BurkeKW #communication #social
Social use of computer-mediated communication by adults on the autism spectrum (MB, RK, DW), pp. 425–434.
SOFTVISSOFTVIS-2010-AnslowMNTB #evaluation #scalability #visualisation
User evaluation of polymetric views using a large visualization wall (CA, SM, JN, EDT, RB), pp. 25–34.
SOFTVISSOFTVIS-2010-LinTOB #comprehension #profiling #towards
Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
SOFTVISSOFTVIS-2010-TrumperBD #comprehension #parallel #thread #visualisation
Understanding complex multithreaded software systems by using trace visualization (JT, JB, JD), pp. 133–142.
SOFTVISSOFTVIS-2010-Zeckzer #layout #matrix #visualisation
Visualizing software entities using a matrix layout (DZ), pp. 207–208.
CAiSECAiSE-2010-CastanoFM #semantics #variability #web
Dealing with Matching Variability of Semantic Web Data Using Contexts (SC, AF, SM), pp. 194–208.
CAiSECAiSE-2010-Paraszczak
The Influence of IT Systems on the Use of the Earth’s Resources (JRP), pp. 7–8.
EDOCEDOC-2010-AmarLCN #aspect-oriented #imperative #programming
Using Aspect-Oriented Programming to Trace Imperative Transformations (BA, HL, BC, CN), pp. 143–152.
EDOCEDOC-2010-EshuisN #framework #outsourcing #process
A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
EDOCEDOC-2010-QuartelSL #architecture #enterprise #modelling #requirements
IT Portfolio Valuation — Using Enterprise Architecture and Business Requirements Modeling (DACQ, MWAS, MML), pp. 3–13.
EDOCEDOC-2010-ZdravkovicI #approach #design #framework #modelling #ontology
A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
ICEISICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance
Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEISICEIS-AIDSS-2010-FariaGSMM #automation #natural language #ontology
Using Natural Language Processing for Automatic Extraction of Ontology Instances (CGdF, RG, IS, MM, DM), pp. 278–283.
ICEISICEIS-AIDSS-2010-GerberKM #formal method #metamodelling #ontology #towards
Towards the Formalisation of the TOGAF Content Metamodel using Ontologies (AG, PK, AvdM), pp. 54–64.
ICEISICEIS-AIDSS-2010-GilS #implementation #performance #process
Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICEISICEIS-AIDSS-2010-HaasMSD #information management #named
ConTask — Using Context-sensitive Assistance to Improve Task-oriented Knowledge Work (JH, HM, SS, AD), pp. 30–39.
ICEISICEIS-AIDSS-2010-MoriyasuYN #learning #self
Supervised Learning for Agent Positioning by using Self-organizing Map (KM, TY, HN), pp. 368–372.
ICEISICEIS-AIDSS-2010-SahaPMB #classification #clustering #difference #image
Improvement of Differential Crisp Clustering using ANN Classifier for Unsupervised Pixel Classification of Satellite Image (IS, DP, UM, SB), pp. 21–29.
ICEISICEIS-AIDSS-2010-SalasPRR #identification
Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
ICEISICEIS-AIDSS-2010-TomeAC #architecture #enterprise #experience #named
TREEAD — A Tool that Enables the Re-use of Experience in Enterprise Architecture Description (PT, LA, EC), pp. 332–343.
ICEISICEIS-AIDSS-2010-VialeBGP #approach #modelling #process #scalability #sequence
Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
ICEISICEIS-DISI-2010-BarczynskiFBS #adaptation #concept #information management #modelling #named
AdaptIE — Using Domain Language Concept to Enable Domain Experts in Modeling of Information Extraction Plans (WMB, FF, FB, DS), pp. 249–256.
ICEISICEIS-DISI-2010-FerrucciGOS #development
Estimating Software Development Effort using Tabu Search (FF, CG, RO, FS), pp. 236–241.
ICEISICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability
Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
ICEISICEIS-DISI-2010-LemosCV #query #relational #sql #xml
Using SQL/XML for Efficiently Translating Queries over XML View of Relational Data (FCL, CC, VMPV), pp. 269–274.
ICEISICEIS-DISI-2010-PanZH #library #open source #query #retrieval
An Open Source Software based Library Catalogue System using Soundexing Retrieval and Query Caching (ZP, YZ, JH), pp. 182–189.
ICEISICEIS-DISI-2010-PopovicCJ #process #quality
Absorption of Information Provided by Business Intelligence Systems — The Effect of Information Quality on the Use of Information in Business Processes (AP, PSC, JJ), pp. 176–181.
ICEISICEIS-DISI-2010-SchusterJS #web
Finding and Classifying Product Relationships using Information from the Public Web (DS, TMJ, AS), pp. 300–309.
ICEISICEIS-DISI-2010-SunyaevKDK #framework #health
Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
ICEISICEIS-HCI-2010-AstolfiMSA #difference #enterprise #people #problem
Using Cultural Differences to Join People with Common Interests or Problems in Enterprise Environment (GA, VMAdM, MARS, JCA), pp. 192–197.
ICEISICEIS-HCI-2010-TranKVW #declarative #generative #modelling #user interface
Using Task and Data Models for user Interface Declarative Generation (VT, MK, JV, YW), pp. 155–160.
ICEISICEIS-ISAS-2010-GradlMWK #enterprise #modelling #network #process
Modeling ERP Business Processes using Layered Queueing Networks (SG, MM, HW, HK), pp. 255–260.
ICEISICEIS-J-2010-BottcherHM10a #xml
Using XML Schema Subtraction to Compress Electronic Payment Messages (SB, RH, CM), pp. 451–463.
ICEISICEIS-J-2010-Cruz-LaraOGBBC #chat #communication #interface #standard
A Chat Interface Using Standards for Communication and e-Learning in Virtual Worlds (SCL, TO, JG, NB, LB, JPC), pp. 541–554.
ICEISICEIS-J-2010-HernandesSF10a #collaboration #concept #ontology #taxonomy #visualisation
Using Visualization and a Collaborative Glossary to Support Ontology Conceptualization (EMH, DS, SF), pp. 90–103.
ICEISICEIS-J-2010-LopesVSS
Using Cases, Evidences and Context to Support Decision Making (ECL, VV, ACS, US), pp. 340–356.
ICEISICEIS-J-2010-UrbanoRO10a #metric
Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
ICEISICEIS-SAIC-2010-GoyalK #approach #automation #fuzzy #multi #set
Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
ICEISICEIS-SAIC-2010-Kristensen #abstraction #collaboration #message passing
Abstraction from Collaboration between Agents using Asynchronous Message-passing (BBK), pp. 86–92.
CIKMCIKM-2010-AjiWAG #analysis #modelling
Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKMCIKM-2010-BatalH #classification #predict
Constructing classification features using minimal predictive patterns (IB, MH), pp. 869–878.
CIKMCIKM-2010-BenderskyCS #feedback #pseudo #query
Structural annotation of search queries using pseudo-relevance feedback (MB, WBC, DAS), pp. 1537–1540.
CIKMCIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards
Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKMCIKM-2010-CartrightALM #approximate #modelling #performance #query
Fast query expansion using approximations of relevance models (MAC, JA, VL, AM), pp. 1573–1576.
CIKMCIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query
Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
CIKMCIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image
Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKMCIKM-2010-FengZXY #crawling #rank
Focused crawling using navigational rank (SF, LZ, YX, CY), pp. 1513–1516.
CIKMCIKM-2010-Grefenstette #semantics
Use of semantics in real life applications (GG), pp. 5–6.
CIKMCIKM-2010-GuptaGNM #query
Efficiently querying archived data using Hadoop (RG, HG, UN, MKM), pp. 1301–1304.
CIKMCIKM-2010-HarveyRC #modelling #ranking #social #topic
Ranking social bookmarks using topic models (MH, IR, MJC), pp. 1401–1404.
CIKMCIKM-2010-HuangSN #graph #query #refinement #word
Query model refinement using word graphs (YH, LS, JYN), pp. 1453–1456.
CIKMCIKM-2010-JindalLL #overview
Finding unusual review patterns using unexpected rules (NJ, BL, EPL), pp. 1549–1552.
CIKMCIKM-2010-KapteinSVK #ranking #wiki
Entity ranking using Wikipedia as a pivot (RK, PS, APdV, JK), pp. 69–78.
CIKMCIKM-2010-KohnckeB #category theory #documentation #wiki
Using Wikipedia categories for compact representations of chemical documents (BK, WTB), pp. 1809–1812.
CIKMCIKM-2010-KurashimaIIF #recommendation
Travel route recommendation using geotags in photo sharing sites (TK, TI, GI, KF), pp. 579–588.
CIKMCIKM-2010-LangMWL #concept #markov #random
Improved latent concept expansion using hierarchical markov random fields (HL, DM, BW, JTL), pp. 249–258.
CIKMCIKM-2010-LiLY #named #query #semantics
EntityEngine: answering entity-relationship queries using shallow semantics (XL, CL, CY), pp. 1925–1926.
CIKMCIKM-2010-LimNJLL #behaviour #detection #overview #rating
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-LiQKG #automation #constraints #model merging
Automatic schema merging using mapping constraints among incomplete sources (XL, CQ, DK, SG), pp. 299–308.
CIKMCIKM-2010-MoonLCLZC #feedback #learning #online #ranking #realtime
Online learning for recency search ranking using real-time user feedback (TM, LL, WC, CL, ZZ, YC), pp. 1501–1504.
CIKMCIKM-2010-NguyenYLF #case study #experience #learning #multi #ranking
Experiences with using SVM-based learning for multi-objective ranking (LTN, WGY, RL, OF), pp. 1917–1920.
CIKMCIKM-2010-PobleteBMB #graph #image #query #retrieval #semantic gap #web
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval (BP, BB, MM, JMB), pp. 1553–1556.
CIKMCIKM-2010-ShavittWW #peer-to-peer #recommendation
Building recommendation systems using peer-to-peer shared content (YS, EW, UW), pp. 1457–1460.
CIKMCIKM-2010-ShiN #dependence
Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
CIKMCIKM-2010-SotoudehA #detection #framework #induction
Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKMCIKM-2010-VijayalakshmiMMDRM #algorithm #search-based
Intelligent sales forecasting engine using genetic algorithms (MV, BM, RM, AD, RR, KM), pp. 1669–1672.
CIKMCIKM-2010-WangL #clustering #documentation #incremental #summary
Document update summarization using incremental hierarchical clustering (DW, TL), pp. 279–288.
CIKMCIKM-2010-WhiteBD #predict
Predicting short-term interests using activity-based search context (RWW, PNB, STD), pp. 1009–1018.
CIKMCIKM-2010-WoodLH #concept #image
Searching consumer image collections using web-based concept expansion (MDW, ACL, SH), pp. 679–688.
CIKMCIKM-2010-XueCS #analysis #modelling
Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKMCIKM-2010-XueHC #query #set
Improving verbose queries using subset distribution (XX, SH, WBC), pp. 1059–1068.
ECIRECIR-2010-AltingovdeAU #retrieval #xml
XML Retrieval Using Pruned Element-Index Files (ISA, DA, ÖU), pp. 306–318.
ECIRECIR-2010-AlyDHS #concept #modelling #retrieval
Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts (RA, ARD, DH, AFS), pp. 241–252.
ECIRECIR-2010-CoxZFH #approximate #correctness #query
Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (IJC, JZ, RF, LKH), pp. 265–280.
ECIRECIR-2010-GoharianFYM #peer-to-peer #query
Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ECIRECIR-2010-KabadjovSSPP #evaluation #summary #taxonomy
Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy (MAK, JS, RS, MP, BP), pp. 662–666.
ECIRECIR-2010-KimCLL #detection #effectiveness #image #named #sequence
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ECIRECIR-2010-RamanUBB #documentation #feedback #on the #pseudo
On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents (KR, RU, PB, AB), pp. 573–576.
ECIRECIR-2010-UdupaK #analysis #canonical #correlation #equivalence
Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ECIRECIR-2010-YangJX #enterprise
Using Weighted Tagging to Facilitate Enterprise Search (SY, JJ, YX), pp. 590–593.
ECIRECIR-2010-YinHL #information retrieval #ranking #wiki
Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia (XY, XH, ZL), pp. 495–507.
ECIRECIR-2010-ZucconA #documentation #probability #quantum #rank #ranking
Using the Quantum Probability Ranking Principle to Rank Interdependent Documents (GZ, LA), pp. 357–369.
ICMLICML-2010-BshoutyL #clustering #linear
Finding Planted Partitions in Nearly Linear Time using Arrested Spectral Clustering (NHB, PML), pp. 135–142.
ICMLICML-2010-Busa-FeketeK #performance
Fast boosting using adversarial bandits (RBF, BK), pp. 143–150.
ICMLICML-2010-CumminsN #named #recognition #visual notation
FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model (MJC, PMN), pp. 3–10.
ICMLICML-2010-DruckM #generative #learning #modelling
High-Performance Semi-Supervised Learning using Discriminatively Constrained Generative Models (GD, AM), pp. 319–326.
ICMLICML-2010-KokD #learning #logic #markov #network
Learning Markov Logic Networks Using Structural Motifs (SK, PMD), pp. 551–558.
ICMLICML-2010-LayB #classification #predict
Supervised Aggregation of Classifiers using Artificial Prediction Markets (NL, AB), pp. 591–598.
ICMLICML-2010-PetrikTPZ #approximate #feature model #linear #markov #process #source code
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes (MP, GT, RP, SZ), pp. 871–878.
ICMLICML-2010-Salakhutdinov #adaptation #learning
Learning Deep Boltzmann Machines using Adaptive MCMC (RS), pp. 943–950.
ICMLICML-2010-YuZ #coordination
Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPRICPR-2010-AdluruTWD #re-engineering
Improving Undersampled MRI Reconstruction Using Non-local Means (GA, TT, RTW, EVRDB), pp. 4000–4003.
ICPRICPR-2010-Allili #retrieval
Wavelet-Based Texture Retrieval Using a Mixture of Generalized Gaussian Distributions (MSA), pp. 3143–3146.
ICPRICPR-2010-AlySTT #multi #recognition #robust #self #similarity
Robust Face Recognition Using Multiple Self-Organized Gabor Features and Local Similarity Matching (SKHA, AS, NT, RiT), pp. 2909–2912.
ICPRICPR-2010-AmanoK #predict
Appearance Control Using Projection with Model Predictive Control (TA, HK), pp. 2832–2835.
ICPRICPR-2010-AnYB #documentation #segmentation
Document Segmentation Using Pixel-Accurate Ground Truth (CA, DY, HSB), pp. 245–248.
ICPRICPR-2010-AriA #estimation #modelling #optimisation
Maximum Likelihood Estimation of Gaussian Mixture Models Using Particle Swarm Optimization (CA, SA), pp. 746–749.
ICPRICPR-2010-ArvanitopoulosBT #fault #linear #subclass
Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPRICPR-2010-AshrafSF #constraints #invariant #rank #recognition
View-Invariant Action Recognition Using Rank Constraint (NA, YS, HF), pp. 3611–3614.
ICPRICPR-2010-AslanAFRAX #3d #graph #segmentation
3D Vertebral Body Segmentation Using Shape Based Graph Cuts (MSA, AMA, AAF, HMR, BA, PX), pp. 3951–3954.
ICPRICPR-2010-AtmosukartoSH #3d #learning #programming #search-based
The Use of Genetic Programming for Learning 3D Craniofacial Shape Quantifications (IA, LGS, CH), pp. 2444–2447.
ICPRICPR-2010-AzarM #automation #image #network #sequence
Automated Tracking of the Carotid Artery in Ultrasound Image Sequences Using a Self Organizing Neural Network (JCA, HHM), pp. 2544–2547.
ICPRICPR-2010-BanimahdE #distance #image #segmentation #set
Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPRICPR-2010-BassiouK #clustering #distance #word
Word Clustering Using PLSA Enhanced with Long Distance Bigrams (NB, CK), pp. 4226–4229.
ICPRICPR-2010-BayramogluA #image #recognition
Shape Index SIFT: Range Image Recognition Using Local Features (NB, AAA), pp. 352–355.
ICPRICPR-2010-BaysalKD
Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPRICPR-2010-BenabbasLID #modelling #recognition
Action Recognition Using Direction Models of Motion (YB, AL, NI, CD), pp. 4295–4298.
ICPRICPR-2010-BicegoMMAF #2d #kernel #recognition
2D Shape Recognition Using Information Theoretic Kernels (MB, AFTM, VM, PMQA, MATF), pp. 25–28.
ICPRICPR-2010-BimboLMP #detection #geometry
Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPRICPR-2010-BouchrikaCNMT #detection #people
Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPRICPR-2010-BozkurtEEE #recognition #speech
Use of Line Spectral Frequencies for Emotion Recognition from Speech (EB, EE, ÇEE, ATE), pp. 3708–3711.
ICPRICPR-2010-BuloP #clustering #difference #probability
Probabilistic Clustering Using the Baum-Eagon Inequality (SRB, MP), pp. 1429–1432.
ICPRICPR-2010-CadavidA #automation #detection #modelling #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-CakirC #2d #feature model #image
Image Feature Extraction Using 2D Mel-Cepstrum (, AEÇ), pp. 674–677.
ICPRICPR-2010-CalderaraPC #people #similarity #statistics
Alignment-Based Similarity of People Trajectories Using Semi-directional Statistics (SC, AP, RC), pp. 4275–4278.
ICPRICPR-2010-CandamoGKG #detection
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPRICPR-2010-CaoZL #markov #random
Human Body Parts Tracking Using Sequential Markov Random Fields (XQC, JZ, ZQL), pp. 1759–1762.
ICPRICPR-2010-Carneiro #automation #case study #comparative #design #image
A Comparative Study on the Use of an Ensemble of Feature Extractors for the Automatic Design of Local Image Descriptors (GC), pp. 3356–3359.
ICPRICPR-2010-CeolinH #difference #gender #metric
Characterising Facial Gender Difference Using Fisher-Rao Metric (SC, ERH), pp. 4308–4311.
ICPRICPR-2010-ChenNW #estimation #multi
Actual Midline Estimation from Brain CT Scan Using Multiple Regions Shape Matching (WC, KN, KW), pp. 2552–2555.
ICPRICPR-2010-ChoiMLSBPF #3d #multi #re-engineering
3D Face Reconstruction Using a Single or Multiple Views (JC, GGM, YL, LS, ORPB, MP, TCF), pp. 3959–3962.
ICPRICPR-2010-ChoPPKKALL #hybrid #segmentation
Level-Set Segmentation of Brain Tumors Using a New Hybrid Speed Function (WC, JP, SYP, SHK, SWK, GA, MEL, GL), pp. 1545–1548.
ICPRICPR-2010-ChoudhuryM #standard
Color Constancy Using Standard Deviation of Color Channels (AC, GGM), pp. 1722–1726.
ICPRICPR-2010-ChowdhuryCGR #graph #video
Cell Tracking in Video Microscopy Using Bipartite Graph Matching (ASC, RC, MG, NR), pp. 2456–2459.
ICPRICPR-2010-CiompiPR #approach #random
A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPRICPR-2010-ColemanSG #architecture #feature model
Coarse Scale Feature Extraction Using the Spiral Architecture Structure (SAC, BWS, BG), pp. 2370–2373.
ICPRICPR-2010-CoutinhoFF #identification #parsing
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
ICPRICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition
A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
ICPRICPR-2010-DaubneyX #3d #image #refinement
Estimating 3D Human Pose from Single Images Using Iterative Refinement of the Prior (BD, XX), pp. 3440–3443.
ICPRICPR-2010-DehzangiMCL #classification #fuzzy
Framewise Phone Classification Using Weighted Fuzzy Classification Rules (OD, BM, EC, HL), pp. 4186–4189.
ICPRICPR-2010-DickinsonHA #multi #video
Segmenting Video Foreground Using a Multi-Class MRF (PD, AH, KA), pp. 1848–1851.
ICPRICPR-2010-DornaikaC #classification #detection #performance
Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPRICPR-2010-DuboisPM #adaptation #analysis #component #composition
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-EkbalSG #feature model #multi #optimisation #recognition
Feature Selection Using Multiobjective Optimization for Named Entity Recognition (AE, SS, CSG), pp. 1937–1940.
ICPRICPR-2010-EklundAOYK #communication #interface #realtime
A Brain Computer Interface for Communication Using Real-Time fMRI (AE, MTA, HO, AY, HK), pp. 3665–3669.
ICPRICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation
A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPRICPR-2010-ErdoganG
Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors (HE, EMG), pp. 4573–4576.
ICPRICPR-2010-ErgulA #classification #topic
Scene Classification Using Spatial Pyramid of Latent Topics (EE, NA), pp. 3603–3606.
ICPRICPR-2010-FischerKFB #documentation #modelling #word
HMM-based Word Spotting in Handwritten Documents Using Subword Models (AF, AK, VF, HB), pp. 3416–3419.
ICPRICPR-2010-FleckD #image #invariant
Using Local Affine Invariants to Improve Image Matching (DF, ZD), pp. 1844–1847.
ICPRICPR-2010-FornesELV #classification
Symbol Classification Using Dynamic Aligned Shape Descriptor (AF, SE, JL, EV), pp. 1957–1960.
ICPRICPR-2010-FouheySB #detection #image #multi
Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPRICPR-2010-FraundorferWP #locality #mobile #visual notation #word
Combining Monocular and Stereo Cues for Mobile Robot Localization Using Visual Words (FF, CW, MP), pp. 3927–3930.
ICPRICPR-2010-FujitaHSTS #detection #image
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GajsekSM #canonical #correlation #multi #recognition
Multi-modal Emotion Recognition Using Canonical Correlations and Acoustic Features (RG, VS, FM), pp. 4133–4136.
ICPRICPR-2010-GhaeminiaSS #adaptation
Adaptive Motion Model for Human Tracking Using Particle Filter (MHG, AHS, SBS), pp. 2073–2076.
ICPRICPR-2010-Gonzalez-RubioC #multi #on the #string
On the Use of Median String for Multi-source Translation (JGR, FC), pp. 4328–4331.
ICPRICPR-2010-GrazziniDS #image #multi
Multichannel Image Regularisation Using Anisotropic Geodesic Filtering (JG, SED, PS), pp. 2664–2667.
ICPRICPR-2010-GriptonL #kernel #semistructured data
Kernel Domain Description with Incomplete Data: Using Instance-Specific Margins to Avoid Imputation (AG, WL), pp. 2921–2924.
ICPRICPR-2010-GuoBC #approach #learning
Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
ICPRICPR-2010-GuoH
Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks (JMG, CSH), pp. 1373–1376.
ICPRICPR-2010-GuoM #detection
Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPRICPR-2010-GuoMR #database #performance #recognition #scalability
Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
ICPRICPR-2010-HaberdarS #detection #framework #mobile #platform #refinement #video
Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPRICPR-2010-HafnerGLUVW #classification #image
Endoscopic Image Classification Using Edge-Based Features (MH, AG, ML, AU, AV, FW), pp. 2724–2727.
ICPRICPR-2010-HarirchiRMDG #algorithm #detection
Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPRICPR-2010-HassanAMHW #authentication #image #self
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPRICPR-2010-HassanCG #documentation #image #kernel #retrieval
Document Image Retrieval Using Feature Combination in Kernel Space (EH, SC, MG), pp. 2009–2012.
ICPRICPR-2010-HoriKY #generative #image #multi #sequence
Arbitrary Stereoscopic View Generation Using Multiple Omnidirectional Image Sequences (MH, MK, NY), pp. 286–289.
ICPRICPR-2010-Hotta #classification #visual notation #word
Scene Classification Using Local Co-occurrence Feature in Subspace Obtained by KPCA of Local Blob Visual Words (KH), pp. 4230–4233.
ICPRICPR-2010-HsinLLC #image
Image Inpainting Using Structure-Guided Priority Belief Propagation and Label Transformations (HFH, JJL, CSL, HYC), pp. 4492–4495.
ICPRICPR-2010-HuC #distance #retrieval #sketching #video
Motion-sketch Based Video Retrieval Using a Trellis Levenshtein Distance (RH, JPC), pp. 121–124.
ICPRICPR-2010-HuQHJT #recognition
Action Recognition Using Spatial-Temporal Context (QH, LQ, QH, SJ, QT), pp. 1521–1524.
ICPRICPR-2010-HuYLS #3d #locality #multi #novel
A Novel Facial Localization for Three-dimensional Face Using Multi-level Partition of Unity Implicits (YH, JY, WL, PS), pp. 682–685.
ICPRICPR-2010-IbrahimKKG #analysis #online #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-InoueSSF #feature model #modelling
High-Level Feature Extraction Using SIFT GMMs and Audio Models (NI, TS, KS, SF), pp. 3220–3223.
ICPRICPR-2010-IzadiS #automation #detection #image #segmentation
Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPRICPR-2010-JabidKC #classification #gender
Gender Classification Using Local Directional Pattern (LDP) (TJ, MHK, OC), pp. 2162–2165.
ICPRICPR-2010-JagerPCC #3d #analysis
Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPRICPR-2010-JakkojuKJ #classification #performance
Fast and Spatially-Smooth Terrain Classification Using Monocular Camera (CJ, KMK, CVJ), pp. 4060–4063.
ICPRICPR-2010-JammalamadakaJKM #matrix
Discriminative Basis Selection Using Non-negative Matrix Factorization (AJ, SJ, SK, BSM), pp. 1533–1536.
ICPRICPR-2010-JiaM #design
Classifying Textile Designs Using Bags of Shapes (WJ, SJM), pp. 294–297.
ICPRICPR-2010-Jiang #3d #re-engineering
3D Human Pose Reconstruction Using Millions of Exemplars (HJ), pp. 1674–1677.
ICPRICPR-2010-JiI #recognition
Using Moments on Spatiotemporal Plane for Facial Expression Recognition (YJ, KI), pp. 3806–3809.
ICPRICPR-2010-JoshiWL #semantics
Suggesting Songs for Media Creation Using Semantics (DJ, MDW, JL), pp. 3208–3211.
ICPRICPR-2010-KalafatlarY #3d #segmentation
3D Articulated Shape Segmentation Using Motion Information (EK, YY), pp. 3595–3598.
ICPRICPR-2010-KanetoNB #estimation #realtime
Real-Time User Position Estimation in Indoor Environments Using Digital Watermarking for Audio Signals (RK, YN, NB), pp. 97–100.
ICPRICPR-2010-KayaCC #design
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPRICPR-2010-KeustermansMVS #automation #identification #modelling
Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
ICPRICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-KhwajaAG #invariant #recognition #representation
Illumination and Expression Invariant Recognition Using SSIM Based Sparse Representation (AAK, AA, RG), pp. 4028–4031.
ICPRICPR-2010-KimL #markov #monte carlo #optimisation #random
Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
ICPRICPR-2010-KimYOC #optimisation #video
Recovery Video Stabilization Using MRF-MAP Optimization (SWK, KMY, SO, JYC), pp. 2804–2807.
ICPRICPR-2010-KitaW #clustering #image
Binarization of Color Characters in Scene Images Using k-means Clustering and Support Vector Machines (KK, TW), pp. 3183–3186.
ICPRICPR-2010-KohGC #locality #robust
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPRICPR-2010-KootstraBK #segmentation #symmetry
Using Symmetry to Select Fixation Points for Segmentation (GK, NB, DK), pp. 3894–3897.
ICPRICPR-2010-KrauszB #recognition
Action Recognition in Videos Using Nonnegative Tensor Factorization (BK, CB), pp. 1763–1766.
ICPRICPR-2010-KrishnanS #detection
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPRICPR-2010-KryszczukHS #orthogonal #predict
Direct Printability Prediction in VLSI Using Features from Orthogonal Transforms (KK, PH, RS), pp. 2764–2767.
ICPRICPR-2010-KumarCCAPH #classification #complexity
Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPRICPR-2010-KumeTSY #estimation #image #parametricity #video
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy (HK, TT, TS, NY), pp. 3923–3926.
ICPRICPR-2010-KusakunniranWZL #multi #recognition
Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron (WK, QW, JZ, HL), pp. 2186–2189.
ICPRICPR-2010-LawalAM #abduction #classification #network #recognition
Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPRICPR-2010-LeeCL #algorithm #data-driven #graph #markov #monte carlo
A Graph Matching Algorithm Using Data-Driven Markov Chain Monte Carlo Sampling (JL, MC, KML), pp. 2816–2819.
ICPRICPR-2010-LeeHH #automation #gender #recognition
Automatic Gender Recognition Using Fusion of Facial Strips (PHL, JYH, YPH), pp. 1140–1143.
ICPRICPR-2010-LeeP #information retrieval
Tracking Hand Rotation and Grasping from an IR Camera Using Cylindrical Manifold Embedding (CSL, SWP), pp. 2612–2615.
ICPRICPR-2010-Lei #distance #verification
Combining the Likelihood and the Kullback-Leibler Distance in Estimating the Universal Background Model for Speaker Verification Using SVM (ZL), pp. 4553–4556.
ICPRICPR-2010-Liao
Region Description Using Extended Local Ternary Patterns (WHL), pp. 1003–1006.
ICPRICPR-2010-LiGW #adaptation #image #reduction
Adaptive Enhancement with Speckle Reduction for SAR Images Using Mirror-Extended Curvelet and PSO (YL, HG, QW), pp. 4520–4523.
ICPRICPR-2010-LiIK #recognition #robust #word
Robust Face Recognition Using Block-Based Bag of Words (ZL, JiI, MK), pp. 1285–1288.
ICPRICPR-2010-LiLD #learning
Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
ICPRICPR-2010-LinW #detection #framework #platform
Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPRICPR-2010-LiuA #learning #semantics
Learning Scene Semantics Using Fiedler Embedding (JL, SA), pp. 3627–3630.
ICPRICPR-2010-LiuCLL #automation #locality #parametricity
A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPRICPR-2010-LiuLH #learning #multi #representation
Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPRICPR-2010-LiuR
Estimating Nonrigid Shape Deformation Using Moments (WL, ER), pp. 185–188.
ICPRICPR-2010-LiuS #similarity #visual notation
Visual Tracking Using Sparsity Induced Similarity (HL, FS), pp. 1702–1705.
ICPRICPR-2010-LiuWWY #adaptation #linear
Pan-Sharpening Using an Adaptive Linear Model (LL, YW, YW, HY), pp. 4512–4515.
ICPRICPR-2010-LiZ
One-Shot Scanning Using a Color Stripe Pattern (RL, HZ), pp. 1666–1669.
ICPRICPR-2010-LiZZ #detection #invariant
Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPRICPR-2010-LlobetCPA #finite #transducer
OCR Post-processing Using Weighted Finite-State Transducers (RL, JRCN, JCPC, JA), pp. 2021–2024.
ICPRICPR-2010-LutfYL #identification
Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
ICPRICPR-2010-LvBYD #verification #visual notation
Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPRICPR-2010-Machucho-CadenaB #3d #algebra #geometry #re-engineering
3D Reconstruction of Tumors for Applications in Laparoscopy Using Conformal Geometric Algebra (RMC, EBC), pp. 2532–2535.
ICPRICPR-2010-MalgireddyCSGM #framework #gesture #modelling #recognition
A Framework for Hand Gesture Recognition and Spotting Using Sub-gesture Modeling (MRM, JJC, SS, VG, DM), pp. 3780–3783.
ICPRICPR-2010-MansouriAT #video
MPEG-2 Video Watermarking Using Pattern Consideration (AM, AMA, FTA), pp. 2428–2431.
ICPRICPR-2010-MatsukawaK #recognition
Action Recognition Using Three-Way Cross-Correlations Feature of Local Moton Attributes (TM, TK), pp. 1731–1734.
ICPRICPR-2010-MaTW #analysis #random
Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPRICPR-2010-MehmoodN #detection #kernel
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPRICPR-2010-MonzoAAM #case study #comparative #locality #recognition
A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPRICPR-2010-MoriMY #recognition
Gait Recognition Using Period-Based Phase Synchronization for Low Frame-Rate Videos (AM, YM, YY), pp. 2194–2197.
ICPRICPR-2010-MoroTU #detection
Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPRICPR-2010-MozaffariBA #classification #gender #geometry #image
Gender Classification Using Single Frontal Image Per Person: Combination of Appearance and Geometric Based Features (SM, HB, RA), pp. 1192–1195.
ICPRICPR-2010-NacereddineTZH #image #retrieval
Shape-Based Image Retrieval Using a New Descriptor Based on the Radon and Wavelet Transforms (NN, ST, DZ, LH), pp. 1997–2000.
ICPRICPR-2010-NasonovK #performance
Fast Super-Resolution Using Weighted Median Filtering (AVN, ASK), pp. 2230–2233.
ICPRICPR-2010-NishidaKOH #algorithm #visual notation
Visual Tracking Algorithm Using Pixel-Pair Feature (KN, TK, YO, MH), pp. 1808–1811.
ICPRICPR-2010-NordbergZ #2d #geometry #image #multi #segmentation
Multibody Motion Segmentation Using the Geometry of 6 Points in 2D Images (KN, VZ), pp. 1783–1787.
ICPRICPR-2010-NymanHA #constraints #framework #multi #platform
Multi-camera Platform Calibration Using Multi-linear Constraints (PN, AH, ), pp. 53–56.
ICPRICPR-2010-OhH #learning #process #video
Unsupervised Learning of Activities in Video Using Scene Context (SO, AH), pp. 3579–3582.
ICPRICPR-2010-OliverTLM #automation #segmentation #set
Automatic Diagnosis of Masses by Using Level set Segmentation and Shape Description (AO, AT, XL, JM), pp. 2528–2531.
ICPRICPR-2010-OzdemirA #classification #image #representation
Image Classification Using Subgraph Histogram Representation (, SA), pp. 1112–1115.
ICPRICPR-2010-PaivaJT #analysis #image
Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPRICPR-2010-PaivaT #detection #image
Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPRICPR-2010-PanMSHN #adaptation #estimation #video
A Dual Pass Video Stabilization System Using Iterative Motion Estimation and Adaptive Motion Smoothing (PP, AM, JS, YH, SN), pp. 2298–2301.
ICPRICPR-2010-PapalazarouRW #detection #estimation #image #multi
Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPRICPR-2010-PapariCP #detection #novel
Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPRICPR-2010-ParkKS #detection #markov #modelling #recognition #visual notation
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPRICPR-2010-PatrauceanGC #identification #invariant
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-PaulaOBS #recognition
Forest Species Recognition Using Color-Based Features (PLdP, LSO, AdSBJ, RS), pp. 4178–4181.
ICPRICPR-2010-PengSGS #classification #documentation
Text Separation from Mixed Documents Using a Tree-Structured Classifier (XP, SS, VG, RS), pp. 241–244.
ICPRICPR-2010-PengYZC #classification #segmentation
Retinal Blood Vessels Segmentation Using the Radial Projection and Supervised Classification (QP, XY, LZ, YmC), pp. 1489–1492.
ICPRICPR-2010-PhamTN #bound #segmentation #similarity
Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPRICPR-2010-PiroonratanaWUALC #identification #morphism #nondeterminism #ranking #symmetry
Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
ICPRICPR-2010-PlumptonKLJ #classification #linear #online
On-Line fMRI Data Classification Using Linear and Ensemble Classifiers (COP, LIK, DEJL, SJJ), pp. 4312–4315.
ICPRICPR-2010-PrumVO #online #recognition #word
On-Line Handwriting Word Recognition Using a Bi-character Model (SP, MV, JMO), pp. 2700–2703.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-QuelhasMC #3d #quantifier
3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter (PQ, AMM, ACC), pp. 2508–2511.
ICPRICPR-2010-QuWL #difference #image #recognition
Action Recognition Using Space-Time Shape Difference Images (HQ, LW, CL), pp. 3661–3664.
ICPRICPR-2010-RahtuSH #random
Compressing Sparse Feature Vectors Using Random Ortho-Projections (ER, MS, JH), pp. 1397–1400.
ICPRICPR-2010-RantosonSFM #3d #metric
Non Contact 3D Measurement Scheme for Transparent Objects Using UV Structured light (RR, CS, DF, FM), pp. 1646–1649.
ICPRICPR-2010-RaraAESF #re-engineering #recognition
Face Recognition at-a-Distance Using Texture, Dense- and Sparse-Stereo Reconstruction (HMR, AMA, SYE, TLS, AAF), pp. 1221–1224.
ICPRICPR-2010-ReckyL #detection
Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPRICPR-2010-RoyM #video
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (AR, SM), pp. 4504–4507.
ICPRICPR-2010-RoySB #game studies #image #segmentation
Segmentation of Unideal Iris Images Using Game Theory (KR, CYS, PB), pp. 2844–2847.
ICPRICPR-2010-SadekAMS #automation #realtime #recognition
Real-Time Automatic Traffic Accident Recognition Using HFG (SS, AAH, BM, US), pp. 3348–3351.
ICPRICPR-2010-SagheerHNS #recognition #word
Holistic Urdu Handwritten Word Recognition Using Support Vector Machine (MWS, CLH, NN, CYS), pp. 1900–1903.
ICPRICPR-2010-SanromaAS #approach #graph
A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
ICPRICPR-2010-SantoshWL #visual notation
Using Spatial Relations for Graphical Symbol Description (KCS, LW, BL), pp. 2041–2044.
ICPRICPR-2010-SarginGMR
Object Tracking with Ratio Cycles Using Shape and Appearance Cues (MES, PG, BSM, KR), pp. 3649–3652.
ICPRICPR-2010-SatakeM #multi
Stereo-Based Multi-person Tracking Using Overlapping Silhouette Templates (JS, JM), pp. 4304–4307.
ICPRICPR-2010-ScharfenbergerCF #artificial reality #predict
Driver Body-Height Prediction for an Ergonomically Optimized Ingress Using a Single Omnidirectional Camera (CS, SC, GF), pp. 298–301.
ICPRICPR-2010-SenechalBP #automation #detection
Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPRICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition
Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPRICPR-2010-SeppkeDH #detection #energy #image #symmetry
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPRICPR-2010-SeppkeDHW #equation #multi #parametricity #performance
Fast Derivation of Soil Surface Roughness Parameters Using Multi-band SAR Imagery and the Integral Equation Model (BS, LSDF, JAH, FW), pp. 3931–3934.
ICPRICPR-2010-SfikasHN #analysis #clustering #multi
Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPRICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPRICPR-2010-ShiSG #documentation #image
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile (ZS, SS, VG), pp. 1916–1919.
ICPRICPR-2010-ShobeirinejadG #classification #gender
Gender Classification Using Interlaced Derivative Patterns (AS, YG), pp. 1509–1512.
ICPRICPR-2010-SilveiraM #image
Boosting Alzheimer Disease Diagnosis Using PET Images (MS, JSM), pp. 2556–2559.
ICPRICPR-2010-Simsekli #automation #classification #music
Automatic Music Genre Classification Using Bass Lines (US), pp. 4137–4140.
ICPRICPR-2010-SirmacekU #detection #network
Road Network Extraction Using Edge Detection and Spatial Voting (BS, ), pp. 3113–3116.
ICPRICPR-2010-SmeetsFHVS #3d #approach #composition #invariant #modelling #recognition
Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
ICPRICPR-2010-SoldeaESU #approach #image #segmentation
Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, , AE, MGU, ZF, MC), pp. 2592–2595.
ICPRICPR-2010-SoltanaACA #adaptation #algorithm #search-based
Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
ICPRICPR-2010-SrikrishnanC #analysis #linear
Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPRICPR-2010-StarkWP #representation #speech
Single Channel Speech Separation Using Source-Filter Representation (MS, MW, FP), pp. 826–829.
ICPRICPR-2010-SteerAM #data fusion #recognition
Audio-Visual Data Fusion Using a Particle Filter in the Application of Face Recognition (MAS, AAH, BM), pp. 4392–4395.
ICPRICPR-2010-SulicPKK #distributed #random #reduction
Dimensionality Reduction for Distributed Vision Systems Using Random Projection (VS, JP, MK, SK), pp. 380–383.
ICPRICPR-2010-SultaniC #detection
Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPRICPR-2010-SuryanarayanSM #recognition
Dynamic Hand Pose Recognition Using Depth Data (PS, AS, DM), pp. 3105–3108.
ICPRICPR-2010-SuzukiIAT #algorithm #estimation #image
A Scale Estimation Algorithm Using Phase-Based Correspondence Matching for Electron Microscope Images (AS, KI, TA, RT), pp. 2420–2423.
ICPRICPR-2010-SzeptyckiACZGS #2d #composition
Partial Face Biometry Using Shape Decomposition on 2D Conformal Maps of Faces (PS, MA, LC, WZ, XDG, DS), pp. 1505–1508.
ICPRICPR-2010-TabiaCDV #3d #retrieval
3D-Shape Retrieval Using Curves and HMM (HT, OC, MD, JPV), pp. 3147–3150.
ICPRICPR-2010-Tagawa #eye tracking #modelling #statistics
Depth Perception Model Based on Fixational Eye Movements Using Bayesian Statistical Inference (NT), pp. 1662–1665.
ICPRICPR-2010-TangHLL #retrieval
A Person Retrieval Solution Using Finger Vein Patterns (DT, BH, RL, WL), pp. 1306–1309.
ICPRICPR-2010-TanveerI #approach
A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
ICPRICPR-2010-TaxHVP #clustering #concept #detection #learning #multi
The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPRICPR-2010-TekeT #image #multi #strict
Multi-spectral Satellite Image Registration Using Scale-Restricted SURF (MT, AT), pp. 2310–2313.
ICPRICPR-2010-ThiCZWS #modelling #recognition
Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPRICPR-2010-TorrentPLFSMP #approach #detection
Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPRICPR-2010-TrummerMD #online #optimisation
Online Next-Best-View Planning for Accuracy Optimization Using an Extended E-Criterion (MT, CM, JD), pp. 1642–1645.
ICPRICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability
Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPRICPR-2010-TumaIP #classification #kernel #set
Hydroacoustic Signal Classification Using Kernel Functions for Variable Feature Sets (MT, CI, MP), pp. 1011–1014.
ICPRICPR-2010-TurkerKG #classification #image #network
Classification of Polarimetric SAR Images Using Evolutionary RBF Networks (TI, SK, MG), pp. 4324–4327.
ICPRICPR-2010-UbukataTMU #multi #segmentation
Multi-object Segmentation in a Projection Plane Using Subtraction Stereo (TU, KT, AM, KU), pp. 3296–3299.
ICPRICPR-2010-Velasco-ForeroA #modelling #statistics
Statistical Shape Modeling Using Morphological Representations (SVF, JA), pp. 3537–3540.
ICPRICPR-2010-VenkateshaT #process #recognition
Human Activity Recognition Using Local Shape Descriptors (SV, MT), pp. 3704–3707.
ICPRICPR-2010-VenkateshJ
Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
ICPRICPR-2010-VenkateshKM #3d #approach #recognition
Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
ICPRICPR-2010-Wang #detection #documentation #recognition
Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPRICPR-2010-WangAYL #bottom-up #estimation #learning #top-down
Combined Top-Down/Bottom-Up Human Articulated Pose Estimation Using AdaBoost Learning (SW, HA, TY, SL), pp. 3670–3673.
ICPRICPR-2010-WangC10a #3d #estimation
Articulated Human Body: 3D Pose Estimation Using a Single Camera (ZW, RC), pp. 3768–3771.
ICPRICPR-2010-WangH #multi #random #recognition
Cancelable Face Recognition Using Random Multiplicative Transform (YW, DH), pp. 1261–1264.
ICPRICPR-2010-WangH10a #case study #classification #design #multi #prototype
A Study of Designing Compact Recognizers of Handwritten Chinese Characters Using Multiple-Prototype Based Classifiers (YW, QH), pp. 1872–1875.
ICPRICPR-2010-WangJMS #process
Decoding Finger Flexion from Electrocorticographic Signals Using a Sparse Gaussian Process (ZW, QJ, KJM, GS), pp. 3756–3759.
ICPRICPR-2010-WangLL #3d #linear #programming
Monocular 3D Tracking of Deformable Surfaces Using Linear Programming (CW, XL, YL), pp. 1710–1713.
ICPRICPR-2010-WangLS #documentation #identification
Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
ICPRICPR-2010-WangM #learning #order #process
Gaussian Process Learning from Order Relationships Using Expectation Propagation (RW, SJM), pp. 605–608.
ICPRICPR-2010-WangSLYB #classification
Shape Classification Using Tree -Unions (BW, WS, WL, XY, XB), pp. 983–986.
ICPRICPR-2010-WartakB #estimation
Optical Flow Estimation Using Diffusion Distances (SW, AGB), pp. 189–192.
ICPRICPR-2010-WatanabeNKI #estimation
Estimation of Non-rigid Surface Deformation Using Developable Surface Model (YW, TN, TK, MI), pp. 197–200.
ICPRICPR-2010-WijnhovenW #detection #performance #probability
Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPRICPR-2010-WuHCCT #detection #interactive #visual notation
Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPRICPR-2010-WuLW #image #learning #retrieval
Enhancing SVM Active Learning for Image Retrieval Using Semi-supervised Bias-Ensemble (JW, ML, CLW), pp. 3175–3178.
ICPRICPR-2010-XiaLH #mining #modelling
Mining Exemplars for Object Modelling Using Affinity Propagation (SX, JL, ERH), pp. 918–921.
ICPRICPR-2010-Xie #segmentation #set
Level Set Based Segmentation Using Local Feature Distribution (XX), pp. 2780–2783.
ICPRICPR-2010-XuHW #similarity
Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding (WX, ERH, RCW), pp. 3324–3327.
ICPRICPR-2010-YaegashiY #kernel #learning #multi #recognition
Geotagged Photo Recognition Using Corresponding Aerial Photos with Multiple Kernel Learning (KY, KY), pp. 3272–3275.
ICPRICPR-2010-YamanakaSS #adaptation #image
Adaptive Image Projection onto Non-planar Screen Using Projector-Camera Systems (TY, FS, JS), pp. 307–310.
ICPRICPR-2010-YamauchiBS #3d #modelling
3D Human Body Modeling Using Range Data (KY, BB, HS), pp. 3476–3479.
ICPRICPR-2010-YangSZ #analysis #multi #recognition
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-YoonK #recognition
Human Action Recognition Using Segmented Skeletal Features (SMY, AK), pp. 3740–3743.
ICPRICPR-2010-ZareG #multi #pattern matching #pattern recognition #recognition
Pattern Recognition Using Functions of Multiple Instances (AZ, PDG), pp. 1092–1095.
ICPRICPR-2010-ZhangGC #detection #invariant
Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPRICPR-2010-ZhangHTW #3d #evaluation #framework #modelling
3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
ICPRICPR-2010-ZhangK10a #detection #graph
Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPRICPR-2010-ZhangSSQ #keyword
Improved Mandarin Keyword Spotting Using Confusion Garbage Model (SZ, ZS, QS, YQ), pp. 3700–3703.
ICPRICPR-2010-ZhangWB #classification
Age Classification Base on Gait Using HMM (DZ, YW, BB), pp. 3834–3837.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
ICPRICPR-2010-ZhangZZZ #classification #kernel #metric
Time Series Classification Using Support Vector Machine with Gaussian Elastic Metric Kernel (DZ, WZ, DZ, HZ), pp. 29–32.
ICPRICPR-2010-ZhouK #identification #image #locality
Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
ICPRICPR-2010-ZhouWH #2d #3d #realtime
Real-Time 3D Face and Facial Action Tracking Using Extended 2D+3D AAMs (MZ, YW, XH), pp. 3963–3966.
ICPRICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition
Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
ICPRICPR-2010-ZouH #3d #performance
Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
ICPRICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence
Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
KDDKDD-2010-AbeMPRJTBACKDG #learning #optimisation
Optimizing debt collections using constrained reinforcement learning (NA, PM, CP, CKR, DLJ, VPT, JJB, GFA, BRC, MK, MD, TG), pp. 75–84.
KDDKDD-2010-ChuaL #generative #modelling #network #online #rating #trust
Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KDDKDD-2010-LiuMTLL #learning #metric #optimisation
Semi-supervised sparse metric learning using alternating linearization optimization (WL, SM, DT, JL, PL), pp. 1139–1148.
KDDKDD-2010-MaxwellBR #graph #memory management #mining
Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
KDDKDD-2010-PrestonBKSF #clustering #constraints
Redefining class definitions using constraint-based clustering: an application to remote sensing of the earth’s surface (DP, CEB, RK, DSM, MAF), pp. 823–832.
KDDKDD-2010-RothBDFHLLMM #graph #social
Suggesting friends using the implicit social graph (MR, ABD, DD, GF, IH, AL, NL, YM, RM), pp. 233–242.
KDDKDD-2010-SatoN #modelling #process #topic
Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
KDDKDD-2010-YangO #feature model #predict #probability
Feature selection for support vector regression using probabilistic prediction (JBY, CJO), pp. 343–352.
KDDKDD-2010-YeLCJ #automation #categorisation #clustering
Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KDIRKDIR-2010-BallesterosBG #dependence #parsing
Text Simplification using Dependency Parsing for Spanish (MB, SB, PG), pp. 330–335.
KDIRKDIR-2010-BallesterosHFG #dependence #parsing
Giving Shape to an N-version Dependency Parser — Improving Dependency Parsing Accuracy for Spanish using Maltparser (MB, JH, VF, PG), pp. 336–341.
KDIRKDIR-2010-Bernard #formal method #modelling #reuse
Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
KDIRKDIR-2010-CamposMO #random #recognition
Recognition of Gene/Protein Names using Conditional Random Fields (DC, SM, JLO), pp. 275–280.
KDIRKDIR-2010-Ghosh #locality #mining #modelling #multi #predict #scalability
Actionable Mining of Large, Multi-relational Data using Localized Predictive Models (JG), pp. 9–10.
KDIRKDIR-2010-HelouA #metric #multi #semantics
Semantic Measures based on Wordnet using Multiple Information Sources (MAH, AA), pp. 500–503.
KDIRKDIR-2010-JedrzejczakW #generative #query
Integrated Candidate Generation in Processing Batches of Frequent Itemset Queries using Apriori (PJ, MW), pp. 487–490.
KDIRKDIR-2010-KrainesGHMT #generative
Generating Literature-based Knowledge Discoveries in Life Sciences using Relationship Associations (SBK, WG, DH, HM, TT), pp. 35–44.
KDIRKDIR-2010-MollerEDS #automation #ontology #recognition
Automatic Spatial Plausibility Checks for Medical Object Recognition Results using a Spatio-anatomical Ontology (MM, PE, AD, DS), pp. 5–13.
KDIRKDIR-2010-Studer #lightweight #modelling #process #semantics #web
Process-oriented Semantic Web Search — Using Lightweight Semantic Models for Supporting the Search Process (RS), p. 7.
KDIRKDIR-2010-TsengPF #classification #markov
The Typhoon Track Classification using Tri-plots and Markov Chain (JCHT, HKKP, CF), pp. 364–369.
KDIRKDIR-2010-ZhangUC #information management
A Comprehensive Solution to Procedural Knowledge Acquisition using Information Extraction (ZZ, VSU, FC), pp. 432–437.
KEODKEOD-2010-CasasCC #fibonacci #modelling #representation #specification #towards
Towards a Representation of Enviromental Models using Specification and Description Language — From the Fibonacci Model to a Wildfire Model (PFiC, MC, JC), pp. 343–346.
KEODKEOD-2010-ChatterjeeB #documentation #network #random #summary
Single Document Text Summarization using Random Indexing and Neural Networks (NC, AB), pp. 171–176.
KEODKEOD-2010-ChatterjeeKRD #automation #classification #email #ontology
Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
KEODKEOD-2010-EynardMM #analysis #on the #ontology
On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KEODKEOD-2010-KamelR #ontology #parallel
Ontology Building using Parallel Enumerative Structures (MK, BR), pp. 276–281.
KEODKEOD-2010-NairM #multi #network
Informledge System — A Modified Knowledge Network with Autonomous Nodes using Multi-lateral Links (TRGN, MM), pp. 351–354.
KEODKEOD-2010-TiwariAMK #mobile #web #web service
Dynamic Discovery of Web Services using Mobile Agents (GT, RA, SM, DSK), pp. 497–500.
KEODKEOD-2010-ValienteRV #modelling #owl #semantics
Defining the Semantics of It Service Management Models using OWL and SWRL (MCV, DR, CVC), pp. 378–381.
KEODKEOD-2010-YunSNYKK #framework #platform #semantics #web #workflow
Improving the Workflow of Semantic Web Portals using M/R in Cloud Platform (SY, MS, HN, SKY, HK, HGK), pp. 485–488.
KEODKEOD-2010-ZakraouiZ #interactive #programming #set #web
Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
KMISKMIS-2010-BornerL #enterprise
Using Role-plays to Acquire Process-oriented Knowledge in Enterprises (RB, ML), pp. 149–156.
KMISKMIS-2010-BrockV #analysis #data flow #semantics
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation
Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMISKMIS-2010-KrainesG #ontology #reuse #semantics
Supporting Reuse of Knowledge of Failures through Ontology-based Semantic Search (SBK, WG), pp. 164–169.
KMISKMIS-2010-SrivastavaS #composition #game studies #validation
The Validation of a Dynamic Service Composition Model using a Simple Game (AS, PGS), pp. 260–266.
RecSysRecSys-2010-HannonBS #collaboration #recommendation #twitter
Recommending twitter users to follow using content and collaborative filtering approaches (JH, MB, BS), pp. 199–206.
RecSysRecSys-2010-LeeB #collaboration #process #recommendation #self
Using self-defined group activities for improvingrecommendations in collaborative tagging systems (DHL, PB), pp. 221–224.
RecSysRecSys-2010-VasukiNLD #network #recommendation
Affiliation recommendation using auxiliary networks (VV, NN, ZL, ISD), pp. 103–110.
SEKESEKE-2010-ArrudaCD #detection #framework
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-FagundesS #estimation #fault
Software Defect Estimation using Support Vector Regression (RAdAF, RMCRdS), pp. 265–268.
SEKESEKE-2010-JuniorLAMW #impact analysis #learning #multi
Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
SEKESEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering
Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
SEKESEKE-2010-KhounSiavashB #metric #ontology #semantics
Using the whole structure of ontology for semantic relatedness measurement (EK, ABD), pp. 79–83.
SEKESEKE-2010-MarcaciniR #clustering #incremental #topic
Incremental Construction of Topic Hierarchies using Hierarchical Term Clustering (RMM, SOR), p. 553.
SEKESEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKESEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning
A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
SEKESEKE-2010-Radlinski #development #predict #quality
Software Development Effort and Quality Prediction Using Bayesian Nets and small Local Qualitative Data (LR), pp. 113–116.
SEKESEKE-2010-RodriguesVZ #automation #modelling #product line #testing
PLeTs-Test Automation using Software Product Lines and Model Based Testing (EdMR, LDV, AFZ), pp. 483–488.
SEKESEKE-2010-ShewchukG #experience #functional #maintenance #testing #user interface
Experience with Maintenance of a Functional GUI Test Suite using IBM Rational Functional Tester (YS, VG), pp. 489–494.
SEKESEKE-2010-VilaMF #adaptation #analysis #qvt #strict
Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKESEKE-2010-Wang #black box #parametricity #testing
Reducing Black-box Test Suite Using Input Parameter Relationships (LW), pp. 180–185.
SEKESEKE-2010-XuanJRYL #automation #classification #debugging
Automatic Bug Triage using Semi-Supervised Text Classification (JX, HJ, ZR, JY, ZL), pp. 209–214.
SIGIRSIGIR-2010-ChandarC
Diversification of search results using webgraphs (PC, BC), pp. 869–870.
SIGIRSIGIR-2010-ClementsSVR #behaviour #predict
Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
SIGIRSIGIR-2010-DuZYCC #query #recognition
Using search session context for named entity recognition in query (JD, ZZ, JY, YC, ZC), pp. 765–766.
SIGIRSIGIR-2010-GaoCWZ #learning #rank
Learning to rank only using training data from related domain (WG, PC, KFW, AZ), pp. 162–169.
SIGIRSIGIR-2010-GoharianM #classification #query
Context aware query classification using dynamic query window and relationship net (NG, SSRM), pp. 723–724.
SIGIRSIGIR-2010-KimC #documentation #multi #ranking
Ranking using multiple document types in desktop search (JK, WBC), pp. 50–57.
SIGIRSIGIR-2010-LeeLSR #precise #retrieval #sentiment
High precision opinion retrieval using sentiment-relevance flows (SWL, JTL, YIS, HCR), pp. 817–818.
SIGIRSIGIR-2010-LopesR #health #information retrieval #precise
Using local precision to compare search engines in consumer health information retrieval (CTL, CR), pp. 835–836.
SIGIRSIGIR-2010-MeijR #modelling #query #wiki
Supervised query modeling using wikipedia (EM, MdR), pp. 875–876.
SIGIRSIGIR-2010-MerhavMBYF #recognition #relational
Incorporating global information into named entity recognition systems using relational context (YM, FdSM, DB, WGY, OF), pp. 883–884.
SIGIRSIGIR-2010-MojdehC #consistency #learning
Semi-supervised spam filtering using aggressive consistency learning (MM, GVC), pp. 751–752.
SIGIRSIGIR-2010-RothK #modelling #retrieval
Cross-language retrieval using link-based language models (BR, DK), pp. 773–774.
SIGIRSIGIR-2010-ShtokKC #modelling #predict #statistics
Using statistical decision theory and relevance models for query-performance prediction (AS, OK, DC), pp. 259–266.
SIGIRSIGIR-2010-WhiteC
Exploring the use of labels to shortcut search trails (RWW, RC), pp. 811–812.
SIGIRSIGIR-2010-WooLLSR #ranking #retrieval
Achieving high accuracy retrieval using intra-document term ranking (HWW, JTL, SWL, YIS, HCR), pp. 885–886.
SIGIRSIGIR-2010-YiLWR #video
Contextual video advertising system using scene information inferred from video scripts (BJY, JTL, HWW, HCR), pp. 771–772.
SIGIRSIGIR-2010-YinHZL #approach #modelling #wiki
A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
SIGIRSIGIR-2010-ZhangWL #interactive #multi #named #summary #visualisation
VisualSum: an interactive multi-document summarization system using visualization (YZ, DW, TL), pp. 857–858.
ECMFAECMFA-2010-JohannesF #abstraction #composition #framework #modelling #network #reuse
Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework (JJ, MAF), pp. 132–143.
ECMFAECMFA-2010-KessentiniBSB #diagrams #heuristic #petri net #sequence chart
Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search (MK, AB, HAS, MB), pp. 156–172.
MODELSMoDELS-v1-2010-KolovosRAPPB #emf #model transformation
Taming EMF and GMF Using Model Transformation (DSK, LMR, SbA, RFP, FACP, GB), pp. 211–225.
MODELSMoDELS-v1-2010-NoyritGTS #consistency #modelling #multi #uml
Consistent Modeling Using Multiple UML Profiles (FN, SG, FT, BS), pp. 392–406.
MODELSMoDELS-v2-2010-GerthKLE #detection #precise #process
Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MODELSMoDELS-v2-2010-LanoR #model transformation #modelling #slicing #uml
Slicing of UML Models Using Model Transformations (KL, SKR), pp. 228–242.
MODELSMoDELS-v2-2010-LoniewskiIA #development #modelling #overview #requirements
A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
SPLCSPLC-2010-Elizondo #composition #development
Using Composition Connectors to Support Software Asset Development (PVE), pp. 496–497.
SPLCSPLC-2010-GadelhaCGCFL #approach #component #product line
An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
SPLCSPLC-2010-GhanamM #execution #feature model #modelling #testing
Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
SPLCSPLC-2010-HartmannKMRTY #component #integration
Using MDA for Integration of Heterogeneous Components in Software Supply Chains (HH, MK, AAJM, JR, TT, TYH), pp. 361–376.
ECOOPECOOP-2010-DhooliaMSS #debugging
Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
ECOOPECOOP-2010-GilL #java #source code
The Use of Overloading in Java Programs (JYG, KL), pp. 529–551.
ECOOPECOOP-2010-ZaeemK #alloy #contract #data type
Contract-Based Data Structure Repair Using Alloy (RNZ, SK), pp. 577–598.
OOPSLAOOPSLA-2010-Kell #adaptation #assembly #component #interface
Component adaptation and assembly using interface relations (SK), pp. 322–340.
OOPSLAOOPSLA-2010-LernerVG #aspect-oriented #javascript
Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
AdaEuropeAdaEurope-2010-AnderssonP #ada #algorithm #implementation #manycore #realtime #scheduling
Implementing Multicore Real-Time Scheduling Algorithms Based on Task Splitting Using Ada 2012 (BA, LMP), pp. 54–67.
AdaEuropeAdaEurope-2010-PastorASA #approach #modelling #realtime #sequence #towards
Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, ), pp. 167–180.
AdaEuropeAdaEurope-2010-White #ada #hardware #scheduling
Using Hardware Support for Scheduling with Ada (RW), pp. 125–138.
LOPSTRLOPSTR-2010-VoetsS #analysis #logic programming #source code
Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PADLPADL-2010-DieterleHL #composition
Skeleton Composition Using Remote Data (MD, TH, RL), pp. 73–87.
PEPMPEPM-2010-Henglein #algebra #equivalence #lazy evaluation #optimisation #relational
Optimizing relational algebra operations using generic equivalence discriminators and lazy products (FH), pp. 73–82.
PEPMPEPM-2010-HofmannK #detection #morphism #problem #towards
I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDIPLDI-2010-BaekC #approximate #energy #framework #named #programming
Green: a framework for supporting energy-conscious programming using controlled approximation (WB, TMC), pp. 198–209.
PLDIPLDI-2010-WestbrookRIYAT #java #multi #named #programming
Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
POPLPOPL-2010-DiasR #automation #declarative #generative
Automatically generating instruction selectors using declarative machine descriptions (JD, NR), pp. 403–416.
PPDPPPDP-2010-BrabrandT #ambiguity #pattern matching #regular expression #string
Typed and unambiguous pattern matching on strings using regular expressions (CB, JGT), pp. 243–254.
QAPLQAPL-2010-AltisenLM #automaton #calculus #component #evaluation #interface #performance #realtime
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata (KA, YL, MM), pp. 16–33.
SASSAS-2010-BrauerK #abstraction #automation
Automatic Abstraction for Intervals Using Boolean Formulae (JB, AK), pp. 167–183.
SASSAS-2010-Lesens #question #static analysis #why
Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
AdaSIGAda-2010-BradleyPZ #ada #development #realtime
Real-time system development in ada using LEGO® mindstorms® NXT (PJB, JAdlP, JZ), pp. 37–40.
AdaSIGAda-2010-JemliR #compilation #problem #static analysis
A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
AdaSIGAda-2010-Pettit #ada #concurrent #design #embedded #realtime #uml
Designing real-time, concurrent, and embedded software systems using UML and Ada (RGPI), pp. 7–8.
AdaSIGAda-2010-Rosen #object-oriented #reliability
Use of object oriented technologies in high reliability system (JPR), pp. 3–4.
RERE-2010-BittnerRGW #multi #requirements
Manufacturer-Supplier Requirements Synchronization Using Exchange Containers and Multi-Level Systems (MB, MOR, HG, MW), pp. 325–330.
RERE-2010-ClementsB #architecture
Using Business Goals to Inform a Software Architecture (PCC, LB), pp. 69–78.
RERE-2010-LockerbieBMBE #analysis #concept #modelling #simulation
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RERE-2010-SalinesiMDD #constraints #integer #requirements #reuse #theorem proving
Using Integer Constraint Solving in Reuse Based Requirements Engineering (CS, RM, DD, OD), pp. 243–251.
RERE-2010-SawahMR #elicitation #modelling #overview #perspective #requirements
Using Cognitive Mapping to Elicit Modelling Requirements: An Overview (SES, AM, MR), pp. 357–363.
RERE-2010-SeyffGG #information management
Using Contextual Information to Guide on-site Analysts (NS, FG, PG), pp. 397–398.
RERE-2010-SeyffGM #mobile #tool support
Using Mobile RE Tools to Give End-Users Their Own Voice (NS, FG, NAMM), pp. 37–46.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RERE-2010-WnukCR #reduction #requirements #towards
Guiding Requirements Scoping Using ROI: Towards Agility, Openness and Waste Reduction (KW, DC, BR), pp. 409–410.
REFSQREFSQ-2010-ProynovaPWW #perspective #requirements #research
Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
ASEASE-2010-KimYS #debugging #memory management #model checking #named
JRF-E: using model checking to give advice on eliminating memory model-related bugs (KK, TYK, BAS), pp. 215–224.
ASEASE-2010-NgocO #fault
Checking roundoff errors using counterexample-guided narrowing (DTBN, MO), pp. 301–304.
ASEASE-2010-RatanotayanonCS #feature model #transitive
Using transitive changesets to support feature location (SR, HJC, SES), pp. 341–344.
ASEASE-2010-ShangAH #case study #experience #mining #pipes and filters #repository #scalability #tool support
An experience report on scaling tools for mining software repositories using MapReduce (WS, BA, AEH), pp. 275–284.
ASEASE-2010-TrezentosLO #dependence #named #optimisation #problem #pseudo
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization (PT, IL, ALO), pp. 427–436.
FSEFSE-2010-ErnstA #type system
Building and using pluggable type systems (MDE, MA), pp. 375–376.
FSEFSE-2010-HalleB #analysis #interactive #message passing
Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSEFSE-2010-KanadeARR #dependence #representation #testing
Representation dependence testing using program inversion (AK, RA, SKR, GR), pp. 277–286.
FSEFSE-2010-MyersS #dynamic analysis #ide #user interface
Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
FSEFSE-2010-Shokry #behaviour #synthesis #towards
Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
ICSEICSE-2010-AdamsJH #identification
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-FritzM #developer
Using information fragments to answer the questions developers ask (TF, GCM), pp. 175–184.
ICSEICSE-2010-GorschekTA #concept #empirical #object-oriented #scalability
A large-scale empirical study of practitioners’ use of object-oriented concepts (TG, EDT, LA), pp. 115–124.
ICSEICSE-2010-JilaniMLGM #invariant
Using invariant functions and invariant relations to compute loop functions (LLJ, OM, AL, WG, AM), pp. 317–318.
ICSEICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference
Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
ICSEICSE-2010-LewisW #fault #monitoring #runtime
Runtime repair of software faults using event-driven monitoring (CL, JW), pp. 275–280.
ICSEICSE-2010-LimQF #named #network #scalability #social
StakeNet: using social networks to analyse the stakeholders of large-scale software projects (SLL, DQ, AF), pp. 295–304.
ICSEICSE-2010-Marinho #consistency #modelling #ocl #product line
A proposal for consistency checking in dynamic software product line models using OCL (FGM), pp. 333–334.
ICSEICSE-2010-NitaN #adaptation #api #source code
Using twinning to adapt programs to alternative APIs (MN, DN), pp. 205–214.
ICSEICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation
Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
ICSEICSE-2010-SallehMGB #empirical #programming
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (NS, EM, JCG, GSJB), pp. 577–586.
ICSEICSE-2010-SharpdD #re-engineering #research
Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSEICSE-2010-TreudeS #developer
Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds (CT, MADS), pp. 365–374.
SACSAC-2010-AlmeidaYA10a #principle
Filtering spams using the minimum description length principle (TAA, AY, JA), pp. 1854–1858.
SACSAC-2010-BechikhSG #mobile #multi #optimisation
Searching for knee regions in multi-objective optimization using mobile reference points (SB, LBS, KG), pp. 1118–1125.
SACSAC-2010-BettiniDS #implementation #product line
Implementing software product lines using traits (LB, FD, IS), pp. 2096–2102.
SACSAC-2010-BicegoLOP #array #classification #modelling #topic
Expression microarray classification using topic models (MB, PL, BO, AP), pp. 1516–1520.
SACSAC-2010-BrogleBB #multi #quality
Quality of service for multicasting using NICE (MB, SB, TB), pp. 670–677.
SACSAC-2010-BucchiaroneGFT #experience #natural language #requirements #scalability #set
An experience in using a tool for evaluating a large set of natural language requirements (AB, SG, AF, GT), pp. 281–286.
SACSAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited
Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SACSAC-2010-DrumondG #concept #logic #markov #ontology
Extracting ontology concept hierarchies from text using Markov logic (LD, RG), pp. 1354–1358.
SACSAC-2010-FunfzigTA #constraints #parametricity
Haptic manipulation of rational parametric planar cubics using shape constraints (CF, PT, GA), pp. 1253–1257.
SACSAC-2010-FuPTW
Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
SACSAC-2010-GabrielSN #clustering #matrix #similarity
Eigenvector-based clustering using aggregated similarity matrices (HHG, MS, AN), pp. 1083–1087.
SACSAC-2010-GiuntaPT #aspect-oriented #design pattern
Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SACSAC-2010-GoncalvesCCGS #modelling #towards
Towards the modeling reactive and proactive agents by using MAS-ML (EJTG, MIC, GALdC, GFG, VTdS), pp. 936–937.
SACSAC-2010-GongWWLZY
Recognizing affect from non-stylized body motion using shape of Gaussian descriptors (LG, TW, CW, FL, FZ, XY), pp. 1203–1206.
SACSAC-2010-GuermaziHH #analysis #classification #image #web
Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SACSAC-2010-GuoQL #configuration management #energy #network #optimisation
A general energy optimization model for wireless networks using configurable antennas (SG, ZQ, SL), pp. 246–250.
SACSAC-2010-HassanB #distributed #file system
Semi-join computation on distributed file systems using map-reduce-merge model (MAHH, MB), pp. 406–413.
SACSAC-2010-HautakorpiM #algorithm #network
Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA) (JH, JM), pp. 655–662.
SACSAC-2010-HeinzlS #validation #xml
Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SACSAC-2010-HoqueRA #named #protocol #scalability
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-JiKYC #3d #how #interactive
How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
SACSAC-2010-KimKMY #multi #network #predict #probability
Probabilistic context prediction using time-inferred multiple pattern networks (YHK, WK, KM, YY), pp. 1015–1019.
SACSAC-2010-Kuzume
Input device for disabled persons using expiration and tooth-touch sound signals (KK), pp. 1159–1164.
SACSAC-2010-LanLSH #algorithm #classification #image
An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SACSAC-2010-LeeJL #detection #graph
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LeeKWAHP #3d #finite #random
Tracking random finite objects using 3D-LIDAR in marine environments (KWL, BK, WSW, MA, FSH, NMP), pp. 1282–1287.
SACSAC-2010-MacielNJIS #interactive
Reality cues-based interaction using whole-body awareness (AM, LPN, VAMJ, JMTI, LFMSS), pp. 1224–1228.
SACSAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SACSAC-2010-MaranzatoPLN #detection
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SACSAC-2010-McDonaldTKG #component #reduction
Using logic-based reduction for adversarial component recovery (JTM, EDT, YCK, MRG), pp. 1993–2000.
SACSAC-2010-MenorBBGP #classification #markov #taxonomy
Virus DNA-fragment classification using taxonomic hidden Markov model profiles (MM, KB, MB, YG, GP), pp. 1567–1571.
SACSAC-2010-MiaoOWS #distributed #network
Coverage-hole trap model in target tracking using distributed relay-robot network (HM, CCO, XW, CS), pp. 1299–1304.
SACSAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity
Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SACSAC-2010-MillerRPW #identification
Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
SACSAC-2010-MissenBC #detection
Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SACSAC-2010-MustaphaZAG #composition #ontology #semantics
Enhancing semantic search using case-based modular ontology (NBM, HBZ, MAA, HHBG), pp. 1438–1439.
SACSAC-2010-NinagawaE #modelling #network #predict #probability
Link prediction using probabilistic group models of network structure (AN, KE), pp. 1115–1116.
SACSAC-2010-ParizekY #component #interactive #traversal
Extraction of component-environment interaction model using state space traversal (PP, NY), pp. 2203–2210.
SACSAC-2010-Perez-CastilloGP #on the #process
On the use of patterns to recover business processes (RPC, IGRdG, MP), pp. 165–166.
SACSAC-2010-PirkolaT #approach #crawling #problem
Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
SACSAC-2010-PortugalR #algorithm #clustering #graph #multi
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning (DP, RPR), pp. 1271–1276.
SACSAC-2010-RiponGHT #approach #layout #multi #problem
Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
SACSAC-2010-Roder #interactive #requirements #usability
Using interaction requirements to operationalize usability (HR), pp. 318–319.
SACSAC-2010-RoyPL #component #detection #documentation #image
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SACSAC-2010-RyuCC #image #layout #named
PHOTOLAND: a new image layout system using spatio-temporal information in digital photos (DSR, WKC, HGC), pp. 1884–1891.
SACSAC-2010-ShahinLK #architecture #design #visualisation
Rationale visualization of software architectural design decision using compendium (MS, PL, MRK), pp. 2367–2368.
SACSAC-2010-ShinKNNTO #named #ontology #recommendation
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping--- (IS, TK, HN, KN, YT, AO), pp. 1442–1443.
SACSAC-2010-SmithH #documentation #image #retrieval
Document retrieval using image features (DS, RH), pp. 47–51.
SACSAC-2010-StoffelSKK #analysis #documentation #visual notation
Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SACSAC-2010-VermolenHL #consistency #modelling #proving
Proving consistency of VDM models using HOL (SV, JH, PGL), pp. 2503–2510.
SACSAC-2010-WeeL
Client-side load balancer using cloud (SW, HL), pp. 399–405.
SACSAC-2010-Youssef #metric #parallel #performance
Using surface effect measures to model parallel performance (BBY), pp. 2400–2401.
LDTALDTA-J-2007-AkessonEH #attribute grammar #compilation #implementation #jastadd
Implementation of a Modelica compiler using JastAdd attribute grammars (, TE, GH), pp. 21–38.
LDTALDTA-J-2007-CamachoMBV #automation #generative #tool support #verification
Automated generation of program translation and verification tools using annotated grammars (DOC, KM, MvdB, JJV), pp. 3–20.
LDTALDTA-2010-Freudenthal #domain-specific language #enterprise
Using DSLs for developing enterprise systems (MF), p. 11.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SLESLE-2010-JohnstoneS10a #generative
Translator Generation Using ART (AJ, ES), pp. 306–315.
ASPLOSASPLOS-2010-KirmanM #power management
A power-efficient all-optical on-chip interconnect using wavelength-based oblivious routing (NK, JFM), pp. 15–28.
ASPLOSASPLOS-2010-RamanKMJA #concurrent #parallel #thread #transaction
Speculative parallelization using software multi-threaded transactions (AR, HK, TRM, TBJ, DIA), pp. 65–76.
ASPLOSASPLOS-2010-WooL #gpu #named #programmable
COMPASS: a programmable data prefetcher using idle GPU shaders (DHW, HHSL), pp. 297–310.
CASECASE-2010-AnandFLM #distributed #implementation #network
A practical implementation of distributed system control over an asynchronous Ethernet network using time stamped data (DMA, JGF, YSLB, JRM), pp. 515–520.
CASECASE-2010-AngererPA #configuration management #mobile #named
MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots (SA, RP, RA), pp. 822–827.
CASECASE-2010-CabasinoGS #fault #petri net
Diagnosis using labeled Petri nets: Faults may either be silent or undistinguishable events (MPC, AG, CS), pp. 485–490.
CASECASE-2010-DhupatiKRR #analysis #detection #novel #speech #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-FrohlichS #automation #constraints #matrix #modelling #problem #scheduling
Relation matrices for automated MILP modeling of scheduling problems using temporal constraints (RF, SCS), pp. 69–74.
CASECASE-2010-GujarathiM #generative #integration
Generative CAD and CAE integration using common data model (GPG, YM), pp. 586–591.
CASECASE-2010-HuSF #analysis #biology
Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASECASE-2010-IshiiONTOTM #analysis #image
Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASECASE-2010-JohnsonM #optimisation
Local planning using switching time optimization (ERJ, TDM), pp. 828–834.
CASECASE-2010-Kanamori #design
Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
CASECASE-2010-KwokHFRW #approach #image
Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
CASECASE-2010-LeBSK #modelling #realtime #towards
Towards virtual instruments for cardiovascular healthcare: Real-time modeling of cardiovascular dynamics using ECG signals (TQL, STSB, AS, RK), pp. 903–910.
CASECASE-2010-MaruyamaKHTA
Nanomanipulation of single virus using Dielectrophoretic concentration on a microfluidic chip (HM, KK, AH, TT, FA), pp. 710–715.
CASECASE-2010-MikosFBF #design #development #distributed #ontology #reuse
Development of a system for distributed sharing and reuse of design and manufacturing knowledge in the PFMEA domain using a description logics-based ontology (WLM, JCEF, PEAB, LSF), pp. 598–603.
CASECASE-2010-PaullGLM #adaptation
An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
CASECASE-2010-RososhanskyXL #automation
Coverage based tool path planning for automated polishing using contact stress theory (MR, FX, YL), pp. 592–597.
CASECASE-2010-SunCL #algorithm #scheduling
Scheduling of steel-making and continuous casting system using the surrogate subgradient algorithm for lagrangian relaxation (LS, TC, PBL), pp. 885–890.
CCCC-2010-CraikK #object-oriented #parallel #source code
Using Ownership to Reason about Inherent Parallelism in Object-Oriented Programs (AC, WK), pp. 145–164.
CGOCGO-2010-GottschlichVS #memory management #performance #transaction
An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
DACDAC-2010-Ababei #design #modelling #network #optimisation
Network on chip design and optimization using specialized influence models (CA), pp. 625–626.
DACDAC-2010-CallegariDWA #classification #learning
Classification rule learning using subgroup discovery of cross-domain attributes responsible for design-silicon mismatch (NC, DGD, LCW, MSA), pp. 374–379.
DACDAC-2010-ChoRXP #network
History-based VLSI legalization using network flow (MC, HR, HX, RP), pp. 286–291.
DACDAC-2010-ConstantinidesA #debugging #testing
Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
DACDAC-2010-DadgourHSB #analysis #design #energy #logic
Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DACDAC-2010-DhimanMR #modelling #online #predict
A system for online power prediction in virtualized environments using Gaussian mixture models (GD, KM, TR), pp. 807–812.
DACDAC-2010-LiangM #reuse
Instruction cache locking using temporal reuse profile (YL, TM), pp. 344–349.
DACDAC-2010-ParkBWM #debugging #graph #locality #named
BLoG: post-silicon bug localization in processors using bug localization graphs (SBP, AB, HW, SM), pp. 368–373.
DACDAC-2010-PigorschS #preprocessor #satisfiability
An AIG-Based QBF-solver using SAT for preprocessing (FP, CS), pp. 170–175.
DACDAC-2010-Potkonjak #synthesis #tool support
Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
DACDAC-2010-WangM #approximate #named #realtime #scalability
PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme (WW, PM), pp. 705–710.
DATEDATE-2010-AndalamRG #multi #predict #thread
Deterministic, predictable and light-weight multithreading using PRET-C (SA, PSR, AG), pp. 1653–1656.
DATEDATE-2010-ArtiagaC #metadata
Using filesystem virtualization to avoid metadata bottlenecks (EA, TC), pp. 562–567.
DATEDATE-2010-Aue #internet #mobile #power management
Low power mobile internet devices using LTE technology (VA), p. 794.
DATEDATE-2010-BarrioMMHM #functional #synthesis
Using Speculative Functional Units in high level synthesis (AADB, MCM, JMM, RH, SOM), pp. 1779–1784.
DATEDATE-2010-BolteSBNB
Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATEDATE-2010-ChenABF #monitoring
Non-invasive blood oxygen saturation monitoring for neonates using reflectance pulse oximeter (WC, IA, SBO, LMGF), pp. 1530–1535.
DATEDATE-2010-ChengDMMRWRA #parametricity
Capturing intrinsic parameter fluctuations using the PSP compact model (BC, DD, NM, CM, GR, XW, SR, AA), pp. 650–653.
DATEDATE-2010-ChenLJC #distributed #manycore #memory management
Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller (XC, ZL, AJ, SC), pp. 39–44.
DATEDATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters
Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATEDATE-2010-DammMHG #modelling #network #simulation #transaction
Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
DATEDATE-2010-DietrichEH #analysis #statistics
Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATEDATE-2010-El-MoselhyD #order #reduction #statistics
Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
DATEDATE-2010-GaoH #geometry #optimisation #programming
A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATEDATE-2010-GiraldoMJM #hardware
A HMMER hardware accelerator using divergences (JFEG, NM, RPJ, ACMAdM), pp. 405–410.
DATEDATE-2010-HatamiP #analysis #component #library #performance #representation #robust
Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATEDATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics
Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATEDATE-2010-KarnerASW #network #runtime #simulation
Holistic simulation of FlexRay networks by using run-time model switching (MK, EA, CS, RW), pp. 544–549.
DATEDATE-2010-KlemmF #c++ #embedded #metaprogramming
Bitstream processing for embedded systems using C++ metaprogramming (RK, GF), pp. 909–913.
DATEDATE-2010-LarsenLNP #analysis #realtime #synthesis
Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATEDATE-2010-MishraJ #optimisation #power management #synthesis
Low-power FinFET circuit synthesis using surface orientation optimization (PM, NKJ), pp. 311–314.
DATEDATE-2010-PomeranzR #requirements #sequence #testing
Reducing the storage requirements of a test sequence by using a background vector (IP, SMR), pp. 1237–1242.
DATEDATE-2010-ShafiqueMH #adaptation #complexity #reduction #video
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusion (MS, BM, JH), pp. 1713–1718.
DATEDATE-2010-SoekenWKGD #modelling #ocl #satisfiability #uml #verification
Verifying UML/OCL models using Boolean satisfiability (MS, RW, MK, MG, RD), pp. 1341–1344.
DATEDATE-2010-TajalliL #design #framework #power management
Ultra-low power mixed-signal design platform using subthreshold source-coupled circuits (AT, YL), pp. 711–716.
DATEDATE-2010-VadlamaniZBT #adaptation #composition #fault #manycore
Multicore soft error rate stabilization using adaptive dual modular redundancy (RV, JZ, WPB, RT), pp. 27–32.
DATEDATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis
GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
DATEDATE-2010-ZengC #metric
Interconnect delay and slew metrics using the beta distribution (JKZ, CPC), pp. 1329–1332.
DATEDATE-2010-ZhangLL #approach #markov #modelling #simulation #verification
An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
HPCAHPCA-2010-BiswasRMACJPPS #metric
Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
HPCAHPCA-2010-KaseridisSCJ #resource management #scalability
A bandwidth-aware memory-subsystem resource management using non-invasive resource profilers for large CMP systems (DK, JS, JC, LKJ), pp. 1–11.
HPCAHPCA-2010-TangBHC #architecture #cpu #performance
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance (DT, YB, WH, MC), pp. 1–12.
HPDCHPDC-2010-BatiniGM #architecture #enterprise
Optimal enterprise data architecture using publish and subscribe (CB, SG, AM), pp. 541–547.
HPDCHPDC-2010-BhagawatyJPABK #design #implementation #simulation
Design, implementation and use of a simulation data archive for coastal science (HB, LJ, SP, GA, NB, TK), pp. 651–657.
HPDCHPDC-2010-BuiYT #abstraction #distributed #named #python #workflow
Weaver: integrating distributed computing abstractions into scientific workflows using Python (PB, LY, DT), pp. 636–643.
HPDCHPDC-2010-ChenCHCH #adaptation
Improving host swapping using adaptive prefetching and paging notifier (WZC, HC, WH, XC, DH), pp. 300–303.
HPDCHPDC-2010-CoutinhoOOBLDM #parallel #workflow
Data parallelism in bioinformatics workflows using Hydra (FC, ESO, DdO, VPB, AABL, AMRD, MM), pp. 507–515.
HPDCHPDC-2010-DonassoloCLV #performance #scalability #simulation #volunteer
Fast and scalable simulation of volunteer computing systems using SimGrid (BD, HC, AL, PV), pp. 605–612.
HPDCHPDC-2010-HenschelMS #distributed #workflow
A distributed workflow for an astrophysical OpenMP application: using the data capacitor over WAN to enhance productivity (RH, SM, SCS), pp. 644–650.
HPDCHPDC-2010-JabriM
Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
HPDCHPDC-2010-KimHMAJ #distributed #energy #scalability
Exploring the RNA folding energy landscape using scalable distributed cyberinfrastructure (JK, WH, SM, FAE, SJ), pp. 477–488.
HPDCHPDC-2010-LiewAHH #data type #distributed #graph #optimisation #parallel #streaming #towards
Towards optimising distributed data streaming graphs using parallel streams (CSL, MPA, JIvH, LH), pp. 725–736.
HPDCHPDC-2010-LimPF #named #performance
SoftPower: fine-grain power estimations using performance counters (MYL, AP, RJF), pp. 308–311.
HPDCHPDC-2010-StoutFMG #clustering #network #scalability
Scaling virtual organization clusters over a wide area network using the Kestrel workload management system (LS, MF, MAM, SG), pp. 692–698.
HPDCHPDC-2010-StuartCMO #multi #pipes and filters
Multi-GPU volume rendering using MapReduce (JAS, CKC, KLM, JDO), pp. 841–848.
ISMMISMM-2010-TianFG #parallel #predict
Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
OSDIOSDI-2010-AnanthanarayananKGSLSH #clustering
Reining in the Outliers in Map-Reduce Clusters using Mantri (GA, SK, AGG, IS, YL, BS, EH), pp. 265–278.
OSDIOSDI-2010-FeldmanZFF #collaboration #named
SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
OSDIOSDI-2010-KimWZK
Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
OSDIOSDI-2010-PengD #distributed #incremental #scalability #transaction
Large-scale Incremental Processing Using Distributed Transactions and Notifications (DP, FD), pp. 251–264.
PDPPDP-2010-BittencourtSM #algorithm #graph #lookahead #scheduling
DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm (LFB, RS, ERMM), pp. 27–34.
PDPPDP-2010-EbrahimiDLPT #architecture #interface #network
A High-Performance Network Interface Architecture for NoCs Using Reorder Buffer Sharing (ME, MD, PL, JP, HT), pp. 546–550.
PDPPDP-2010-FloresAA #energy #hardware
Energy-Efficient Hardware Prefetching for CMPs Using Heterogeneous Interconnects (AF, JLA, MEA), pp. 147–154.
PDPPDP-2010-LeoAGZ #analysis #clustering #data transformation #throughput
Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
PDPPDP-2010-MarosiKFL
Sandboxing for Desktop Grids Using Virtualization (CAM, PK, GF, OL), pp. 559–566.
PDPPDP-2010-MartinezCPRP #modelling #performance
Performance Modeling of MPI Applications Using Model Selection Techniques (DRM, JCC, TFP, FFR, VBP), pp. 95–102.
PDPPDP-2010-MinhW #parallel #predict
Using Historical Data to Predict Application Runtimes on Backfilling Parallel Systems (TNM, LW), pp. 246–252.
PPoPPPPoPP-2010-CastaldoW #parallel #scalability
Scaling LAPACK panel operations using parallel cache assignment (AMC, RCW), pp. 223–232.
PPoPPPPoPP-2010-LupeiSPMBKA #game studies #memory management #parallel #scalability #towards #transaction
Towards scalable and transparent parallelization of multiplayer games using transactional memory support (DL, BS, DP, MM, MB, WK, CA), pp. 325–326.
PPoPPPPoPP-2010-SandesM #comparison #gpu #named #sequence
CUDAlign: using GPU to accelerate the comparison of megabase genomic sequences (EFdOS, ACMAdM), pp. 137–146.
PPoPPPPoPP-2010-UpadhyayaMP #data type #generative #performance
Using data structure knowledge for efficient lock generation and strong atomicity (GU, SPM, VSP), pp. 281–292.
PPoPPPPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability
PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
FASEFASE-2010-DarvasM #consistency #proving
Proving Consistency and Completeness of Model Classes Using Theory Interpretation (ÁD, PM), pp. 218–232.
TACASTACAS-2010-ParizekK #component #detection #fault #java #performance #random
Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CAVCAV-2010-TorreMP #concurrent #interface #linear #model checking #source code
Model-Checking Parameterized Concurrent Programs Using Linear Interfaces (SLT, PM, GP), pp. 629–644.
ICLPICLP-2010-ShakarianSS10 #network #optimisation #problem #social #source code
Using Generalized Annotated Programs to Solve Social Network Optimization Problems (PS, VSS, MLS), pp. 182–191.
ICSTICST-2010-DebroyW #automation #source code
Using Mutation to Automatically Suggest Fixes for Faulty Programs (VD, WEW), pp. 65–74.
ICSTICST-2010-HuangCM #algorithm #search-based #testing #user interface
Repairing GUI Test Suites Using a Genetic Algorithm (SH, MBC, AMM), pp. 245–254.
ICSTICST-2010-Laurent #concept #formal method #process #testing #validation #verification
Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICTSSICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
ICTSSICTSS-2010-ArcuriIB #black box #embedded #random #realtime #search-based #testing
Black-Box System Testing of Real-Time Embedded Systems Using Random and Search-Based Testing (AA, MZZI, LCB), pp. 95–110.
ICTSSICTSS-2010-LamanchaU #generative #product line #testing
Testing Product Generation in Software Product Lines Using Pairwise for Features Coverage (BPL, MPU), pp. 111–125.
ISSTAISSTA-2010-DanielGM #execution #on the #symbolic computation
On test repair using symbolic execution (BD, TG, DM), pp. 207–218.
ISSTAISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing
Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
ICSTSAT-2010-Ehlers #automaton #satisfiability
Minimising Deterministic Büchi Automata Precisely Using SAT Solving (RE), pp. 326–332.
ICSTSAT-2010-FuhsS #linear #satisfiability #source code
Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT (CF, PSK), pp. 71–84.
TAPTAP-2010-BueDKB #abstraction #behaviour
Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
TAPTAP-2010-ClaessenSH #named #specification #testing
QuickSpec: Guessing Formal Specifications Using Testing (KC, NS, JH), pp. 6–21.
TAPTAP-2010-GladischTBY #generative #testing #verification
Generating Regression Unit Tests Using a Combination of Verification and Capture & Replay (CG, SST, BB, AY), pp. 61–76.
VMCAIVMCAI-2010-BuZL #automaton #hybrid #programming #reachability #verification
Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming (LB, JZ, XL), pp. 78–94.
CBSECBSE-2009-Bickford #component #specification
Component Specification Using Event Classes (MB), pp. 140–155.
QoSAQoSA-2009-KrogmannSBKMM #architecture #feedback #performance #predict #visualisation
Improved Feedback for Architectural Performance Prediction Using Software Cartography Visualizations (KK, CMS, SB, MK, AM, FM), pp. 52–69.
WICSA-ECSAWICSA-ECSA-2009-AboudAFHTUV #architecture #automation #classification #component #concept
Automated architectural component classification using concept lattices (NAA, GA, JRF, MH, CT, CU, SV), pp. 21–30.
WICSA-ECSAWICSA-ECSA-2009-Babar #agile #architecture #case study #challenge #development
An exploratory study of architectural practices and challenges in using agile software development approaches (MAB), pp. 81–90.
WICSA-ECSAWICSA-ECSA-2009-BucchiaronePVR #modelling #self #verification
Self-Repairing systems modeling and verification using AGG (AB, PP, CV, OR), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2009-EmeryH #architecture #framework
Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 (DEE, RH), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2009-HenttonenM #architecture #open source #reuse #tool support
Open source based tools for sharing and reuse of software architectural knowledge (KH, MM), pp. 41–50.
WICSA-ECSAWICSA-ECSA-2009-LiuLXSZ #architecture #enterprise #integration
Using architecture integration patterns to compose enterprise mashups (YL, XL, LX, MS, LZ), pp. 111–120.
WICSA-ECSAWICSA-ECSA-2009-NordCEH #architecture #documentation #set
Reviewing architecture documents using question sets (RLN, PCC, DEE, RH), pp. 325–328.
WICSA-ECSAWICSA-ECSA-2009-RooSA #adaptation #architecture #embedded #multi #optimisation
An architectural style for optimizing system qualities in adaptive embedded systems using Multi-Objective Optimization (AdR, HS, MA), pp. 349–352.
DocEngDocEng-2009-DiazAK #product line
Using DITA for documenting software product lines (OD, FIA, JK), pp. 231–240.
DocEngDocEng-2009-Hassan09a #documentation #graph #interactive #named
GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
DocEngDocEng-2009-JoshiL #analysis #documentation #image #natural language #web
Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRRDRR-2009-HalimaA #concept #recognition #segmentation
Simultaneous segmentation and recognition of Arabic printed text using linguistic concepts of vocabulary (MBH, AMA), pp. 1–10.
DRRDRR-2009-LiD #difference #independence #verification
Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRRDRR-2009-NakaiKI #documentation #image
Camera-based document image mosaicing using LLAH (TN, KK, MI), pp. 1–10.
DRRDRR-2009-NonnemakerB #classification
Using synthetic data safely in classification (JN, HSB), pp. 1–10.
DRRDRR-2009-TaghvaC #analysis #bound #documentation
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRRDRR-2009-TanVK #clustering #identification #online
Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
TPDLECDL-2009-DammKFC #concept #library #multimodal #music #query
A Concept for Using Combined Multimodal Queries in Digital Music Libraries (DD, FK, CF, MC), pp. 261–272.
TPDLECDL-2009-MachadoPFMM #component #user interface
User Interface for a Geo-Temporal Search Service Using DIGMAP Components (JM, GP, NF, BM, HM), pp. 483–486.
TPDLECDL-2009-OlsenS #distributed #library
Gaining Access to Decentralised Library Resources Using Location-Aware Services (BSO, ITS), pp. 388–391.
TPDLECDL-2009-TonniesB #evaluation #library #quality #roadmap #semantics
Using Semantic Technologies in Digital Libraries — A Roadmap to Quality Evaluation (ST, WTB), pp. 168–179.
HTHT-2009-AmitayCHOSYG #approach #social
Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
HTHT-2009-HargoodMW
Using a thematic model to enrich photo montages (CH, DEM, MJW), pp. 135–140.
HTHT-2009-Martinez-RomoA #approach #information management #web
Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
ICDARICDAR-2009-Abd-AlmageedKD #documentation #linear
Page Rule-Line Removal Using Linear Subspaces in Monochromatic Handwritten Arabic Documents (WAA, JK, DSD), pp. 768–772.
ICDARICDAR-2009-AbdulkaderC #fault #learning #low cost #multi
Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment (AA, MRC), pp. 576–580.
ICDARICDAR-2009-AhmadVK #markov #recognition #word
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model (ARA, CVG, MK), pp. 161–165.
ICDARICDAR-2009-BarratT #image #modelling #network
Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
ICDARICDAR-2009-BledaBGZLMPV #online #recognition
Improving a DTW-Based Recognition Engine for On-line Handwritten Characters by Using MLPs (MJCB, SEB, JGM, FZM, DLP, AMV, FPV, JMVT), pp. 1260–1264.
ICDARICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDARICDAR-2009-BoussellaaBZAA #algorithm #documentation #image
Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm (WB, AB, AZ, HEA, AMA), pp. 743–747.
ICDARICDAR-2009-BukhariSB09a #independence #segmentation
Script-Independent Handwritten Textlines Segmentation Using Active Contours (SSB, FS, TMB), pp. 446–450.
ICDARICDAR-2009-CaoPSN #adaptation #clustering
Unsupervised HMM Adaptation Using Page Style Clustering (HC, RP, SS, PN), pp. 1091–1095.
ICDARICDAR-2009-DiemS #recognition
Recognition of Degraded Handwritten Characters Using Local Features (MD, RS), pp. 221–225.
ICDARICDAR-2009-ElbaatiBKEAA #recognition
Arabic Handwriting Recognition Using Restored Stroke Chronology (AE, HB, MK, AE, HEA, AMA), pp. 411–415.
ICDARICDAR-2009-FornesLSB #identification #music #on the
On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
ICDARICDAR-2009-GalballyFMO #evaluation #verification
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDARICDAR-2009-GarainP #identification #multi
Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
ICDARICDAR-2009-HamdaniAKA #multi #online #recognition
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition (MH, HEA, MK, AMA), pp. 201–205.
ICDARICDAR-2009-HanifP #algorithm #detection #image #locality
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDARICDAR-2009-Hassan #documentation #graph
User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
ICDARICDAR-2009-HeH09a #classification #estimation #online
Affine Distortion Compensation for an Isolated Online Handwritten Chinese Character Using Combined Orientation Estimation and HMM-Based Minimax Classification (TH, QH), pp. 1226–1230.
ICDARICDAR-2009-HoangTP #diagrams #image
Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram (TVH, ST, NYP), pp. 921–925.
ICDARICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-ImpedovoFM #recognition #word
HMM Based Handwritten Word Recognition System by Using Singularities (SI, AF, RM), pp. 783–787.
ICDARICDAR-2009-KimLK #mobile
Scene Text Extraction Using Focus of Mobile Camera (EK, SL, JHK), pp. 166–170.
ICDARICDAR-2009-LandreMR #classification #difference #image
Ornamental Letters Image Classification Using Local Dissimilarity Maps (JL, FMN, SR), pp. 186–190.
ICDARICDAR-2009-LeloreB #documentation #image #markov
Document Image Binarisation Using Markov Field Model (TL, FB), pp. 551–555.
ICDARICDAR-2009-LuqmanBR #classification #graph #network #recognition
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDARICDAR-2009-MansjurWJ #automation #categorisation #classification #kernel #learning #topic
Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization (DSM, TSW, BHJ), pp. 1086–1090.
ICDARICDAR-2009-MarinaiMS #clustering #order
Mathematical Symbol Indexing Using Topologically Ordered Clusters of Shape Contexts (SM, BM, GS), pp. 1041–1045.
ICDARICDAR-2009-MiyaoM #adaptation #online #recognition
Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples (HM, MM), pp. 1156–1160.
ICDARICDAR-2009-MoghaddamRC #approach #classification #independence #multi #segmentation #set
Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
ICDARICDAR-2009-MontreuilGHN #2d #documentation #layout #random
Unconstrained Handwritten Document Layout Extraction Using 2D Conditional Random Fields (FM, EG, LH, SN), pp. 853–857.
ICDARICDAR-2009-MuramatsuYM #authentication #online
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-NakaiKI #documentation #image #realtime #retrieval #web
Real-Time Retrieval for Images of Documents in Various Languages Using a Web Camera (TN, KK, MI), pp. 146–150.
ICDARICDAR-2009-PalWK #case study #classification #comparative #recognition
Comparative Study of Devnagari Handwritten Character Recognition Using Different Feature and Classifiers (UP, TW, FK), pp. 1111–1115.
ICDARICDAR-2009-PanBS #recognition
Isolated Handwritten Farsi Numerals Recognition Using Sparse and Over-Complete Representations (WP, TDB, CYS), pp. 586–590.
ICDARICDAR-2009-PavelecOJNB #identification #modelling
Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
ICDARICDAR-2009-RomeroTV #feedback #image
Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images (VR, AHT, EV), pp. 96–100.
ICDARICDAR-2009-RoyPLD #multi #programming #segmentation
Multi-Oriented and Multi-Sized Touching Character Segmentation Using Dynamic Programming (PPR, UP, JL, MD), pp. 11–15.
ICDARICDAR-2009-SaldarriagaMV #documentation #online #recognition
Using top n Recognition Candidates to Categorize On-line Handwritten Documents (SPS, EM, CVG), pp. 881–885.
ICDARICDAR-2009-SundaramR #online #recognition
An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDARICDAR-2009-WakaharaU #2d #composition
Hierarchical Decomposition of Handwriting Deformation Vector Field Using 2D Warping and Global/Local Affine Transformation (TW, SU), pp. 1141–1145.
ICDARICDAR-2009-WangBA #automation #documentation
Document Content Extraction Using Automatically Discovered Features (SYW, HSB, CA), pp. 1076–1080.
ICDARICDAR-2009-WangH #classification #design #fault #modelling #parametricity #precise
Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification Error Training and Parameter Compression (YW, QH), pp. 36–40.
ICDARICDAR-2009-YiPX #integration #multi #recognition #video
Using Multiple Frame Integration for the Text Recognition of Video (JY, YP, JX), pp. 71–75.
ICDARICDAR-2009-ZhouLN #online #random #recognition #string
Online Handwritten Japanese Character String Recognition Using Conditional Random Fields (XDZ, CLL, MN), pp. 521–525.
JCDLJCDL-2009-Barker #education #library #online
Science teachers’ use of online resources and the digital library for Earth system education (LJB), pp. 1–10.
JCDLJCDL-2009-GaleasKF #analysis #assessment #documentation #fourier
Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
JCDLJCDL-2009-HaqN #encryption
Using timed-release cryptography to mitigate the preservation risk of embargo periods (RH, MLN), pp. 183–192.
JCDLJCDL-2009-MurataTMK #ranking
Query-page intention matching using clicked titles and snippets to boost search rankings (MM, HT, YM, RK), pp. 105–114.
JCDLJCDL-2009-PereiraRZLGF #ambiguity #web
Using web information for author name disambiguation (DAP, BARN, NZ, AHFL, MAG, AAF), pp. 49–58.
JCDLJCDL-2009-TreeratpitukG #random
Disambiguating authors in academic publications using random forests (PT, CLG), pp. 39–48.
SIGMODSIGMOD-2009-ChaudhuriNS #profiling #static analysis
Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
SIGMODSIGMOD-2009-ChenOG #performance
Fast and dynamic OLAP exploration using UDFs (ZC, CO, CGA), pp. 1087–1090.
SIGMODSIGMOD-2009-Chi #social #web
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason (EHC), pp. 973–984.
SIGMODSIGMOD-2009-IsardY #distributed #programming language
Distributed data-parallel computing using a high-level programming language (MI, YY), pp. 987–994.
SIGMODSIGMOD-2009-PaparizosNSA #data flow #query #web
Answering web queries using structured data sources (SP, AN, JCS, RA), pp. 1127–1130.
SIGMODSIGMOD-2009-Plattner #approach #database #in memory
A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
SIGMODSIGMOD-2009-ZhangMC #clustering #scalability
Scalable skyline computation using object-based space partitioning (SZ, NM, DWC), pp. 483–494.
VLDBVLDB-2009-CanimBMLR
An Object Placement Advisor for DB2 Using Solid State Storage (MC, BB, GAM, CAL, KAR), pp. 1318–1329.
VLDBVLDB-2009-CautisDOV #performance #query #set #specification #xpath
Efficient Rewriting of XPath Queries Using Query Set Specifications (BC, AD, NO, VV), pp. 301–312.
VLDBVLDB-2009-JohnsonPA #inheritance #scalability
Improving OLTP Scalability using Speculative Lock Inheritance (RJ, IP, AA), pp. 479–489.
VLDBVLDB-2009-LeglerLSK #distributed #mining #robust
Robust Distributed Top-N Frequent Pattern Mining Using the SAP BW Accelerator (TL, WL, JS, JK), pp. 1438–1449.
VLDBVLDB-2009-LiuJ
Using Trees to Depict a Forest (BL, HVJ), pp. 133–144.
VLDBVLDB-2009-NandiB #named #taxonomy
HAMSTER: Using Search Clicklogs for Schema and Taxonomy Matching (AN, PAB), pp. 181–192.
VLDBVLDB-2009-PereiraRSTWH #question #web
Answering Web Questions Using Structured Data — Dream or Reality? (FP, AR, SS, WTP, GW, AYH), p. 1646.
VLDBVLDB-2009-Rajaraman #named #topic #web
Kosmix: High-Performance Topic Exploration using the Deep Web (AR), pp. 1524–1529.
VLDBVLDB-2009-WangSCMKZPY #data transformation #named #semantics #web
SMDM: Enhancing Enterprise-Wide Master Data Management Using Semantic Web Technologies (XW, XS, FC, LM, NK, KZ, YP, YY), pp. 1594–1597.
VLDBVLDB-2009-WillhalmPBPZS #in memory #named #performance
SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units (TW, NP, YB, HP, AZ, JS), pp. 385–394.
CSEETCSEET-2009-Al-Yahya #re-engineering #wiki
Using Wikis to Support Teamwork Skills in Software Engineering Courses (MMAY), pp. 142–149.
CSEETCSEET-2009-GB #education #ontology #re-engineering
Using Ontologies to Aid the Teaching of Software Engineering (SPG, AB), pp. 224–231.
CSEETCSEET-2009-KoolmanojwongB #case study #education #experience #research
Using Software Project Courses to Integrate Education and Research: An Experience Report (SK, BWB), pp. 26–33.
CSEETCSEET-2009-McMeekinKCC #taxonomy
Evaluating Software Inspection Cognition Levels Using Bloom’s Taxonomy (DAM, BRvK, EC, DJAC), pp. 232–239.
CSEETCSEET-2009-Padua #quality
Using Quality Audits to Assess Software Course Projects (WP), pp. 162–165.
CSEETCSEET-2009-TaranMSS #authoring #case study #framework #industrial #multi #platform #scalability
Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry (GT, RM, RS, AS), pp. 61–68.
CSEETCSEET-2009-WuWSK #development #education #evaluation #framework #game studies
An Evaluation of Using a Game Development Framework in Higher Education (BW, AIW, JES, TBK), pp. 41–44.
EDMEDM-2009-AbbasS #learning
an Argument Learning Environment Using Agent-Based ITS (ALES) (SA, HS), pp. 200–209.
EDMEDM-2009-AgapitoO #detection #performance
Detecting Symptoms of Low Performance Using Production Rules (JBA, AO), pp. 31–40.
EDMEDM-2009-FengBH #composition #education #learning
Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions on Learning (MF, JB, NTH), pp. 51–60.
EDMEDM-2009-PavlikCK #analysis #automation #domain model #learning #modelling
Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
EDMEDM-2009-RaiGB #parametricity
Using Dirichlet priors to improve model parameter plausibility (DR, YG, JB), pp. 141–150.
EDMEDM-2009-SacinASO #data mining #education #mining #recommendation
Recommendation in Higher Education Using Data Mining Techniques (CVS, JBA, LS, AO), pp. 191–199.
ITiCSEITiCSE-2009-AhoniemiK
Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
ITiCSEITiCSE-2009-Al-BowAEFFLLM #education #game studies #programming #student
Using game creation for teaching computer programming to high school students and teachers (MAB, DA, JE, RF, JF, CL, STL, SM), pp. 104–108.
ITiCSEITiCSE-2009-AltinBEKOSSSMPR09a #experience #learning #student #tool support #user interface
Use of intuitive tools to enhance student learning and user experience (RA, MB, NE, CK, ÖCÖ, MS, HS, DS, CCM, CP, CRR), p. 365.
ITiCSEITiCSE-2009-BlasGMB #analysis #automation #composition
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSEITiCSE-2009-BrabrandD #taxonomy
Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
ITiCSEITiCSE-2009-Dooley
Peer assessments using the moodle workshop tool (JFD), p. 344.
ITiCSEITiCSE-2009-Draganova #learning #mobile
Use of mobile phone technologies in learning (CD), p. 399.
ITiCSEITiCSE-2009-EnglishR #assessment #automation #case study #source code #student
Evaluating students’ programs using automated assessment: a case study (JE, TR), p. 371.
ITiCSEITiCSE-2009-Garcia-MateosA #algorithm #data type #online
A course on algorithms and data structures using on-line judging (GGM, JLFA), pp. 45–49.
ITiCSEITiCSE-2009-Gomez-MartinJA #design pattern #education #game studies #product line
Teaching design patterns using a family of games (MAGM, GJD, JA), pp. 268–272.
ITiCSEITiCSE-2009-Kultur
Keeping the pace in CS-1 through the use of CMS (CK), p. 398.
ITiCSEITiCSE-2009-MaFRRW #modelling #visualisation
Improving the mental models held by novice programmers using cognitive conflict and jeliot visualisations (LM, JDF, MR, IR, MW), pp. 166–170.
ITiCSEITiCSE-2009-MoffatT #algorithm #education
The use of MUVE technology in teaching AI algorithms (DCM, KT), p. 396.
ITiCSEITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming
Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ITiCSEITiCSE-2009-Rubio-SanchezV #recursion
Tail recursion by using function generalization (MRS, JÁVI), p. 394.
ITiCSEITiCSE-2009-SoriaP #architecture #aspect-oriented #development #education #open source
Teaching software architectures and aspect-oriented software development using open-source projects (CCS, JP), p. 385.
ITiCSEITiCSE-2009-Steenkiste
The use of a controlled wireless testbed in courses (PS), pp. 80–84.
ITiCSEITiCSE-2009-Townsend #student
Using a groupware system in CS1 to engage introverted students (GCT), pp. 16–20.
ITiCSEITiCSE-2009-VillalobosCJ #interactive #learning #programming
Developing programming skills by using interactive learning objects (JV, NAC, CJ), pp. 151–155.
SIGITESIGITE-2009-Connolly #design #education #guidelines #web
No longer partying like it’s 1999: designing a modern web stream using the it2008 curriculum guidelines (RWC), pp. 74–79.
SIGITESIGITE-2009-Cross #protocol
Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
SIGITESIGITE-2009-HansenBGRM #novel #open source
A novel IP telephony course using open-source software (RAH, VMB, RG, DR, LM), pp. 43–49.
SIGITESIGITE-2009-OhMP #education #encryption #internet #protocol #simulation
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
SIGITESIGITE-2009-PakC #assessment #markov #modelling #risk management
Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
SIGITESIGITE-2009-Stanley #architecture #education #hardware #logic #network #operating system #simulation
Using digital logic simulation as a teaching aid in discrete mathematics, hardware and operating systems, networking, computer organization and computer architecture: a workshop outline (TDS), pp. 1–2.
ICPCICPC-J-2008-HindleGH09 #complexity #rank
Reading beside the lines: Using indentation to rank revisions by complexity (AH, MWG, RCH), pp. 414–429.
CSMRCSMR-2009-BurenR #analysis #architecture #maintenance
Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMRCSMR-2009-Chikofsky #architecture #process
Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
CSMRCSMR-2009-FrankeJLUHEK #assessment #metric #network
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMRCSMR-2009-Gimnich #design
Using Existing Software Assets in SOA Design (RG), pp. 309–310.
CSMRCSMR-2009-KpodjedoRGA #algorithm #evolution #question
Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla? (SK, FR, PG, GA), pp. 179–188.
CSMRCSMR-2009-PatelHR #clustering #dependence #dynamic analysis
Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
CSMRCSMR-2009-Rombach #design #maintenance #product line
Design for Maintenance — Use of Engineering Principles and Product Line Technology (HDR), pp. 1–2.
CSMRCSMR-2009-SoriaPC #architecture #fault #locality #modelling #tool support
Tool Support for Fault Localization Using Architectural Models (AS, JADP, MRC), pp. 59–68.
CSMRCSMR-2009-SoriaPC09a #architecture #aspect-oriented #configuration management
Handling the Dynamic Reconfiguration of Software Architectures Using Aspects (CCS, JP, JÁC), pp. 263–266.
ICPCICPC-2009-GueheneucKM #comprehension
Working session: Using eye-tracking to understand program comprehension (YGG, HHK, JIM), pp. 278–279.
ICPCICPC-2009-MurphyVS #behaviour #process #programming
Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
ICPCICPC-2009-StefikG #debugging #empirical
Using spoken text to aid debugging: An empirical study (AS, EG), pp. 110–119.
ICSMEICSM-2009-AlamAH #dependence
Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #risk management
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
ICSMEICSM-2009-DaraLLST #execution #testing
Using dynamic execution data to generate test cases (RD, SL, WL, ASG, LT), pp. 433–436.
ICSMEICSM-2009-DongG #comprehension #hybrid
Understanding source package organization using the hybrid model (XD, MWG), pp. 575–578.
ICSMEICSM-2009-DraganCM
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSMEICSM-2009-FerzundAW #classification #metric
Software change classification using hunk metrics (JF, SNA, FW), pp. 471–474.
ICSMEICSM-2009-FokaefsTCS #clustering #object-oriented
Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
ICSMEICSM-2009-GayHMM #concept #feedback #on the
On the use of relevance feedback in IR-based concept location (GG, SH, AM, TM), pp. 351–360.
ICSMEICSM-2009-HolmesCWD #case study #source code
The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSMEICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance
Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
ICSMEICSM-2009-Li #analysis #dependence #identification
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSMEICSM-2009-Poshyvanyk #information retrieval #maintenance
Using information retrieval to support software maintenance tasks (DP), pp. 453–456.
ICSMEICSM-2009-ShihabJH #developer #open source
Studying the use of developer IRC meetings in open source projects (ES, ZMJ, AEH), pp. 147–156.
ICSMEICSM-2009-ShternT #clustering #evaluation
Refining clustering evaluation using structure indicators (MS, VT), pp. 297–305.
ICSMEICSM-2009-VasaLBN #analysis #comparative #evolution
Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSMEICSM-2009-WitZD #clone tracking
Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSMEICSM-2009-YokomoriSNI #component #framework #impact analysis #ranking
Assessing the impact of framework changes using component ranking (RY, HPS, MN, KI), pp. 189–198.
ICSMEICSM-2009-Yoo #impact analysis #metric #performance
Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
ICSMEICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability
Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
MSRMSR-2009-EkanayakeTGB #concept #fault #predict #quality
Tracking concept drift of software projects using defect prediction quality (JE, JT, HCG, AB), pp. 51–60.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSRMSR-2009-LubsenZP #co-evolution
Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSRMSR-2009-MatterKN #debugging #developer
Assigning bug reports using a vocabulary-based expertise model of developers (DM, AK, ON), pp. 131–140.
MSRMSR-2009-ShihabJH #chat #developer #gnome #internet #on the
On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project (ES, ZMJ, AEH), pp. 107–110.
MSRMSR-2009-TianRP #automation #categorisation
Using Latent Dirichlet Allocation for automatic categorization of software (KT, MR, DP), pp. 163–166.
WCREWCRE-1999-CapobiancoLOPP99a #analysis #traceability
Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCREWCRE-1999-GatrellCH99a #c# #design pattern #replication
Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
WCREWCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
WCREWCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
CIAACIAA-2009-AhnH #heuristic #implementation
Implementation of State Elimination Using Heuristics (JHA, YSH), pp. 178–187.
CIAACIAA-2009-Sastre-Martinez #network #parsing #performance #recursion
Efficient Parsing Using Filtered-Popping Recursive Transition Networks (JMSM), pp. 241–244.
ICALPICALP-v1-2009-Jansen #constant #scheduling
An EPTAS for Scheduling Jobs on Uniform Processors: Using an MILP Relaxation with a Constant Number of Integral Variables (KJ), pp. 562–573.
ICALPICALP-v1-2009-Nederlof #algorithm #performance #problem
Fast Polynomial-Space Algorithms Using Möbius Inversion: Improving on Steiner Tree and Related Problems (JN), pp. 713–725.
ICALPICALP-v2-2009-CooperIKK #graph #random
Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
LATALATA-2009-Blanchet-SadriMRW #algorithm #word
An Answer to a Conjecture on Overlaps in Partial Words Using Periodicity Algorithms (FBS, RM, AR, EW), pp. 188–199.
LATALATA-2009-Onodera #locality
New Morphic Characterizations of Languages in Chomsky Hierarchy Using Insertion and Locality (KO), pp. 648–659.
FMFM-2009-HjortRLPS #modelling #testing #user interface
Model-Based GUI Testing Using Uppaal at Novo Nordisk (UHH, JIR, KGL, MAP, AS), pp. 814–818.
FMFM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FMFM-2009-JostLHSH #analysis #bound
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-LangM #composition #confluence #detection #partial order #reduction
Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
FMFM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFMIFM-2009-SalaunB #algebra #encoding #process
Realizability of Choreographies Using Process Algebra Encodings (GS, TB), pp. 167–182.
SEFMSEFM-2009-BertoliniM #model checking #probability #testing #user interface
Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
SEFMSEFM-2009-HieronsJUY #adaptation #sequence
Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences (RMH, GVJ, HU, HY), pp. 157–166.
SEFMSEFM-2009-HummelT #behaviour #specification
Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
SEFMSEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing
Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
SEFMSEFM-2009-TruongTN #analysis #coordination #multi
Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFMSFM-2009-ClarkGT #analysis #web #web service
Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
TLCATLCA-2009-Atkey #for free #parametricity #representation #syntax
Syntax for Free: Representing Syntax with Binding Using Parametricity (RA), pp. 35–49.
CEFPCEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code
Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
ICFPICFP-2009-GazagnaireH #database #functional #named #performance #programming #transaction
OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons (TG, VH), pp. 203–214.
ICFPICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support
Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
ICFPICFP-2009-Pierce #education #programming language #proving
λ, the ultimate TA: using a proof assistant to teach programming language foundations (BCP), pp. 121–122.
AIIDEAIIDE-2009-TutenelSBK #design #game studies #semantics
Using Semantics to Improve the Design of Game Worlds (TT, RMS, RB, KJdK).
AIIDEAIIDE-2009-ZhaoS #behaviour #game studies #learning #modelling
Learning Character Behaviors Using Agent Modeling in Games (RZ, DS).
CoGCIG-2009-AveryLA #coordination #evolution
Evolving coordinated spatial tactics for autonomous entities using influence maps (PA, SJL, BA), pp. 341–348.
CoGCIG-2009-CardamoneLL #learning
Learning drivers for TORCS through imitation using supervised methods (LC, DL, PLL), pp. 148–155.
CoGCIG-2009-CowleyCBH #behaviour #modelling #predict
Analyzing player behavior in Pacman using feature-driven decision theoretic predictive modeling (BC, DC, MMB, RJH), pp. 170–177.
CoGCIG-2009-DrachenCY #modelling #self
Player modeling using self-organization in Tomb Raider: Underworld (AD, AC, GNY), pp. 1–8.
CoGCIG-2009-EbnerT #evolution #programming #search-based
Evolving driving controllers using Genetic Programming (ME, TT), pp. 279–286.
CoGCIG-2009-GalwayCB #difference #game studies #learning
Improving Temporal Difference game agent control using a dynamic exploration during control learning (LG, DC, MMB), pp. 38–45.
CoGCIG-2009-JangYC #algorithm #game studies #realtime
Optimal strategy selection of non-player character on real time strategy game using a speciated evolutionary algorithm (SHJ, JY, SBC), pp. 75–79.
CoGCIG-2009-MalikD #behaviour #coordination #metaprogramming #multi #testing
Improving testing of multi-unit computer players for unwanted behavior using coordination macros (AM, JD), pp. 355–362.
CoGCIG-2009-ThompsonL #automation #execution #realtime
Realtime execution of automated plans using evolutionary robotics (TT, JL), pp. 333–340.
DiGRADiGRA-2009-AndersonBCDLM #game studies #problem #video
Using microgenetic methods to investigate problem solving in video games (AA, CB, KMC, JD, AL, WM).
DiGRADiGRA-2009-DahlskogKA #classification #functional #game studies
Mapping the game landscape: Locating genres using functional classification (SD, AK, EA).
DiGRADiGRA-2009-EylesE #game studies
Using an RFID game to phenomenologically test a theoretical systemic model for describing ambient games (ME, RE).
DiGRADiGRA-2009-RibbensP #case study #experience #research
Researching player experiences through the use of different qualitative methods (WR, YP).
DiGRADiGRA-2009-RyanS #comprehension #game studies #interactive #learning #video
Evaluating Interactive Entertainment using Breakdown: Understanding Embodied Learning in Video Games (WR, MAS).
DiGRADiGRA-2009-Salazar #framework #multi #simulation
Simulating a Quasi-Simulation: A framework for using Multi Agent Simulation Techniques for studying MMORPGs (JS).
FDGFDG-2009-ChertoffBLL #3d #game studies
An exploration of menu techniques using a 3D game input device (DBC, RWB, JJLJ), pp. 256–262.
CoGVS-Games-2009-CharlesCM #game studies #representation #student
Using Player and World Representation Techniques from Computer Games to Improve Student Engagement (DC, TC, MM), pp. 36–42.
CoGVS-Games-2009-Halloran #communication #game studies
It's Talk, But Not as We Know It: Using VoIP to Communicate in War Games (JH0), pp. 133–140.
CoGVS-Games-2009-ValerioPMMSC
Second Life Information Desk System Using Instant Messaging and Short Messaging Service Technologies (SV, JP, LM, PM, CS, FdC), pp. 125–132.
CoGVS-Games-2009-VidaniC #design #game studies #modelling
Using a Task Modeling Formalism in the Design of Serious Games for Emergency Medical Procedures (ACV, LC), pp. 95–102.
GT-VMTGT-VMT-2009-MazanekM09a #diagrams #parsing
Contraction of Unconnected Diagrams using Least Cost Parsing (SM, MM), pp. 189–201.
CHICHI-2009-AokiHMMPSW #community #research
A vehicle for research: using street sweepers to explore the landscape of environmental community action (PMA, RJH, AMM, CM, EP, SS, AW), pp. 375–384.
CHICHI-2009-AppertZ #tool support
Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
CHICHI-2009-BaoG #what
What’s “this” you say?: the use of local references on distant displays (PB, DG), pp. 1029–1032.
CHICHI-2009-BergmanTBCW
It’s not that important: demoting personal information of low subjective importance using GrayArea (OB, ST, RBM, EC, SW), pp. 269–278.
CHICHI-2009-BuscherCM #eye tracking #predict #web #what
What do you see when you’re surfing?: using eye tracking to predict salient regions of web pages (GB, EC, MRM), pp. 21–30.
CHICHI-2009-FeketeEG #named
Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
CHICHI-2009-FindlaterMMD #adaptation #performance
Ephemeral adaptation: the use of gradual onset to improve menu selection performance (LF, KM, JM, JQD), pp. 1655–1664.
CHICHI-2009-Gerber #effectiveness
Using improvisation to enhance the effectiveness of brainstorming (EG), pp. 97–104.
CHICHI-2009-HongC
Annotate once, appear anywhere: collective foraging for snippets of interest using paragraph fingerprinting (LH, EHC), pp. 1791–1794.
CHICHI-2009-HornSCJ #education #programming language #visual notation
Comparing the use of tangible and graphical programming languages for informal science education (MSH, ETS, RJC, RJKJ), pp. 975–984.
CHICHI-2009-JakobsenH #source code #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHICHI-2009-KitturCS #topic #what #wiki
What’s in Wikipedia?: mapping topics and conflict using socially annotated category structure (AK, EHC, BS), pp. 1509–1512.
CHICHI-2009-LawA #game studies #named
Input-agreement: a new mechanism for collecting data using human computation games (EL, LvA), pp. 1197–1206.
CHICHI-2009-MarshallFHRHRYD #interactive #physics
Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
CHICHI-2009-WonJH #visual notation #web
Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
CHICHI-2009-YamashitaIKI #multi
Difficulties in establishing common ground in multiparty groups using machine translation (NY, RI, HK, TI), pp. 679–688.
HCIDHM-2009-Butler #3d
Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
HCIDHM-2009-EllegastHS #assessment
Workload Assessment in Field Using the Ambulatory CUELA System (RPE, IH, CS), pp. 221–226.
HCIDHM-2009-FaustC #3d
3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
HCIDHM-2009-JeonJKH #classification #gender
Facial Gender Classification Using LUT-Based Sub-images and DIE (JBJ, SHJ, DJK, KSH), pp. 36–45.
HCIDHM-2009-McInnesSP #reliability
Within and Between-Subject Reliability Using Classic Jack for Ergonomic Assessments (BM, AS, JP), pp. 653–660.
HCIDHM-2009-PandithLD #evaluation
The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
HCIDHM-2009-SummerskillMCGSD #case study #evaluation #validation
Validation of the HADRIAN System Using an ATM Evaluation Case Study (SJS, RM, KC, DEG, RES, PD), pp. 727–736.
HCIHCD-2009-CantoniBFB #human-computer #requirements
Playful Holistic Support to HCI Requirements Using LEGO Bricks (LC, LB, MF, DB), pp. 844–853.
HCIHCD-2009-ChuangO #correlation #design #mobile
A Photo Correlation Map Using Mobile AP II for Scenario-Based Design (YLC, MO), pp. 177–183.
HCIHCD-2009-HasanMP #e-commerce #usability
Using Google Analytics to Evaluate the Usability of E-Commerce Sites (LH, AM, SGP), pp. 697–706.
HCIHCD-2009-HashizumeKY #communication #difference
Regional Difference in the Use of Cell Phone and Other Communication Media among Senior Users (AH, MK, TY), pp. 426–435.
HCIHCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCD-2009-JonesND #information retrieval #set
Use of Nursing Management Minimum Data Set (NMMDS) for a Focused Information Retrieval (JFJ, ETN, CD), pp. 972–978.
HCIHCD-2009-MisawaF #case study #experience #generative #idea #user interface
A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCIHCD-2009-Rocker
Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments (CR), pp. 1052–1061.
HCIHCD-2009-Seland #design #game studies #mobile
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCIHCD-2009-ShibukawaFIN #effectiveness
Fundamental Studies on Effective e-Learning Using Physiology Indices (MS, MFF, YI, SPN), pp. 795–804.
HCIHCD-2009-YuL #generative #idea
Facilitating Idea Generation Using Personas (DJY, WCL), pp. 381–388.
HCIHCI-AUII-2009-FanS #3d #navigation #user interface
Pull and Push: Proximity-Aware User Interface for Navigating in 3D Space Using a Handheld Camera (MF, YS), pp. 133–140.
HCIHCI-AUII-2009-IizukaAM #behaviour
The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
HCIHCI-AUII-2009-JeongSGKJ
Object Scanning Using a Sensor Frame (SJ, TS, GG, KHK, JWJ), pp. 433–439.
HCIHCI-AUII-2009-JiK #named
CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HCIHCI-AUII-2009-KimPS #3d #design
Menu Design in Cell Phones: Use of 3D Menus (KK, RWP, GS), pp. 48–57.
HCIHCI-AUII-2009-KubickiLLSKC #human-computer #interactive
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
HCIHCI-AUII-2009-LeeJLJCY #monitoring #smarttech
Wearable ECG Monitoring System Using Conductive Fabrics and Active Electrodes (SHL, SMJ, CKL, KSJ, GC, SKY), pp. 778–783.
HCIHCI-AUII-2009-MatsuiIK #image #recognition
Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing (TM, TI, YK), pp. 151–158.
HCIHCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi
Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCIHCI-AUII-2009-SungJC #metric
Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor (MS, KJ, GC), pp. 784–792.
HCIHCI-AUII-2009-TakadaOKT #navigation #smarttech
A Context-Aware AR Navigation System Using Wearable Sensors (DT, TO, KK, HT), pp. 793–801.
HCIHCI-AUII-2009-TokiwaYNSI
Motion Capture System Using an Optical Resolver (TT, MY, HN, MS, MI), pp. 536–543.
HCIHCI-NIMT-2009-BeinhauerH #evaluation #mobile #multimodal
Using Acoustic Landscapes for the Evaluation of Multimodal Mobile Applications (WB, CH), pp. 3–11.
HCIHCI-NIMT-2009-ChoumaneS #interactive #modelling #multimodal
Modeling and Using Salience in Multimodal Interaction Systems (AC, JS), pp. 12–18.
HCIHCI-NIMT-2009-Jain #human-computer #multimodal
Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
HCIHCI-NIMT-2009-KotaniYAH #representation
Representation of Velocity Information by Using Tactile Apparent Motion (KK, TY, TA, KH), pp. 470–478.
HCIHCI-NIMT-2009-KoudaKS #design #interface
Motion Stroke-A Tablet-Based Interface for Motion Design Tool Using Drawing (HK, IK, KS), pp. 821–829.
HCIHCI-NIMT-2009-MikhailAGSSE #communication #named
BEXPLORER: Computer and Communication Control Using EEG (MM, MAS, MG, NS, BS, KEA), pp. 579–587.
HCIHCI-NIMT-2009-MiwaIWIN
Shadow Awareness: Bodily Expression Supporting System with Use of Artificial Shadow (YM, SI, TW, KI, HN), pp. 226–235.
HCIHCI-NIMT-2009-OkitaNS #communication
Non-verbal Communication System Using Pictograms (MO, YN, HS), pp. 720–724.
HCIHCI-NIMT-2009-SadP09a #gesture #representation
Using Pictographic Representation, Syntactic Information and Gestures in Text Entry (HHS, FP), pp. 735–744.
HCIHCI-NIMT-2009-SanchezFFP #development #interface
Development of Symbiotic Brain-Machine Interfaces Using a Neurophysiology Cyberworkstation (JCS, RJOF, JABF, JCP), pp. 606–615.
HCIHCI-NIMT-2009-SchreiberWB #concept #interactive
New Interaction Concepts by Using the Wii Remote (MS, MvWM, RB), pp. 261–270.
HCIHCI-NIMT-2009-SuzukiMT #interactive #interface
Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
HCIHCI-NT-2009-AbeOO #automation #image
Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCIHCI-NT-2009-BeeldersBMD #interface #performance #prototype #word
Measuring User Performance for Different Interfaces Using a Word Processor Prototype (TRB, PJB, TM, ED), pp. 395–404.
HCIHCI-NT-2009-HaesenMLC #design #multi
Supporting Multidisciplinary Teams and Early Design Stages Using Storyboards (MH, JM, KL, KC), pp. 616–623.
HCIHCI-NT-2009-HermannJSS #internet
Acceptance of Future Technologies Using Personal Data: A Focus Group with Young Internet Users (FH, DJ, DS, AS), pp. 431–437.
HCIHCI-NT-2009-KimWW #adaptation #parametricity #process #recognition #research
The Research on Adaptive Process for Emotion Recognition by Using Time-Dependent Parameters of Autonomic Nervous Response (JK, MCW, JW), pp. 77–84.
HCIHCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #virtual machine
Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
HCIHCI-NT-2009-OkuboF #development #estimation
Development of Estimation System for Concentrate Situation Using Acceleration Sensor (MO, AF), pp. 131–140.
HCIHCI-NT-2009-SuzukiMSANYF #estimation #on the #performance
On the Possibility about Performance Estimation Just before Beginning a Voluntary Motion Using Movement Related Cortical Potential (SS, TM, YS, KA, NN, TY, SF), pp. 184–191.
HCIHCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability
Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
HCIHCI-VAD-2009-CasasOP #education #tablet
Using Tablet PCs and Pen-Based Technologies to Support Engineering Education (IC, SFO, JP), pp. 31–38.
HCIHCI-VAD-2009-MampadiCG #adaptation #hypermedia #information management #learning
The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems (FM, SYC, GG), pp. 156–165.
HCIHCI-VAD-2009-OHearB #enterprise #process #user interface
Using Activity Descriptions to Generate User Interfaces for ERP Software (TO, YB), pp. 577–586.
HCIHCI-VAD-2009-Sano #framework
A Proposal for a Framework for an e-Alumni Program Using SNS (HS), pp. 209–216.
HCIHIMI-DIE-2009-KumeS #analysis #web
Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HCIHIMI-DIE-2009-LaquaiAPR #3d #interactive #multimodal #user interface
Using 3D Touch Interaction for a Multimodal Zoomable User Interface (FL, MA, TP, GR), pp. 543–552.
HCIHIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics
Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HCIHIMI-DIE-2009-MistrzykR #industrial #modelling
Practical Use of Task Models for Building and Modeling Operations Chart in the Industrial Production (TM, AR), pp. 140–148.
HCIHIMI-DIE-2009-NakagawaNM
Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
HCIHIMI-DIE-2009-Soderston #experience #tool support #user interface
A Retrospective and Prospective View of Information Technology Professionals’ Use of Tools: Maturing the User Experience (CS), pp. 306–315.
HCIHIMI-DIE-2009-SrinivasSPK #classification #feature model #performance
Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HCIHIMI-II-2009-HadaS #development #mobile #process
Development of an Annotation-Based Classroom Activities Support Environment Using Digital Appliance, Mobile Device and PC (YH, MS), pp. 642–649.
HCIHIMI-II-2009-HasegawaOWMM #estimation #mobile
Legible Character Size on Mobile Terminal Screens: Estimation Using Pinch-in/Out on the iPod Touch Panel (SH, MO, TW, SM, MM), pp. 395–402.
HCIHIMI-II-2009-KimMC #clustering #network #protocol
A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
HCIHIMI-II-2009-KimMPH #performance #visualisation
Efficient Annotation Visualization Using Distinctive Features (SKK, SHM, JP, SYH), pp. 295–303.
HCIHIMI-II-2009-LigdaJLJ #automation #distributed #tool support
Pilot Confidence with ATC Automation Using Cockpit Situation Display Tools in a Distributed Traffic Management Environment (SVL, NHJ, JL, WWJ), pp. 816–825.
HCIHIMI-II-2009-MilanovaKRTK #adaptation #image #representation #retrieval
Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation (MGM, RK, SHR, VT, RK), pp. 304–314.
HCIHIMI-II-2009-SawaragiIHN #approach #identification
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIHIMI-II-2009-SchwarzlerRWR #modelling #visual notation
Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System (SS, GR, FW, GR), pp. 201–209.
HCIHIMI-II-2009-WatanabeOHMM #mobile
Usefulness of Mobile Information Provision Systems Using Graphic Text -Visibility of Graphic Text on Mobile Phones (TW, MO, SH, SM, MM), pp. 476–485.
HCIHIMI-II-2009-YajimaSM
Remote Consultation System Using Hierarchically Structured Agents (HY, JS, KM), pp. 609–618.
HCIIDGD-2009-BoseS #hypermedia
The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
HCIIDGD-2009-EngleF #metric #multi #scalability
Rescaling Non-metric Data to Metric Data Using Multi-Dimensional Scaling (KME, GAF), pp. 245–253.
HCIIDGD-2009-PhukanR #eye tracking #usability
Considerations for Using Eye Trackers during Usability Studies (AP, MR), pp. 301–307.
HCIIDGD-2009-SwansonSG #framework
Exploring Cultural Context Using the Contextual Scenario Framework (ES, KS, JG), pp. 117–126.
HCIOCSC-2009-AndersenFLN #development #game studies
The Coming Revolution in Competence Development: Using Serious Games to Improve Cross-Cultural Skills (BA, MF, PL, VPN), pp. 413–422.
HCIOCSC-2009-ChaLHK #evaluation
User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence (JWC, HwL, YSH, LK), pp. 305–311.
HCIOCSC-2009-JohnsonB #community #wiki
Creating Community through the Use of a Class Wiki (KAJ, JB), pp. 471–478.
HCIOCSC-2009-KadenbachK #challenge #collaboration #development #education #social
Benefits and Challenges of Using Collaborative Development Environments with Social Software in Higher Computer Science Education (DK, CK), pp. 479–487.
HCIOCSC-2009-SongNKE #recommendation #word
A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
HCIOCSC-2009-TsuchihashiO #case study #interface
A Study on the Interface for Viewing the Information Menu of a Town from Intersections Using a Digital Compass (MT, KO), pp. 126–133.
CAiSECAiSE-2009-GaillyP #modelling #ontology #standard
Using the REA Ontology to Create Interoperability between E-Collaboration Modeling Standards (FG, GP), pp. 395–409.
CAiSECAiSE-2009-GiachettiMP #automation #domain-specific language #generative #modelling #uml
Using UML as a Domain-Specific Modeling Language: A Proposal for Automatic Generation of UML Profiles (GG, BM, OP), pp. 110–124.
CAiSECAiSE-2009-KaiyaTSSK #analysis #quality #requirements
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSECAiSE-2009-LiuLYWH #analysis #constraints #verification #workflow
ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
CAiSECAiSE-2009-MaoBPF #automation #generative
Defining and Using Schematic Correspondences for Automatically Generating Schema Mappings (LM, KB, NWP, AAAF), pp. 79–93.
CAiSECAiSE-2009-SalayM #diagrams #quality #test coverage
Improving Model Quality Using Diagram Coverage Criteria (RS, JM), pp. 186–200.
CAiSECAiSE-2009-SalayME #megamodelling #modelling
Using Macromodels to Manage Collections of Related Models (RS, JM, SME), pp. 141–155.
EDOCEDOC-2009-BoukhebouzeABM #modelling #process #rule-based #verification
Rule-Based Modeling and Verification of Business Processes Using ECAPE Net (MB, YA, ANB, ZM), p. 74–?.
EDOCEDOC-2009-BucklEMRS #architecture #enterprise
Using Enterprise Architecture Management Patterns to Complement TOGAF (SB, AME, FM, RR, CMS), pp. 34–41.
ICEISICEIS-AIDSS-2009-CastroAP #approach #concept #implementation #metadata #named
K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
ICEISICEIS-AIDSS-2009-CastroO #multi #quality
Using Quality Costs in a Multi-agent System for an Airline Operations Control (AJMC, EO), pp. 19–24.
ICEISICEIS-AIDSS-2009-ChongC
An Investigation into Dynamic Customer Requirement using Computational Intelligence (YTC, CHC), pp. 113–117.
ICEISICEIS-AIDSS-2009-KhashmanD #image #network
Optimum DCT Compression of Medical Images using Neural Networks (AK, KD), pp. 90–95.
ICEISICEIS-AIDSS-2009-KuoWHH #clustering #network #optimisation #order
An Order Clustering System using ART2 Neural Network and Particle Swarm Optimization Methodn (RJK, MJW, TWH, TLH), pp. 54–59.
ICEISICEIS-AIDSS-2009-MarinicaOG #algorithm #mining
User-driven Association Rule Mining using a Local Algorithm (CM, AO, FG), pp. 200–205.
ICEISICEIS-AIDSS-2009-OReilly #algorithm #multi #optimisation
Frequency Assignment Optimization using the Swarm Intelligence Multi-agent based Algorithm (SIMBA) (GBO), pp. 25–32.
ICEISICEIS-AIDSS-2009-RaimbaultGL #diagrams #information management #uml
Using UML Class Diagram as a Knowledge Engineering Tool (TR, DG, SL), pp. 60–65.
ICEISICEIS-AIDSS-2009-RodriguesNCM
Estimating Greenhouse Gas Emissions using Computational Intelligence (JAPR, LBN, PHGC, JCCBSdM), pp. 248–250.
ICEISICEIS-AIDSS-2009-SunLTT #2d #invariant #recognition
Using GRA for 2D Invariant Object Recognition (THS, JCL, CHT, FCT), pp. 108–112.
ICEISICEIS-AIDSS-2009-TsengCH #approach #assembly #multi #sequence
A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
ICEISICEIS-DISI-2009-GroppeGK #optimisation
Optimization of SPARQL by using coreSPARQL (JG, SG, JK), pp. 107–112.
ICEISICEIS-DISI-2009-GuerraBOSS #keyword #named
Keymantic: A Keyword-based Search Engine using Structural Knowledge (FG, SB, MO, AS, CS), pp. 241–246.
ICEISICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics
Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEISICEIS-DISI-2009-MoserMBM #approach #integration #modelling #performance #requirements #semantics
Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
ICEISICEIS-DISI-2009-RomeuAC #integration #metric
Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEISICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #web
Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
ICEISICEIS-HCI-2009-NakanishiTO #artificial reality #complexity #design #effectiveness #guidelines #verification
Study for Establishing Design Guidelines for Manuals using Augmented Reality Technology — Verification and Expansion of the Basic Model Describing “Effective Complexity” (MN, SiT, YO), pp. 21–26.
ICEISICEIS-HCI-2009-NetoD #case study #gesture #scalability
A Study on the use of Gestures for Large Displays (AN, CD), pp. 55–60.
ICEISICEIS-ISAS-2009-CiaramellaCLM #agile #process #prototype
Using BPMN and Tracing for Rapid Business Process Prototyping Environments (AC, MGCAC, BL, FM), pp. 206–212.
ICEISICEIS-ISAS-2009-FerreiraCAB #modelling #requirements
Keeping the Rationale of IS Requirements using Organizational Business Models (JJF, VMC, RMdA, FAB), pp. 292–297.
ICEISICEIS-ISAS-2009-KinderenGA #modelling #multi #reasoning
Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models (SdK, JG, HA), pp. 131–136.
ICEISICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #xml
A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
ICEISICEIS-ISAS-2009-NascimentoITR #legacy #process
A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEISICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process
Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEISICEIS-J-2009-CallegariB #fuzzy #logic #multi
A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEISICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #safety
Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
ICEISICEIS-J-2009-GadK #clustering #performance #semantics #similarity
Enhancing Text Clustering Performance Using Semantic Similarity (WKG, MSK), pp. 325–335.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEISICEIS-J-2009-NachevHS #fuzzy #network #predict
Insolvency Prediction of Irish Companies Using Backpropagation and Fuzzy ARTMAP Neural Networks (AN, SH, BS), pp. 287–298.
ICEISICEIS-J-2009-NollR #concept #traceability
Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
ICEISICEIS-J-2009-Sun #network
Stereo Matching Using Synchronous Hopfield Neural Network (THS), pp. 336–347.
ICEISICEIS-SAIC-2009-CernuzziZ #design #named #tool support
Gaia4E: A Tool Supporting the Design of MAS using Gaia (LC, FZ), pp. 82–88.
ICEISICEIS-SAIC-2009-CiuffoI #case study #collaboration #information management #recommendation
Using Grids to Support Information Filtering Systems — A Case Study of Running Collaborative Filtering Recommendations on gLite (LNC, EI), pp. 12–18.
ICEISICEIS-SAIC-2009-GandhiT #categorisation #email #ontology
Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEISICEIS-SAIC-2009-LeeLK #classification
Blog Classification using K-means (KJL, ML, WK), pp. 61–67.
CIKMCIKM-2009-AchananuparpYC
Using negative voting to diversify answers in non-factoid question answering (PA, CCY, XC), pp. 1681–1684.
CIKMCIKM-2009-AlgarniLXL #effectiveness #feedback #information management
An effective model of using negative relevance feedback for information filtering (AA, YL, YX, RYKL), pp. 1605–1608.
CIKMCIKM-2009-AlonsoGB #clustering #timeline
Clustering and exploring search results using timeline constructions (OA, MG, RABY), pp. 97–106.
CIKMCIKM-2009-AnastasakosHKR #approach #collaboration #graph #recommendation
A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
CIKMCIKM-2009-BalasubramanianC #automation #generative #modelling #topic
Automatic generation of topic pages using query-based aspect models (NB, SC), pp. 2049–2052.
CIKMCIKM-2009-BatalH #classification
Boosting KNN text classification accuracy by using supervised term weighting schemes (IB, MH), pp. 2041–2044.
CIKMCIKM-2009-BohmNPW #clustering
Density-based clustering using graphics processors (CB, RN, CP, BW), pp. 661–670.
CIKMCIKM-2009-CaoCCJZ #categorisation #modelling #retrieval
The use of categorization information in language models for question retrieval (XC, GC, BC, CSJ, CZ), pp. 265–274.
CIKMCIKM-2009-DasdanDKD #automation #interface #query #retrieval
Automatic retrieval of similar content using search engine query interface (AD, PD, SK, CD), pp. 701–710.
CIKMCIKM-2009-DengKL #retrieval
Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
CIKMCIKM-2009-FernandezL #retrieval
Using opinion-based features to boost sentence retrieval (RTF, DEL), pp. 1617–1620.
CIKMCIKM-2009-GurajadaK #clustering #maintenance #online
On-line index maintenance using horizontal partitioning (SG, PSK), pp. 435–444.
CIKMCIKM-2009-GwaderaC #mining #ranking
Mining and ranking streams of news stories using cross-stream sequential patterns (RG, FC), pp. 1709–1712.
CIKMCIKM-2009-HuSZC #clustering #semantics
Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
CIKMCIKM-2009-IslamI #set #web
Real-word spelling correction using Google web 1Tn-gram data set (AI, DI), pp. 1689–1692.
CIKMCIKM-2009-KatoOOT #query #relational #web
Query by analogical example: relational search using web search engine indices (MPK, HO, SO, KT), pp. 27–36.
CIKMCIKM-2009-KhareA #empirical #interface #markov #segmentation
An empirical study on using hidden markov model for search interface segmentation (RK, YA), pp. 17–26.
CIKMCIKM-2009-KimC #pseudo #retrieval
Retrieval experiments using pseudo-desktop collections (JK, WBC), pp. 1297–1306.
CIKMCIKM-2009-KobayakawaKTOKT #analysis #classification #kernel
Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKMCIKM-2009-KuttyNL #approach #clustering #documentation #named #xml
XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
CIKMCIKM-2009-LeeNL #approach #feedback #retrieval
An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
CIKMCIKM-2009-LeeVRKMI #adaptation #performance #topic
Measuring system performance and topic discernment using generalized adaptive-weight mean (CTL, VV, EMR, GK, NMF, AI), pp. 2033–2036.
CIKMCIKM-2009-LiuZ #classification #sentiment
Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKMCIKM-2009-LuHM #algorithm #approximate #performance
Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKMCIKM-2009-MabroukehE #mining #ontology #predict #semantics #web
Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
CIKMCIKM-2009-MaCQG #game studies
Improving search engines using human computation games (HM, RC, CQ, AG), pp. 275–284.
CIKMCIKM-2009-MartineauFJP #classification #difference #problem #word
Improving binary classification on text problems using differential word features (JM, TF, AJ, SP), pp. 2019–2024.
CIKMCIKM-2009-MouzaLRS #algebra #n-gram #named #string
AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
CIKMCIKM-2009-PanCASD #feature model #ranking
Feature selection for ranking using boosted trees (FP, TC, DA, FS, GD), pp. 2025–2028.
CIKMCIKM-2009-ParkG #automation #metric #realtime #towards
Towards real-time measurement of customer satisfaction using automatically generated call transcripts (YP, SCG), pp. 1387–1396.
CIKMCIKM-2009-ParkR #analysis #information retrieval #kernel #semantics
Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKMCIKM-2009-PuH #clustering #feedback #pseudo #semantics
Pseudo relevance feedback using semantic clustering in relevance language model (QP, DH), pp. 1931–1934.
CIKMCIKM-2009-RachakondaS #topic
Finding the topical anchors of a context using lexical cooccurrence data (ARR, SS), pp. 1741–1744.
CIKMCIKM-2009-RafieiL #query #web
Data extraction from the web using wild card queries (DR, HL), pp. 1939–1942.
CIKMCIKM-2009-SeoCS #community #concurrent #online #thread
Online community search using thread structure (JS, WBC, DAS), pp. 1907–1910.
CIKMCIKM-2009-VienVCYKC #kernel #locality #named #visualisation
VRIFA: a nonlinear SVM visualization tool using nomogram and localized radial basis function (LRBF) kernels (NAV, NHV, TC, HY, SK, BHC), pp. 2081–2082.
CIKMCIKM-2009-ViyanonM #database #detection #relational #similarity #xml
A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKMCIKM-2009-VriesKCC #array #robust
Robust record linkage blocking using suffix arrays (TdV, HK, SC, PC), pp. 305–314.
CIKMCIKM-2009-WangML #learning #programming #question #rank #search-based
Learning to rank using evolutionary computation: immune programming or genetic programming? (SW, JM, JL), pp. 1879–1882.
CIKMCIKM-2009-WimalasuriyaD #information management #multi #ontology
Using multiple ontologies in information extraction (DCW, DD), pp. 235–244.
CIKMCIKM-2009-WuCZZ #approach #definite clause grammar #learning #novel #rank
Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
CIKMCIKM-2009-WuTW #query #revisited #xml
Answering XML queries using materialized views revisited (XW, DT, WHW), pp. 475–484.
CIKMCIKM-2009-XiaYZ #automation #web
Automatic web data extraction using tree alignment (YX, HY, SZ), pp. 1645–1648.
CIKMCIKM-2009-XuFZH #feature model #orthogonal
To obtain orthogonal feature extraction using training data selection (YX, SF, JZ, OH), pp. 1819–1822.
CIKMCIKM-2009-YangXBHSY #case study #cumulative #generative #information retrieval #social
A study of information retrieval on accumulative social descriptions using the generation features (LY, SX, SB, DH, ZS, YY), pp. 721–730.
ECIRECIR-2009-Ailon #algorithm #linear #query #ranking
A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
ECIRECIR-2009-BolelliEG #detection #topic
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
ECIRECIR-2009-Efron #aspect-oriented #multi #query
Using Multiple Query Aspects to Build Test Collections without Human Relevance Judgments (ME), pp. 276–287.
ECIRECIR-2009-HalveyPHVHGJ #case study #difference #low level #metric #retrieval #video
Diversity, Assortment, Dissimilarity, Variety: A Study of Diversity Measures Using Low Level Features for Video Retrieval (MH, PP, DH, RV, FH, AG, JMJ), pp. 126–137.
ECIRECIR-2009-KarimzadehganWR
Enhancing Expert Finding Using Organizational Hierarchies (MK, RWW, MR), pp. 177–188.
ECIRECIR-2009-LlorenteR #automation #higher-order #image #statistics
Using Second Order Statistics to Enhance Automated Image Annotation (AL, SMR), pp. 570–577.
ECIRECIR-2009-MissenB #detection #semantics
Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
ECIRECIR-2009-WeerkampBR #email #information management
Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ECIRECIR-2009-YinSC #query
Query Expansion Using External Evidence (ZY, MS, NC), pp. 362–374.
ICMLICML-2009-CamposZJ #constraints #learning #network
Structure learning of Bayesian networks using constraints (CPdC, ZZ, QJ), pp. 113–120.
ICMLICML-2009-LiKZ #learning
Semi-supervised learning using label mean (YFL, JTK, ZHZ), pp. 633–640.
ICMLICML-2009-PlathTN #classification #image #multi #random #segmentation
Multi-class image segmentation using conditional random fields and global classification (NP, MT, SN), pp. 817–824.
ICMLICML-2009-RainaMN #learning #scalability
Large-scale deep unsupervised learning using graphics processors (RR, AM, AYN), pp. 873–880.
ICMLICML-2009-Schmidt #process
Function factorization using warped Gaussian processes (MNS), pp. 921–928.
ICMLICML-2009-TielemanH #performance #persistent
Using fast weights to improve persistent contrastive divergence (TT, GEH), pp. 1033–1040.
ICMLICML-2009-Toussaint #approximate #optimisation
Robot trajectory optimization using approximate inference (MT), pp. 1049–1056.
ICMLICML-2009-YiWSS #probability
Stochastic search using the natural gradient (YS, DW, TS, JS), pp. 1161–1168.
ICMLICML-2009-YuLZG #collaboration #parametricity #predict #random #scalability
Large-scale collaborative prediction using a nonparametric random effects model (KY, JDL, SZ, YG), pp. 1185–1192.
ICMLICML-2009-ZhanLLZ #learning #metric
Learning instance specific distances using metric propagation (DCZ, ML, YFL, ZHZ), pp. 1225–1232.
KDDKDD-2009-DundarHBRR #case study #dataset #detection #learning
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
KDDKDD-2009-FuxmanKGATS #automation #classification
Improving classification accuracy using automatically extracted training data (AF, AK, ABG, RA, PT, JCS), pp. 1145–1154.
KDDKDD-2009-JiYLZKY #interactive
Drosophila gene expression pattern annotation using sparse features and term-term interactions (SJ, LY, YXL, ZHZ, SK, JY), pp. 407–416.
KDDKDD-2009-Macskassy #empirical #graph #learning #metric
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
KDDKDD-2009-MakanjuZM #clustering
Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDDKDD-2009-MaunzHK #graph #mining #refinement #scalability
Large-scale graph mining using backbone refinement classes (AM, CH, SK), pp. 617–626.
KDDKDD-2009-PatnaikMSR #data mining #mining
Sustainable operation and management of data center chillers using temporal data mining (DP, MM, RKS, NR), pp. 1305–1314.
KDDKDD-2009-SatuluriP #clustering #community #graph #probability #scalability
Scalable graph clustering using stochastic flows: applications to community discovery (VS, SP), pp. 737–746.
KDDKDD-2009-VatturiW #detection
Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
KDDKDD-2009-XuYL #mining
Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
KDIRKDIR-2009-DuarteDRF #clustering #consistency
Cluster Ensemble Selection — Using Average Cluster Consistency (FJFD, JMMD, FR, ALNF), pp. 85–95.
KDIRKDIR-2009-FatemiPRS #concept #mining #retrieval #semantics #video
Using Association Rule Mining to Enrich Semantic Concepts for Video Retrieval (NF, FP, LER, AFS), pp. 119–126.
KDIRKDIR-2009-GoyalBM #query
Entailment of Causal Queries in Narratives using Action Language (PG, LB, TMM), pp. 112–118.
KDIRKDIR-2009-GuoK #ontology
Discovering Relationship Associations in Life Sciences using Ontology and Inference (WG, SBK), pp. 10–17.
KDIRKDIR-2009-KimRM #retrieval #semantics
A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KDIRKDIR-2009-KulkarniC #concept #semantics #word
Computation of the Semantic Relatedness between Words using Concept Clouds (SK, DC), pp. 183–188.
KDIRKDIR-2009-LamB #categorisation #invariant #multi
Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
KDIRKDIR-2009-WangVH #documentation #probability #retrieval
Document Retrieval using a Probabilistic Knowledge Model (SW, SV, MH), pp. 26–33.
KEODKEOD-2009-CeaGMS #development #ontology
Using Linguistic Patterns to Enhance Ontology Development (GAdC, AGP, EMP, MdCSF), pp. 206–213.
KEODKEOD-2009-DumitrescuK #performance #reuse #self #towards
Towards Social-software for the Efficient Reuse of Solution Patterns for Self-optimizing Systems (RD, BK), pp. 342–347.
KEODKEOD-2009-Hufflen #component #framework #non-functional
A Framework for Managing Components using Non-functional Properties (JMH), pp. 460–463.
KEODKEOD-2009-YiR #algorithm #clustering #ontology
Using a Clustering Algorithm for Domain Related Ontology Construction (HY, VJRS), pp. 336–341.
KEODKEOD-2009-ZghalKYN #composition #named #ontology
OACAS — Ontologies Alignment using Composition and Aggregation of Similarities (SZ, MK, SBY, EMN), pp. 233–238.
KMISKMIS-2009-AlvesM #correlation
Best use of Knowledge in a Space Program — Managing the Correlated Technologies (MBA, AMM), pp. 301–304.
KMISKMIS-2009-Kume #analysis #visual notation #web
Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
MLDMMLDM-2009-CelepcikayEO #dataset
Regional Pattern Discovery in Geo-referenced Datasets Using PCA (OUC, CFE, CO), pp. 719–733.
MLDMMLDM-2009-GadK #clustering #semantics #similarity
New Semantic Similarity Based Model for Text Clustering Using Extended Gloss Overlaps (WKG, MSK), pp. 663–677.
MLDMMLDM-2009-GoncalvesQ #classification #kernel #semantics
Using Graph-Kernels to Represent Semantic Information in Text Classification (TG, PQ), pp. 632–646.
MLDMMLDM-2009-KobayashiS #classification #distributed #linear #representation
A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDMMLDM-2009-NunesSP #detection #image
Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
MLDMMLDM-2009-QureshiZ #quality
Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
MLDMMLDM-2009-RiesenB #difference #graph #prototype #reduction
Dissimilarity Based Vector Space Embedding of Graphs Using Prototype Reduction Schemes (KR, HB), pp. 617–631.
MLDMMLDM-2009-SilvaSNPJN #classification #geometry #image #metric
Lung Nodules Classification in CT Images Using Simpson’s Index, Geometrical Measures and One-Class SVM (CAdS, ACS, SMBN, ACdP, GBJ, RAN), pp. 810–822.
RecSysRecSys-2009-Golbeck #recommendation #social #trust #tutorial
Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSysRecSys-2009-JamaliE #network #recommendation #trust
Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSysRecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust
FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSysRecSys-2009-PhelanMS #realtime #recommendation #topic #twitter
Using twitter to recommend real-time topical news (OP, KM, BS), pp. 385–388.
RecSysRecSys-2009-QuerciaC #mobile #named #recommendation
FriendSensing: recommending friends using mobile phones (DQ, LC), pp. 273–276.
RecSysRecSys-2009-UmyarovT #estimation #modelling #rating #recommendation
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models (AU, AT), pp. 37–44.
SEKESEKE-2009-AhsanFW #debugging #estimation #machine learning
Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKESEKE-2009-AndresMN #mining #realtime #testing
Using a Mining Frequency Patterns Model to Automate Passive Testing of Real-time Systems (CA, MGM, MN), pp. 426–431.
SEKESEKE-2009-FarZYA #concept #documentation #learning #semantics
Realization of Semantic Search Using Concept Learning and Document Annotation Agents (BHF, CZ, Z(Y, MA), pp. 164–169.
SEKESEKE-2009-GarlanCSBC #analysis #architecture
Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKESEKE-2009-HuangCPHP #automation #information management
Automated Nursing Knowledge Management Using Indexing (SH, SC, ASP, SH, MP), pp. 93–96.
SEKESEKE-2009-LemkeR #framework #platform
Using Knowledge Objects to Exchange Knowledge in a MAS Platform (APL, MBR), pp. 206–211.
SEKESEKE-2009-PengLPF #algorithm #requirements
Requirements Discovery Based on RGPS Using Evolutionary Algorithm (TP, BL, WP, ZF), pp. 286–290.
SEKESEKE-2009-PortoMF #comprehension #visualisation
The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
SEKESEKE-2009-RusNSC #algorithm #clustering #fault #graph
Clustering of Defect Reports Using Graph Partitioning Algorithms (VR, XN, SGS, YC), pp. 442–445.
SEKESEKE-2009-WilliamsR #risk management #statistics
Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIRSIGIR-2009-ArampatzisKR #optimisation
Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
SIGIRSIGIR-2009-BolourianMR #named #quantifier #topic
SugarCube: quantification of topic propagation in the blogosphere using percolation theory (AAB, YM, CJvR), pp. 786–787.
SIGIRSIGIR-2009-Bossard #automation #documentation #summary
Using document structure for automatic summarization (AB), p. 849.
SIGIRSIGIR-2009-BrunoM #approach #clustering #modelling #multi
Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
SIGIRSIGIR-2009-CarmelRZ #clustering #wiki
Enhancing cluster labeling using wikipedia (DC, HR, NZ), pp. 139–146.
SIGIRSIGIR-2009-Collins-ThompsonB #performance #predict #query
Estimating query performance using class predictions (KCT, PNB), pp. 672–673.
SIGIRSIGIR-2009-DouSNW #web
Using anchor texts with their hyperlink structure for web search (ZD, RS, JYN, JRW), pp. 227–234.
SIGIRSIGIR-2009-GuanBMCW #graph #multi #personalisation #ranking #recommendation
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects (ZG, JB, QM, CC, CW), pp. 540–547.
SIGIRSIGIR-2009-ItakuraC #detection #markov #wiki
Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
SIGIRSIGIR-2009-KapteinKK #ad hoc #category theory #wiki
Using wikipedia categories for ad hoc search (RK, MK, JK), pp. 824–825.
SIGIRSIGIR-2009-KeikhaCC #random
Blog distillation using random walks (MK, MJC, FC), pp. 638–639.
SIGIRSIGIR-2009-KumaranC #predict #quality #query
Reducing long queries using query quality predictors (GK, VRC), pp. 564–571.
SIGIRSIGIR-2009-LeeLP #reduction #similarity
Tag-based object similarity computation using term space dimension reduction (YKL, SJL, JP), pp. 790–791.
SIGIRSIGIR-2009-Liu #community #ranking
Using computational community interest as an indicator for ranking (XL), p. 851.
SIGIRSIGIR-2009-Liu09a #information retrieval #personalisation #topic
Personalizing information retrieval using task features, topic knowledge, and task product (JL), p. 855.
SIGIRSIGIR-2009-MaCQG #game studies
Page hunt: improving search engines using human computation games (HM, RC, CQ, AG), pp. 746–747.
SIGIRSIGIR-2009-McDougallM
Expertise search in academia using facets (DM, CM), p. 834.
SIGIRSIGIR-2009-MetzlerNCR #documentation
Building enriched document representations using aggregated anchor text (DM, JN, HC, SR), pp. 219–226.
SIGIRSIGIR-2009-NohPYLP #automation #folksonomy #multi #network
An automatic translation of tags for multimedia contents using folksonomy networks (TGN, SBP, HGY, SJL, SYP), pp. 492–499.
SIGIRSIGIR-2009-PunithaJG #automation #feature model #multi #query #retrieval #topic #video
Topic prerogative feature selection using multiple query examples for automatic video retrieval (PP, JMJ, AG), pp. 804–805.
SIGIRSIGIR-2009-RavanaPM
System scoring using partial prior information (SDR, LAFP, AM), pp. 788–789.
SIGIRSIGIR-2009-SeoJ #graph #precise #retrieval
High precision retrieval using relevance-flow graph (JS, JJ), pp. 694–695.
SIGIRSIGIR-2009-SiersdorferPS #automation #video
Automatic video tagging using content redundancy (SS, JSP, MS), pp. 395–402.
SIGIRSIGIR-2009-SubramaniamSDV #fuzzy #similarity #string
Experiments in CLIR using fuzzy string search based on surface similarity (SS, AKS, PD, VV), pp. 682–683.
SIGIRSIGIR-2009-TomasikTT #classification #image
Tagging products using image classification (BT, PT, DT), pp. 792–793.
SIGIRSIGIR-2009-WangLF #automation #fuzzy #predict
Automatic URL completion and prediction using fuzzy type-ahead search (JW, GL, JF), pp. 634–635.
SIGIRSIGIR-2009-XuM #web
Evaluating web search using task completion time (YX, DM), pp. 676–677.
SIGIRSIGIR-2009-YehK #documentation #image
Searching documentation using text, OCR, and image (TY, BK), pp. 776–777.
ECMFAECMDA-FA-2009-EvansFM #case study #eclipse #experience #modelling #network
Experiences of Developing a Network Modeling Tool Using the Eclipse Environment (AE, MAF, PM), pp. 301–312.
ECMFAECMDA-FA-2009-KublerG #approach #mining #qvt
A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
ECMFAECMDA-FA-2009-TisiJFCB #higher-order #model transformation #on the
On the Use of Higher-Order Model Transformations (MT, FJ, PF, SC, JB), pp. 18–33.
ICMTICMT-2009-AmstelLB #asf+sdf #metric #model transformation #quality
Using Metrics for Assessing the Quality of ASF+SDF Model Transformations (MvA, CFJL, MvdB), pp. 239–248.
ICMTICMT-2009-FabroABJ #model transformation
Achieving Rule Interoperability Using Chains of Model Transformations (MDDF, PA, JB, FJ), pp. 249–259.
MODELSMoDELS-2009-DrusinskyS #logic #uml
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
SPLCSPLC-2009-SchmidL #optimisation #product line
Introducing and optimizing software product lines using the FEF (KS, FvdL), p. 311.
SPLCSPLC-2009-Voelter #domain-specific language #product line
Using domain specific languages for product line engineering (MV), p. 329.
MODELSMoDELS-2009-DrusinskyS #logic #uml
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
ECOOPECOOP-2009-CutsemBDM
Adding State and Visibility Control to Traits Using Lexical Nesting (TVC, AB, SD, WDM), pp. 220–243.
ECOOPECOOP-2009-XuRS #alias #analysis #points-to #scalability
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLAOOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
TOOLSTOOLS-EUROPE-2009-BruniV #generative #named #prototype #virtual machine
PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy (CB, TV), pp. 328–347.
TOOLSTOOLS-EUROPE-2009-SadilekW #grammarware #semantics
Using Grammarware Languages to Define Operational Semantics of Modelled Languages (DAS, GW), pp. 348–356.
TOOLSTOOLS-EUROPE-2009-StrickerHS #constraints #design #diagrams #uml
Designing Design Constraints in the UML Using Join Point Designation Diagrams (VS, SH, DS), pp. 57–76.
AdaEuropeAdaEurope-2009-Montoya-DatoAG #ada #experience #online #programming
An Experience on Ada Programming Using On-Line Judging (FJMD, JLFA, GGM), pp. 75–89.
LOPSTRLOPSTR-2009-AstefanoaeiBR #testing
Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
LOPSTRLOPSTR-2009-CzenkoE #flexibility
LP with Flexible Grouping and Aggregates Using Modes (MC, SE), pp. 67–81.
LOPSTRLOPSTR-2009-ScandoloKH #parallel #pipes and filters
Program Parallelization Using Synchronized Pipelining (LS, CK, MVH), pp. 173–187.
PADLPADL-2009-MaldeO #analysis #haskell #scalability #sequence
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
PEPMPEPM-2009-CifuentesKLS #debugging #detection #program analysis
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPMPEPM-2009-SalamaMTGO #consistency #dependent type
Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions (CS, GM, WT, JG, JO), pp. 121–130.
PLDIPLDI-2009-AftandilianG #garbage collection
GC assertions: using the garbage collector to check heap properties (EA, SZG), pp. 235–244.
PLDIPLDI-2009-KunduTL #equivalence #optimisation #proving
Proving optimizations correct using parameterized program equivalence (SK, ZT, SL), pp. 327–337.
PLDIPLDI-2009-MehraraHHM #hardware #low cost #memory management #transaction
Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory (MM, JH, PCH, SAM), pp. 166–176.
PLDIPLDI-2009-RavitchJAL #automation #generative #library #static analysis
Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
PLDIPLDI-2009-SrivastavaG #abstraction #verification
Program verification using templates over predicate abstraction (SS, SG), pp. 223–234.
PLDIPLDI-2009-TorreMP #calculus #fixpoint #recursion #source code
Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
POPLPOPL-2009-BrunelDHLM #logic #model checking
A foundation for flow-based program matching: using temporal logic and model checking (JB, DD, RRH, JLL, GM), pp. 114–126.
SASSAS-2009-DohKS #parsing #static analysis #string
Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
SASSAS-2009-Qadeer #algorithm #smt #verification
Algorithmic Verification of Systems Software Using SMT Solvers (SQ), p. 2.
SASSAS-2009-Simon #analysis #optimisation #pointer #similarity
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
AdaSIGAda-2009-Barkstrom #ada #algorithm #concurrent #multi #on the #problem
On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms (BRB), pp. 61–72.
AdaSIGAda-2009-DelangePPKSK #simulation #validation
Validate, simulate, and implement ARINC653 systems using the AADL (JD, LP, AP, MK, FS, FK), pp. 31–44.
AdaSIGAda-2009-LosebyCB #embedded
Use of SPARK in a resource constrained embedded system (CL, PC, CB), pp. 87–90.
AdaSIGAda-2009-Sward09a #ada
Georegistration of imagery from unmanned aircraft systems using Ada (RES), pp. 121–126.
RERE-2009-AdamDEG #requirements
Using Task-oriented Requirements Engineering in Different Domains (SA, JD, ME, AG), pp. 267–272.
RERE-2009-CarvalloF #component #on the #process #requirements
On the Use of Requirements for Driving Call-for-Tender Processes for Procuring Coarse-grained OTS Components (JPC, XF), pp. 287–292.
RERE-2009-KonradD #industrial #lessons learnt #modelling
Lessons Learned from the Use of Artifact Models in Industrial Projects (SK, HD), pp. 349–354.
RERE-2009-TunJLNY #problem
Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
ASEASE-2009-CassellAGN #automation #clustering #towards
Towards Automating Class-Splitting Using Betweenness Clustering (KC, PA, LG, JN), pp. 595–599.
ASEASE-2009-GuldaliFJSE #automation #clustering #requirements #testing
Semi-automated Test Planning for e-ID Systems by Using Requirements Clustering (BG, HF, MJ, SS, GE), pp. 29–39.
ASEASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASEASE-2009-LedruPB #string #testing
Using String Distances for Test Case Prioritisation (YL, AP, SB), pp. 510–514.
ASEASE-2009-LiXTHS #automation #generative #named #regular expression #source code #testing
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions (NL, TX, NT, JdH, WS), pp. 515–519.
ASEASE-2009-MalikGEK #automation #data type #debugging
A Case for Automated Debugging Using Data Structure Repair (MZM, KG, BE, SK), pp. 620–624.
ASEASE-2009-RayMACSM #validation #verification
Validating Automotive Control Software Using Instrumentation-Based Verification (AR, IM, CA, RC, CPS, CM), pp. 15–25.
ASEASE-2009-WeiglhoferFW #fault #locality #testing
Using Spectrum-Based Fault Localization for Test Case Grouping (MW, GF, FW), pp. 630–634.
ASEASE-2009-YuAB #analysis #generative #source code #string
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ESEC-FSEESEC-FSE-2009-MaiaKUM #modelling #probability #refinement #towards
Towards accurate probabilistic models using state refinement (PHMM, JK, SU, NCM), pp. 281–284.
ESEC-FSEESEC-FSE-2009-VangalaCT #clustering #comparison #execution #testing
Test case comparison and clustering using program profiles and static execution (VV, JC, PT), pp. 293–294.
ICSEICSE-2009-CalinescuK #analysis
Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSEICSE-2009-CasoBGU #abstraction #contract #finite #validation
Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
ICSEICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSEICSE-2009-Hassan #complexity #fault #predict
Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSEICSE-2009-MenziesWBH #how #probability #process
How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
ICSEICSE-2009-MorinBNJ #adaptation #aspect-oriented #modelling
Taming Dynamically Adaptive Systems using models and aspects (BM, OB, GN, JMJ), pp. 122–132.
ICSEICSE-2009-SantelicesJYH #lightweight #multi
Lightweight fault-localization using multiple coverage types (RAS, JAJ, YY, MJH), pp. 56–66.
ICSEICSE-2009-WeimerNGF #automation #programming #search-based
Automatically finding patches using genetic programming (WW, TN, CLG, SF), pp. 364–374.
ICSEICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social
Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
SACSAC-2009-Abbadeni #database #information retrieval #multi #query #visual notation
Information retrieval from visual databases using multiple representations and multiple queries (NA), pp. 1523–1527.
SACSAC-2009-BaechlerBH #image #modelling #verification
Labeled images verification using Gaussian mixture models (MB, JLB, JH), pp. 1331–1335.
SACSAC-2009-BreauxLOA #identification #requirements
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-BuresHM #component #product line
Using a product line for creating component systems (TB, PH, MM), pp. 501–508.
SACSAC-2009-CaldersGPR #mining #process
Using minimum description length for process mining (TC, CWG, MP, AR), pp. 1451–1455.
SACSAC-2009-CasadeiV #design #model checking #probability #self #simulation
Using probabilistic model checking and simulation for designing self-organizing systems (MC, MV), pp. 2103–2104.
SACSAC-2009-ChunLSC #multi #predict #video
An enhanced multi-view video compression using the constrained inter-view prediction (SC, SL, KS, KC), pp. 1811–1815.
SACSAC-2009-DaiMSZ #concept analysis #towards
Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
SACSAC-2009-DaoudTBC #ontology #personalisation
A session based personalized search using an ontological user profile (MD, LTL, MB, BC), pp. 1732–1736.
SACSAC-2009-DelicatoSPOBP #adaptation #aspect-oriented #composition #mobile
Using aspects and dynamic composition to provide context-aware adaptation for mobile applications (FCD, ILAS, PFP, ALSO, TVB, LP), pp. 456–460.
SACSAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing
TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
SACSAC-2009-EsfahaniMSU #mining #process
Using process mining to business process distribution (FSE, MAAM, MNS, NIU), pp. 2140–2145.
SACSAC-2009-FilhoNLA #framework #memory management #mobile #visualisation
A framework for text visualization using memory traffic management for mobile devices (JBFF, JdSRN, CRFL, RMCA), pp. 1847–1848.
SACSAC-2009-FloraTB #forensics #identification #image
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-GonzalesLL #community #online #requirements
Requirements engineering using appreciative inquiry for an online community of caregivers of children with autism (CHG, GL, GDL), pp. 142–146.
SACSAC-2009-HalleV #monitoring #runtime #streaming #web #web service #xml
Runtime monitoring of web service choreographies using streaming XML (SH, RV), pp. 2118–2125.
SACSAC-2009-HarshN #multi
Using geo-spatial session tagging for smart multicast session discovery (PH, REN), pp. 22–27.
SACSAC-2009-HijikataHON #algorithm #analysis
HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-HuangSMZH #approach
A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
SACSAC-2009-JeschkePV #development #web
Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
SACSAC-2009-LemosBOML #code search #reuse #testing
Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
SACSAC-2009-LimaH #approach
Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
SACSAC-2009-LindvallFKCJ #network #semantics
Searching for relevant software change artifacts using semantic networks (ML, RLF, GK, ZC, VPJ), pp. 496–500.
SACSAC-2009-LiuDSYH #algorithm #classification #image #invariant
A new K-View algorithm for texture image classification using rotation-invariant feature (HL, SD, ES, CY, CCH), pp. 914–921.
SACSAC-2009-LiuTS #classification #complexity #learning
Assessing complexity of service-oriented computing using learning classifier systems (LL, ST, HS), pp. 2170–2171.
SACSAC-2009-LuYLELW #correlation #data type #detection #incremental
Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
SACSAC-2009-MacielH #architecture #rest #transaction
An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
SACSAC-2009-MagaudNS #coq #formal method #theorem
Formalizing Desargues’ theorem in Coq using ranks (NM, JN, PS), pp. 1110–1115.
SACSAC-2009-MarquesF #documentation
Reconstructing strip-shredded documents using color as feature matching (MAOM, COAF), pp. 893–894.
SACSAC-2009-MartinsHM #image #multi #re-engineering
Super-resolution image reconstruction using the generalized isotropic multi-level logistic model (ALDM, MRPH, NDAM), pp. 934–938.
SACSAC-2009-MattheT #query
Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degrees (TM, GDT), pp. 1699–1703.
SACSAC-2009-MoallemL #distributed #grid #scheduling
Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
SACSAC-2009-NetoFP #named #people
MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasks (FGdON, JMF, RRGP), pp. 158–159.
SACSAC-2009-OlowoyeyeTF #segmentation
Medical volume segmentation using bank of Gabor filters (AO, MT, SF), pp. 826–829.
SACSAC-2009-PaganoPL #multi #realtime
Real-time multi-view vision systems using WSNs (PP, FP, YL), pp. 2191–2196.
SACSAC-2009-ParkH #embedded #fine-grained #operating system #programming
Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environment (JP, SH), pp. 1952–1956.
SACSAC-2009-ParkKLKK #network #realtime
A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networks (HP, MK, SL, SK, YK), pp. 196–200.
SACSAC-2009-ParkPR #algorithm #automation
Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithms (KP, TP, KRR), pp. 1098–1105.
SACSAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation
A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
SACSAC-2009-PassitoMM #analysis #network #protocol
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-PostarnakevichS #modelling #representation #visualisation
Global-to-local representation and visualization of molecular surfaces using deformable models (NP, RS), pp. 782–787.
SACSAC-2009-RamanathanRG #delivery #framework #people #process #trade-off
The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvement (JR, RR, RG), pp. 259–264.
SACSAC-2009-RodriguesSC #composition #embedded #functional #set #verification
Improving functional verification of embedded systems using hierarchical composition and set theory (CLR, KRGdS, HdNC), pp. 1632–1636.
SACSAC-2009-RyuKC #algorithm #detection #documentation #evolution
A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
SACSAC-2009-SchmidtSS #approach #personalisation #social #web
Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
SACSAC-2009-ShaLW #classification #visual notation
Foreground classification using active template in the scene context for visual surveillance (XS, XL, JW), pp. 943–944.
SACSAC-2009-SherminO #network
Using dynamic bayesian networks to infer gene regulatory networks from expression profiles (AS, MAO), pp. 799–803.
SACSAC-2009-TanakaKTN #navigation #predict
A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SACSAC-2009-TarratacaSC #gesture #recognition #smarttech
The current feasibility of gesture recognition for a smartphone using J2ME (LT, ACS, JMPC), pp. 1642–1649.
SACSAC-2009-TokoroTT #smarttech
A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SACSAC-2009-YounM #email #ontology #personalisation
Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
LDTALDTA-2008-FokkerS09 #abstract interpretation #attribute grammar #functional #source code
Abstract Interpretation of Functional Programs using an Attribute Grammar System (JF, SDS), pp. 117–133.
GPCEGPCE-2009-Nikhil #design #hardware
Using GPCE principles for hardware systems and accelerators: (bridging the gap to HW design) (RSN), pp. 1–2.
ASPLOSASPLOS-2009-CaulfieldGS #clustering #data-driven #memory management #named #performance #power management
Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications (AMC, LMG, SS), pp. 217–228.
ASPLOSASPLOS-2009-SidiroglouLPVNK #automation #named #self
ASSURE: automatic software self-healing using rescue points (SS, OL, CP, NV, JN, ADK), pp. 37–48.
CASECASE-2009-AlenljungL #graph #verification
Formal verification of PLC controlled systems using Sensor Graphs (TA, BL), pp. 164–170.
CASECASE-2009-BalajiGK #case study
Selection of a machine tool for FMS using ELECTRE III — a case study (CMB, AG, RK), pp. 171–176.
CASECASE-2009-BeraN
A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
CASECASE-2009-BukkapatnamMKSK #monitoring #realtime
Real-time monitoring of container stability loss using wireless vibration sensor tags (STSB, SM, JK, VS, RK), pp. 221–226.
CASECASE-2009-ChakiC #approach #automation #fuzzy #multi
An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
CASECASE-2009-GargM #agile #algorithm #clustering #named
RACK: RApid clustering using K-means algorithm (VKG, MNM), pp. 621–626.
CASECASE-2009-HariharanB #markov #process
Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
CASECASE-2009-JohnsonM #animation #automation #optimisation #synthesis
Automated trajectory synthesis from animation data using trajectory optimization (ERJ, TDM), pp. 274–279.
CASECASE-2009-KumarWKSS #analysis #fuzzy #predict #variability
A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASECASE-2009-Makkapati #segmentation
Improved wavelet-based microscope autofocusing for blood smears by using segmentation (VM), pp. 208–211.
CASECASE-2009-NaveenRR #algorithm #difference #evolution #network #search-based
Rule extraction from differential evolution trained radial basis function network using genetic algorithms (NN, VR, CRR), pp. 152–157.
CASECASE-2009-SenguptaDBMD #detection #fault #modelling
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CASECASE-2009-VoronovA #model checking #process #verification
Verification of process operations using model checking (AV, ), pp. 415–420.
CASECASE-2009-YuanZ
Micro-mixing of highly viscous bio-samples using orbital shaking (LY, YFZ), pp. 579–584.
CCCC-2009-AbadiBHHI #implementation #memory management #transaction
Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
DACDAC-2009-AbercrombiePC #design #equation #simulation
Use of lithography simulation for the calibration of equation-based design rule checks (DA, FP, CC), pp. 67–70.
DACDAC-2009-BaiocchiC #in memory #memory management
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DACDAC-2009-ChoudhuryM #logic #lookahead #optimisation
Timing-driven optimization using lookahead logic circuits (MRC, KM), pp. 390–395.
DACDAC-2009-EllithorpeTK #architecture #named #network
Internet-in-a-Box: emulating datacenter network architectures using FPGAs (JDE, ZT, RHK), pp. 880–883.
DACDAC-2009-FeySD #bound #fault tolerance
Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DACDAC-2009-GhaniN #approximate #grid #performance #power management #verification
Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
DACDAC-2009-HelinskiAP #physics
A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
DACDAC-2009-JainC #graph #performance #satisfiability
Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts (HJ, EMC), pp. 563–568.
DACDAC-2009-LeeK #manycore #optimisation #throughput
Optimizing throughput of power- and thermal-constrained multicore processors using DVFS and per-core power-gating (JL, NSK), pp. 47–50.
DACDAC-2009-MehrotraS #performance #robust
A robust and efficient harmonic balance (HB) using direct solution of HB Jacobian (AM, AS), pp. 370–375.
DACDAC-2009-PatilLZWM #logic
Digital VLSI logic technology using Carbon Nanotube FETs: frequently asked questions (NP, AL, JZ, HSPW, SM), pp. 304–309.
DACDAC-2009-PotkonjakNNM #detection #hardware
Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DACDAC-2009-SarbisheiAF #clustering #heuristic #optimisation #polynomial
Polynomial datapath optimization using partitioning and compensation heuristics (OS, BA, MF), pp. 931–936.
DACDAC-2009-ShinPS #synthesis
Register allocation for high-level synthesis using dual supply voltages (IS, SP, YS), pp. 937–942.
DACDAC-2009-StrojwasJRP
Creating an affordable 22nm node using design-lithography co-optimization (AJS, TJ, VR, LTP), pp. 95–96.
DACDAC-2009-WangCSC #graph #power management #synthesis
Low power gated bus synthesis using shortest-path Steiner graph for system-on-chip communications (RW, NCC, BS, CKC), pp. 166–171.
DACDAC-2009-WuDL #3d #integer #named #programming #scalability
GRIP: scalable 3D global routing using integer programming (THW, AD, JTL), pp. 320–325.
DACDAC-2009-ZengZNGGS #optimisation #scheduling
Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
DACDAC-2009-ZhangS #estimation
Accurate temperature estimation using noisy thermal sensors (YZ, AS), pp. 472–477.
DATEDATE-2009-AlvesNDB #detection #fault #multi
Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATEDATE-2009-BaertBWA
Exploring parallelizations of applications for MPSoC platforms using MPA (RB, EB, SW, TJA), pp. 1148–1153.
DATEDATE-2009-BildBD #performance
Minimization of NBTI performance degradation using internal node control (DRB, GEB, RPD), pp. 148–153.
DATEDATE-2009-ChangBM #design
Customizing IP cores for system-on-chip designs using extensive external don’t-cares (KHC, VB, ILM), pp. 582–585.
DATEDATE-2009-DarbariAFB #design #simulation
Selective state retention design using symbolic simulation (AD, BMAH, DF, JB), pp. 1644–1649.
DATEDATE-2009-DensmoreSDPS #design #evaluation #framework
UMTS MPSoC design evaluation using a system level design framework (DD, AS, AD, RP, ALSV), pp. 478–483.
DATEDATE-2009-GuoS #bound #design #distributed #optimisation
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATEDATE-2009-KinsmanN #finite #modulo theories #precise
Finite Precision bit-width allocation using SAT-Modulo Theory (ABK, NN), pp. 1106–1111.
DATEDATE-2009-KirchnerBG #simulation
Analogue mixed signal simulation using spice and SystemC (TK, NB, CG), pp. 284–287.
DATEDATE-2009-KochteZIKRWCP #modelling #transaction #validation
Test exploration and validation using transaction level models (MAK, CGZ, MEI, RSK, MR, HJW, SDC, PP), pp. 1250–1253.
DATEDATE-2009-KravetsM #logic #synthesis
Sequential logic synthesis using symbolic bi-decomposition (VNK, AM), pp. 1458–1463.
DATEDATE-2009-LinW
Rewiring using IRredundancy Removal and Addition (CCL, CYW), pp. 324–327.
DATEDATE-2009-MitraZPW #logic
Imperfection-immune VLSI logic circuits using Carbon Nanotube Field Effect Transistors (SM, JZ, NP, HW), pp. 436–441.
DATEDATE-2009-MollCRB #modelling #performance #protocol
Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATEDATE-2009-OzturkK #compilation #execution #memory management
Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
DATEDATE-2009-PurandareWK #abstraction #refinement
Strengthening properties using abstraction refinement (MP, TW, DK), pp. 1692–1697.
DATEDATE-2009-RealVD #correlation
Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
DATEDATE-2009-RobertsKM #energy #memory management
Using non-volatile memory to save energy in servers (DR, TK, TNM), pp. 743–748.
DATEDATE-2009-SafizadehTATB #nondeterminism
Using randomization to cope with circuit uncertainty (HS, MT, EKA, GT, KB), pp. 815–820.
DATEDATE-2009-SinhaRBS #design #multi #protocol
Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATEDATE-2009-TannirK #analysis
Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATEDATE-2009-WangCTHR #modelling #optimisation #performance #polynomial
An efficient decoupling capacitance optimization using piecewise polynomial models (XW, YC, SXDT, XH, JR), pp. 1190–1195.
DATEDATE-2009-WangM
An accurate interconnect thermal model using equivalent transmission line circuit (BW, PM), pp. 280–283.
HPCAHPCA-2009-PowellBEMSY #named #parametricity #runtime
CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
HPCAHPCA-2009-ReddiGHWSB #predict
Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
HPDCHPDC-2009-AssuncaoCB #capacity #clustering #in the cloud
Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters (MDdA, AdC, RB), pp. 141–150.
HPDCHPDC-2009-HironakaST #concurrent #performance
High performance wide-area overlay using deadlock-free routing (KH, HS, KT), pp. 81–90.
HPDCHPDC-2009-Reeuwijk #data flow #framework #learning #named #peer-to-peer #self
Maestro: a self-organizing peer-to-peer dataflow framework using reinforcement learning (CvR), pp. 187–196.
ISMMISMM-2009-GuanSJ #performance #policy
Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
ISMMISMM-2009-NaeemL #alias #analysis #performance #set
Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMMISMM-2009-SerranoZ #garbage collection #optimisation
Placement optimization using data context collected during garbage collection (MJS, XZ), pp. 69–78.
PDPPDP-2009-AchourNS #adaptation #algorithm #clustering #modelling #on the #performance
On the Use of Performance Models for Adaptive Algorithm Selection on Heterogeneous Clusters (SA, WN, LAS), pp. 85–89.
PDPPDP-2009-CasconOHDR #concurrent #interface #multi #network #thread
A Multi-Threaded Network Interface Using Network Processors (PC, JO, WMH, AFD, IR), pp. 196–200.
PDPPDP-2009-EngelmannVNS #fault tolerance #migration
Proactive Fault Tolerance Using Preemptive Migration (CE, GV, TN, SLS), pp. 252–257.
PDPPDP-2009-FrancoBFA #2d #implementation #parallel
A Parallel Implementation of the 2D Wavelet Transform Using CUDA (JF, GB, JF, MEA), pp. 111–118.
PDPPDP-2009-KunisR #algorithm #constraints #optimisation #parallel #precedence #scheduling
Optimization of Layer-based Scheduling Algorithms for Mixed Parallel Applications with Precedence Constraints Using Move-blocks (RK, GR), pp. 70–77.
PDPPDP-2009-SantosAPDRS #monitoring #performance #scheduling #web #web service
Using Web Services for Performance Monitoring and Scheduling (AS, FA, VBP, DD, JR, ES), pp. 361–368.
PPoPPPPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction
Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
PPoPPPPoPP-2009-LiBH #distributed #multi #performance #scalability #scheduling
Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin (TL, DPB, SH), pp. 65–74.
PPoPPPPoPP-2009-ZyulkyarovGUCAHV #game studies #interactive #memory management #multi #transaction
Atomic quake: using transactional memory in an interactive multiplayer game server (FZ, VG, OSÜ, AC, EA, TH, MV), pp. 25–34.
SOSPSOSP-2009-DunaganZS #combinator #graph #named #optimisation
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
ESOPESOP-2009-Campbell #analysis #data type #memory management
Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
ESOPESOP-2009-Reynolds #category theory #design #programming language
Using Category Theory to Design Programming Languages (JCR), pp. 62–63.
FASEFASE-2009-AguirreFMMW #alloy #behaviour #specification
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
FASEFASE-2009-ChatterjeeJS #java #named #query
SNIFF: A Search Engine for Java Using Free-Form Queries (SC, SJ, KS), pp. 385–400.
FASEFASE-2009-KovacsV #array #invariant #proving #source code #theorem proving
Finding Loop Invariants for Programs over Arrays Using a Theorem Prover (LK, AV), pp. 470–485.
STOCSTOC-2009-AndersenP #evolution #set
Finding sparse cuts locally using evolving sets (RA, YP), pp. 235–244.
STOCSTOC-2009-Gentry #encryption
Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
STOCSTOC-2009-Liu #algorithm #quantum
Quantum algorithms using the curvelet transform (YKL), pp. 391–400.
CAVCAV-2009-BeerBCOT
Explaining Counterexamples Using Causality (IB, SBD, HC, AO, RJT), pp. 94–108.
CAVCAV-2009-DangS #image #polynomial
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion (TD, DS), pp. 219–232.
CAVCAV-2009-GuernicG #analysis #hybrid #reachability
Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAVCAV-2009-LahiriQR #concurrent #detection #fault #precise #smt
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
CAVCAV-2009-MajumdarX #testing
Reducing Test Inputs Using Information Partitions (RM, RGX), pp. 555–569.
CAVCAV-2009-Monniaux #float #linear #on the
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure (DM), pp. 570–583.
CAVCAV-2009-VerdoolaegeJB #equivalence #source code
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences (SV, GJ, MB), pp. 599–613.
CSLCSL-2009-GaboardiP #bound #semantics
Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
ICLPICLP-2009-BroechelerSS #logic programming #probability #query #source code
Using Histograms to Better Answer Queries to Probabilistic Logic Programs (MB, GIS, VSS), pp. 40–54.
ICLPICLP-2009-Mungall #case study #experience #logic programming
Experiences Using Logic Programming in Bioinformatics (CM), pp. 1–21.
ICLPICLP-2009-PaluDPR #constraints #lazy evaluation #programming #set
Answer Set Programming with Constraints Using Lazy Grounding (ADP, AD, EP, GR), pp. 115–129.
ICLPICLP-2009-Raiser #constraints #graph transformation
Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (FR), pp. 540–541.
ICLPICLP-2009-Todorova #natural language #prolog
Answering Questions from Natural Language Using A-Prolog (YT), pp. 544–546.
ICLPICLP-2009-Wielemaker #prolog #web
Enabling Serendipitous Search on the Web of Data Using Prolog (JW), p. 36.
ICSTICST-2009-BandyopadhyayG #generative #modelling #sequence #state machine #uml
Test Input Generation Using UML Sequence and State Machines Models (AB, SG), pp. 121–130.
ICSTICST-2009-KaminskiA #detection #fault #logic #testing
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
ICSTICST-2009-KaminskiA09a #fault #logic #mutation testing #performance #testing
Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing (GKK, PA), pp. 386–395.
ICSTICST-2009-MurphyKVC #approach #assurance #quality #testing
Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
ICSTICST-2009-MurphySK #ml #runtime #testing
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles (CM, KS, GEK), pp. 436–445.
ICSTICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #identification #mining
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTAISSTA-2009-ClauseO #automation #identification #named
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTAISSTA-2009-ZhangHGXM #integer #linear #programming #testing
Time-aware test-case prioritization using integer linear programming (LZ, SSH, CG, TX, HM), pp. 213–224.
MBTMBT-2009-DadeauLH #automaton #generative #on the #random #testing
On the Use of Uniform Random Generation of Automata for Testing (FD, JL, PCH), pp. 37–51.
MBTMBT-2009-SchumannSH #graph #nondeterminism #testing
Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs (AS, MS, JH), pp. 87–99.
ICSTSAT-2009-BonetJ #metric #satisfiability
Efficiently Calculating Evolutionary Tree Measures Using SAT (MLB, KSJ), pp. 4–17.
ICSTSAT-2009-HaimW #machine learning
Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
ICSTSAT-2009-KojevnikovKY #performance
Finding Efficient Circuits Using SAT-Solvers (AK, ASK, GY), pp. 32–44.
FATESTestCom-FATES-2009-AdjirSR #realtime #testing
Testing Real-Time Systems Using TINA (NA, PdSS, KMR), pp. 1–15.
FATESTestCom-FATES-2009-ErnitsRJV #modelling #testing #web
Model-Based Testing of Web Applications Using NModel (JPE, RR, JJ, MV), pp. 211–216.
FATESTestCom-FATES-2009-SubramaniamXGP #approach #proving #testing #theorem proving
An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
VMCAIVMCAI-2009-KiddRDV #debugging #random
Finding Concurrency-Related Bugs Using Random Isolation (NK, TWR, JD, MV), pp. 198–213.
VMCAIVMCAI-2009-TalyGT #constraints #logic #theorem proving
Synthesizing Switching Logic Using Constraint Solving (AT, SG, AT), pp. 305–319.
VMCAIVMCAI-2009-WimmerBB #bound #generative #markov #model checking
Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
CBSECBSE-2008-KuperbergKR #behaviour #black box #component #modelling #parametricity #performance #predict
Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
ECSAECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology
Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
ECSAECSA-2008-FilhoCNOLAM #design #overview #perspective
Evaluating Domain Design Approaches Using Systematic Review (EDdSF, RdOC, DFSN, THBdO, LBL, ESdA, SRdLM), pp. 50–65.
ECSAECSA-2008-KamalA #behaviour #design pattern #modelling
Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
ECSAECSA-2008-NavarroC #approach #architecture #automation #design
Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
ECSAECSA-2008-Perry #architecture #design #evolution #maintenance
Issues in Architecture Evolution: Using Design Intent in Maintenance and Controlling Dynamic Evolution (DEP), p. 1.
ECSAECSA-2008-SanzQCMO #architecture #modelling #representation
Representing Service-Oriented Architectural Models Using pi-ADL (MLS, ZQ, CEC, EM, FO), pp. 273–280.
QoSAQoSA-2008-ArdagnaGM #architecture #modelling
Rethinking the Use of Models in Software Architecture (DA, CG, RM), pp. 1–27.
WICSAWICSA-2008-Aldrich #architecture
Using Types to Enforce Architectural Structure (JA), pp. 211–220.
WICSAWICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
DocEngDocEng-2008-AlkhateebL #composition #documentation #generative #towards
Towards extending and using SPARQL for modular document generation (FA, SL), pp. 164–172.
DocEngDocEng-2008-KumarS #automation #documentation #n-gram
Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
DocEngDocEng-2008-Nguyen #algorithm #documentation #image
A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DocEngDocEng-2008-RonnauPB #documentation #reliability #xml
Merging changes in XML documents using reliable context fingerprints (SR, CP, UMB), pp. 52–61.
DocEngDocEng-2008-ValleCP #documentation #identification #performance #visual notation
Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
DRRDRR-2008-AntaniDLST #image
Exploring use of images in clinical articles for decision support in evidence-based medicine (SA, DDF, JL, BVS, GRT), p. 68150.
DRRDRR-2008-BaiNS #composition
Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRRDRR-2008-ChanVT #identification #online #prototype
Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
DRRDRR-2008-El-HajjML #modelling #recognition #word
Recognition of Arabic handwritten words using contextual character models (REH, CM, LLS), p. 681503.
DRRDRR-2008-ShafaitKB #adaptation #image #implementation #performance
Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
DRRDRR-2008-XiangTLW #recognition #reliability
Achieving high recognition reliability using decision trees and AdaBoost (JX, XT, YL, PSPW), p. 68150.
DRRDRR-2008-XiuB #adaptation #recognition
Whole-book recognition using mutual-entropy-driven model adaptation (PX, HSB), p. 681506.
DRRDRR-2008-ZouLT #html #online
Extracting a sparsely located named entity from online HTML medical articles using support vector machine (JZ, DXL, GRT), p. 68150.
TPDLECDL-2008-BindingT #web #web service
Using Terminology Web Services for the Archaeological Domain (CB, DT), pp. 392–393.
TPDLECDL-2008-FernandezMFVA #agile #development #library
Agile DL: Building a DELOS-ConformedDigital Library Using Agile Software Development (JDF, MAMP, PdlF, JV, JA), pp. 398–399.
TPDLECDL-2008-IkedaZG
Matching Hierarchies Using Shared Objects (RI, KZ, HGM), pp. 209–220.
TPDLECDL-2008-UematsuIFKO #proximity
Proximity Scoring Using Sentence-Based Inverted Index for Practical Full-Text Search (YU, TI, KF, RK, HO), pp. 308–319.
TPDLECDL-2008-YangPJLH #ambiguity #correlation #topic #web
Author Name Disambiguation for Citations Using Topic and Web Correlation (KHY, HTP, JYJ, HML, JMH), pp. 185–196.
HTHT-2008-ChiM #comprehension #performance #social
Understanding the efficiency of social tagging systems using information theory (EHC, TM), pp. 81–88.
HTHT-2008-ChoudhurySJS #communication #predict #social
Dynamic prediction of communication flow using social context (MDC, HS, AJ, DDS), pp. 49–54.
HTHT-2008-Diniz #education #hypermedia
Efl and hypertext: using webquests to maximize english teaching (MGD), pp. 223–224.
HTHT-2008-LeeBG #community #ranking #similarity
Extracting and ranking viral communities using seeds and content similarity (HCL, AB, LG), pp. 139–148.
HTHT-2008-TomsaB #social #visualisation
Hyperlinks visualization using social bookmarking (MT, MB), pp. 245–246.
JCDLJCDL-2008-CarmelYR #analysis #library
Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
JCDLJCDL-2008-HariharanHM #summary #web
Discovering gis sources on the web using summaries (RH, BH, SM), pp. 94–103.
JCDLJCDL-2008-Hetzner #markov #metadata #modelling
A simple method for citation metadata extraction using hidden markov models (EH), pp. 280–284.
JCDLJCDL-2008-KhooPWRPD #library #metric #web
Using web metrics to analyze digital libraries (MK, JP, ALW, MR, BP, RAD), pp. 375–384.
JCDLJCDL-2008-PereiraRZL #web
Using web information for creating publication venue authority files (DAP, BARN, NZ, AHFL), pp. 295–304.
JCDLJCDL-2008-TibenderanaO #library
Acceptance and use of electronic library services in ugandan universities (PKGT, PJO), pp. 323–332.
SIGMODSIGMOD-2008-BohmFP #clustering #component #independence
Outlier-robust clustering using independent components (CB, CF, CP), pp. 185–198.
SIGMODSIGMOD-2008-LeeC #performance #query
Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
VLDBVLDB-2008-Cohen #constraints #generative #xml
Generating XML structure using examples and constraints (SC), pp. 490–501.
VLDBVLDB-2008-CohenK #estimation #sketching
Tighter estimation using bottom k sketches (EC, HK), pp. 213–224.
VLDBVLDB-2008-CormodeSYZ #graph
Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDBVLDB-2008-FontouraJKOTV #taxonomy
Relaxation in text search using taxonomies (MF, VJ, RK, CO, AT, SV), pp. 672–683.
VLDBVLDB-2008-KwonBG #distributed #fault tolerance #file system
Fault-tolerant stream processing using a distributed, replicated file system (YK, MB, AGG), pp. 574–585.
VLDBVLDB-2008-LeeHLG #classification #clustering #named
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering (JGL, JH, XL, HG), pp. 1081–1094.
VLDBVLDB-2008-MetwallyEAA #correlation #detection #named
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
CSEETCSEET-2008-GotterbarnM #re-engineering
Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
CSEETCSEET-2008-JohnsgardM #overview #programming
Using Alice in Overview Courses to Improve Success Rates in Programming I (KJ, JM), pp. 129–136.
CSEETCSEET-2008-RasR #information management #learning
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning (ER, JR), pp. 77–84.
CSEETCSEET-2008-SalamahG #education #model checking #specification
A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
EDMEDM-2008-BarnesSLC #case study #logic #proving #student
A pilot study on logic proof tutoring using hints generated from historical student data (TB, JCS, LL, MJC), pp. 197–201.
EDMEDM-2008-PavlikCWK #performance
Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor (PIP, HC, LW, KRK), pp. 77–86.
ITiCSEITiCSE-2008-Albin-ClarkK #game studies #simulation
The use of role play to simulate a tethered swarm of robots for urban search and rescue (USAR) (AAC, TRVAK), p. 335.
ITiCSEITiCSE-2008-Connolly #design #development #education #multi #platform
Complecto mutatio: teaching software design best practices using multi-platform development (RWC), p. 345.
ITiCSEITiCSE-2008-DennyLH #student
Student use of the PeerWise system (PD, ALR, JH), pp. 73–77.
ITiCSEITiCSE-2008-Deugo08a #eclipse
Using eclipse in the classroom (DD), p. 322.
ITiCSEITiCSE-2008-Kurmas #automation #logic #performance #student #testing
Improving student performance using automated testing of simulated digital logic circuits (ZK), pp. 265–270.
ITiCSEITiCSE-2008-LinhoffS #education #game studies #programming
Teaching game programming using XNA (JL, AS), pp. 250–254.
ITiCSEITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards
Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
ITiCSEITiCSE-2008-SalterD #logic #multi #scalability
Using DLSim 3: a scalable, extensible, multi-level logic simulator (RMS, JLD), p. 315.
SIGITESIGITE-2008-Edirisinghe #education #fault #game studies #identification #programming #student
Teaching students to identify common programming errors using a game (EMNSE), pp. 95–98.
SIGITESIGITE-2008-MullinsC #programming #student
Engaging students in programming fundamentals using alice 2.0 (PMM, MC), pp. 81–88.
CSMRCSMR-2008-CosmaM #comprehension #dependence #distributed #object-oriented
Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies (DCC, RM), pp. 103–112.
CSMRCSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability
Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
CSMRCSMR-2008-LagerstromJ #architecture #enterprise #maintenance #modelling #predict
Using Architectural Models to Predict the Maintainability of Enterprise Systems (RL, PJ), pp. 248–252.
CSMRCSMR-2008-MendeBKM #clone detection #detection #evolution #product line
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
CSMRCSMR-2008-SpekKL #architecture #concept #semantics #towards
Towards Recovering Architectural Concepts Using Latent Semantic Indexing (PvdS, SK, PvdL), pp. 253–257.
CSMRCSMR-2008-Trifu #data flow #identification #object-oriented
Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-HaiducM #on the #source code
On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPCICPC-2008-Parr #embedded #reuse #semantics
The Reuse of Grammars with Embedded Semantic Actions (TP), pp. 5–10.
ICPCICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSMEICSM-2008-KothariBMS #algebra #development #on the #performance
On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
ICSMEICSM-2008-LiH #random testing #testing
Using random test selection to gain confidence in modified software (WL, MJH), pp. 267–276.
ICSMEICSM-2008-LuciaOV #metric #semantics
Using structural and semantic metrics to improve class cohesion (ADL, RO, LV), pp. 27–36.
ICSMEICSM-2008-MalikH #adaptation #co-evolution #evolution #heuristic
Supporting software evolution using adaptive change propagation heuristics (HM, AEH), pp. 177–186.
ICSMEICSM-2008-RiccaPT #guidelines #lessons learnt #maintenance
Guidelines on the use of Fit tables in software maintenance tasks: Lessons learned from 8 experiments (FR, MDP, MT), pp. 317–326.
MSRMSR-2008-HataMK #precise
An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
MSRMSR-2008-SiyCS #challenge #developer #segmentation
Summarizing developer work history using time series segmentation: challenge report (HPS, PC, MS), pp. 137–140.
SCAMSCAM-2008-BoogerdM #analysis #data flow #on the #profiling
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAMSCAM-2008-CeccatoDT #legacy #program transformation
Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
SCAMSCAM-2008-GiffhornH #analysis #java #precise #source code
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAMSCAM-2008-JiaH #fault #higher-order #mutation testing #testing
Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
WCREWCRE-2008-GrantCS #analysis #automation #component #concept #independence
Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCREWCRE-2008-LukinsKE #debugging #locality #retrieval #source code
Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCREWCRE-2008-Muliawan #higher-order #model transformation #transformation language
Extending a Model Transformation Language Using Higher Order Transformations (OM), pp. 315–318.
WCREWCRE-2008-RompaeyD #estimation
Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
CIAACIAA-2008-GarciaPAR #automaton #finite #learning #nondeterminism #regular expression
Learning Regular Languages Using Nondeterministic Finite Automata (PG, MVdP, GIA, JR), pp. 92–101.
ICALPICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability
Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
LATALATA-2008-Klunder #automaton #finite
Characterization of Star-Connected Languages Using Finite Automata (BK), pp. 311–320.
FMFM-2008-ChalinR #fault #ml #performance #runtime
JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity (PC, FR), pp. 246–261.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-MacedoLF #development #distributed #incremental #realtime
Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM (HDM, PGL, JSF), pp. 181–197.
RTARTA-2008-MoserS #polynomial #proving
Proving Quadratic Derivational Complexities Using Context Dependent Interpretations (GM, AS), pp. 276–290.
SEFMSEFM-2008-GuoS #finite #impact analysis #proving #state machine #theorem proving
Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover (BG, MS), pp. 335–344.
SEFMSEFM-2008-SalasK #modelling #policy #privacy #testing
Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFMSEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol
Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
SEFMSEFM-2008-XavierHM #fault tolerance #source code #verification
Using Formal Verification to Reduce Test Space of Fault-Tolerant Programs (KSX, SH, ACVdM), pp. 181–190.
FLOPSFLOPS-2008-Julien #induction #integer
Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base (NJ), pp. 48–63.
FLOPSFLOPS-2008-PrinceGM #proving
Proving Properties about Lists Using Containers (RP, NG, CM), pp. 97–112.
IFLIFL-2008-LijnseP #automation #data type #database #programming #relational
Between Types and Tables — Using Generic Programming for Automated Mapping between Data Types and Relational Databases (BL, RP), pp. 272–290.
AIIDEAIIDE-2008-CutumisuSBS #game studies #learning
Agent Learning using Action-Dependent Learning Rates in Computer Role-Playing Games (MC, DS, MHB, RSS).
CoGCIG-2008-ChiouW #adaptation #programming #user satisfaction
Player Adaptive Entertainment Computing (PAEC): Mechanism to model user satisfaction by using Neuro Linguistic Programming (NLP) techniques (AC, KWW), pp. 343–349.
CoGCIG-2008-DjordjevichXBWGV #game studies
Preparing for the aftermath: Using emotional agents in game-based training for disaster response (DD, PGX, MLB, JW, MRG, SJV), pp. 266–275.
CoGCIG-2008-OlesenYH #challenge #game studies #realtime
Real-time challenge balance in an RTS game using rtNEAT (JKO, GNY, JH), pp. 87–94.
CoGCIG-2008-OsakiSTK #difference #evaluation #learning #probability
An Othello evaluation function based on Temporal Difference Learning using probability of winning (YO, KS, YT, YK), pp. 205–211.
CoGCIG-2008-Sahraei-ArdakaniRRL #case study #optimisation
A study of electricity market dynamics using Invasive Weed Colonization Optimization (MSA, MR, ARK, CL), pp. 276–282.
CoGCIG-2008-WenderW #game studies #learning
Using reinforcement learning for city site selection in the turn-based strategy game Civilization IV (SW, IDW), pp. 372–377.
CoGCIG-2008-WestraHDD #adaptation #game studies #online
On-line adapting games using agent organizations (JW, HvH, VD, FD), pp. 243–250.
CoGCIG-2008-WittkampBH #adaptation
Using NEAT for continuous adaptation and teamwork formation in Pacman (MW, LB, PH), pp. 234–242.
GT-VMTGT-VMT-2006-JakobS08 #graph grammar #metamodelling #modelling
View Creation of Meta Models by Using Modified Triple Graph Grammars (JJ, AS), pp. 181–190.
GT-VMTGT-VMT-2006-Varro08 #database #graph transformation #implementation #independence #plugin #query
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries (GV), pp. 121–132.
GT-VCGT-VC-2007-BruniBGM08 #architecture #graph grammar #modelling
Modelling Dynamic Software Architectures using Typed Graph Grammars (RB, AB, SG, HCM), pp. 39–53.
GT-VMTGT-VMT-2008-BaresiGMM #abstraction #graph transformation #verification
Using Graph Transformation Systems to Specify and Verify Data Abstractions (LB, CG, AM, MM).
GT-VMTGT-VMT-2008-BucchiaroneG #architecture #verification
Dynamic Software Architectures Verification using DynAlloy (AB, JPG).
GT-VMTGT-VMT-2008-GrabskaSL #design #graph transformation #reasoning #visual notation
Visual Design and Reasoning with the Use of Hypergraph Transformations (EG, GMS, TLL).
ICGTICGT-2008-EhrigE #correctness #graph #model transformation #semantics
Semantical Correctness and Completeness of Model Transformations Using Graph and Rule Transformation (HE, CE), pp. 194–210.
ICGTICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network
Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
ICGTICGT-2008-RangelLKEB #behaviour #refactoring
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
ICGTICGT-2008-Striewe #graph grammar #implementation #state machine
Using a Triple Graph Grammar for State Machine Implementations (MS), pp. 514–516.
CHICHI-2008-BuechleyECC #arduino #education
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science education (LB, ME, JC, AC), pp. 423–432.
CHICHI-2008-ClawsonLRIS #automation #fault #type system
Automatic whiteout++: correcting mini-QWERTY typing errors using keypress timing (JC, KL, AR, RAI, TS), pp. 573–582.
CHICHI-2008-DugganP #topic #web
Knowledge in the head and on the web: using topic expertise to aid search (GBD, SJP), pp. 39–48.
CHICHI-2008-GeyerDDMBM #reuse #social
Use and reuse of shared lists as a social content type (WG, CD, JMD, DRM, BB, MJM), pp. 1545–1554.
CHICHI-2008-GrafSSWR #interactive #search-based #user interface
In-car interaction using search-based user interfaces (SG, WS, AS, AW, GR), pp. 1685–1688.
CHICHI-2008-GuoS #case study #comparative #interactive #user interface
Exploring the use of tangible user interfaces for human-robot interaction: a comparative study (CG, ES), pp. 121–130.
CHICHI-2008-HornbaekF #empirical #evaluation #usability
Making use of business goals in usability evaluation: an experiment with novice evaluators (KH, EF), pp. 903–912.
CHICHI-2008-HsiehLHK #communication
Using tags to assist near-synchronous communication (GH, JL, SEH, RK), pp. 223–226.
CHICHI-2008-Joinson #facebook #people
Looking at, looking up or keeping up with people?: motives and use of facebook (ANJ), pp. 1027–1036.
CHICHI-2008-KangWA #interactive #mobile #social #video
Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
CHICHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #web
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHICHI-2008-KobayashiI #multi #scalability
Ninja cursors: using multiple cursors to assist target acquisition on large screens (MK, TI), pp. 949–958.
CHICHI-2008-LanirBF #design #visual notation
Observing presenters’ use of visual aids to inform the design of classroom presentation software (JL, KSB, LF), pp. 695–704.
CHICHI-2008-LawranceBBR #behaviour #maintenance
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
CHICHI-2008-MorrisBM #named #type system
SuperBreak: using interactivity to enhance ergonomic typing breaks (DM, AJBB, BM), pp. 1817–1826.
CHICHI-2008-MoscovichH #multi
Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
CHICHI-2008-OganAJ #learning #predict
Pause, predict, and ponder: use of narrative videos to improve cultural discussion and learning (AO, VA, CJ), pp. 155–162.
CHICHI-2008-RatwaniMT #eye tracking #fault #predict
Predicting postcompletion errors using eye movements (RMR, JMM, JGT), pp. 539–542.
CHICHI-2008-SankarpandianLE #named
Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
CHICHI-2008-SaponasTMB #interface
Demonstrating the feasibility of using forearm electromyography for muscle-computer interfaces (TSS, DST, DM, RB), pp. 515–524.
CHICHI-2008-SzentgyorgyiTL #game studies #social
Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system (CS, MAT, EL), pp. 1463–1472.
CHICHI-2008-TianXWZLSD #3d #user interface
Tilt menu: using the 3D orientation information of pen devices to extend the selection capability of pen-based user interfaces (FT, LX, HW, XZ, YL, VS, GD), pp. 1371–1380.
CHICHI-2008-YataniPBN #gesture #named
Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
CSCWCSCW-2008-HancockTF #symmetry
I know something you don’t: the use of asymmetric personal information for interpersonal advantage (JTH, CLT, KF), pp. 413–416.
CSCWCSCW-2008-ReillyMWI
Small details: using one device to navigate together (DFR, BM, CRW, KMI), pp. 253–256.
SOFTVISSOFTVIS-2008-AnslowNMB #3d #visualisation #web
Web software visualization using extensible 3D (X3D) graphics (CA, JN, SM, RB), pp. 213–214.
SOFTVISSOFTVIS-2008-ParduhnSW #algorithm #graph #visualisation
Algorithm visualization using concrete and abstract shape graphs (SAP, RS, RW), pp. 33–36.
SOFTVISSOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #visualisation
Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
CAiSECAiSE-2008-DeckerKLPW #modelling
Modeling Service Choreographies Using BPMN and BPEL4Chor (GD, OK, FL, KP, MW), pp. 79–93.
CAiSECAiSE-2008-HerssensJF
Capturing and Using QoS Relationships to Improve Service Selection (CH, IJ, SF), pp. 312–327.
CAiSECAiSE-2008-MuehlenR #how #modelling #process
How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
CAiSECAiSE-2008-ViscusiTS #approach #case study #empirical
Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
EDOCEDOC-2008-KavimandanKG #automation #enterprise #model transformation #synthesis #workflow
Automated Context-Sensitive Dialog Synthesis for Enterprise Workflows Using Templatized Model Transformations (AK, RK, ASG), pp. 159–168.
EDOCEDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality
Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOCEDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol
Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEISICEIS-AIDSS-2008-BurdescuML #concept #student
Building a Decision Support System for Students by Using Concept Maps (DDB, MCM, BL), pp. 130–135.
ICEISICEIS-AIDSS-2008-MahdaviSP #approach #automation
Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
ICEISICEIS-AIDSS-2008-Nachev #network
Forecasting with ARTMAP-IC Neural Networks — An Application Using Corporate Bankruptcy Data (AN), pp. 167–172.
ICEISICEIS-AIDSS-2008-SchmidtV #reasoning
Using Case-Based Reasoning to Explain Exceptional Cases (RS, OV), pp. 119–124.
ICEISICEIS-AIDSS-2008-TsengKH #approach #assembly
A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
ICEISICEIS-DISI-2008-MoraGRPBGCR #metric #qvt
Software Measurement by Using QVT Transformations in an MDA Context (BM, FG, FR, MP, AB, AG, JÁC, IR), pp. 117–124.
ICEISICEIS-HCI-2008-LeivaCGA #development #maintenance #workflow
A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEISICEIS-HCI-2008-MordechaiFD #interface #named #taxonomy
TTLS: A Grouped Display of Search Results Based on Organizational Taxonomy Using the LCC&K Interface (VM, AJF, OD), pp. 47–53.
ICEISICEIS-ISAS1-2008-GullaBK #concept #ontology
Using Association Rules to Learn Concept Relationships in Ontologies (JAG, TB, GSK), pp. 58–65.
ICEISICEIS-ISAS1-2008-LoewensternS #lifecycle
IT Service Management of Using Heterogeneous, Dynamically Alterable Configuration Item Lifecycles (DL, LS), pp. 155–160.
ICEISICEIS-ISAS2-2008-BrunetSLG #modelling
Using Variants in KAOS Goal Modelling (JB, FS, RL, CG), pp. 339–344.
ICEISICEIS-ISAS2-2008-PivetaMPAGP #process #ranking #refactoring
Ranking Refactoring Patterns Using the Analytical Hierarchy Process (EKP, AMDM, MSP, JA, PG, RTP), pp. 195–200.
ICEISICEIS-ISAS2-2008-Prpitsch #process
From Process to Software Systems’ Service — Using a Layered Model to Connect Technical and Process-related Views (CP), pp. 298–304.
ICEISICEIS-J-2008-PapatheocharousA08a #algorithm #approach #hybrid #modelling #network #predict #search-based
Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
ICEISICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics
Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEISICEIS-SAIC-2008-BoukadiGV #aspect-oriented #collaboration #enterprise
Enhancing Enterprise Collaboration Using Context-Aware Service Based on Aspects (KB, CG, LV), pp. 29–36.
ICEISICEIS-SAIC-2008-BrockeTW #e-commerce #mobile
Making Use of Mobile Devices in E-Commerce — Overcoming Organizational Barriers through User Participation (JvB, BT, DW), pp. 168–173.
ICEISICEIS-SAIC-2008-DAgostiniFDG #semantics
Contextual Semantic Search — Capturing, using the User’s Context to Direct Semantic Search (CSD, RF, MARD, FAOG), pp. 154–159.
ICEISICEIS-SAIC-2008-KangasharjuK #data transfer #mobile #xml
Using Bit-Efficient XML to Optimize Data Transfer of XForms-Based Mobile Services (JK, OK), pp. 5–11.
ICEISICEIS-SAIC-2008-RanW #adaptation #metric #performance
Develop Adaptive Workplace E-Learning Environments by Using Performance Measurement Systems (WR, MW), pp. 142–147.
ICEISICEIS-SAIC-2008-StellerKCNL #approach #pervasive #reasoning #semantics
A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
CIKMCIKM-2008-BaoYFXSY #social
Boosting social annotations using propagation (SB, BY, BF, SX, ZS, YY), pp. 1507–1508.
CIKMCIKM-2008-BarskySTU
A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKMCIKM-2008-BroderCFGJR #feedback #web
Search advertising using web relevance feedback (AZB, PC, MF, EG, VJ, LR), pp. 1013–1022.
CIKMCIKM-2008-ChanLY #logic #modelling
Coreference resolution using expressive logic models (KC, WL, XY), pp. 1373–1374.
CIKMCIKM-2008-DaoudTB #graph #ontology #personalisation
Using a graph-based ontological user profile for personalizing search (MD, LTL, MB), pp. 1495–1496.
CIKMCIKM-2008-HuangS #markov #query
A latent variable model for query expansion using the hidden markov model (QH, DS), pp. 1417–1418.
CIKMCIKM-2008-MahouiTSC #identification #modelling #predict
Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
CIKMCIKM-2008-MaYLK #mining #network #process #social
Mining social networks using heat diffusion processes for marketing candidates selection (HM, HY, MRL, IK), pp. 233–242.
CIKMCIKM-2008-MaYLK08a #matrix #named #probability #recommendation #social
SoRec: social recommendation using probabilistic matrix factorization (HM, HY, MRL, IK), pp. 931–940.
CIKMCIKM-2008-MeiZC #query
Query suggestion using hitting time (QM, DZ, KWC), pp. 469–478.
CIKMCIKM-2008-QuMG #network #semantics
Using tag semantic network for keyphrase extraction in blogs (LQ, CM, IG), pp. 1381–1382.
CIKMCIKM-2008-RahurkarC
Using the current browsing context to improve search relevance (MR, SC), pp. 1493–1494.
CIKMCIKM-2008-RaviP #scalability
Using structured text for large-scale attribute extraction (SR, MP), pp. 1183–1192.
CIKMCIKM-2008-RosenfeldFU #classification #sequence #web
Using sequence classification for filtering web pages (BR, RF, LHU), pp. 1355–1356.
CIKMCIKM-2008-SeoC
Blog site search using resource selection (JS, WBC), pp. 1053–1062.
CIKMCIKM-2008-ShiNC
Relating dependent indexes using dempster-shafer theory (LS, JYN, GC), pp. 429–438.
CIKMCIKM-2008-VinayMC #effectiveness #rank #retrieval
Estimating retrieval effectiveness using rank distributions (VV, NMF, IJC), pp. 1425–1426.
CIKMCIKM-2008-WangZRM #automation #online #ranking #topic
Automatic online news topic ranking using media focus and user attention based on aging theory (CW, MZ, LR, SM), pp. 1033–1042.
CIKMCIKM-2008-XinLTL #comprehension #random
Academic conference homepage understanding using constrained hierarchical conditional random fields (XX, JL, JT, QL), pp. 1301–1310.
CIKMCIKM-2008-XuDW #query #wiki
Entity-based query reformulation using wikipedia (YX, FD, BW), pp. 1441–1442.
ECIRECIR-2008-AbdullahG #approach #usability
Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
ECIRECIR-2008-AyacheQ #corpus #learning #video
Video Corpus Annotation Using Active Learning (SA, GQ), pp. 187–198.
ECIRECIR-2008-CloughR #design #image #visualisation
Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ECIRECIR-2008-EidoonYO #ontology
Ontology Matching Using Vector Space (ZE, NY, FO), pp. 472–481.
ECIRECIR-2008-HeLR #metric #predict #query
Using Coherence-Based Measures to Predict Query Difficulty (JH, ML, MdR), pp. 689–694.
ECIRECIR-2008-HuangBCQ #image #network #retrieval #web
Improving Web Image Retrieval Using Image Annotations and Inference Network (PH, JB, CC, GQ), pp. 617–621.
ECIRECIR-2008-LillisTCD #data fusion #probability
Extending Probabilistic Data Fusion Using Sliding Windows (DL, FT, RWC, JD), pp. 358–369.
ECIRECIR-2008-NaKL08c #probability #similarity
Query-Based Inter-document Similarity Using Probabilistic Co-relevance Model (SHN, ISK, JHL), pp. 684–688.
ECIRECIR-2008-NunesRD #web
Use of Temporal Expressions in Web Search (SN, CR, GD), pp. 580–584.
ECIRECIR-2008-RitchieTR #information retrieval
Using Terms from Citations for IR: Some First Results (AR, ST, SR), pp. 211–221.
ECIRECIR-2008-ScholerSBT
Using Clicks as Implicit Judgments: Expectations Versus Observations (FS, MS, BB, AT), pp. 28–39.
ECIRECIR-2008-SongHRB #composition #mining #modelling #multi #query
Facilitating Query Decomposition in Query Language Modeling by Association Rule Mining Using Multiple Sliding Windows (DS, QH, SMR, PB), pp. 334–345.
ECIRECIR-2008-ValletHJ #evaluation #graph #recommendation
Use of Implicit Graph for Recommending Relevant Videos: A Simulated Evaluation (DV, FH, JMJ), pp. 199–210.
ECIRECIR-2008-ZhaoST #effectiveness #performance #predict #query #similarity #variability
Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence (YZ, FS, YT), pp. 52–64.
ICMLICML-2008-DoshiPR #learning
Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
ICMLICML-2008-KirshnerP #dependence
ICA and ISA using Schweizer-Wolff measure of dependence (SK, BP), pp. 464–471.
ICMLICML-2008-LarochelleB #classification #strict
Classification using discriminative restricted Boltzmann machines (HL, YB), pp. 536–543.
ICMLICML-2008-SahbiARK #kernel #recognition #robust
Robust matching and recognition using context-dependent kernels (HS, JYA, JR, RK), pp. 856–863.
ICMLICML-2008-SalakhutdinovM08a #markov #matrix #monte carlo #probability
Bayesian probabilistic matrix factorization using Markov chain Monte Carlo (RS, AM), pp. 880–887.
ICMLICML-2008-ShiBY #learning #modelling
Data spectroscopy: learning mixture models using eigenspaces of convolution operators (TS, MB, BY), pp. 936–943.
ICMLICML-2008-SyedBS #learning #linear #programming
Apprenticeship learning using linear programming (US, MHB, RES), pp. 1032–1039.
ICMLICML-2008-Tieleman #approximate #strict
Training restricted Boltzmann machines using approximations to the likelihood gradient (TT), pp. 1064–1071.
ICMLICML-2008-WangM #analysis
Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICMLICML-2008-YueJ #predict #set
Predicting diverse subsets using structural SVMs (YY, TJ), pp. 1224–1231.
ICPRICPR-2008-Abd-AlmageedASD #classification #hybrid
Document-zone classification using partial least squares and hybrid classifiers (WAA, MA, WS, DSD), pp. 1–4.
ICPRICPR-2008-AgrisBK #adaptation #agile #approach #recognition
Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
ICPRICPR-2008-AmanoK #feedback
Appearance enhancement using a projector-camera feedback system (TA, HK), pp. 1–4.
ICPRICPR-2008-Baradarani #segmentation
Moving object segmentation using the 9/7-10/8 dual-tree complex filter bank (AB), pp. 1–4.
ICPRICPR-2008-BarratT #effectiveness #image #network #retrieval #semantics #visual notation
Visual features with semantic combination using Bayesian network for a more effective image retrieval (SB, ST), pp. 1–4.
ICPRICPR-2008-BazinKDV #image
Improvement of feature matching in catadioptric images using gyroscope data (JCB, IK, CD, PV), pp. 1–5.
ICPRICPR-2008-CamposJ #constraints #learning #network #parametricity
Improving Bayesian Network parameter learning using constraints (CPdC, QJ), pp. 1–4.
ICPRICPR-2008-ChakrabortyE #constraints #invariant #locality
Object localization using affine invariant substructure constraints (IC, AME), pp. 1–5.
ICPRICPR-2008-ChamaretM #validation #video
Attention-based video reframing: Validation using eye-tracking (CC, OLM), pp. 1–4.
ICPRICPR-2008-ChandraS
A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPRICPR-2008-ChangLAH #clique #clustering #constraints
Unsupervised clustering using hyperclique pattern constraints (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChangLAH08a #collaboration #image #learning
Using collaborative learning for image contrast enhancement (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChenCW #higher-order #named #performance
HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods (AYCC, JJC, LW), pp. 1–4.
ICPRICPR-2008-ChenSXS #algorithm #identification #search-based
Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
ICPRICPR-2008-ChenZP #segmentation
Unsupervised dynamic texture segmentation using local spatiotemporal descriptors (JC, GZ, MP), pp. 1–4.
ICPRICPR-2008-CheongL #approach #image #matrix #multi #orthogonal #recognition
An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
ICPRICPR-2008-ChoB #dependence #image
Image inpainting using wavelet-based inter- and intra-scale dependency (DC, TDB), pp. 1–4.
ICPRICPR-2008-ChoiMSH #analysis
Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPRICPR-2008-ChuangHFH #detection #multi
Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
ICPRICPR-2008-DehzangiMCL #classification #fuzzy #learning #speech
Fuzzy rule selection using Iterative Rule Learning for speech data classification (OD, BM, CES, HL), pp. 1–4.
ICPRICPR-2008-DonoserB #matrix #segmentation
Using covariance matrices for unsupervised texture segmentation (MD, HB), pp. 1–4.
ICPRICPR-2008-EmmsHW #graph #quantum
Graph drawing using quantum commute time (DE, ERH, RCW), pp. 1–4.
ICPRICPR-2008-FabletLSMCB #learning
Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPRICPR-2008-FengGDJ #retrieval
Motion capture data retrieval using an artist’s doll (TCF, PG, JD, BJ), pp. 1–4.
ICPRICPR-2008-FerrerVSRB #algorithm #approximate #graph
An approximate algorithm for median graph computation using graph embedding (MF, EV, FS, KR, HB), pp. 1–4.
ICPRICPR-2008-GatosPP #adaptation #documentation #image #multi
Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
ICPRICPR-2008-GhoshM #classification #documentation #kernel #similarity #xml
Combining content and structure similarity for XML document classification using composite SVM kernels (SG, PM), pp. 1–4.
ICPRICPR-2008-GongC #graph #learning #online #optimisation #realtime #segmentation
Real-time foreground segmentation on GPUs using local online learning and global graph cut optimization (MG, LC), pp. 1–4.
ICPRICPR-2008-Gonzalez-AguirreABD #geometry #graph #modelling #self #visual notation
Model-based visual self-localization using geometry and graphs (DIGA, TA, EBC, RD), pp. 1–5.
ICPRICPR-2008-GuehamBC #automation #classification #correlation #forensics
Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
ICPRICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #video
An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
ICPRICPR-2008-GuoYZZY #embedded #markov #random
Face super-resolution using 8-connected Markov Random Fields with embedded prior (KG, XY, RZ, GZ, SY), pp. 1–4.
ICPRICPR-2008-HahnKW #3d #algorithm #estimation
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm (MH, LK, CW), pp. 1–4.
ICPRICPR-2008-HainesW #random
Combining shape-from-shading and stereo using Gaussian-Markov random fields (TSFH, RCW), pp. 1–4.
ICPRICPR-2008-HanYJ #evaluation #online
Online feature evaluation for object tracking using Kalman Filter (ZH, QY, JJ), pp. 1–4.
ICPRICPR-2008-HidakaK #feature model #optimisation
Non-Neighboring Rectangular Feature selection using Particle Swarm Optimization (AH, TK), pp. 1–4.
ICPRICPR-2008-HortaMF #algorithm #clustering #comparison #image
A comparison of clustering fully polarimetric SAR images using SEM algorithm and G0P mixture modelwith different initializations (MMH, NDAM, ACF), pp. 1–4.
ICPRICPR-2008-HossainMJY #adaptation #identification #invariant
Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
ICPRICPR-2008-HsiaoCC #recognition
Human action recognition using temporal-state shape contexts (PCH, CSC, LWC), pp. 1–4.
ICPRICPR-2008-HuangST #detection #video
Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
ICPRICPR-2008-HuAS08a #learning
Learning motion patterns in crowded scenes using motion flow field (MH, SA, MS), pp. 1–5.
ICPRICPR-2008-HuSM #categorisation #clustering
Categorization using semi-supervised clustering (JH, MS, AM), pp. 1–4.
ICPRICPR-2008-IbrahimG #online #verification
On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPRICPR-2008-Ilic #recognition
Object labeling for recognition using vocabulary trees (SI), pp. 1–4.
ICPRICPR-2008-IzadiS #robust
Robust region-based background subtraction and shadow removing using color and gradient information (MI, PS), pp. 1–5.
ICPRICPR-2008-JiaDQA #3d #estimation #metric
Directionality measurement and illumination estimation of 3D surface textures by using mojette transform (PJ, JD, LQ, FA), pp. 1–4.
ICPRICPR-2008-KaholV #analysis #modelling #process
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPRICPR-2008-KangKNN #image #multi #recognition #segmentation
Multiband image segmentation and object recognition using texture filter banks (YK, KK, TN, YN), pp. 1–4.
ICPRICPR-2008-KarnickMP #approach #classification #concept #incremental #learning #multi
Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
ICPRICPR-2008-KashimaHRS #clustering #distance
K-means clustering of proportional data using L1 distance (HK, JH, BKR, MS), pp. 1–4.
ICPRICPR-2008-KasuyaKKO #estimation #robust
Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
ICPRICPR-2008-KatayamaUS #coordination #online #recognition
A new HMM for on-line character recognition using pen-direction and pen-coordinate features (YK, SU, HS), pp. 1–4.
ICPRICPR-2008-KazuiMMF #detection #matrix
Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
ICPRICPR-2008-KimS #consistency #detection #sequence #video
Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
ICPRICPR-2008-Kita #case study #detection #image
A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
ICPRICPR-2008-KleinLM
Preceding car tracking using belief functions and a particle filter (JK, CL, PM), pp. 1–4.
ICPRICPR-2008-KonKAT #adaptation #detection #interactive #realtime
Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
ICPRICPR-2008-LachezeB #image #locality
Image sampling for localization using entropy (LL, RB), pp. 1–4.
ICPRICPR-2008-LeeWN #detection #performance
Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
ICPRICPR-2008-LiDM #feature model #learning #locality
Localized feature selection for Gaussian mixtures using variational learning (YL, MD, YM), pp. 1–4.
ICPRICPR-2008-LinG #infinity
Depth recovery using defocus blur at infinity (HYL, KDG), pp. 1–4.
ICPRICPR-2008-LiuS08a #detection #robust
Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
ICPRICPR-2008-LiYWS #invariant
Bi-model tracking of object of interest using invariant spatiogram descriptor (JL, WYY, JGW, WS), pp. 1–4.
ICPRICPR-2008-Machucho-CadenaCB
Rendering of brain tumors using endoneurosonography (RMC, SdlCR, EBC), pp. 1–4.
ICPRICPR-2008-MakiHM #image
Tracking features on a moving object using local image bases (AM, YH, TM), pp. 1–5.
ICPRICPR-2008-MandalW #recognition
Face recognition using curvelet based PCA (TM, QMJW), pp. 1–4.
ICPRICPR-2008-MaruyamaKYT #3d #locality
3D object localization based on occluding contour using STL CAD model (KM, YK, TY, FT), pp. 1–4.
ICPRICPR-2008-MeiS #image #parametricity #statistics
Unsupervised image embedding using nonparametric statistics (GM, CRS), pp. 1–4.
ICPRICPR-2008-MirzaeiR #clustering #transitive
Combining hierarchical clusterings using min-transitive closure (AM, MR), pp. 1–4.
ICPRICPR-2008-MohantaSC #detection #multi
Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
ICPRICPR-2008-MooreSLD #image #segmentation #top-down
Top down image segmentation using congealing and graph-cut (DM, JS, SL, BAD), pp. 1–4.
ICPRICPR-2008-MunizCR #classification #independence
Use of band ratioing for building illumination independent texture classification systems (RM, JAC, MRS), pp. 1–4.
ICPRICPR-2008-MuraiF #bound #detection #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-OkaKXLW #authentication #named #similarity #sketching
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
ICPRICPR-2008-OnishiTA #3d #estimation #image
3D human posture estimation using the HOG features from monocular image (KO, TT, YA), pp. 1–4.
ICPRICPR-2008-PaclikLND #analysis #estimation #multi
Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPRICPR-2008-PalaioB #adaptation #multi
Multi-object tracking using an adaptive transition model particle filter with region covariance data association (HP, JB), pp. 1–4.
ICPRICPR-2008-PanBS #detection #image #representation
Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
ICPRICPR-2008-PengXXD #recognition
Face recognition using anisotropic dual-tree complex wavelet packets (YP, XX, WX, QD), pp. 1–4.
ICPRICPR-2008-PohK #authentication #bound #fault #multimodal #on the
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPRICPR-2008-RebiereAD #image
Image mosaicing using local optical flow registration (NR, MFAF, FD), pp. 1–5.
ICPRICPR-2008-Rokui
Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
ICPRICPR-2008-RyooA #fuzzy #nondeterminism #process
Human activities: Handling uncertainties using fuzzy time intervals (MSR, JKA), pp. 1–5.
ICPRICPR-2008-SahaB #clustering #multi #symmetry
A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
ICPRICPR-2008-SanromaSA #clique #graph
Improving the matching of graphs generated from shapes by the use of procrustes distances into a clique-based MAP formulation (GS, FS, RA), pp. 1–4.
ICPRICPR-2008-SekiH #3d #multi #realtime
Real-time 3D tracking using multiple sample points (AS, HH), pp. 1–4.
ICPRICPR-2008-ShenCH #image #retrieval
Face image retrieval by using Haar features (BCS, CSC, HHH), pp. 1–4.
ICPRICPR-2008-ShenCLB #random
Stereo matching using random walks (RS, IC, XL, AB), pp. 1–4.
ICPRICPR-2008-ShenZL #detection #higher-order #programming
Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
ICPRICPR-2008-ShinK #algorithm
Enhanced Resolution-aware Fitting algorithm using interpolation operator (JS, DK), pp. 1–4.
ICPRICPR-2008-ShivakumaraHT #detection #performance #video
Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
ICPRICPR-2008-SinghNGBSP #hybrid #random
Hybrid SVM — Random Forest classication system for oral cancer screening using LIF spectra (RKS, SKN, LG, SB, CS, KMP), pp. 1–4.
ICPRICPR-2008-Stelldinger #re-engineering
Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting (PS), pp. 1–4.
ICPRICPR-2008-SugaFTA #graph #recognition #segmentation
Object recognition and segmentation using SIFT and Graph Cuts (AS, KF, TT, YA), pp. 1–4.
ICPRICPR-2008-SugimotoO #array #image #synthesis
Virtual focusing image synthesis for user-specified image region using camera array (SS, MO), pp. 1–4.
ICPRICPR-2008-SukumarBPKA #locality #multi #nondeterminism
Uncertainty minimization in multi-sensor localization systems using model selection theory (SRS, HB, DLP, AK, MAA), pp. 1–4.
ICPRICPR-2008-SuS #generative #modelling
Generative models for fingerprint individuality using ridge models (CS, SNS), pp. 1–4.
ICPRICPR-2008-SuzukiSZ #network
Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD) (KS, ZS, JZ), pp. 1–4.
ICPRICPR-2008-TaketomiSY #database #estimation #realtime
Real-time camera position and posture estimation using a feature landmark database with priorities (TT, TS, NY), pp. 1–4.
ICPRICPR-2008-ThomeeHBL #retrieval
Using an artificial imagination for texture retrieval (BT, MJH, EMB, MSL), pp. 1–4.
ICPRICPR-2008-Trujillo-RomeroD #pseudo
Registration by using a pseudo color attribute (FTR, MD), pp. 1–4.
ICPRICPR-2008-TsolakisFD #framework #performance
A framework for efficient correspondence using feature interrelations (AGT, MF, AD), pp. 1–4.
ICPRICPR-2008-TsuchiyaF #feature model
A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPRICPR-2008-UedaT #locality #on the #scalability
On the scalability of robot localization using high-dimensional features (TU, KT), pp. 1–4.
ICPRICPR-2008-UkitaKK
IBR-based free-viewpoint imaging of a complex scene using few cameras (NU, SK, MK), pp. 1–4.
ICPRICPR-2008-VajariaSK #multi #retrieval
Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
ICPRICPR-2008-Vega-PonsRV #algorithm #segmentation #set
Active contour algorithm for texture segmentation using a texture feature set (SVP, JLGR, OLV), pp. 1–4.
ICPRICPR-2008-WachenfeldTJ #recognition #robust
Robust recognition of 1-D barcodes using camera phones (SW, ST, XJ), pp. 1–4.
ICPRICPR-2008-WangC #classification #semantics
Film shot classification using directing semantics (HLW, LFC), pp. 1–4.
ICPRICPR-2008-WangM #invariant #probability #recognition #similarity
Scale invariant face recognition using probabilistic similarity measure (ZW, ZM), pp. 1–4.
ICPRICPR-2008-WangTHW #bound
Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPRICPR-2008-WatanabeIHY #algorithm #performance #reduction #video
A fast algorithm of video super-resolution using dimensionality reduction by DCT and example selection (KW, YI, TH, MY), pp. 1–5.
ICPRICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
ICPRICPR-2008-WongCF #adaptation #image
Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
ICPRICPR-2008-WuF #3d #classification #learning #multi
Multiple view based 3D object classification using ensemble learning of local subspaces (JW, KF), pp. 1–4.
ICPRICPR-2008-XiaoL #higher-order
Improvement on Mean Shift based tracking using second-order information (LX, PL), pp. 1–4.
ICPRICPR-2008-XiaoWH #graph #invariant #recognition
Object recognition using graph spectral invariants (XB, RCW, ERH), pp. 1–4.
ICPRICPR-2008-YamaguchiWNN #estimation #image #sequence
Road region estimation using a sequence of monocular images (KY, AW, TN, YN), pp. 1–4.
ICPRICPR-2008-YangB #algorithm #fault #sketching
Curve fitting algorithm using iterative error minimization for sketch beautification (JY, HB), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-YangYWY #fuzzy #recognition
Face recognition using Complete Fuzzy LDA (WY, HY, JW, JY), pp. 1–4.
ICPRICPR-2008-YanZ #correlation #multimodal
Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
ICPRICPR-2008-YaoADTHM
Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT (JY, NA, AD, AMTD, OMH, JM), pp. 1–4.
ICPRICPR-2008-YaoCAPKA #probability
Sensor planning for PTZ cameras using the probability of camera overload (YY, CHC, BRA, DLP, AK, MAA), pp. 1–5.
ICPRICPR-2008-YenCWWC #video
A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
ICPRICPR-2008-YiAC #invariant #kernel
Orientation and scale invariant mean shift using object mask-based kernel (KMY, HSA, JYC), pp. 1–4.
ICPRICPR-2008-YingZ #detection #performance
Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
ICPRICPR-2008-ZareG #detection #process
Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
ICPRICPR-2008-ZhangYDG #recognition
Handwritten Chinese character recognition using Local Discriminant Projection with Prior Information (HZ, JY, WD, JG), pp. 1–4.
ICPRICPR-2008-ZhaoG #multi #recognition
Establishing point correspondence using multidirectional binary pattern for face recognition (SZ, YG), pp. 1–4.
ICPRICPR-2008-ZhongYSCG #clustering
Hierarchical background subtraction using local pixel clustering (BZ, HY, SS, XC, WG), pp. 1–4.
ICPRICPR-2008-ZhouWS #classification #process #recognition
Human motion recognition using Gaussian Processes classification (HZ, LW, DS), pp. 1–4.
ICPRICPR-2008-ZhuangZHH #estimation #markov
Face age estimation using patch-based hidden Markov model supervectors (XZ, XZ, MHJ, TSH), pp. 1–4.
ICPRICPR-2008-ZitouniSOD #algorithm #graph #image #ranking #web
Re-ranking of web image search results using a graph algorithm (HZ, SGS, DO, PD), pp. 1–4.
KDDKDD-2008-CaroCS
Using tagflake for condensing navigable tag hierarchies from tag clouds (LDC, KSC, MLS), pp. 1069–1072.
KDDKDD-2008-ChowGS #detection #privacy
Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDDKDD-2008-Christen #automation #classification #nearest neighbour
Automatic record linkage using seeded nearest neighbour and support vector machine classification (PC), pp. 151–159.
KDDKDD-2008-GallagherTEF #classification #network
Using ghost edges for classification in sparsely labeled networks (BG, HT, TER, CF), pp. 256–264.
KDDKDD-2008-GrossmanG #data mining #mining #performance
Data mining using high performance data clouds: experimental studies using sector and sphere (RLG, YG), pp. 920–927.
KDDKDD-2008-HallSM #dependence
Unsupervised deduplication using cross-field dependencies (RH, CAS, AM), pp. 310–317.
KDDKDD-2008-HoT #automation #multi
Automated cyclone discovery and tracking using knowledge sharing in multiple heterogeneous satellite data (SSH, AT), pp. 928–936.
KDDKDD-2008-KoenigsteinST #analysis #query #string
Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDDKDD-2008-LaxmanTW #generative #modelling #predict #sequence
Stream prediction using a generative model based on frequent episodes in event sequences (SL, VT, RWW), pp. 453–461.
KDDKDD-2008-MelvilleRL #modelling #web
Customer targeting models using actively-selected web content (PM, SR, RDL), pp. 946–953.
KDDKDD-2008-SarmaGI #query
Bypass rates: reducing query abandonment using negative inferences (ADS, SG, SI), pp. 177–185.
KDDKDD-2008-SatoYN #graph #information management #parametricity #semantics #word
Knowledge discovery of semantic relationships between words using nonparametric bayesian graph model (IS, MY, HN), pp. 587–595.
KDDKDD-2008-ShengPI #data mining #mining #multi #quality
Get another label? improving data quality and data mining using multiple, noisy labelers (VSS, FJP, PGI), pp. 614–622.
KDDKDD-2008-WangD #classification #kernel #semantics #wiki
Building semantic kernels for text classification using wikipedia (PW, CD), pp. 713–721.
KDDKDD-2008-YuJ #kernel
Training structural svms with kernels using sampled cuts (CNJY, TJ), pp. 794–802.
KDDKDD-2008-ZengMLBM #analysis #predict
Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KRKR-2008-DohertyS #reasoning
Reasoning with Qualitative Preferences and Cardinalities using Generalized Circumscription (PD, AS), pp. 560–570.
KRKR-2008-MotikGHS #graph #representation
Representing Structured Objects using Description Graphs (BM, BCG, IH, US), pp. 296–306.
RecSysRecSys-2008-BogersB #recommendation
Recommending scientific articles using citeulike (TB, AvdB), pp. 287–290.
RecSysRecSys-2008-KagieWG #difference
Choosing attribute weights for item dissimilarity using clikstream data with an application to a product catalog map (MK, MCvW, PJFG), pp. 195–202.
RecSysRecSys-2008-Kwon #rating #recommendation
Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
RecSysRecSys-2008-ShepitsenGMB #clustering #personalisation #recommendation #social
Personalized recommendation in social tagging systems using hierarchical clustering (AS, JG, BM, RDB), pp. 259–266.
RecSysRecSys-2008-ZanardiC #ranking #recommendation #social
Social ranking: uncovering relevant content using tag-based recommender systems (VZ, LC), pp. 51–58.
SEKESEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability
Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
SEKESEKE-2008-BalushiSPCL #identification #ontology #quality
Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SEKESEKE-2008-Barros #information management #predict
Predicting Software Project Size Using Project Generated Information (MdOB), pp. 149–154.
SEKESEKE-2008-BrandlFW #modelling #reasoning #testing
Coverage-based Testing Using Qualitative Reasoning Models (HB, GF, FW), pp. 393–398.
SEKESEKE-2008-CuiSXM #architecture #design #reuse
A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
SEKESEKE-2008-DasguptaEFKSV #design #fault tolerance #grid #standard
Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy (GD, OE, LF, SK, SMS, BV), pp. 814–819.
SEKESEKE-2008-DuZR #concept analysis #release planning
Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
SEKESEKE-2008-FilhoV #testing #web #web service #xml
Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
SEKESEKE-2008-FraserWW #automaton #testing
Using Observer Automata to Select Test Cases for Test Purposes (GF, MW, FW), pp. 709–714.
SEKESEKE-2008-HittleG #fault #file system #injection #testing
Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SEKESEKE-2008-KimBBSA #behaviour #named #visualisation
VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
SEKESEKE-2008-KornerG #automation #ontology
Improving Automatic Model Creation Using Ontologies (SJK, TG), pp. 691–696.
SEKESEKE-2008-LucasSM #classification #personalisation #recommendation #towards
Comparing the Use of Traditional and Associative Classifiers towards Personalized Recommendations (JPL, SS, MNMG), pp. 607–612.
SEKESEKE-2008-MahoneyE #monitoring
Using Scenario Monitoring to Address State Based Crosscutting Concerns (MM, TE), pp. 581–586.
SEKESEKE-2008-MarquesMNF #approach #interface #ontology #semantics #web #web service
Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
SEKESEKE-2008-MuhlenfeldMMS #execution #modelling #ontology #process
Ontology-based Process Modeling and Execution Using STEP/EXPRESS (AM, WM, FM, MS), pp. 935–940.
SEKESEKE-2008-ParkK #automaton #bound #constraints #lts #model checking
Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKESEKE-2008-ReddyreddyX #xml
Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
SEKESEKE-2008-TekbacakTD #approach #certification #data access #security #semantics
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
SEKESEKE-2008-ZhongYAF
Ontology-learning Supported Sematic Search Using Cooperative Agents (CZ, Z(Y, MA, BHF), pp. 123–128.
SIGIRSIGIR-2008-BalogRW #modelling #retrieval
Bloggers as experts: feed distillation using expert retrieval models (KB, MdR, WW), pp. 753–754.
SIGIRSIGIR-2008-Banerjee #classification #corpus #modelling #topic
Improving text classification accuracy using topic modeling over an additional corpus (SB), pp. 867–868.
SIGIRSIGIR-2008-BenderskyK #graph #ranking
Re-ranking search results using document-passage graphs (MB, OK), pp. 853–854.
SIGIRSIGIR-2008-BuscherDE #feedback #query
Query expansion using gaze-based feedback on the subdocument level (GB, AD, LvE), pp. 387–394.
SIGIRSIGIR-2008-DingLLP #clustering #probability
Posterior probabilistic clustering using NMF (CHQD, TL, DL, WP), pp. 831–832.
SIGIRSIGIR-2008-DruckMM #learning
Learning from labeled features using generalized expectation criteria (GD, GSM, AM), pp. 595–602.
SIGIRSIGIR-2008-Gan #approach #query
Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
SIGIRSIGIR-2008-GengLQALS #nearest neighbour #query #ranking
Query dependent ranking using K-nearest neighbor (XG, TYL, TQ, AA, HL, HYS), pp. 115–122.
SIGIRSIGIR-2008-GuanWCBW #crawling #effectiveness #estimation #online #topic
Guide focused crawler efficiently and effectively using on-line topical importance estimation (ZG, CW, CC, JB, JW), pp. 757–758.
SIGIRSIGIR-2008-HeMO #metric #retrieval
Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
SIGIRSIGIR-2008-HeMO08a #ranking
Ranking opinionated blog posts using OpinionFinder (BH, CM, IO), pp. 727–728.
SIGIRSIGIR-2008-JiangN #video #visual notation
Bag-of-visual-words expansion using visual relatedness for video indexing (YGJ, CWN), pp. 769–770.
SIGIRSIGIR-2008-JohoHJ #documentation #summary
Emulating query-biased summaries using document titles (HJ, DH, JMJ), pp. 709–710.
SIGIRSIGIR-2008-KapteinLHK #modelling #web
Using parsimonious language models on web data (RK, RL, DH, JK), pp. 763–764.
SIGIRSIGIR-2008-PengL #analysis #evolution #topic
Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIRSIGIR-2008-TanWC #detection #sentiment
Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
SIGIRSIGIR-2008-TrieschniggMRK #concept #modelling
Measuring concept relatedness using language models (DT, EM, MdR, WK), pp. 823–824.
SIGIRSIGIR-2008-VelosoAGM #learning #rank
Learning to rank at query-time using association rules (AV, HMdA, MAG, WMJ), pp. 267–274.
SIGIRSIGIR-2008-WangH #documentation #retrieval
Improving biomedical document retrieval using domain knowledge (SW, MH), pp. 785–786.
SIGIRSIGIR-2008-WanY #analysis #clustering #multi #summary
Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIRSIGIR-2008-YuZXG #categorisation #design #learning
trNon-greedy active learning for text categorization using convex ansductive experimental design (KY, SZ, WX, YG), pp. 635–642.
BXBX-2008-Hidaka1 #bidirectional #graph transformation
Bidirectional Graph Transformation using UnCAL (SH), p. 43.
ECMFAECMDA-FA-2008-BercoviciFW #architecture
From Business Architecture to SOA Realization Using MDD (AB, FF, AJW), pp. 381–392.
ECMFAECMDA-FA-2008-NogueraD #domain model #framework #modelling #validation
Annotation Framework Validation Using Domain Models (CN, LD), pp. 48–62.
ICMTICMT-2008-VignagaPB #contract #interactive #model transformation
Extracting Object Interactions Out of Software Contracts Using Model Transformations (AV, DP, MCB), pp. 245–259.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
SPLCSPLC-2008-GustavssonA #embedded #flexibility #product line
Evaluating Flexibility in Embedded Automotive Product Lines Using Real Options (HG, JA), pp. 235–242.
SPLCSPLC-2008-HartmannT #diagrams #feature model #multi #product line #variability
Using Feature Diagrams with Context Variability to Model Multiple Product Lines for Software Supply Chains (HH, TT), pp. 12–21.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
TOOLSTOOLS-EUROPE-2008-CohenGM #program transformation
Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
AdaEuropeAdaEurope-2008-Evequoz #concurrent #performance #word
Practical, Fast and Simple Concurrent FIFO Queues Using Single Word Synchronization Primitives (CE), pp. 59–72.
PADLPADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming
Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
PEPMPEPM-2008-GillenwaterMSZTGO #hardware #static typing
Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
PEPMPEPM-2008-ZhuK #library
Specialization for applications using shared libraries (PZ, SCK), pp. 159–168.
PLDIPLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
POPLPOPL-2008-LahiriQ #precise #smt #verification
Back to the future: revisiting precise program verification using SMT solvers (SKL, SQ), pp. 171–182.
PPDPPPDP-2008-MoralesCH #automaton #generative
Comparing tag scheme variations using an abstract machine generator (JFM, MC, MVH), pp. 32–43.
PPDPPPDP-2008-PlasmeijerJKA #ajax #declarative #evaluation #workflow
Declarative Ajax and client side evaluation of workflows using iTasks (RP, JMJ, PWMK, PA), pp. 56–66.
QAPLQAPL-2008-Smith #abstract interpretation #imperative #probability #source code
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions (MJAS), pp. 43–59.
SASSAS-2008-AllamigeonGG #invariant
Inferring Min and Max Invariants Using Max-Plus Polyhedra (XA, SG, EG), pp. 189–204.
SASSAS-2008-LalR #data flow #multi #query
Solving Multiple Dataflow Queries Using WPDSs (AL, TWR), pp. 93–109.
SASSAS-2008-PrabhuS #analysis #array #java #pointer
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
SASSAS-2008-RamanathanSGJ #protocol
Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
AdaSIGAda-2008-Moore #ada
A buffer container class hierarchy using Ada 2005 (BJM), pp. 57–74.
AdaSIGAda-2008-SwardW #architecture #enterprise #multi
A multi-language service-oriented architecture using an enterprise service bus (RES, KJW), pp. 85–90.
RERE-2008-Castro-HerreraDCM #data mining #elicitation #mining #process #recommendation #requirements #scalability
Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes (CCH, CD, JCH, BM), pp. 165–168.
RERE-2008-FeatherHMU #analysis #deployment #requirements
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RERE-2008-MavinNWML #requirements
Using Scenarios to Discover Requirements for Engine Control Systems (AM, MN, PW, NAMM, PL), pp. 235–240.
RERE-2008-RifautD #assessment #framework #quality #requirements
Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
RERE-2008-Szoke #automation #scheduling
A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQREFSQ-2008-SchlosserJM #database #requirements
Using a Creativity Workshop to Generate Requirements for an Event Database Application (CS, SJ, NAMM), pp. 109–122.
ASEASE-2008-AdnanGDZ #analysis #clustering #component #design #interface
Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASEASE-2008-AndreouP #estimation #fuzzy
Software Cost Estimation using Fuzzy Decision Trees (ASA, EP), pp. 371–374.
ASEASE-2008-BrichauKM #source code
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASEASE-2008-CamachoM #automation #named
APPAREIL: A Tool for Building Automated Program Translators Using Annotated Grammars (DOC, KM), pp. 489–490.
ASEASE-2008-Hall #modelling #queue #realtime #specification #validation
Validating Real Time Specifications using Real Time Event Queue Modeling (RJH), pp. 79–88.
ASEASE-2008-KhalekELK #constraints #generative #relational #testing #theorem proving
Query-Aware Test Generation Using a Relational Constraint Solver (SAK, BE, YOL, SK), pp. 238–247.
ASEASE-2008-PortOM #requirements #simulation
Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
ASEASE-2008-RakamaricH #automation #axiom #static analysis
Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
FSEFSE-2008-DragertDR #concurrent #generative
Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSEFSE-2008-KoesnandarERHSS #metaprogramming #web
Using assertions to help end-user programmers create dependable web macros (AK, SGE, GR, LH, CS, KTS), pp. 124–134.
FSEFSE-2008-KulturTB #estimation #memory management #named #network
ENNA: software effort estimation using ensemble of neural networks with associative memory (YK, BT, ABB), pp. 330–338.
FSEFSE-2008-OsterweilCEPWBH #dataset #experience #process #workflow
Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
FSEFSE-2008-YuWGB #composition #encoding #performance #summary #verification #web #web service
Modular verification of web services using efficient symbolic encoding and summarization (FY, CW, AG, TB), pp. 192–202.
ICSEICSE-2008-BunyakiatiFSC #standard #testing #uml
Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSEICSE-2008-GannodBH #education #re-engineering
Using the inverted classroom to teach software engineering (GCG, JEB, MTH), pp. 777–786.
ICSEICSE-2008-SankaranarayananIG #induction #library #logic programming #mining #specification
Mining library specifications using inductive logic programming (SS, FI, AG), pp. 131–140.
ICSEICSE-2008-SicardBP #architecture #component #self
Using components for architecture-based management: the self-repair case (SS, FB, NDP), pp. 101–110.
ICSEICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language
An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
ICSEICSE-2008-XuR #detection #java #memory management #precise #profiling
Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
ICSEICSE-2008-YilmazPW #fault #locality
Time will tell: fault localization using time spectra (CY, AMP, CW), pp. 81–90.
ICSEICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict
Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
SACSAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving
Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SACSAC-2008-AbreuGZG #automation #fault #invariant #locality
Automatic software fault localization using generic program invariants (RA, AG, PZ, AJCvG), pp. 712–717.
SACSAC-2008-AgulhariSB
Compressing electrocardiogram signals using parameterized wavelets (CMA, RMRS, ISB), pp. 1348–1352.
SACSAC-2008-AhamedRH #architecture #distributed #identification #scalability
Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SACSAC-2008-AiresSM
Optical flow using color information: preliminary results (KRTA, AMS, AADM), pp. 1607–1611.
SACSAC-2008-AndresAN #experience #formal method #information management
Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SACSAC-2008-AntonellisMT #clustering #documentation #named #summary #xml
XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries (PA, CM, NT), pp. 1081–1088.
SACSAC-2008-AntonyBHP #approach #biology #interactive #mining #validation
Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
SACSAC-2008-AraujoPFLO #distributed #named
FlagelLink: a decision support system for distributed flagellar data using data warehouse (FFA, ÂMAP, KMF, BFL, DMO), pp. 1268–1272.
SACSAC-2008-BadishiK #adaptation
Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
SACSAC-2008-BraghettoFP #algebra #execution #process
Using process algebra to control the execution of business processes (KRB, JEF, CP), pp. 128–129.
SACSAC-2008-BroiniziFG #framework #requirements
Using annotations in the naked objects framework to explore data requirements (MEBB, JEF, AG), pp. 630–637.
SACSAC-2008-BuenoWJ #automation #generative #testing
Automatic test data generation using particle systems (PMSB, WEW, MJ), pp. 809–814.
SACSAC-2008-BussBSE #analysis #flexibility #graph #pointer
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SACSAC-2008-CarvalhoLGS #identification #programming #search-based
Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
SACSAC-2008-ChongKLG #energy #network
Using association rules for energy conservation in wireless sensor networks (SKC, SK, SWL, MMG), pp. 971–975.
SACSAC-2008-CorreaIZF #analysis #image #mobile
Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SACSAC-2008-Denner-Broser #algorithm #analysis #problem
An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SACSAC-2008-DingMH #approach #refinement #specification
An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
SACSAC-2008-FonsecaVM #data access #detection #online
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-GarciaH #analysis #functional #metric
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-GarciaT #security #semantics #web #web service
Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SACSAC-2008-HieronsJUY #adaptation #sequence
Using adaptive distinguishing sequences in checking sequence constructions (RMH, GVJ, HU, HY), pp. 682–687.
SACSAC-2008-KeyvanpourA #approach #image #interactive #retrieval #semantics
A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
SACSAC-2008-KuangZ #algorithm #detection
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LiG #detection #network #optimisation
TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
SACSAC-2008-LuizPBR #approach #mobile #programming #search-based
A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
SACSAC-2008-MaagG #approach #protocol #self #testing
Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SACSAC-2008-MatosBP #recognition
Face recognition using DCT coefficients selection (FMdSM, LVB, JvdP), pp. 1753–1757.
SACSAC-2008-MengleG #algorithm #ambiguity #classification #feature model
Using ambiguity measure feature selection algorithm for support vector machine classifier (SSRM, NG), pp. 916–920.
SACSAC-2008-MengleGP #category theory #classification
Discovering relationships among categories using misclassification information (SSRM, NG, AP), pp. 932–937.
SACSAC-2008-MorimotoO #metric #video
Eyelid measurements using digital video processing (CHM, TFdO), pp. 1369–1373.
SACSAC-2008-Nassiri #3d #e-commerce #trust
Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SACSAC-2008-NecaskyP #concept #design #semantics #web #web service
Designing semantic web services using conceptual model (MN, JP), pp. 2243–2247.
SACSAC-2008-OsadaOKKK #diagrams #metric
Proposing metrics of difficulty of domain knowledge using usecase diagrams (AO, DO, NK, HK, KK), pp. 624–629.
SACSAC-2008-PavelecJBO #identification #independence
Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SACSAC-2008-PereiraAGS #architecture #configuration management #hybrid
Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture (MMP, SRFdA, BCdO, ISS), pp. 1552–1553.
SACSAC-2008-RadtkeSW #algorithm #classification
Using the RRT algorithm to optimize classification systems for handwritten digits and letters (PVWR, RS, TW), pp. 1748–1752.
SACSAC-2008-ReynosoCGP #diagrams #metric #ocl #statechart #uml
Formal definition of measures for UML statechart diagrams using OCL (LR, JACL, MG, MP), pp. 846–847.
SACSAC-2008-RochaR #animation #evaluation
An evaluation of a collision handling system using sphere-trees for plausible rigid body animation (RdSR, MAFR), pp. 1241–1245.
SACSAC-2008-SchobelP #case study #clustering #cpu #kernel #research #scheduling
Kernel-mode scheduling server for CPU partitioning: a case study using the Windows research kernel (MS, AP), pp. 1700–1704.
SACSAC-2008-SuKZG #classification #collaboration #machine learning
Imputation-boosted collaborative filtering using machine learning classifiers (XS, TMK, XZ, RG), pp. 949–950.
SACSAC-2008-SungCM #clustering #concept #learning #lifecycle #ontology #performance #web
Efficient concept clustering for ontology learning using an event life cycle on the web (SS, SC, DM), pp. 2310–2314.
SACSAC-2008-TanWWC #detection #problem #semantics
Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
SACSAC-2008-TierneyJ #ontology #semantics
C-SAW---contextual semantic alignment of ontologies: using negative semantic reinforcement (BT, MJ), pp. 2346–2347.
SACSAC-2008-VictorPB
Context addressing using context-aware flooding (KV, JP, YB), pp. 1960–1961.
SACSAC-2008-Willassen #calculus
Using simplified event calculus in digital investigation (SYW), pp. 1438–1442.
SACSAC-2008-XuWQ #modelling #verification
Modeling and verifying BPEL using synchronized net (CX, HW, WQ), pp. 2358–2362.
SACSAC-2008-YuiMUK #distributed #named #parallel #xquery
XBird/D: distributed and parallel XQuery processing using remote proxy (MY, JM, SU, HK), pp. 1003–1007.
SACSAC-2008-ZhangMD #feature model #fuzzy #image #retrieval #set
Texture feature extraction and description using fuzzy set of main dominant directions of variable scales in content-based medical image retrieval (GZ, ZMM, LD), pp. 1760–1761.
SACSAC-2008-ZhuDXW #documentation #image #linear
Perspective rectification of camera-based document images using local linear structure (YZ, RD, BX, CW), pp. 451–452.
LDTALDTA-2007-AkessonEH08 #compilation #development #jastadd
Development of a Modelica Compiler Using JastAdd (, TE, GH), pp. 117–131.
LDTALDTA-2007-HameyG08 #domain-specific language #experience #implementation #stratego
Implementing a Domain-Specific Language Using Stratego/XT: An Experience Paper (LGCH, SG), pp. 37–51.
GPCEGPCE-2008-ApelKB #aspect-oriented #functional #refactoring
Program refactoring using functional aspects (SA, CK, DSB), pp. 161–170.
GPCEGPCE-2008-Batory #modelling
Using modern mathematics as an FOSD modeling language (DSB), pp. 35–44.
GPCEGPCE-2008-GottschlingL #c++ #compilation #concept #library #performance #reuse #robust #semantics
Integrating semantics and compilation: using c++ concepts to develop robust and efficient reusable libraries (PG, AL), pp. 67–76.
SLESLE-2008-LiangD #evaluation #model transformation #txl
A Practical Evaluation of Using TXL for Model Transformation (HL, JD), pp. 245–264.
SLESLE-2008-Nilsson-NymanEH #semiparsing
Practical Scope Recovery Using Bridge Parsing (ENN, TE, GH), pp. 95–113.
ASPLOSASPLOS-2008-GummarajuCTR #manycore #named #programming
Streamware: programming general-purpose multicore processors using streams (JG, JC, YT, MR), pp. 297–307.
CASECASE-2008-AddadA #algebra #architecture #evaluation #graph #modelling
Modeling and response time evaluation of ethernet-based control architectures using timed event graphs and Max-Plus algebra (BA, SA), pp. 418–423.
CASECASE-2008-Andoh #identification
Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
CASECASE-2008-ChoiJSKRKKSACC #automation #development #flexibility #framework #mobile #platform
Development of flexible laboratory automation platform using Mobile Agents in the clinical laboratory (BC, SMJ, SHS, JK, SR, MCK, JK, WHS, KTA, WC, HRC), pp. 918–923.
CASECASE-2008-DaiCL
Robot tracking using vision and laser sensors (WD, AC, PXL), pp. 169–174.
CASECASE-2008-HanX #identification #multi #network
Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
CASECASE-2008-HooverMR #3d #detection #image #matrix
Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
CASECASE-2008-HouZWCT #adaptation #approach #fuzzy #nondeterminism
Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
CASECASE-2008-LiuSXYLZF #agile #approach
Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
CASECASE-2008-MitaniH #analysis #metric #symmetry
Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASECASE-2008-MittalYBB #difference #equation #modelling #multi #performance #probability
Dynamics and performance modeling of multi-stage manufacturing systems using nonlinear stochastic differential equations (UM, HY, STSB, LGB), pp. 498–503.
CASECASE-2008-NagleW #named
GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CASECASE-2008-PonnambalamPMS #network
Modified ART1 neural networks for cell formation using production data (SGP, RSP, SSM, SS), pp. 603–608.
CASECASE-2008-RohPSYC0LC #flexibility
Flexible docking mechanism using combination of magnetic force with error-compensation capability (SgR, JHP, YKS, KY, MC, HSK, HL, HRC), pp. 697–702.
CASECASE-2008-SharmaBDC #assembly #generative #optimisation #sequence
Generation of optimized robotic assembly sequence using ant colony optimization (SS, BBB, PD, BBC), pp. 894–899.
CASECASE-2008-SrivastavaVK #combinator
Procurement of global logistics services using combinatorial auctions (NKS, NV, SK), pp. 297–302.
CASECASE-2008-TamadazteDFF #automation #multi #visual notation
Automatic micromanipulation using multiscale visual servoing (BT, SD, GF, NLFP), pp. 977–982.
CASECASE-2008-UnverM #automation #composition #design pattern #throughput
Using architectural software patterns in support of controlling modular high throughput screening automation systems (HÖÜ, JM), pp. 912–917.
CASECASE-2008-XuDAG #3d #random
Motion planning for steerable needles in 3D environments with obstacles using rapidly-exploring Random Trees and backchaining (JX, VD, RA, KG), pp. 41–46.
CASECASE-2008-ZhuCS #markov #recognition
Human intention recognition in Smart Assisted Living Systems using a Hierarchical Hidden Markov Model (CZ, QC, WS), pp. 253–258.
CCCC-2008-ZhaoRARW #debugging #how #performance
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
DACDAC-2008-BharathES #algorithm #automation #search-based
Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM (KB, EE, MS), pp. 560–565.
DACDAC-2008-BrockmanLKKM #array #design #memory management #multi #programmable
Design of a mask-programmable memory/multiplier array using G4-FET technology (JBB, SL, PMK, AK, MMM), pp. 337–338.
DACDAC-2008-CookS #design #predict
Predictive design space exploration using genetically programmed response surfaces (HC, KS), pp. 960–965.
DACDAC-2008-CoskunRG #learning #multi #online
Temperature management in multiprocessor SoCs using online learning (AKC, TSR, KCG), pp. 890–893.
DACDAC-2008-DargaSM #performance #symmetry
Faster symmetry discovery using sparsity of symmetries (PTD, KAS, ILM), pp. 149–154.
DACDAC-2008-DasikaDFMB
DVFS in loop accelerators using BLADES (GSD, SD, KF, SAM, DMB), pp. 894–897.
DACDAC-2008-GaoKKLAM #estimation #hybrid #multi #performance #simulation
Multiprocessor performance estimation using hybrid simulation (LG, KK, SK, RL, GA, HM), pp. 325–330.
DACDAC-2008-GulatiK #fault #simulation #towards
Towards acceleration of fault simulation using graphics processing units (KG, SPK), pp. 822–827.
DACDAC-2008-JinC #benchmark #case study #metric #performance #simulation #statistics
Improve simulation efficiency using statistical benchmark subsetting: an ImplantBench case study (ZJ, ACC), pp. 970–973.
DACDAC-2008-JoshiCSBA #power management #reduction
Leakage power reduction using stress-enhanced layouts (VJ, BC, DS, DB, KA), pp. 912–917.
DACDAC-2008-Ng #challenge #modelling #verification
Challenges in using system-level models for RTL verification (KN), pp. 812–815.
DACDAC-2008-OzisikyilmazMC #design #machine learning #performance
Efficient system design space exploration using machine learning techniques (, GM, ANC), pp. 966–969.
DACDAC-2008-PaulB #configuration management #memory management #performance #resource management
Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
DACDAC-2008-SauerGL #framework #functional #modelling #named #performance
SystemClick: a domain-specific framework for early exploration using functional performance models (CS, MG, HPL), pp. 480–485.
DACDAC-2008-TamPB #analysis #automation #layout #locality #precise
Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DACDAC-2008-YuB #fault #multi
Multiple defect diagnosis using no assumptions on failing pattern characteristics (XY, RD(B), pp. 361–366.
DACDAC-2008-ZhangYZDKDKC #optimisation #power management
Low power passive equalizer optimization using tritonic step response (LZ, WY, HZ, AD, GAK, DMD, ESK, CKC), pp. 570–573.
DATEDATE-2008-BadarogluDLC
Calibration of Integrated CMOS Hall Sensors Using Coil-on-Chip in ATE Environment (MB, GD, FL, OC), pp. 873–878.
DATEDATE-2008-BrisolaraORLCW #code generation #uml
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-ChoiC #testing
Digital bit stream jitter testing using jitter expansion (HWC, AC), pp. 1468–1473.
DATEDATE-2008-CopeCL #configuration management #gpu #logic #memory management
Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
DATEDATE-2008-CorderoK
Clock Distribution Scheme using Coplanar Transmission Lines (VHCC, SPK), pp. 985–990.
DATEDATE-2008-FarahaniFS #architecture #network #scalability
Scalable Architecture for on-Chip Neural Network Training using Swarm Intelligence (AFF, SMF, SS), pp. 1340–1345.
DATEDATE-2008-FeinsteinTM #detection #equivalence #logic
Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
DATEDATE-2008-GhoshNR #adaptation #fault tolerance #novel
A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking (SG, PN, KR), pp. 366–371.
DATEDATE-2008-KazmierskiZA #approximate #mobile #modelling #performance
Efficient circuit-level modelling of ballistic CNT using piecewise non-linear approximation of mobile charge density (TJK, DZ, BMAH), pp. 146–151.
DATEDATE-2008-LiMM #concurrent #named #self
CASP: Concurrent Autonomous Chip Self-Test Using Stored Test Patterns (YL, SM, SM), pp. 885–890.
DATEDATE-2008-Marques-SilvaP #algorithm #satisfiability
Algorithms for Maximum Satisfiability using Unsatisfiable Cores (JMS, JP), pp. 408–413.
DATEDATE-2008-MuraliMAGBBM #manycore #optimisation #platform
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization (SM, AM, DA, RG, SPB, LB, GDM), pp. 110–115.
DATEDATE-2008-NagpalGK #approach #design
A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
DATEDATE-2008-PakbazniaP
Coarse-Grain MTCMOS Sleep Transistor Sizing Using Delay Budgeting (EP, MP), pp. 385–390.
DATEDATE-2008-ParkSP #embedded #execution
Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
DATEDATE-2008-PlazaMB #constraints #generative #random
Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
DATEDATE-2008-PradhanV #performance #synthesis
Fast Analog Circuit Synthesis Using Sensitivity Based Near Neighbor Searches (AP, RV), pp. 523–526.
DATEDATE-2008-SchirnerD #modelling #scheduling
Introducing Preemptive Scheduling in Abstract RTOS Models using Result Oriented Modeling (GS, RD), pp. 122–127.
DATEDATE-2008-SteinhorstH #model checking #specification
Model Checking of Analog Systems using an Analog Specification Language (SS, LH), pp. 324–329.
DATEDATE-2008-TanQ #framework #markov #power management #probability
A Framework of Stochastic Power Management Using Hidden Markov Model (YT, QQ), pp. 92–97.
DATEDATE-2008-ThoguluvaRC #architecture #performance #programmable #security
Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
DATEDATE-2008-VillarJGK #specification
Heterogeneous System-level Specification Using SystemC (EV, AJ, CG, TK).
DATEDATE-2008-YonedaF #functional #reuse
Wrapper and TAM Co-Optimization for Reuse of SoC Functional Interconnects (TY, HF), pp. 1366–1369.
DATEDATE-2008-YuanHX
Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
DATEDATE-2008-ZhangHXL #fault #manycore
Defect Tolerance in Homogeneous Manycore Processors Using Core-Level Redundancy with Unified Topology (LZ, YH, QX, XL), pp. 891–896.
DATEDATE-2008-ZhouPB #analysis #generative #metric #modelling
Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
HPCAHPCA-2008-ChenMP #constraints #graph #memory management #runtime #validation
Runtime validation of memory ordering using constraint graph checking (KC, SM, PP), pp. 415–426.
HPCAHPCA-2008-ChungDKK #memory management #thread #transaction
Thread-safe dynamic binary translation using transactional memory (JC, MD, HK, CK), pp. 279–289.
HPCAHPCA-2008-KimGWB #analysis #performance
System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
HPCAHPCA-2008-LeeKMP #predict
Performance-aware speculation control using wrong path usefulness prediction (CJL, HK, OM, YNP), pp. 39–49.
HPDCHPDC-2008-CarreraSWTA
Managing SLAs of heterogeneous workloads using dynamic application placement (DC, MS, IW, JT, EA), pp. 217–218.
HPDCHPDC-2008-KhannaCKSSKF #data transfer #multi #network #optimisation
Multi-hop path splitting and multi-pathing optimizations for data transfers over shared wide-area networks using gridFTP (GK, ÜVÇ, TMK, PS, JHS, RK, ITF), pp. 225–226.
HPDCHPDC-2008-ManosMKCKT #distributed #performance
Distributed mpi cross-site run performance using mpig (SM, MDM, OK, PVC, NTK, BRT), pp. 229–230.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
HPDCHPDC-2008-SotomayorKF #execution #virtual machine
Combining batch execution and leasing using virtual machines (BS, KK, ITF), pp. 87–96.
LCTESLCTES-2008-EbnerBSKWK
Generalized instruction selection using SSA-graphs (DE, FB, BS, AK, PW, AK), pp. 31–40.
OSDIOSDI-2008-BansalA
Binary Translation Using Peephole Superoptimizers (SB, AA), pp. 177–192.
OSDIOSDI-2008-YuIFBEGC #distributed #named
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language (YY, MI, DF, MB, ÚE, PKG, JC), pp. 1–14.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
PDPPDP-2008-BerbecaruA #performance
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes (DB, LA), pp. 581–589.
PDPPDP-2008-ColmenarMGLH #modelling #probability
Modelling Asynchronous Systems using Probability Distribution Functions (JMC, NM, OG, JL, JIH), pp. 3–11.
PDPPDP-2008-GoswamiG #contract
Resource Selection in Grids Using Contract Net (KG, AG), pp. 105–109.
PDPPDP-2008-KecskemetiKTKD #automation #deployment
Automatic Service Deployment Using Virtualisation (GK, PK, GT, TK, TD), pp. 628–635.
PDPPDP-2008-KrenekPKFSDSWM #analysis #multi #simulation
Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
PDPPDP-2008-LouatiZ #network
Personal Overlay Networks Management Using a P2P-based Publish/Subscribe Naming System (WL, DZ), pp. 95–99.
PDPPDP-2008-MerzPW #coordination #distributed #framework #network #simulation
A Simulation Framework for Distributed Super-Peer Topology Construction Using Network Coordinates (PM, MP, SW), pp. 491–498.
PDPPDP-2008-TaillardGD #approach #framework #performance #visual notation
A Graphical Framework for High Performance Computing Using An MDE Approach (JT, FG, JLD), pp. 165–173.
PPoPPPPoPP-2008-AnsariKJLKW #adaptation #algorithm #case study #concurrent #experience #memory management #transaction
Experiences using adaptive concurrency in transactional memory with Lee’s routing algorithm (MA, CK, KJ, ML, CCK, IW), pp. 261–262.
PPoPPPPoPP-2008-ChengCHT #classification #manycore #platform #scalability
Scalable packet classification using interpreting: a cross-platform multi-core solution (HC, ZC, BH, XT), pp. 33–42.
PPoPPPPoPP-2008-LevM #hardware #memory management #transaction
Split hardware transactions: true nesting of transactions using best-effort hardware transactional memory (YL, JWM), pp. 197–206.
PPoPPPPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling
Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPPPPoPP-2008-RyooRBSKH #evaluation #gpu #optimisation #parallel #performance #thread
Optimization principles and application performance evaluation of a multithreaded GPU using CUDA (SR, CIR, SSB, SSS, DBK, WmWH), pp. 73–82.
FASEFASE-2008-AlrajehRU #behaviour #modelling
Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
FASEFASE-2008-BergJR #similarity #state machine #testing
Regular Inference for State Machines Using Domains with Equality Tests (TB, BJ, HR), pp. 317–331.
FASEFASE-2008-JurjensSY #analysis #automation #security
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FoSSaCSFoSSaCS-2008-GruberJ #bound #communication #complexity #regular expression
Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
STOCSTOC-2008-Ben-AroyaT #combinator #graph
A combinatorial construction of almost-ramanujan graphs using the zig-zag product (ABA, ATS), pp. 325–334.
STOCSTOC-2008-DeKSS #composition #integer #multi #performance
Fast integer multiplication using modular arithmetic (AD, PPK, CS, RS), pp. 499–506.
TACASTACAS-2008-ChocklerGY #automation #performance #refinement
Efficient Automatic STE Refinement Using Responsibility (HC, OG, AY), pp. 233–248.
TACASTACAS-2008-McMillan #generative #invariant #proving #quantifier
Quantified Invariant Generation Using an Interpolating Saturation Prover (KLM), pp. 413–427.
TACASTACAS-2008-SankaranarayananDI #hybrid #model checking
Symbolic Model Checking of Hybrid Systems Using Template Polyhedra (SS, TD, FI), pp. 188–202.
CAVCAV-2008-KashyapG
Producing Short Counterexamples Using “Crucial Events” (SK, VKG), pp. 491–503.
CAVCAV-2008-KingS #congruence #equation #satisfiability
Inferring Congruence Equations Using SAT (AK, HS), pp. 281–293.
CSLCSL-2008-Nguyen #proving
Proving Infinitude of Prime Numbers Using Binomial Coefficients (PN), pp. 184–198.
ICLPICLP-2008-AlpuenteEI #dependence #termination
Termination of Narrowing Using Dependency Pairs (MA, SE, JI), pp. 317–331.
ICLPICLP-2008-AnhRD #implementation
An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLPICLP-2008-Baral #information management #programming #reasoning #representation #set
Using Answer Set Programming for Knowledge Representation and Reasoning: Future Directions (CB), pp. 69–70.
ICLPICLP-2008-BeniniBM #constraints #multi #platform #policy #programming #resource management
Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLPICLP-2008-CliffeVBP #animation #declarative #named #programming #set #visualisation
ASPVIZ: Declarative Visualisation and Animation Using Answer Set Programming (OC, MDV, MB, JAP), pp. 724–728.
ICLPICLP-2008-EglyGW #framework #implementation #named #programming
ASPARTIX: Implementing Argumentation Frameworks Using Answer-Set Programming (UE, SAG, SW), pp. 734–738.
ICLPICLP-2008-MontaliTACGLM #declarative #logic programming #specification #verification
Verification from Declarative Specifications Using Logic Programming (MM, PT, MA, FC, MG, EL, PM), pp. 440–454.
ICLPICLP-2008-MuggletonST #bias #declarative #logic programming #named
TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLPICLP-2008-Santos #bias #declarative #logic programming #named
TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICLPICLP-2008-Tsitovich #detection #model checking #security
Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
ICSTICST-2008-HaslingGB #case study #modelling #requirements #testing #uml
Model Based Testing of System Requirements using UML Use Case Models (BH, HG, KB), pp. 367–376.
ICSTICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
ICSTICST-2008-RingsNG #grid #testing #workflow
Testing Grid Application Workflows Using TTCN-3 (TR, HN, JG), pp. 210–219.
ICSTICST-2008-SherriffW #composition #empirical #impact analysis
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
ICSTICST-2008-WareWS #metric #predict
The Use of Intra-Release Product Measures in Predicting Release Readiness (MPW, FGW, MS), pp. 230–237.
IJCARIJCAR-2008-MouraB #effectiveness #logic #set
Deciding Effectively Propositional Logic Using DPLL and Substitution Sets (LMdM, NB), pp. 410–425.
ISSTAISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named
Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
ISSTAISSTA-2008-DoR #analysis #modelling #testing
Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTAISSTA-2008-JeffreyGG #fault #locality
Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
LICSLICS-2008-Burel #deduction #first-order #representation #type system
A First-Order Representation of Pure Type Systems Using Superdeduction (GB), pp. 253–263.
MBTMBT-2008-Jurjens #case study #modelling #security #testing
Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
ICSTSAT-2008-EibachPV #satisfiability
Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
ICSTSAT-2008-KottlerKS08a #bound #np-hard #satisfiability #subclass
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
FATESTestCom-FATES-2008-DangN #generative #hybrid #testing
Using Disparity to Enhance Test Generation for Hybrid Systems (TD, TN), pp. 54–69.
CBSECBSE-2007-FornasierWG #component #composition #named #programming #runtime
Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL (PF, JW, IG), pp. 227–241.
ECSAECSA-2007-FuentesGPV #architecture
Using Connectors to Model Crosscutting Influences in Software Architectures (LF, NG, MP, JAV), pp. 292–295.
ECSAECSA-2007-OrtizPAAS #approach #architecture #case study #component #experience #framework
Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, , PS), pp. 335–338.
QoSAQoSA-2007-PaceC #architecture #design #quality
Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
WICSAWICSA-2007-RossoM #approach #architecture #knowledge-based #scalability
Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
DocEngDocEng-2007-Storey #documentation #folksonomy #navigation #ontology #taxonomy
Navigating documents using ontologies, taxonomies and folksonomies (MADS), p. 2.
DRRDRR-2007-KimLT #documentation #identification #online
Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
DRRDRR-2007-Likforman-SulemS #network #recognition
Recognition of degraded handwritten digits using dynamic Bayesian networks (LLS, MS).
DRRDRR-2007-ShettySBS #documentation #random #segmentation
Segmentation and labeling of documents using conditional random fields (SS, HS, MJB, SNS).
TPDLECDL-2007-ChenWL #image
Using Watermarks and Offline DRM to Protect Digital Images in DIAS (HYC, HAW, CLL), pp. 529–531.
TPDLECDL-2007-GortonFF #framework #generative #library #specification
Specification and Generation of Digital Libraries into DSpace Using the 5S Framework (DG, WF, EAF), pp. 567–569.
TPDLECDL-2007-ImaiKS #library #mobile
Retrieving Tsunami Digital Library by Use of Mobile Phones (SI, YK, NS), pp. 525–528.
TPDLECDL-2007-KongL #logic #multi #xml
Using XML Logical Structure to Retrieve (Multimedia) Objects (ZK, ML), pp. 100–111.
TPDLECDL-2007-Martinez-PrietoFVA #logic #xml
Electronic Work : Building Dynamic Services over Logical Structure Using Aqueducts for XML Processing (MAMP, PdlF, JV, JA), pp. 445–448.
TPDLECDL-2007-Shiri #interface #library #metadata #visual notation
The Use of Metadata in Visual Interfaces to Digital Libraries (AS), pp. 489–494.
HTHT-2007-ChinC #hypermedia #identification #social
Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
HTHT-2007-FigueiraL #interactive #learning #visualisation
Interaction visualization in web-based learning using igraphs (ÁRF, JBL), pp. 45–46.
HTHT-2007-LeblancA #learning
Using forum in an organizational learning context (AL, MHA), pp. 41–42.
HTHT-2007-MasonT #case study #network #social
Tags, networks, narrative: exploring the use of social software for the study of narrative in digital contexts (BLM, ST), pp. 39–40.
HTHT-2007-SinclairML #wiki
Dynamic link service 2.0: using wikipedia as a linkbase (PASS, KM, PHL), pp. 161–162.
ICDARICDAR-2007-BernardAH #random #recognition
Using Random Forests for Handwritten Digit Recognition (SB, SA, LH), pp. 1043–1047.
ICDARICDAR-2007-BhardwajSSS #on the #verification
On the Use of Lexeme Features for Writer Verification (AB, AS, HS, SNS), pp. 1088–1092.
ICDARICDAR-2007-BrinkSB #identification #towards #verification
Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
ICDARICDAR-2007-ChouGC #classification #multi #recognition
Recognition of Fragmented Characters Using Multiple Feature-Subset Classifiers (CHC, CYG, FC), pp. 198–202.
ICDARICDAR-2007-CostagliolaDR #diagrams #grammarware #sketching
Using Grammar-Based Recognizers for Symbol Completion in Diagrammatic Sketches (GC, VD, MR), pp. 1078–1082.
ICDARICDAR-2007-DasariB #identification
Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
ICDARICDAR-2007-FinkP #modelling #on the #recognition
On the Use of Context-Dependent Modeling Units for HMM-Based Offline Handwriting Recognition (GAF, TP), pp. 729–733.
ICDARICDAR-2007-FujimotoSTSN #documentation #image #parallel #programming
Curved paper rectification for digital camera document images by shape from parallel geodesics using continuous dynamic programming (KF, JS, HT, MS, SN), pp. 267–271.
ICDARICDAR-2007-Furmaniak #segmentation
Unsupervised Newspaper Segmentation Using Language Context (RF), pp. 1263–1267.
ICDARICDAR-2007-GaoWHD #documentation #image #integer #linear #programming
Decompose Document Image Using Integer Linear Programming (DG, YW, HH, MD), pp. 397–401.
ICDARICDAR-2007-GazzahA #analysis #identification
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-HamamuraAI #algorithm #probability #recognition #word
An Analytic Word Recognition Algorithm Using a Posteriori Probability (TH, TA, BI), pp. 669–673.
ICDARICDAR-2007-HirayamaNK #classification #difference
A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace (JH, HN, NK), pp. 432–436.
ICDARICDAR-2007-HuangLM #string
Cryptogram Decoding for OCR Using Numerization Strings (GBH, EGLM, AM), pp. 208–212.
ICDARICDAR-2007-HuangSHFN #approach #difference #recognition
An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
ICDARICDAR-2007-HummIH #modelling #statistics #verification
Spoken Handwriting Verification Using Statistical Models (AH, RI, JH), pp. 999–1003.
ICDARICDAR-2007-ImdadBERE #identification
Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
ICDARICDAR-2007-JinZ #synthesis
Synthesis of Chinese Character Using Affine Transformation (LJ, XZ), pp. 218–222.
ICDARICDAR-2007-KeshariW #hybrid #recognition
Hybrid Mathematical Symbol Recognition Using Support Vector Machines (BK, SMW), pp. 859–863.
ICDARICDAR-2007-KramerKKB #finite #metadata #probability #transducer
Bibliographic Meta-Data Extraction Using Probabilistic Finite State Transducers (MK, HK, DK, TMB), pp. 609–613.
ICDARICDAR-2007-KunduHHPG #recognition
Arabic Handwriting Recognition Using Variable Duration HMM (AK, TH, BH, JP, LVG), pp. 644–648.
ICDARICDAR-2007-Likforman-SulemS #network #recognition
Recognition of Broken Characters from Historical Printed Books Using Dynamic Bayesian Networks (LLS, MS), pp. 173–177.
ICDARICDAR-2007-LiwickiIB #detection #online #programming
On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
ICDARICDAR-2007-LouloudisGH #approach #detection #documentation
Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
ICDARICDAR-2007-LuthyVB #markov #modelling #segmentation
Using Hidden Markov Models as a Tool for Handwritten Text Line Segmentation (FL, TV, HB), p. 8–?.
ICDARICDAR-2007-NamboodiriNJ #on the
On Using Classical Poetry Structure for Indian Language Post-Processing (AMN, PJN, CVJ), pp. 1238–1242.
ICDARICDAR-2007-NguyenBML #classification #verification
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDARICDAR-2007-NicolasDPH #2d #documentation #image #random #segmentation
Document Image Segmentation Using a 2D Conditional Random Field Model (SN, JD, TP, LH), pp. 407–411.
ICDARICDAR-2007-PanBS #segmentation
Text Segmentation from Complex Background Using Sparse Representations (WP, TDB, CYS), pp. 412–416.
ICDARICDAR-2007-PrasanthBSRM #online
Elastic Matching of Online Handwritten Tamil and Telugu Scripts Using Local Features (LP, VB, RS, GVR, DM), pp. 1028–1032.
ICDARICDAR-2007-PrusaH #2d #recognition
Mathematical Formulae Recognition Using 2D Grammars (DP, VH), pp. 849–853.
ICDARICDAR-2007-QuiniouA #detection #fault #network #online #recognition
Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
ICDARICDAR-2007-RinglstetterRGS #fault
Deriving Symbol Dependent Edit Weights for Text Correction_The Use of Error Dictionaries (CR, UR, AG, KUS), pp. 639–643.
ICDARICDAR-2007-SekiFNSM #analysis #documentation #information management
Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDARICDAR-2007-ShettySS #random #recognition #word
Handwritten Word Recognition Using Conditional Random Fields (SS, HS, SNS), pp. 1098–1102.
ICDARICDAR-2007-TanakaG
Autonomous Text Capturing Robot Using Improved DCT Feature and Text Tracking (MT, HG), pp. 1178–1182.
ICDARICDAR-2007-TonouchiK #mobile #online #recognition
Text Input System Using Online Overlapped Handwriting Recognition for Mobile Devices (YT, AK), pp. 754–758.
ICDARICDAR-2007-ToujAA #segmentation
Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
ICDARICDAR-2007-WendlingR #recognition
Symbol Recognition Using a 2-class Hierarchical Model of Choquet Integrals (LW, JR), pp. 634–638.
ICDARICDAR-2007-WickRL #fault #modelling #topic
Context-Sensitive Error Correction: Using Topic Models to Improve OCR (MLW, MGR, EGLM), pp. 1168–1172.
ICDARICDAR-2007-YangJ #kernel #recognition
Handwritten Chinese Character Recognition Using Modified LDA and Kernel FDA (DY, LJ), pp. 914–918.
ICDARICDAR-2007-YangJZH #recognition
Finger-Written Chinese Characters Recognition Using Hierarchical LDA (DY, LJ, LXZ, JCH), pp. 322–326.
ICDARICDAR-2007-ZhangYT #documentation #image
Removing Shading Distortions in Camera-based Document Images Using Inpainting and Surface Fitting With Radial Basis Functions (LZ, AMY, CLT), pp. 984–988.
ICDARICDAR-2007-ZiaratbanFE
Use of Legal Amount to Confirm or Correct the Courtesy Amount on Farsi Bank Checks (MZ, KF, ME), pp. 1123–1127.
ICDARICDAR-2007-ZiaratbanFF #feature model #recognition
Language-Based Feature Extraction Using Template-Matching In Farsi/Arabic Handwritten Numeral Recognition (MZ, KF, FF), pp. 297–301.
JCDLJCDL-2007-AbbasiC #analysis #categorisation #communication #visualisation
Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
JCDLJCDL-2007-BorgmanWMP #architecture #embedded #library #network
Drowning in data: digital library architecture to support scientific use of embedded sensor networks (CLB, JCW, MSM, AP), pp. 269–277.
JCDLJCDL-2007-CheeS #clustering #community #documentation
Document clustering using small world communities (BWC, BRS), pp. 53–62.
JCDLJCDL-2007-DruinWMB #case study #library
Children’s interests and concerns when using the international children’s digital library: a four-country case study (AD, AW, SM, BBB), pp. 167–176.
JCDLJCDL-2007-Ernst-GerlachF #retrieval
Retrieval in text collections with historic spelling using linguistic and spelling variants (AEG, NF), pp. 333–341.
JCDLJCDL-2007-LiCZL #automation #case study #classification #network
Automatic patent classification using citation network information: an experimental study in nanotechnology (XL, HC, ZZ, JL), pp. 419–427.
JCDLJCDL-2007-NewmanHCS #metadata #modelling #statistics #topic
Subject metadata enrichment using statistical topic models (DN, KH, CC, PS), pp. 366–375.
JCDLJCDL-2007-RichardsonF
Using bilingual ETD collections to mine phrase translations (RR, EAF), pp. 352–353.
JCDLJCDL-2007-TakedaT #clustering #named #performance #summary
UpdateNews: a news clustering and summarization system using efficient text processing (TT, AT), pp. 438–439.
SIGMODSIGMOD-2007-BandiMAA #algorithm #data type #performance
Fast data stream algorithms using associative memories (NB, AM, DA, AEA), pp. 247–256.
SIGMODSIGMOD-2007-ChandyG #database
Event processing using database technology (KMC, DG), pp. 1169–1170.
SIGMODSIGMOD-2007-FaloutsosKS #graph #matrix #mining #scalability #tool support
Mining large graphs and streams using matrix and tensor tools (CF, TGK, JS), p. 1174.
SIGMODSIGMOD-2007-FangHLYGLS #named #query
GPUQP: query co-processing using graphics processors (RF, BH, ML, KY, NKG, QL, PVS), pp. 1061–1063.
SIGMODSIGMOD-2007-LarsonLZZ #assurance #estimation #quality
Cardinality estimation using sample views with quality assurance (PÅL, WL, JZ, PZ), pp. 175–186.
SIGMODSIGMOD-2007-NandiJ #interface #query
Assisted querying using instant-response interfaces (AN, HVJ), pp. 1156–1158.
SIGMODSIGMOD-2007-TufteLMPBR #estimation
Travel time estimation using NiagaraST and latte (KT, JL, DM, VP, RLB, JR), pp. 1091–1093.
SIGMODSIGMOD-2007-ZhouGBN #query
Query relaxation using malleable schemas (XZ, JG, WTB, WN), pp. 545–556.
VLDBVLDB-2007-AbadiMMH #clustering #data transformation #scalability #semantics #web
Scalable Semantic Web Data Management Using Vertical Partitioning (DJA, AM, SM, KJH), pp. 411–422.
VLDBVLDB-2007-BhattacharyaMS #distributed #modelling #named #network #query #statistics
MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models (AB, AM, AKS), pp. 854–865.
VLDBVLDB-2007-Helmer #documentation #similarity
Measuring the Structural Similarity of Semistructured Documents Using Entropy (SH), pp. 1022–1032.
VLDBVLDB-2007-LimWW
Unifying Data and Domain Knowledge Using Virtual Views (LL, HW, MW), pp. 255–266.
VLDBVLDB-2007-LitwinMRS #algebra #performance #string
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
VLDBVLDB-2007-LiuWC #keyword #named #semantics #xml
XSeek: A Semantic XML Search Engine Using Keywords (ZL, JW, YC), pp. 1330–1333.
VLDBVLDB-2007-LiWY #approximate #named #performance #query #string
VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams (CL, BW, XY), pp. 303–314.
VLDBVLDB-2007-PapadomanolakisDA #automation #database #design #performance #query
Efficient Use of the Query Optimizer for Automated Database Design (SP, DD, AA), pp. 1093–1104.
VLDBVLDB-2007-ShenDNR #datalog #declarative #embedded #information management
Declarative Information Extraction Using Datalog with Embedded Extraction Predicates (WS, AD, JFN, RR), pp. 1033–1044.
VLDBVLDB-2007-ZinnBG #modelling #query
Modeling and Querying Vague Spatial Objects Using Shapelets (DZ, JB, MG), pp. 567–578.
CSEETCSEET-2007-CarverHHHR #programming #re-engineering #student
Increased Retention of Early Computer Science and Software Engineering Students Using Pair Programming (JCC, LH, LH, JEH, DSR), pp. 115–122.
CSEETCSEET-2007-Chao #collaboration #student #wiki
Student Project Collaboration Using Wikis (JC), pp. 255–261.
CSEETCSEET-2007-McGregorBBBK #architecture #education #reasoning
Using an Architecture Reasoning Tool to Teach Software Architecture (JDM, FB, LB, PB, MK), pp. 275–282.
CSEETCSEET-2007-Padua #development #modelling
Using Model-Driven Development in Time-Constrained Course Projects (WP), pp. 133–140.
CSEETCSEET-2007-RootRT #concept #re-engineering
Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
CSEETCSEET-2007-Staron #analysis #learning #student
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEETCSEET-2007-Taran #education #game studies #re-engineering #risk management
Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
ITiCSEITiCSE-2007-CaronnaSMIHT #predict
Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
ITiCSEITiCSE-2007-DistasioW #education #framework #game studies
Inclusive computer science education using a ready-made computer game framework (JD, TPW), pp. 116–120.
ITiCSEITiCSE-2007-FreireFPT #education #web
Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
ITiCSEITiCSE-2007-GorraLC #assessment #database #student
An account of the use of synoptic assessment for students in the area of databases at level 2 (AG, SL, JC), p. 334.
ITiCSEITiCSE-2007-Impagliazzo #approach #source code
Using an outcome-based approach to assess computing programs (JI), p. 344.
ITiCSEITiCSE-2007-KheirW #realtime #speech #student
Inclusion of deaf students in computer science classes using real-time speech transcription (RK, TW), pp. 261–265.
ITiCSEITiCSE-2007-Lewis #student #word
Are pictures worth 1000 words? the use of affective imagery surveys to capture student perceptions of the computing discipline (TLL), p. 312.
ITiCSEITiCSE-2007-OliverGMA #learning
Using disruptive technology for explorative learning (IO, KG, AM, CA), pp. 96–100.
SIGITESIGITE-2007-Bailey #web
A web systems laboratory using portable hard drives (MGB), pp. 107–112.
SIGITESIGITE-2007-ChaKL #abstraction #problem
Using puzzles: problem-solving and abstraction (SC, DK, WGL), pp. 135–140.
SIGITESIGITE-2007-GuimaraesM #animation #database #education #security
Using animation courseware in the teaching of database security (MAMG, MM), pp. 253–258.
SIGITESIGITE-2007-MiertschinW #concept #learning
Using concept maps to navigate complex learning environments (SLM, CLW), pp. 175–184.
SIGITESIGITE-2007-ToderickL #linux #physics
Using VPN technology to remove physical barriers in linux lab experiments (LT, PJLI), pp. 113–118.
CSMRCSMR-2007-BrandBEJKKSV #ide #legacy #maintenance
Using The Meta-Environment for Maintenance and Renovation (MvdB, MB, GRE, HAdJ, PK, ATK, TvdS, JJV), pp. 331–332.
CSMRCSMR-2007-LoeschP #concept analysis #product line #variability
Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
CSMRCSMR-2007-Lormans #evolution #monitoring #requirements
Monitoring Requirements Evolution using Views (ML), pp. 349–352.
ICPCICPC-2007-CornelissenHZMWD #comprehension #execution #sequence
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views (BC, DH, AZ, LM, JJvW, AvD), pp. 49–58.
ICPCICPC-2007-MirarabHT #co-evolution #network #predict
Using Bayesian Belief Networks to Predict Change Propagation in Software Systems (SM, AH, LT), pp. 177–188.
ICPCICPC-2007-StefikAPB #debugging #named
WAD: A Feasibility study using the Wicked Audio Debugger (AS, RTA, RP, JB), pp. 69–80.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-Anda #maintenance #metric
Assessing Software System Maintainability using Structural Measures and Expert Assessments (BA), pp. 204–213.
ICSMEICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing
Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSMEICSM-2007-GustavssonLLMB #development #distributed #maintenance #modelling #uml
Simplifying maintenance by using XSLT to unlock UML models in a distributed development environment (HG, BL, BL, AM, MB), pp. 465–468.
ICSMEICSM-2007-LuccaFT #classification #concept analysis #web
Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
ICSMEICSM-2007-Salahuddin #testing
Analysing the Impact of Change on Test Sets Using X-Machines (SS), pp. 511–512.
ICSMEICSM-2007-Vivanco #approach #modelling #predict #quality
Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
ICSMEICSM-2007-WalkinshawRW #feature model
Feature Location and Extraction using Landmarks and Barriers (NW, MR, MW), pp. 54–63.
MSRMSR-2007-German #open source
Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects (DMG), p. 24.
MSRMSR-2007-HerraizGR07a #analysis #eclipse
Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSRMSR-2007-Masticola #development #lightweight #mining #repository
Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
MSRMSR-2007-ValettoHECWW #congruence #development #repository
Using Software Repositories to Investigate Socio-technical Congruence in Development Projects (GV, MEH, KE, SC, MNW, CW), p. 25.
SCAMSCAM-2007-MolinaS #approximate #open source #performance #source code
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
SCAMSCAM-2007-RodenVEM #agile #empirical #metric #modelling #process #quality
An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes (PLR, SV, LHE, SLM), pp. 171–179.
WCREWCRE-2007-McNairGW #architecture #evolution #visualisation
Visualizing Software Architecture Evolution Using Change-Sets (AM, DMG, JHWJ), pp. 130–139.
WCREWCRE-2007-RaberL #data mining #debugging #mining
Emulated Breakpoint Debugger and Data Mining Using Detours (JR, EL), pp. 271–272.
WCREWCRE-2007-Staiger #analysis #reverse engineering #user interface #visual notation
Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
CIAACIAA-2007-Marschner #transducer
Efficiently Matching with Local Grammars Using Prefix Overlay Transducers (CM), pp. 314–316.
LATALATA-2007-KutribM #automaton #performance #recognition
Fast Reversible Language Recognition Using Cellular Automata (MK, AM), pp. 331–342.
IFMIFM-2007-HasanT #cumulative #probability #verification
Verification of Probabilistic Properties in HOL Using the Cumulative Distribution Function (OH, ST), pp. 333–352.
IFMIFM-2007-PlaggeL #model checking #specification #validation
Validating Z Specifications Using the ProBAnimator and Model Checker (DP, ML), pp. 480–500.
IFMIFM-2007-PodorozhnyKPZ #alloy #multi #verification
Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
RTARTA-2007-EscobarM #infinity #model checking
Symbolic Model Checking of Infinite-State Systems Using Narrowing (SE, JM), pp. 153–168.
RTARTA-2007-KorpM #bound #proving #term rewriting #termination
Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
SEFMSEFM-2007-CrockerC #automation #c #reasoning #source code #verification
Verification of C Programs Using Automated Reasoning (DC, JC), pp. 7–14.
SEFMSEFM-2007-Lano #diagrams #interactive #specification
Formal Specification using Interaction Diagrams (KL), pp. 293–304.
SEFMSEFM-2007-SahaRC #modelling #protocol #verification
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
SEFMSEFM-2007-SampathRSR #case study #generative #how
How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
ICFPICFP-2007-BeshersFS #case study #experience #functional #linux #programming
Experience report: using functional programming to manage a linux distribution (CB, DF, JS), pp. 213–218.
ICFPICFP-2007-MarlowYJ #lazy evaluation #performance #pointer
Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
IFLIFL-2007-Kleeblatt #dependent type
Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
IFLIFL-2007-NaylorR #graph #reduction
The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA (MN, CR), pp. 129–146.
LISPILC-2007-Borden #classification
Classification using conditional probabilities and Shannon’s definition of information (AB), p. 15.
LISPILC-2007-HerzeelGCD #e-commerce #lisp
Modularizing crosscuts in an e-commerce application in Lisp using HALO (CH, KG, PC, TD), p. 11.
CoGCIG-2007-CarterL #algorithm
An Investigation into Tournament Poker Strategy using Evolutionary Algorithms (RGC, JL), pp. 117–124.
CoGCIG-2007-FinkDA #behaviour #game studies #machine learning
Extracting NPC behavior from computer games using computer vision and machine learning techniques (AF, JD, JA), pp. 24–31.
CoGCIG-2007-LeighLM #algorithm #search-based
Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms (REL, SJL, CM), pp. 72–79.
CoGCIG-2007-OommenGP #bound #finite #game studies #probability
Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
CoGCIG-2007-RunarssonJ #evaluation #learning
Effect of look-ahead search depth in learning position evaluation functions for Othello using -greedy exploration (TPR, EOJ), pp. 210–215.
CoGCIG-2007-SeredynskiBK #ad hoc #behaviour #evolution #game studies #modelling #network
Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model (MS, PB, MAK), pp. 96–103.
CoGCIG-2007-VenessB #effectiveness #game studies #probability
Effective Use of Transposition Tables in Stochastic Game Tree Search (JV, AB), pp. 112–116.
DiGRADiGRA-2007-BraggeS #game studies #mining #profiling #research #tool support
Profiling Academic Research on Digital Games Using Text Mining Tools (JB, JS).
DiGRADiGRA-2007-DekkerC #game studies
Please Biofeed the Zombies: Enhancing the Gameplay and Display of a Horror Game Using Biofeedback (AD, EC).
DiGRADiGRA-2007-KamRTC #design pattern #game studies #mobile
Mobile Gaming with Children in Rural India: Contextual Factors in the Use of Game Design Patterns (MK, VR, AT, JFC).
DiGRADiGRA-2007-NatkinYJM #adaptation #game studies #modelling #multi #ubiquitous
Creating Multiplayer Ubiquitous Games using an adaptive narration model based on a user's model (SN, CY, SJ, BM).
DiGRADiGRA-2007-WyeldLCGLH #game studies
The Ethics of Indigenous Storytelling: using the Torque Game Engine to Support Australian Aboriginal Cultural Heritage (TGW, BL, JC, CG, BL, JH).
FDGGDCSE-J-2007-Youngblood #education #game studies #student
Engaging Students in Advanced Computer Science Education Using Game Segments (GMY).
AGTIVEAGTIVE-2007-AschenbrennerG #graph #graph grammar
Transforming Scene Graphs Using Triple Graph Grammars — A Practice Report (NA, LG), pp. 32–43.
AGTIVEAGTIVE-2007-BiermannEET #eclipse #editing #generative #plugin
Generating Eclipse Editor Plug-Ins Using Tiger (EB, KE, CE, GT), pp. 583–584.
AGTIVEAGTIVE-2007-EngelsGSW #consistency #contract #modelling #process #visual notation #web #web service
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts (GE, BG, CS, HW), pp. 17–31.
AGTIVEAGTIVE-2007-GogollaBD #graph transformation #ocl
From Graph Transformation to OCL Using USE (MG, FB, DHD), pp. 585–586.
AGTIVEAGTIVE-2007-LeenheerM #collaboration #evolution #graph transformation #ontology
Using Graph Transformation to Support Collaborative Ontology Evolution (PDL, TM), pp. 44–58.
GT-VMTGT-VMT-2007-BisztrayH #csp #process #verification
Rule-Level Verification of Business Process Transformations using CSP (DB, RH).
GT-VMTGT-VMT-2007-BonevaHKR #graph transformation #multi #simulation
Simulating Multigraph Transformations Using Simple Graphs (IB, FH, HK, AR).
CHICHI-2007-BirnholtzGMB #case study #process #scalability
An exploratory study of input configuration and group process in a negotiation task using a large display (JPB, TG, CM, RB), pp. 91–100.
CHICHI-2007-DingEKLCSWB #empirical #visual notation
An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC (XD, TE, WAK, SL, JC, JBS, TVW, WEB), pp. 1019–1028.
CHICHI-2007-KristenssonZ #gesture
Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
CHICHI-2007-KumarPW #named
EyePoint: practical pointing and selection using gaze and keyboard (MK, AP, TW), pp. 421–430.
CHICHI-2007-LankCR #predict
Endpoint prediction using motion kinematics (EL, YCNC, JR), pp. 637–646.
CHICHI-2007-LudfordPRT
Capturing, sharing, and using local place information (PJL, RP, KR, LGT), pp. 1235–1244.
CHICHI-2007-MoravejiLDOW #design #named
Comicboarding: using comics as proxies for participatory design with children (NM, JL, JD, PO, SW), pp. 1371–1374.
CHICHI-2007-NenonenLHLJH #game studies #interactive
Using heart rate to control an interactive game (VN, AL, VH, TL, MJ, PH), pp. 853–856.
CHICHI-2007-SchrammelGST #exclamation #quote
“Look!”: using the gaze direction of embodied agents (JS, AG, RS, MT), pp. 1187–1190.
CHICHI-2007-SeayK #game studies #online #problem #self
Project massive: self-regulation and problematic use of online gaming (AFS, REK), pp. 829–838.
CHICHI-2007-SellenFAHRW #case study #memory management
Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
CHICHI-2007-TangLPWD #interactive #process
Recent shortcuts: using recent interactions to support shared activities (JCT, JL, JSP, SW, CD), pp. 1263–1272.
CHICHI-2007-VogelB #interface #named
Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
CHICHI-2007-ZhaoDCBB #feedback #named
Earpod: eyes-free menu selection using touch input and reactive audio feedback (SZ, PD, MHC, RB, PB), pp. 1395–1404.
HCIDHM-2007-BeurierCMTW #approach #data-driven #database #simulation
Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
HCIDHM-2007-EndoKKMKM #assessment #design
A Computer-Aided Ergonomic Assessment and Product Design System Using Digital Hands (YE, SK, TK, NM, MK, MM), pp. 833–842.
HCIDHM-2007-FanC #adaptation
A Modified Particle Swarm Optimizer Using an Adaptive Dynamic Weight Scheme (SKSF, JMC), pp. 56–65.
HCIDHM-2007-GeorgeG #modelling
Facilitating Pronunciation Skills for Children with Phonological Disorders Using Human Modelling (JG, PG), pp. 595–605.
HCIDHM-2007-KimPHL #design #evaluation
Evaluation of Navy Shipboard Habitability for a Warship Design Using Human Model (HK, JHP, HH, CML), pp. 884–893.
HCIDHM-2007-LeeFCBEAP #finite #modelling
Finite Element Modeling to Aid in Refining the Rehabilitation of Amputees Using Osseointegrated Prostheses (WL, LF, NJC, RB, JE, CA, MJP), pp. 655–658.
HCIDHM-2007-VolzBHK #automation #generative #linear #metric
Automatic, Body Measurements Based Generation of Individual Avatars Using Highly Adjustable Linear Transformation (AV, RB, SH, KK), pp. 453–459.
HCIDHM-2007-WashburnSG #maintenance #multimodal
Using Multimodal Technologies to Enhance Aviation Maintenance Inspection Training (CW, PS, AKG), pp. 1018–1026.
HCIDHM-2007-YaoMW #3d #low cost
Low Cost 3D Shape Acquisition System Using Strip Shifting Pattern (LY, LM, DW), pp. 276–285.
HCIDHM-2007-ZhaoL #3d #image #locality #orthogonal
Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
HCIHCI-AS-2007-KimuraTHTAOT #analysis #approach
The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCIHCI-AS-2007-KojimaIN #documentation
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-AS-2007-LeeNB #monitoring #network #reliability
Personal Life Logger and Belonging Monitor Using Reliable ZigBee Networks (KL, KN, CB), pp. 961–970.
HCIHCI-IDU-2007-BaranauskasN #design #flexibility #interactive
Using Patterns to Support the Design of Flexible User Interaction (MCCB, VPdAN), pp. 1033–1042.
HCIHCI-IDU-2007-Forsman #experience #human-computer #research #tool support
After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
HCIHCI-IDU-2007-Gomez-CarneroI #representation
Evaluator of User’s Actions (Eua) Using the Model of Abstract Representation Dgaui (SGC, JRI), pp. 463–471.
HCIHCI-IDU-2007-LingLX #complexity #validation #web
Validating Information Complexity Questionnaires Using Travel Web Sites (CL, ML, JX), pp. 901–910.
HCIHCI-IDU-2007-OkamotoKGI #design
Participatory Design Using Scenarios in Different Cultures (MO, HK, IG, KI), pp. 223–231.
HCIHCI-IDU-2007-StrybelVDKNCG #predict
Predicting Perceived Situation Awareness of Low Altitude Aircraft in Terminal Airspace Using Probe Questions (TZS, KPLV, JPD, JK, TKN, VC, FPG), pp. 939–948.
HCIHCI-IDU-2007-TarbyERTLK #architecture #aspect-oriented #comparison #evaluation #interactive #programming #usability
Traces Using Aspect Oriented Programming and Interactive Agent-Based Architecture for Early Usability Evaluation: Basic Principles and Comparison (JCT, HE, JR, CDT, PL, CK), pp. 632–641.
HCIHCI-IDU-2007-TranMC #independence #memory management
Using Memory Aid to Build Memory Independence (QTT, EDM, GC), pp. 959–965.
HCIHCI-IDU-2007-VogiazouFL #design #process
The Use of Improvisational Role-Play in User Centered Design Processes (YV, JF, JL), pp. 262–272.
HCIHCI-IPT-2007-ChenC
Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator (CHC, MLC), pp. 560–568.
HCIHCI-IPT-2007-DzwiarekLNRS #artificial reality #assessment #visual notation
Assessment of Perception of Visual Warning Signals Generated Using an Augmented Reality System (MD, AL, AN, CR, TS), pp. 579–586.
HCIHCI-IPT-2007-GalludLTP #experience #interactive #mobile
Using Mobile Devices to Improve the Interactive Experience of Visitors in Art Museums (JAG, MDL, RT, VMRP), pp. 280–287.
HCIHCI-IPT-2007-JeonKB #mobile
Interacting with a Tabletop Display Using a Camera Equipped Mobile Phone (SJ, GJK, MB), pp. 336–343.
HCIHCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #word
Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
HCIHCI-IPT-2007-SongWT #game studies #interface
A Tangible Game Interface Using Projector-Camera Systems (PS, SW, JT), pp. 956–965.
HCIHCI-IPT-2007-TsaoCC #concept #design #flexibility #research #smarttech
The Research of Using Image-Transformation to the Conceptual Design of Wearable Product with Flexible Display (YCT, LCC, SCC), pp. 1220–1229.
HCIHCI-IPT-2007-YoshidaMS #interactive #mobile #visual notation
Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
HCIHCI-MIE-2007-Alexandris #human-computer #quote #semantics
“Show and Tell”: Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints (CA), pp. 13–22.
HCIHCI-MIE-2007-ChanCCHH #detection #multi
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-ChangKP #constraints #evolution #set
Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint (JSC, EYK, SHP), pp. 583–588.
HCIHCI-MIE-2007-ChungK #classification
Classification of a Person Picture and Scenery Picture Using Structured Simplicity (MBC, IJK), pp. 821–828.
HCIHCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #word
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
HCIHCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics
Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCIHCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCIHCI-MIE-2007-HirotaWI #interface
Menu Selection Using Auditory Interface (KH, YW, YI), pp. 70–75.
HCIHCI-MIE-2007-JangKC #geometry #visual notation
Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM (HJ, GYK, HIC), pp. 634–641.
HCIHCI-MIE-2007-JangWB #named
MEMORIA: Personal Memento Service Using Intelligent Gadgets (HJ, JW, CB), pp. 331–339.
HCIHCI-MIE-2007-JungKK #estimation #image #modelling
Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling (DJJ, KSK, HJK), pp. 649–658.
HCIHCI-MIE-2007-JuSK #game studies #people #quote
“Shooting a Bird”: Game System Using Facial Feature for the Handicapped People (JJ, YS, EYK), pp. 642–648.
HCIHCI-MIE-2007-KangEKKASK #modelling #multi
Human Motion Modeling Using Multivision (BDK, JSE, JHK, CK, SHA, BJS, SKK), pp. 659–668.
HCIHCI-MIE-2007-KimKEKASK #adaptation #detection #realtime
Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
HCIHCI-MIE-2007-KimSK #network
Emotion-Based Textile Indexing Using Neural Networks (NYK, YS, EYK), pp. 349–357.
HCIHCI-MIE-2007-KwonPKK #recognition
Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift (KSK, SHP, EYK, HJK), pp. 690–699.
HCIHCI-MIE-2007-MehtaC #ontology
Developing a Conversational Agent Using Ontologies (MM, AC), pp. 154–164.
HCIHCI-MIE-2007-OguraNS #communication #parallel #thread
Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System (KO, KN, KS), pp. 186–195.
HCIHCI-MIE-2007-ReveiuDF #adaptation #multi #retrieval
Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation (AR, MD, FF), pp. 486–492.
HCIHCI-MIE-2007-SetiawanHL #interactive #multi #people
Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction (NAS, SJH, CWL), pp. 738–746.
HCIHCI-MIE-2007-WangYCI #interactive #interface #multimodal #realtime
Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction (HW, JY, MHC, MI), pp. 225–231.
HCIHCI-MIE-2007-YoonK #case study #interactive
A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System (JY, JK), pp. 763–768.
HCIHIMI-IIE-2007-AlsharaI #integration #learning
Business Integration Using the Interdisciplinary Project Based Learning Model (IPBL) (OKA, MI), pp. 823–833.
HCIHIMI-IIE-2007-DoyoSA #case study #transaction
A Study of Production / Transaction-Related Model Using Control Theory (DD, KS, KA), pp. 855–862.
HCIHIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social
Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HCIHIMI-IIE-2007-HarunN #user interface
User Interface for Knowledge Sharing Using Knowledge Gardening Metaphor (AFH, NLMN), pp. 319–327.
HCIHIMI-IIE-2007-HashimotoN #community #memory management
Fond Memory Management System by Using Information About Communities (KH, YN), pp. 23–29.
HCIHIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online
Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HCIHIMI-IIE-2007-IshiiYIN #navigation
A Navigation System Using Ultrasonic Directional Speaker with Rotating Base (KI, YY, MI, KN), pp. 526–535.
HCIHIMI-IIE-2007-KaminoyamaMHSKA #navigation #people
Walk Navigation System Using Photographs for People with Dementia (HK, TM, FH, KS, NK, SA), pp. 1039–1049.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-LiuYCL #estimation #health #modelling
Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
HCIHIMI-IIE-2007-MaILJ
Use of Chinese Short Messages (DM, FI, YL, LJ), pp. 582–591.
HCIHIMI-IIE-2007-NagamatsuKKS #development #eye tracking
Development of a Skill Acquisition Support System Using Expert’s Eye Movement (TN, YK, JK, HS), pp. 430–439.
HCIHIMI-IIE-2007-WakitaAT #metric #mobile #prototype
Methodology for Constructing a Prototype Site for Finding Employment SPI Measures Using Mobile Phones (SW, MA, TT), pp. 983–993.
HCIHIMI-IIE-2007-WangCH #memory management
Using Long Term Memory for Bookmark Management (MJW, KMC, TKH), pp. 812–820.
HCIHIMI-IIE-2007-YamaguchiNAHKN #artificial reality #named #navigation
AR-Navi: An In-Vehicle Navigation System Using Video-Based Augmented Reality Technology (YY, TN, KA, MH, HK, SN), pp. 1139–1147.
HCIHIMI-IIE-2007-YoonKPLY #game studies #modelling
Game Player Modeling Using D-FSMs (TBY, DMK, KHP, JHL, KHY), pp. 490–499.
HCIHIMI-MTT-2007-AblassmeierPRR #network
Context-Aware Information Agents for the Automotive Domain Using Bayesian Networks (MA, TP, SR, GR), pp. 561–570.
HCIHIMI-MTT-2007-ChienC #comprehension
The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch (YHC, CHC), pp. 814–823.
HCIHIMI-MTT-2007-ChoBKC #difference #on the #probability
On Achieving Proportional Loss Differentiation Using Dynamic-MQDDP with Differential Drop Probability (KC, SB, JK, JWC), pp. 584–593.
HCIHIMI-MTT-2007-CornsML #approach #development #machine learning #optimisation
Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
HCIHIMI-MTT-2007-GoncalvesaMJ #documentation
Using Autobiographic Information to Retrieve Real and Electronic Documents (DG, TJVG, RM, JAJ), pp. 427–436.
HCIHIMI-MTT-2007-Jeong #comprehension
Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HCIHIMI-MTT-2007-JiGC #comparison #word
Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HCIHIMI-MTT-2007-KwonSH #design #implementation #realtime
Design and Implementation of Enhanced Real Time News Service Using RSS and VoiceXML (HJK, JHS, KSH), pp. 677–686.
HCIHIMI-MTT-2007-LeeJ #case study
A Study on a Stereoscopic Display System Using a Rotary Disk Type Beam Shutter (KHL, TJJ), pp. 868–875.
HCIHIMI-MTT-2007-MarucciLC #approach #classification #fuzzy
Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
HCIHIMI-MTT-2007-Miki #collaboration #development #guidelines
Use of Socio-technical Guidelines in Collaborative System Development (HM), pp. 90–97.
HCIHIMI-MTT-2007-NagaiEK #comprehension #process
Measuring Brain Activities Related to Understanding Using Near-Infrared Spectroscopy (NIRS) (MN, NE, TK), pp. 884–893.
HCIHIMI-MTT-2007-SakuradaHON #interface #online #recognition
A Japanese Text Input Interface Using On-Line Writing-Box-Free Handwriting Recognition and Kana-to-Kanji Conversion (TS, YH, HO, MN), pp. 940–949.
HCIHIMI-MTT-2007-ShiIL #query #visual notation
Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
HCIHIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer
Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
HCIOCSC-2007-BlevisLRS #design #interactive #research
Using Design Critique as Research to Link Sustainability and Interactive Technologies (EB, YKL, DR, ES), pp. 22–31.
HCIOCSC-2007-NuschkeJ #collaboration #communication #framework #information management #tool support
A Framework for Inter-organizational Collaboration Using Communication and Knowledge Management Tools (PN, XJ), pp. 406–415.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-HoltenCW #sequence #visualisation
Trace Visualization Using Hierarchical Edge Bundles and Massive Sequence Views (DH, BC, JJvW), pp. 47–54.
VISSOFTVISSOFT-2007-LangelierD #analysis #visual notation
Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
VISSOFTVISSOFT-2007-LienhardKG #agile #prototype #visualisation
Rapid Prototyping of Visualizations using Mondrian (AL, AK, OG), pp. 67–70.
CAiSECAiSE-2007-EderW #comparison #detection #graph #ontology
Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
CAiSECAiSE-2007-LiuBW #behaviour #modelling
Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
CAiSECAiSE-2007-SilvaAMC #design #social
Designing Social Patterns Using Advanced Separation of Concerns (CTLLS, JA, AMDM, JC), pp. 309–323.
EDOCEDOC-2007-LiningtonL #approach #behaviour #modelling #security
Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOCEDOC-2007-MilanovicKGGWDH #integration #process
Business Process Integration by Using General Rule Markup Language (MM, NK, DG, AG, GW, VD, MH), pp. 353–364.
EDOCEDOC-2007-Molina-JimenezSC #consistency #implementation #message passing #middleware
Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware (CMJ, SKS, NC), pp. 51–62.
EDOCEDOC-2007-RosenbergEMPD #aspect-oriented #development #process #quality #top-down
Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL (FR, CE, AM, CP, SD), pp. 15–26.
EDOCEDOC-2007-SunithaAK
Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
ICEISICEIS-AIDSS-2007-BermejoGP #email
Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
ICEISICEIS-AIDSS-2007-KirwanGM #adaptation #case study #energy #implementation #information management
Energy Management Information Systems: An Exploratory study of Implementations Using Adaptive Structuration Theory (OK, WG, PM), pp. 303–309.
ICEISICEIS-AIDSS-2007-KrohaR #classification
Using Grammars for Text Classification (PK, TR), pp. 259–264.
ICEISICEIS-AIDSS-2007-LiuCM #recognition
Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
ICEISICEIS-AIDSS-2007-YingboJJ #learning #predict #process #workflow
Using Decision Tree Learning to Predict Workflow Activity Time Consumption (YL, JW, JS), pp. 69–75.
ICEISICEIS-DISI-2007-AraqueSD #data flow #monitoring #web
Monitoring web data sources using temporal properties as an external resources of a data warehouse (FA, AS, CD), pp. 28–35.
ICEISICEIS-DISI-2007-CairesC #architecture #semantics #web
Using semantic web and service oriented technologies to build loosely coupled systems: SWOAT — a service and semantic web oriented architecture technology (BC, JC), pp. 226–232.
ICEISICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy
Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
ICEISICEIS-DISI-2007-GroppeGL #order
Using an index of precomputed joins in order to speed up SPARQL processing (SG, JG, VL), pp. 13–20.
ICEISICEIS-DISI-2007-PapatheocharousA #estimation #network
Software cost estimation using artificial neural networks with inputs selection (EP, ASA), pp. 398–407.
ICEISICEIS-DISI-2007-RaminhosP #approach #declarative
Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
ICEISICEIS-DISI-2007-RayG
A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEISICEIS-EIS-2007-AddinquyT #enterprise #requirements #specification
Reducing Requirements to EIS Specifications GAP Using RM-ODP Enterprise Viewpoint (CA, BT), pp. 31–38.
ICEISICEIS-EIS-2007-KarnouskosS #enterprise #network #towards
Towards Enterprise Applications Using Wireless Sensor Networks (SK, PS), pp. 230–236.
ICEISICEIS-HCI-2007-AraujoB #architecture #education #game studies
Using Games in the Teaching of Digital Systems and of Computers Architecture (PJGdA, JVB), pp. 5–10.
ICEISICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech
Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
ICEISICEIS-HCI-2007-FariaBVR #framework #platform
Platform to Drive an Intelligent Wheelchair Using Facial Expressions (PMF, RAMB, EV, LPR), pp. 164–169.
ICEISICEIS-HCI-2007-IshikawaYY #multi #novel
Novel View Telepresence with High-Scalability Using Multi-Casted Omni-Directional Videos (TI, KY, NY), pp. 148–156.
ICEISICEIS-J-2007-ArjunanWKNY #recognition
Recognition of Human Voice Utterances from Facial Surface EMG without Using Audio Signals (SPA, HW, DKK, GRN, WCY), pp. 366–378.
ICEISICEIS-J-2007-Barjis07a #modelling #process #simulation
A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
ICEISICEIS-J-2007-CastroO07a #distributed #multi #problem
Solving Airline Operations Problems Using Specialized Agents in a Distributed Multi-Agent System (AJMC, ECO), pp. 173–184.
ICEISICEIS-J-2007-TraversonA #requirements #specification
Linking Requirements to EIS Specifications Using Correspondence Rules (BT, CA), pp. 276–285.
ICEISICEIS-SAIC-2007-BoukadiGMB #petri net #specification #verification #web #web service
Specification and Verification of Views over Composite Web Services Using High Level Petri-Nets (KB, CG, ZM, DB), pp. 107–112.
ICEISICEIS-SAIC-2007-CheungSB #collaboration
Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
ICEISICEIS-SAIC-2007-GarcesQCHC #e-commerce #modelling #multi #transaction
E-Commerce Transaction Modeling Using Moderately Open Multi-Agent Systems (AG, RQ, MC, JH, EC), pp. 167–172.
ICEISICEIS-SAIC-2007-Maximilien #approach #challenge #problem #ruby #semantics #web #web service
A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
ICEISICEIS-SAIC-2007-PoloniaCO #scalability
A MODEL to Optimize the Use of Imaging Equipment and Human Skills Scattered in Very Large Geographical Areas (DFP, CMAC, JLO), pp. 208–212.
ICEISICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics
Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
ICEISICEIS-SAIC-2007-RuizB #documentation
Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
ICEISICEIS-SAIC-2007-Silva #collaboration
Using Narratives in Collaborative Writing — An Example (NDS), pp. 351–358.
ICEISICEIS-SAIC-2007-WuGRSM #automation #composition #process #semantics #web #web service
Automatic Composition of Semantic Web Services Using Process Mediation (ZW, KG, AR, APS, JAM), pp. 453–462.
CIKMCIKM-2007-CarteretteA #documentation #evaluation #retrieval
Semiautomatic evaluation of retrieval systems using document similarities (BC, JA), pp. 873–876.
CIKMCIKM-2007-GuoCXW #maintenance #online #performance
Efficient on-line index maintenance for dynamic text collections by using dynamic balancing tree (RG, XC, HX, BW), pp. 751–760.
CIKMCIKM-2007-JurczykA #analysis #community
Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKMCIKM-2007-LadY #feedback
Generalizing from relevance feedback using named entity wildcards (AL, YY), pp. 721–730.
CIKMCIKM-2007-LiMGDBM #predict #process
Predicting individual priorities of shared activities using support vector machines (LL, MJM, WG, CD, BB, DRM), pp. 515–524.
CIKMCIKM-2007-Pasca07a #query #web
Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
CIKMCIKM-2007-PeraN #email #similarity #word
Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
CIKMCIKM-2007-WangFZ #feedback #query #retrieval
Improve retrieval accuracy for difficult queries using negative feedback (XW, HF, CZ), pp. 991–994.
CIKMCIKM-2007-XuBCY #information retrieval #social
Using social annotations to improve language model for information retrieval (SX, SB, YC, YY), pp. 1003–1006.
CIKMCIKM-2007-YangQZGL #analysis #graph #web
Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKMCIKM-2007-YanH #feedback #multi #probability #query #retrieval
Query expansion using probabilistic local feedback with application to multimedia retrieval (RY, AGH), pp. 361–370.
CIKMCIKM-2007-YuTT #category theory #evaluation #ontology #wiki
Ontology evaluation using wikipedia categories for browsing (JY, JAT, AMT), pp. 223–232.
ECIRECIR-2007-AshooriL #repository #topic #xml
Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
ECIRECIR-2007-AslamP #estimation #multi #query
Query Hardness Estimation Using Jensen-Shannon Divergence Among Multiple Scoring Functions (JAA, VP), pp. 198–209.
ECIRECIR-2007-BrunnertAR #enterprise #people #retrieval #visualisation
Enterprise People and Skill Discovery Using Tolerant Retrieval and Visualization (JB, OA, DR), pp. 674–677.
ECIRECIR-2007-HeD #classification #naive bayes
Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIRECIR-2007-MacdonaldO #feedback
Using Relevance Feedback in Expert Search (CM, IO), pp. 431–443.
ECIRECIR-2007-MartinetS #documentation
Using Visual-Textual Mutual Information and Entropy for Inter-modal Document Indexing (JM, SS), pp. 549–556.
ECIRECIR-2007-Medina-PagolaRHP #distance #documentation #representation
Document Representation Using Global Association Distance Model (JEMP, AYRG, AHD, JHP), pp. 565–572.
ECIRECIR-2007-MeenaP #analysis #sentiment
Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ECIRECIR-2007-MeloS #classification #multi #ontology
Multilingual Text Classification Using Ontologies (GdM, SS), pp. 541–548.
ECIRECIR-2007-MoreauCS #automation #machine learning #query
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning (FM, VC, PS), pp. 222–233.
ECIRECIR-2007-PaltoglouSS #algorithm #modelling #multi
Results Merging Algorithm Using Multiple Regression Models (GP, MS, MS), pp. 173–184.
ECIRECIR-2007-RoullandKCRGPO #clustering #query #refinement
Query Reformulation and Refinement Using NLP-Based Sentence Clustering (FR, ANK, SC, CR, AG, KP, JO), pp. 210–221.
ECIRECIR-2007-ShahE #detection #documentation #metric #representation #topic
Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
ECIRECIR-2007-YamoutOT #feedback #query
Relevance Feedback Using Weight Propagation Compared with Information-Theoretic Query Expansion (FY, MPO, JT), pp. 258–270.
ECIRECIR-2007-YuSLWM #image #ranking
Improve Ranking by Using Image Information (QY, SS, ZL, JRW, WYM), pp. 645–652.
ECIRECIR-2007-ZhangZC #performance #scalability
Efficient Construction of FM-index Using Overlapping Block Processing for Large Scale Texts (DZ, YZ, JC), pp. 113–123.
ECIRECIR-2007-ZwolL #effectiveness #retrieval #semantics #xml
Effective Use of Semantic Structure in XML Retrieval (RvZ, TvL), pp. 621–628.
ICMLICML-2007-DingL #adaptation #analysis #clustering #reduction
Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICMLICML-2007-GerberTW #reduction #robust
Robust non-linear dimensionality reduction using successive 1-dimensional Laplacian Eigenmaps (SG, TT, RTW), pp. 281–288.
ICMLICML-2007-LeskovecF #graph #modelling #multi #scalability
Scalable modeling of real graphs using Kronecker multiplication (JL, CF), pp. 497–504.
ICMLICML-2007-Mahadevan #3d #adaptation #learning #multi
Adaptive mesh compression in 3D computer graphics using multiscale manifold learning (SM), pp. 585–592.
ICMLICML-2007-NilssonSJ #kernel #reduction
Regression on manifolds using kernel dimension reduction (JN, FS, MIJ), pp. 697–704.
ICMLICML-2007-WipfN
Beamforming using the relevance vector machine (DPW, SSN), pp. 1023–1030.
KDDKDD-2007-BeckerA #concept #ranking #realtime
Real-time ranking with concept drift using expert advice (HB, MA), pp. 86–94.
KDDKDD-2007-ChewBKA #information retrieval
Cross-language information retrieval using PARAFAC2 (PAC, BWB, TGK, AA), pp. 143–152.
KDDKDD-2007-CulottaWHMM #adaptation #database #metric #similarity
Canonicalization of database records using adaptive similarity measures (AC, MLW, RH, MM, AM), pp. 201–209.
KDDKDD-2007-DingSJL #framework #kernel #learning #recommendation
A learning framework using Green’s function and kernel regularization with application to recommender system (CHQD, RJ, TL, HDS), pp. 260–269.
KDDKDD-2007-SatoN #documentation #information management #multi #parametricity #topic
Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior (IS, HN), pp. 590–598.
KDDKDD-2007-Schickel-ZuberF #clustering #learning #recommendation
Using hierarchical clustering for learning theontologies used in recommendation systems (VSZ, BF), pp. 599–608.
KDDKDD-2007-SrihariXS #documentation #generative
Use of ranked cross document evidence trails for hypothesis generation (RKS, LX, TS), pp. 677–686.
MLDMMLDM-2007-HanKK #performance #sequence
Efficient Subsequence Matching Using the Longest Common Subsequence with a Dual Match Index (TSH, SKK, JK), pp. 585–600.
MLDMMLDM-2007-MartinsSSPG #classification #image
Classification of Breast Masses in Mammogram Images Using Ripley’s K Function and Support Vector Machine (LdOM, ECdS, ACS, ACdP, MG), pp. 784–794.
MLDMMLDM-2007-PracnerTRI #attribute grammar #categorisation
Categorizing Evolved CoreWar Warriors Using EM and Attribute Evaluation (DP, NT, MR, MI), pp. 681–693.
MLDMMLDM-2007-SunV
Data Selection Using SASH Trees for Support Vector Machines (CS, RV), pp. 286–295.
MLDMMLDM-2007-ZagorisPK #algorithm #fuzzy #reduction #self
Color Reduction Using the Combination of the Kohonen Self-Organized Feature Map and the Gustafson-Kessel Fuzzy Algorithm (KZ, NP, IK), pp. 703–715.
RecSysRecSys-2007-LathiaHC #collaboration #distributed #metric
Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
RecSysRecSys-2007-NathansonBG #adaptation #clustering #recommendation
Eigentaste 5.0: constant-time adaptability in a recommender system using item clustering (TN, EB, KYG), pp. 149–152.
RecSysRecSys-2007-Vuorikari #education #information retrieval #question #reuse #social
Can social information retrieval enhance the discovery and reuse of digital educational content? (RV), pp. 207–210.
SEKESEKE-2007-AmouiST #network #predict
Temporal Software Change Prediction Using Neural Networks (MA, MS, LT), pp. 380–385.
SEKESEKE-2007-GuzmanPP #modelling #pattern matching
Using Model-Driven Pattern Matching to derive functionalities in Models (IGRdG, MP, MP), pp. 529–534.
SEKESEKE-2007-HofmeisterW #architecture #design #independence #platform
Designing a Platform-Independent Use-Case for a Composite Application using a Reference Architecture (HH, GW), pp. 227–231.
SEKESEKE-2007-HuangL07a #composition #reasoning
Service Composition Using Planning and Case-Based Reasoning (KHH, AL), pp. 610–615.
SEKESEKE-2007-KanaskarSR #analysis #approach #detection
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-KrenickyWE #design #query
Exploratory Design of Derivation Business Rules Using Query Rewriting (RK, DW, SME), pp. 467–472.
SEKESEKE-2007-MizouniSD #case study #composition #requirements
Using Formal Composition of Use Cases in Requirements Engineering (RM, AS, RD), p. 238–?.
SEKESEKE-2007-MonteiroOG #implementation #source code #user interface
A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKESEKE-2007-MoserPS #agile #development #incremental #modelling #predict
Incremental Effort Prediction Models in Agile Development using Radial Basis Functions (RM, WP, GS), pp. 519–522.
SEKESEKE-2007-PengJRZ #case study #component #database #product line #reuse
Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
SEKESEKE-2007-Rhem #modelling #uml
Knowledge Modelling using UML (AJR), p. 755–?.
SEKESEKE-2007-SettasS #ontology #project management
Using Ontologies to Represent Software Project Management Antipatterns (DS, IS), pp. 604–609.
SEKESEKE-2007-TranCT #modelling #process
Broadening the Use of Process Patterns for Modeling Processes (HNT, BC, DTBT), pp. 57–62.
SEKESEKE-2007-WongZQCD #effectiveness #fault #locality #network
Effective Fault Localization using BP Neural Networks (WEW, LZ, YQ, KYC, JD), pp. 374–379.
SIGIRSIGIR-2007-AlonsoGB #timeline #visualisation
Search results using timeline visualizations (OA, MG, RABY), p. 908.
SIGIRSIGIR-2007-AzzopardiRB #analysis #query #topic
Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIRSIGIR-2007-BaiNCB #information retrieval #query
Using query contexts in information retrieval (JB, JYN, GC, HB), pp. 15–22.
SIGIRSIGIR-2007-BanerjeeRG #clustering #wiki
Clustering short texts using wikipedia (SB, KR, AG), pp. 787–788.
SIGIRSIGIR-2007-BroderFGJJZ #classification #query #robust #web
Robust classification of rare queries using web knowledge (AZB, MF, EG, AJ, VJ, TZ), pp. 231–238.
SIGIRSIGIR-2007-CastilloDGMS #detection #web
Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
SIGIRSIGIR-2007-Collins-ThompsonC #estimation #feedback #nondeterminism #pseudo
Estimation and use of uncertainty in pseudo-relevance feedback (KCT, JC), pp. 303–310.
SIGIRSIGIR-2007-Diaz #performance #predict
Performance prediction using spatial autocorrelation (FD), pp. 583–590.
SIGIRSIGIR-2007-FernandezL #analysis #detection
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-FranzX #multi #segmentation
Story segmentation of broadcast news in Arabic, Chinese and English using multi-window features (MF, JMX), pp. 703–704.
SIGIRSIGIR-2007-FuKS #collaboration #query #retrieval #topic
Using collaborative queries to improve retrieval for difficult topics (XF, DK, CS), pp. 879–880.
SIGIRSIGIR-2007-GaoNNZHWH #query
Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIRSIGIR-2007-KyriakopoulouK #classification #clustering
Using clustering to enhance text classification (AK, TK), pp. 805–806.
SIGIRSIGIR-2007-LiLHC #ad hoc #corpus #query #wiki
Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
SIGIRSIGIR-2007-LiuHAY #named #performance #predict #sentiment
ARSA: a sentiment-aware model for predicting sales performance using blogs (YL, XH, AA, XY), pp. 607–614.
SIGIRSIGIR-2007-Metzler #modelling #parametricity
Using gradient descent to optimize language modeling smoothing parameters (DM), pp. 687–688.
SIGIRSIGIR-2007-MetzlerC #concept #markov #random
Latent concept expansion using markov random fields (DM, WBC), pp. 311–318.
SIGIRSIGIR-2007-QiuLBCK #ambiguity #metadata #query
Quantify query ambiguity using ODP metadata (GQ, KL, JB, CC, ZK), pp. 697–698.
SIGIRSIGIR-2007-SitbonB #segmentation #topic
Topic segmentation using weighted lexical links (WLL) (LS, PB), pp. 737–738.
SIGIRSIGIR-2007-SmuckerA #similarity #web
Using similarity links as shortcuts to relevant web pages (MDS, JA), pp. 863–864.
SIGIRSIGIR-2007-TurnbullBTL #semantics #set #towards
Towards musical query-by-semantic-description using the CAL500 data set (DT, LB, DAT, GRGL), pp. 439–446.
SIGIRSIGIR-2007-Wan #clustering #documentation #evaluation #named
OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
SIGIRSIGIR-2007-WhiteBC #interactive #web
Studying the use of popular destinations to enhance web search interaction (RWW, MB, SC), pp. 159–166.
SIGIRSIGIR-2007-ZhangHRJ #learning #query
Query rewriting using active learning for sponsored search (WVZ, XH, BR, RJ), pp. 853–854.
SIGIRSIGIR-2007-ZhengCSZ #framework #learning #ranking
A regression framework for learning ranking functions using relative relevance judgments (ZZ, KC, GS, HZ), pp. 287–294.
SIGIRSIGIR-2007-ZhuYCG #classification #matrix
Combining content and link for classification using matrix factorization (SZ, KY, YC, YG), pp. 487–494.
ECMFAECMDA-FA-2007-Warmer #domain-specific language #modelling
A Model Driven Software Factory Using Domain Specific Languages (JW), pp. 194–203.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
SPLCSPLC-2007-BeucheBDFGHJJKMW #product line #requirements #tool support
Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice (DB, AB, HD, AF, HG, GH, DJ, IJ, RTK, TvdM, AW), pp. 84–96.
SPLCSPLC-2007-KastnerAB #aspectj #case study #implementation
A Case Study Implementing Features Using AspectJ (CK, SA, DSB), pp. 223–232.
SPLCSPLC-2007-VolterG #aspect-oriented #development #implementation #modelling #product line
Product Line Implementation using Aspect-Oriented and Model-Driven Software Development (MV, IG), pp. 233–242.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
ECOOPECOOP-2007-DoorenS #abstraction #inheritance
A Higher Abstraction Level Using First-Class Inheritance Relations (MvD, ES), pp. 425–449.
ECOOPECOOP-2007-VaziriTFD #declarative
Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
OOPSLAOOPSLA-2007-BuytaertGHAEB #compilation
Using hpm-sampling to drive dynamic compilation (DB, AG, MH, MA, LE, KDB), pp. 553–568.
OOPSLAOOPSLA-2007-Rinard #termination
Using early phase termination to eliminate load imbalances at barrier synchronization points (MCR), pp. 369–386.
AdaEuropeAdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling
Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, , FL), pp. 168–179.
LOPSTRLOPSTR-2007-ZhangN #constraints #scalability #theorem proving #unification
A Scalable Inclusion Constraint Solver Using Unification (YZ, FN), pp. 121–137.
PADLPADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADLPADL-2007-FisselerKBKM #algebra #haskell #information management
Algebraic Knowledge Discovery Using Haskell (JF, GKI, CB, AK, CM), pp. 80–93.
PADLPADL-2007-HuangHP #named #parallel #process
HPorter: Using Arrows to Compose Parallel Processes (LH, PH, JP), pp. 275–289.
PEPMPEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics
Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
PLDIPLDI-2007-RamanathanGJ #mining #specification
Static specification inference using predicate mining (MKR, AG, SJ), pp. 123–134.
POPLPOPL-2007-ShenSMD #approximate #locality
Locality approximation using time (XS, JS, BM, CD), pp. 55–61.
PPDPPPDP-2007-Lucas #proving #termination
Practical use of polynomials over the reals in proofs of termination (SL), pp. 39–50.
PPDPPPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis
Detecting defects in Erlang programs using static analysis (KFS), p. 37.
QAPLQAPL-2007-BistarelliMRS #constraints #graph #logic programming #modelling #multi
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming (SB, UM, FR, FS), pp. 111–127.
QAPLQAPL-2007-YaikhomCGH #approach #modelling #performance
A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
SASSAS-2007-SankaranarayananIG #program analysis
Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
SASSAS-2007-Tip #constraints #refactoring
Refactoring Using Type Constraints (FT), pp. 1–17.
AdaSIGAda-2007-Lau #imperative #reasoning #source code
Using SPARK for a beginner’s course on reasoning about imperative programs (KKL), pp. 75–78.
AdaSIGAda-2007-Maurer #ada #proving
Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
AdaSIGAda-2007-PukiteL #design #logic #simulation
Generic discrete event simulations using DEGAS: application to logic design and digital signal processing (PP, LL), pp. 27–40.
AdaSIGAda-2007-Sward #ada #architecture #named #web #web service
SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
AdaSIGAda-2007-Sward07a #ada #architecture
Using ada in a service-Ooriented architecture (RES), pp. 63–68.
RERE-2007-BhatG #maintenance
Enhancing Requirement Stakeholder Satisfaction during Far-shore Maintenance of Custom Developed Software using Shift-Pattern Model (JMB, MG), pp. 322–327.
RERE-2007-ConejeroHMA #requirements
Discovering Volatile and Aspectual Requirements Using a Crosscutting Pattern (JMC, JH, AMDM, JA), pp. 391–392.
RERE-2007-Fricker #network #social
Explaining Stakeholder Negotiation Using Social Goal Networks (SF), pp. 387–388.
RERE-2007-KartsevaGT #design #enterprise
Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
RERE-2007-MaidenLRJB #modelling
Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System (NAMM, JL, DR, SJ, DB), pp. 49–52.
RERE-2007-MunirajJ #prototype #requirements
Requirements Engineering using Prototyping Projects in Healthcare Diagnostic Software Applications (GM, VJ), pp. 307–312.
RERE-2007-SmithG #game studies #lightweight #requirements
Using a Game to Introduce Lightweight Requirements Engineering (RS, OG), pp. 379–380.
REFSQREFSQ-2007-FrickerGM #implementation
Handshaking Between Software Projects and Stakeholders Using Implementation Proposals (SF, TG, PM), pp. 144–159.
ASEASE-2007-CabotCR #constraints #modelling #named #ocl #programming #uml #verification
UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming (JC, RC, DR), pp. 547–548.
ASEASE-2007-ChenM #concurrent #source code #testing
Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
ASEASE-2007-ClauseDOP #effectiveness #memory management
Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
ASEASE-2007-LemosBOMMBL #named #reuse #source code
CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASEASE-2007-MajumdarX #generative #testing
Directed test generation using symbolic grammars (RM, RGX), pp. 134–143.
ASEASE-2007-NaslavskyR #modelling #testing #traceability
Using traceability to support model-based regression testing (LN, DJR), pp. 567–570.
ASEASE-2007-PoshyvanykM #design #incremental #information retrieval
Using information retrieval to support design of incremental change of software (DP, AM), pp. 563–566.
ESEC-FSEESEC-FSE-2007-Coman #analysis #automation #developer #low level
An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSEESEC-FSE-2007-GrechanikMP #traceability
Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSEESEC-FSE-2007-HalfondO #automation #generative #interface #testing #web
Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
ESEC-FSEESEC-FSE-2007-MajumdarX #generative #testing
Directed test generation using symbolic grammars (RM, RGX), pp. 553–556.
ESEC-FSEESEC-FSE-2007-PatelBS #capacity #case study
A case study in assessing and improving capacity using an anatomy of good practice (MP, AB, KS), pp. 509–512.
ESEC-FSEESEC-FSE-2007-SankaranarayananCJI #constraints #feedback #generative #monte carlo
State space exploration using feedback constraint generation and Monte-Carlo sampling (SS, RMC, GJ, FI), pp. 321–330.
ESEC-FSEESEC-FSE-2007-SherriffHLW #identification #static analysis
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ESEC-FSEESEC-FSE-2007-XuRTQ #java #performance
Efficient checkpointing of java software using context-sensitive capture and replay (G(X, AR, YT, FQ), pp. 85–94.
ESEC-FSEESEC-FSE-2007-ZibinPAAKE #java
Object and reference immutability using java generics (YZ, AP, MA, SA, AK, MDE), pp. 75–84.
GTTSEGTTSE-2007-SeguraBCT #automation #feature model #graph transformation #modelling
Automated Merging of Feature Models Using Graph Transformations (SS, DB, ARC, PT), pp. 489–505.
ICSEICSE-2007-BernerWK #test coverage #testing
Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSEICSE-2007-BestJN #distributed #information management #modelling #security
Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSEICSE-2007-RajapakseJ #analysis #trade-off #web
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSEICSE-2007-RunesonAN #detection #fault #natural language
Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
ICSEICSE-2007-Staron #education #evaluation #learning #process #re-engineering #student
Using Experiments in Software Engineering as an Auxiliary Tool for Teaching — A Qualitative Evaluation from the Perspective of Students’ Learning Process (MS), pp. 673–676.
ICSEICSE-2007-YuanM #feedback #runtime #testing #user interface
Using GUI Run-Time State as Feedback to Generate Test Cases (XY, AMM), pp. 396–405.
ICSEICSE-2007-Zualkernan #learning #programming
Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes (IAZ), pp. 723–726.
SACSAC-2007-AhamedHSK #pervasive
Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
SACSAC-2007-Avila-GarciaER #modelling #product line
Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
SACSAC-2007-BistarelliFP
Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
SACSAC-2007-BoussellaaZA #hybrid
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SACSAC-2007-BraghettoFP #control flow #process #specification
Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
SACSAC-2007-CambroneroPDV #modelling #web #web service
Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
SACSAC-2007-Cardoso-CachopoO #categorisation #classification
Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
SACSAC-2007-ChenL #hardware
Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
SACSAC-2007-Chiong #algorithm #search-based
Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
SACSAC-2007-CimadamoreV #approach #java
Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
SACSAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification
Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
SACSAC-2007-FabroV #automation #integration #modelling #weaving
Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
SACSAC-2007-FangWLYD #assessment #detection #multi #sequence
The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
SACSAC-2007-GooneratneTH #algorithm #graph #traversal #verification #web #web service
Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
SACSAC-2007-HuXP #approach #modelling
Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
SACSAC-2007-KawsarFN #lightweight
A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
SACSAC-2007-Kofron #behaviour #component #protocol
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SACSAC-2007-LebbahMR #constraints #implementation #performance #reduction
Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
SACSAC-2007-LeeHPLJK #performance #regular expression
A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
SACSAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation
Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
SACSAC-2007-NollR #ontology #traceability
Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
SACSAC-2007-NoordendeBT #mobile #security
Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
SACSAC-2007-OHareGJLOS
Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
SACSAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #verification
Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
SACSAC-2007-PaliwalAB #distributed #verification #web #web service
Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
SACSAC-2007-PaulK #precise #slicing
Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
SACSAC-2007-PereraGB #low level #visualisation
Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
SACSAC-2007-PlattGM #detection #on the #query #sequence #topic
On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
SACSAC-2007-PolatD #privacy
Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
SACSAC-2007-SarfrazR #algorithm #image #polynomial #random
A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
SACSAC-2007-TanC #classification
Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
SACSAC-2007-TetsuyaAHN #ad hoc #generative #network
Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SACSAC-2007-VarroB #automation #induction #logic programming #model transformation
Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
SACSAC-2007-VuMTA #knowledge base #web
Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
SACSAC-2007-XingXE #approximate #automation #documentation #xml
Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
SACSAC-2007-XiongCL #classification #database #mining #multi
Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
SACSAC-2007-YiYC #mobile #multi
Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
SACSAC-2007-ZhangMMB #locality #network #performance #problem #self
Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
SACSAC-2007-ZhouHP #database #image
An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
GPCEGPCE-2007-JarviMS #adaptation #c++ #composition #concept #library
Library composition and adaptation using c++ concepts (JJ, MAM, JNS), pp. 73–82.
CASECASE-2007-AramakiNKHT #interface #knowledge base
Human-Robot Interface by using frame like knowledge base (SA, TN, MK, YH, TT), pp. 729–734.
CASECASE-2007-BasileCT #fault #online
Improving on-line fault diagnosis for discrete event systems using time (FB, PC, GDT), pp. 26–32.
CASECASE-2007-BukkapatnamK #monitoring
Container Integrity and Condition Monitoring using RF Vibration Sensor Tags (STSB, RK), pp. 585–590.
CASECASE-2007-ChalfounBKP #fault #matrix
Calibration Using Generalized Error Matrices of a Long Reach Articulated Carrier (JC, CB, DK, YP), pp. 777–782.
CASECASE-2007-FalkmanLA #specification
Specification of Production Systems using PPN and Sequential Operation Charts (PF, BL, KA), pp. 20–25.
CASECASE-2007-FontanelliRS #algorithm #locality #metric #performance
A Fast RANSAC-Based Registration Algorithm for Accurate Localization in Unknown Environments using LIDAR Measurements (DF, LR, SS), pp. 597–602.
CASECASE-2007-Gonzalez-CastoloL #approximate #fuzzy #petri net
Approximating State of DES Using Fuzzy Timed Petri Nets (JCGC, ELM), pp. 722–728.
CASECASE-2007-JacksonCM
A Rationale for the use of Optical Mice Chips for Economic and Accurate Vehicle Tracking (JDJ, DWC, JM), pp. 939–944.
CASECASE-2007-KimCAY #mobile
RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
CASECASE-2007-KimLSSZ #approach #biology #metric #performance
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
CASECASE-2007-KimLSSZ07a #approach #biology #metric #performance
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
CASECASE-2007-LamLY #automation #framework #platform #sketching
Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
CASECASE-2007-LiuWL #algorithm #design #effectiveness #multi #platform #product line #search-based #towards
Towards Effective Multi-platforming Design of Product Family using Genetic Algorithm (ZL, YSW, KSL), pp. 300–305.
CASECASE-2007-LjungkrantzA #case study #component #industrial #library #logic #programming
A Study of Industrial Logic Control Programming using Library Components (OL, ), pp. 117–122.
CASECASE-2007-LuHF #network #process #robust #smarttech
Creating Robust Activity Maps Using Wireless Sensor Network in a Smart Home (CHL, YcH, LCF), pp. 741–746.
CASECASE-2007-LuimulaSPPAL #mobile #ubiquitous
Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
CASECASE-2007-MarefatP #automation #modelling #process #retrieval #reuse #similarity
Similarity-Based Retrieval of CAD Solid Models for Automated Reuse of Machining Process Plans (MMM, CP), pp. 312–317.
CASECASE-2007-McVittieSMMLHM #automation #classification
Automated Classification of Macrophage Membrane Integrity using a Fluorescent Live/Dead Stain (PM, CSS, TWM, SM, MEL, MH, DRM), pp. 554–559.
CASECASE-2007-MitaniYH #analysis
Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASECASE-2007-SarkisSD #automation #modelling #parametricity
Modeling the Variation of the Intrinsic Parameters of an Automatic Zoom Camera System using Moving Least-Squares (MS, CTS, KD), pp. 560–565.
CASECASE-2007-WangLS #injection
Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
CASECASE-2007-YamamotoFI #3d #metric #multi #performance
A High-Speed 3D Shape Measurement System Using a Multi-Sided Mirror (KY, HF, II), pp. 823–828.
CASECASE-2007-YogeswaranPT #algorithm #heuristic #hybrid #problem #search-based
An hybrid heuristic using genetic algorithm and simulated annealing algorithm to solve machine loading problem in FMS (MY, SGP, MKT), pp. 182–187.
CASECASE-2007-YoonHMSR #algorithm #image #navigation #performance
Efficient Navigation Algorithm Using 1D Panoramic Images (SY, WH, SKM, YS, KSR), pp. 536–541.
CASECASE-2007-YuanZCC #automation
Automatic Mixing of Bio-Samples Using Micro-Channel and Centrifugation (LY, YFZ, WC, MC), pp. 634–639.
CASECASE-2007-ZuHT #coordination #generative #integer #linear #programming
Trajectory Generation in Relative Velocity Coordinates Using Mixed Integer Linear Programming with IHDR Guidance (DZ, JH, DT), pp. 1125–1130.
CCCC-2007-JeonSH #data access #layout
Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
CCCC-2007-LeeRBM #constraints #control flow #graph
Correcting the Dynamic Call Graph Using Control-Flow Constraints (BL, KR, MDB, KSM), pp. 80–95.
CCCC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling
Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CCCC-2007-PazP #garbage collection
Using Prefetching to Improve Reference-Counting Garbage Collectors (HP, EP), pp. 48–63.
CCCC-2007-ScholzB #analysis #composition #data flow #framework
A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGOCGO-2007-BarthouDCDJ #compilation #composition #kernel #optimisation
Loop Optimization using Hierarchical Compilation and Kernel Decomposition (DB, SD, PC, AD, WJ), pp. 170–184.
CGOCGO-2007-CavazosFABOT #compilation #optimisation #performance
Rapidly Selecting Good Compiler Optimizations using Performance Counters (JC, GF, FVA, EVB, MFPO, OT), pp. 185–197.
CGOCGO-2007-DaiLH #execution #network #pipes and filters
Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
CGOCGO-2007-GrzegorczykSKW #feedback
Isla Vista Heap Sizing: Using Feedback to Avoid Paging (CG, SS, CK, RW), pp. 325–340.
COCVCOCV-2007-FangS #bidirectional #compilation #generative #java
Generating Java Compiler Optimizers Using Bidirectional CTL (LF, MS), pp. 49–63.
DACDAC-2007-AksoyCFM #metric #optimisation
Optimization of Area in Digital FIR Filters using Gate-Level Metrics (LA, EACdC, PFF, JCM), pp. 420–423.
DACDAC-2007-ChenL #statistics #testing
Extraction of Statistical Timing Profiles Using Test Data (YYC, JJL), pp. 509–514.
DACDAC-2007-CzajkowskiB
Using Negative Edge Triggered FFs to Reduce Glitching Power in FPGA Circuits (TSC, SDB), pp. 324–329.
DACDAC-2007-DengBWYZ #named #performance #satisfiability
EHSAT: An Efficient RTL Satisfiability Solver Using an Extended DPLL Procedure (SD, JB, WW, XY, YZ), pp. 588–593.
DACDAC-2007-DongL #performance #simulation
Accelerating Harmonic Balance Simulation Using Efficient Parallelizable Hierarchical Preconditioning (WD, PL), pp. 436–439.
DACDAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics
Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DACDAC-2007-GhodratLR #analysis #estimation #hybrid
Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DACDAC-2007-HallschmidS #automation #energy #modelling
Automatic Cache Tuning for Energy-Efficiency using Local Regression Modeling (PH, RS), pp. 732–737.
DACDAC-2007-KangKIAR #estimation #metric #online #reliability
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
DACDAC-2007-KangKR #design #power management
Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop (KK, KK, KR), pp. 934–939.
DACDAC-2007-KocKEO #embedded #memory management #multi
Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
DACDAC-2007-LiuLC #algorithm #approximate #multi #optimisation
A Provably Good Approximation Algorithm for Power Optimization Using Multiple Supply Voltages (HYL, WPL, YWC), pp. 887–890.
DACDAC-2007-RamalingamSNOP #analysis #composition #modelling
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DACDAC-2007-YeZL #optimisation #performance #power management #statistics
Statistical Leakage Power Minimization Using Fast Equi-Slack Shell Based Optimization (XY, YZ, PL), pp. 853–858.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DACDAC-2007-ZhuGSDK #architecture #power management #towards
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors (CZ, Z(G, LS, RPD, RGK), pp. 312–317.
DATEDATE-2007-AnisN #architecture #debugging #interactive #low cost
Interactive presentation: Low cost debug architecture using lossy compression for silicon debug (EA, NN), pp. 225–230.
DATEDATE-2007-BorremansLWR #analysis #multi
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATEDATE-2007-ChangLR #performance
Improve CAM power efficiency using decoupled match line scheme (YJC, YHL, SJR), pp. 165–170.
DATEDATE-2007-CiesielskiAGGB #data flow #diagrams
Data-flow transformations using Taylor expansion diagrams (MJC, SA, DGP, JG, EB), pp. 455–460.
DATEDATE-2007-ClausZMS #configuration management #hardware #video
Using partial-run-time reconfigurable hardware to accelerate video processing in driver assistance system (CC, JZ, FHM, WS), pp. 498–503.
DATEDATE-2007-ErdoganO #analysis
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-FaragES #2d #configuration management
Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
DATEDATE-2007-GhoshBR #adaptation #scheduling #synthesis
Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling (SG, SB, KR), pp. 1532–1537.
DATEDATE-2007-GuptaOJWB #comprehension #distributed #multi #network
Understanding voltage variations in chip multiprocessors using a distributed power-delivery network (MSG, JLO, RJ, GYW, DMB), pp. 624–629.
DATEDATE-2007-HaastregtK #interactive #optimisation #performance #random
Interactive presentation: Feasibility of combined area and performance optimization for superscalar processors using random search (SvH, PMWK), pp. 606–611.
DATEDATE-2007-HosseinabadyDN #testing
Using the inter- and intra-switch regularity in NoC switch testing (MH, AD, ZN), pp. 361–366.
DATEDATE-2007-HuangT #analysis #correlation #multi #performance
Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-KroeningS #image #interactive #proving #refinement #word
Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs (DK, NS), pp. 1325–1330.
DATEDATE-2007-LaouamriA #framework #network #testing
Remote testing and diagnosis of System-on-Chips using network management frameworks (OL, CA), pp. 373–378.
DATEDATE-2007-LataireVP #design #interactive #multi #optimisation
Interactive presentation: Optimizing analog filter designs for minimum nonlinear distortions using multisine excitations (JL, GV, RP), pp. 267–272.
DATEDATE-2007-MangassarianVSNA #estimation #process #pseudo #satisfiability
Maximum circuit activity estimation using pseudo-boolean satisfiability (HM, AGV, SS, FNN, MSA), pp. 1538–1543.
DATEDATE-2007-MarianiBC #design
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
DATEDATE-2007-MuellerGS #design #polynomial #programming #trade-off
Trade-off design of analog circuits using goal attainment and “Wave Front” sequential quadratic programming (DM, HEG, US), pp. 75–80.
DATEDATE-2007-NardiTNAGLS #analysis #design #statistics
Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATEDATE-2007-QuSN #configuration management #energy #interactive #runtime #scalability
Interactive presentation: Using dynamic voltage scaling to reduce the configuration energy of run time reconfigurable devices (YQ, JPS, JN), pp. 147–152.
DATEDATE-2007-RenterghemDVVQ #compilation #development
Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
DATEDATE-2007-RousseauMGMLDG #certification #configuration management
Enabling certification for dynamic partial reconfiguration using a minimal flow (BR, PM, DG, DM, JDL, FD, YG), pp. 983–988.
DATEDATE-2007-SeongM #performance #taxonomy
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-SheldonVL #design #interactive #paradigm
Interactive presentation: Soft-core processor customization using the design of experiments paradigm (DS, FV, SL), pp. 821–826.
DATEDATE-2007-TadesseSLBG #analysis #modelling #satisfiability
Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATEDATE-2007-TongbongMC #evaluation #interactive #metric #multi #statistics #testing
Interactive presentation: Evaluation of test measures for LNA production testing using a multinormal statistical model (JT, SM, JLC), pp. 731–736.
DATEDATE-2007-WangCW #optimisation #scheduling #testing
SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling (ZW, KC, SW), pp. 201–206.
DATEDATE-2007-Wong #equation #performance #symmetry
Fast positive-real balanced truncation of symmetric systems using cross Riccati equations (NW), pp. 1496–1501.
DATEDATE-2007-YonedaIF #algorithm #configuration management #interactive #scheduling
Interactive presentation: An SoC test scheduling algorithm using reconfigurable union wrappers (TY, MI, HF), pp. 231–236.
DATEDATE-2007-ZhouB #approach #reduction #scheduling #testing
Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
HPCAHPCA-2007-ClarkHYMF #hardware #lightweight
Liquid SIMD: Abstracting SIMD Hardware using Lightweight Dynamic Mapping (NC, AH, SY, SAM, KF), pp. 216–227.
HPDCHPDC-2007-HackerM #queue #reliability
Using queue structures to improve job reliability (TJH, ZM), pp. 43–54.
HPDCHPDC-2007-KimKMBS #network
Using content-addressable networks for load balancing in desktop grids (JSK, PJK, MAM, BB, AS), pp. 189–198.
HPDCHPDC-2007-MullerGSF #case study #game studies #multi #online #replication #scalability
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2 (JM, SG, TS, SF), pp. 219–220.
ISMMISMM-2007-NguyenR #detection #memory management
Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
LCTESLCTES-2007-AbouGhazalehFRXLCMM #cpu #machine learning #scalability
Integrated CPU and l2 cache voltage scaling using machine learning (NA, APF, CR, RX, FL, BRC, DM, RGM), pp. 41–50.
LCTESLCTES-2007-HinesTW
Addressing instruction fetch bottlenecks by using an instruction register file (SRH, GST, DBW), pp. 165–174.
PDPPDP-2007-ChongHF #java #memory management
Pretenuring in Java by Object Lifetime and Reference Density Using Scratch-Pad Memory (KFC, CYH, ASF), pp. 205–212.
PDPPDP-2007-PlazaVBP #detection #image #network #parallel
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations (AP, DV, SB, JP), pp. 333–340.
PDPPDP-2007-Talia
Using Grids for Exploiting Data Abundance in Science (DT).
PPoPPPPoPP-2007-GontmakherMS #energy #multi #performance #thread
Using fine grain multithreading for energy efficient computing (AG, AM, AS), pp. 259–269.
PPoPPPPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread
Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
PPoPPPPoPP-2007-MamidalaNVSP #on the #performance #scalability #trade-off
On using connection-oriented vs. connection-less transport for performance and scalability of collective and one-sided operations: trade-offs and impact (ARM, SN, AV, GS, DKP), pp. 46–54.
SOSPSOSP-2007-RossbachHPRAW #hardware #memory management #named #operating system #transaction
TxLinux: using and managing hardware transactional memory in an operating system (CJR, OSH, DEP, HER, BA, EW), pp. 87–102.
SOSPSOSP-2007-VandiverBLM #commit #fault #scheduling #transaction
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling (BV, HB, BL, SM), pp. 59–72.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
ESOPESOP-2007-LeinoS #invariant #verification
Using History Invariants to Verify Observers (KRML, WS), pp. 80–94.
FASEFASE-2007-KleinG #diagrams #specification
Joint Structural and Temporal Property Specification Using Timed Story Scenario Diagrams (FK, HG), pp. 185–199.
FoSSaCSFoSSaCS-2007-BengtsonP #formal method #logic #π-calculus
Formalising the π-Calculus Using Nominal Logic (JB, JP), pp. 63–77.
TACASTACAS-2007-YuCL #bound #diagrams #reachability
Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
AMOSTA-MOST-2007-ChenPU #analysis #dependence #generative #modelling #testing
Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
AMOSTA-MOST-2007-FraserW #generative #ltl #model checking #performance #testing
Using LTL rewriting to improve the performance of model-checker based test-case generation (GF, FW), pp. 64–74.
CADECADE-2007-GeBT #modulo theories #quantifier #satisfiability #verification
Solving Quantified Verification Conditions Using Satisfiability Modulo Theories (YG, CB, CT), pp. 167–182.
CADECADE-2007-Harrison #automation #proving
Automating Elementary Number-Theoretic Proofs Using Gröbner Bases (JH), pp. 51–66.
CADECADE-2007-KoprowskiM #dependence #predict #satisfiability
Predictive Labeling with Dependency Pairs Using SAT (AK, AM), pp. 410–425.
CADECADE-2007-MotikSH #logic #reasoning
Optimized Reasoning in Description Logics Using Hypertableaux (BM, RS, IH), pp. 67–83.
CADECADE-2007-TiwariG #logic #program analysis #proving #theorem proving
Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
CAVCAV-2007-SinhaC #composition #lazy evaluation #learning #satisfiability #verification
SAT-Based Compositional Verification Using Lazy Learning (NS, EMC), pp. 39–54.
CAVCAV-2007-WangYGI #precise #reachability
Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra (CW, ZY, AG, FI), pp. 352–365.
ICLPICLP-2007-NieuwenborghCV #fuzzy #set
Computing Fuzzy Answer Sets Using dlvhex (DVN, MDC, DV), pp. 449–450.
ICLPICLP-2007-West #animation #logic programming #programming language #specification
The Use of a Logic Programming Language in the Animation of Z Specifications (MMW), pp. 451–452.
ISSTAISSTA-2007-Koster #consistency #quality
Using portfolio theory for better and more consistent quality (KK), pp. 108–117.
ISSTAISSTA-2007-NainarCRL #debugging #statistics
Statistical debugging using compound boolean predicates (PAN, TC, JR, BL), pp. 5–15.
ISSTAISSTA-2007-ShohamYFP #abstraction #mining #specification
Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
MBTMBT-2007-DadeauLB #java #ml #specification #testing
Measuring a Java Test Suite Coverage Using JML Specifications (FD, YL, LdB), pp. 21–32.
MBTMBT-2007-OuimetL #automation #consistency #satisfiability #specification #state machine #verification
Automated Verification of Completeness and Consistency of Abstract State Machine Specifications using a SAT Solver (MO, KL), pp. 85–97.
ICSTSAT-2007-DeKV
Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
TAPTAP-2007-Gargantini #detection #fault #model checking #testing
Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
TAPTAP-2007-LiuMS #automation #contract #generative #quality #query #testing
Using Contracts and Boolean Queries to Improve the Quality of Automatic Test Generation (L(L, BM, BS), pp. 114–130.
TAPTAP-2007-RummerS #calculus #java #logic #proving #source code
Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
VMCAIVMCAI-2007-BouillaguetKWZR #data type #first-order #proving #theorem proving #verification
Using First-Order Theorem Provers in the Jahob Data Structure Verification System (CB, VK, TW, KZ, MCR), pp. 74–88.
CBSECBSE-2006-CangussuCW #component #multi #process
Multi Criteria Selection of Components Using the Analytic Hierarchy Process (JWC, KMLC, WEW), pp. 67–81.
CBSECBSE-2006-CervantesC #architecture #lightweight #product line #workflow
Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture (HC, SCV), pp. 198–205.
DocEngDocEng-2006-GormishS #documentation #editing #image #standard
Standards based high resolution Document editing using low resolution proxy images (MJG, ELS), p. 33.
DocEngDocEng-2006-QeliF #aspect-oriented #documentation #programming #xml #xpath
Filtering XML documents using XPath expressions and aspect-oriented programming (EQ, BF), pp. 85–87.
DocEngDocEng-2006-QeliGF #detection #documentation #xml #xpath
Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
DRRDRR-2006-TaghvaBCBPN #automation #information management #relational
Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
TPDLECDL-2006-AmatoBDFRS #experience #library #multi
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience (GA, PB, FD, FF, FR, PS), pp. 379–390.
TPDLECDL-2006-ParkKKLK #personalisation
Personalized Digital E-library Service Using Users’ Profile Information (WP, WK, SK, HL, YKK), pp. 528–531.
TPDLECDL-2006-SmithKN #replication #repository
Repository Replication Using NNTP and SMTP (JAS, MK, MLN), pp. 51–62.
TPDLECDL-2006-SzlavikTL #retrieval #summary #xml
The Use of Summaries in XML Retrieval (ZS, AT, ML), pp. 75–86.
HTHT-2006-Delort #documentation #identification
Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
HTHT-2006-Ruddle #hypermedia #navigation #string
Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
JCDLJCDL-2006-JordanWG #algorithm #feedback #generative #query
Using controlled query generation to evaluate blind relevance feedback algorithms (CJ, CRW, QG), pp. 286–295.
JCDLJCDL-2006-KaczmarekHE #certification #evaluation #repository
Repository software evaluation using the audit checklist for certification of trusted digital repositories (JK, TGH, JE), pp. 107–108.
JCDLJCDL-2006-KulesKS #categorisation #category theory #web
Categorizing web search results into meaningful and stable categories using fast-feature techniques (BK, JK, BS), pp. 210–219.
JCDLJCDL-2006-McMartinIMWM #library
Factors motivating use of digital libraries (FPM, ERI, CM, AJW, GM), pp. 254–255.
JCDLJCDL-2006-MedelyanW #consistency
Measuring inter-indexer consistency using a thesaurus (OM, IHW), pp. 274–275.
JCDLJCDL-2006-OnELKP #approach #clique #effectiveness #library #problem
An effective approach to entity resolution problem using quasi-clique and its application to digital libraries (BWO, EE, DL, JK, JP), pp. 51–52.
JCDLJCDL-2006-ReckerP #education #library
Using resources across educational digital libraries (MR, BP), pp. 240–241.
JCDLJCDL-2006-ReichherzerB #documentation #requirements
Quantifying software requirements for supporting archived office documents using emulation (TR, GB), pp. 86–94.
PODSPODS-2006-GoelGM #modelling #optimisation
Asking the right questions: model-driven optimization using probes (AG, SG, KM), pp. 203–212.
SIGMODSIGMOD-2006-DengR #approximate #detection #streaming
Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
SIGMODSIGMOD-2006-GawlickKL #database #declarative
Using the oracle database as a declarative RSS hub (DG, MK, ZHL), p. 722.
SIGMODSIGMOD-2006-GouKC #evaluation #performance #query
Query evaluation using overlapping views: completeness and efficiency (GG, MK, RC), pp. 37–48.
SIGMODSIGMOD-2006-KoudasMS #case study #experience
Using SPIDER: an experience report (NK, AM, DS), p. 719.
SIGMODSIGMOD-2006-LimLLWS #data type #query
Continuous query processing in data streams using duality of data and queries (HSL, JGL, MJL, KYW, IYS), pp. 313–324.
SIGMODSIGMOD-2006-OnoseDPC #query #xml
Rewriting nested XML queries using nested views (NO, AD, YP, EC), pp. 443–454.
VLDBVLDB-2006-BunemanCFK #distributed #partial evaluation #query
Using Partial Evaluation in Distributed Query Evaluation (PB, GC, WF, AK), pp. 211–222.
VLDBVLDB-2006-DasGKT #query
Answering Top-k Queries Using Views (GD, DG, NK, DT), pp. 451–462.
VLDBVLDB-2006-HuangCLL #evolution #xml
XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
VLDBVLDB-2006-LakshmananWZ #query
Answering Tree Pattern Queries Using Views (LVSL, WHW, Z(Z), pp. 571–582.
VLDBVLDB-2006-MorfoniosI
CURE for Cubes: Cubing Using a ROLAP Engine (KM, YEI), pp. 379–390.
VLDBVLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity
Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
VLDBVLDB-2006-ZhangZWSP #feedback #image #interactive
Using High Dimensional Indexes to Support Relevance Feedback Based Interactive Images Retrival (JZ, XZ, WW, BS, JP), pp. 1211–1214.
CSEETCSEET-2006-BurgeT #case study #challenge #education #re-engineering
Rising to the Challenge: Using Business-Oriented Case Studies in Software Engineering Education (JEB, DT), pp. 43–50.
ITiCSEITiCSE-2006-AssuncaoO #dot-net #education #framework #platform #web #web service
Teaching web services using .NET platform (LA, ALO), p. 339.
ITiCSEITiCSE-2006-Chamillard #education #performance #predict #student
Using student performance predictions in a computer science curriculum (ATC), pp. 260–264.
ITiCSEITiCSE-2006-DaviesCT #education #ontology
Using a computing ontology for educational purposes (GD, LNC, HT), p. 334.
ITiCSEITiCSE-2006-Godejord #education #social
Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
ITiCSEITiCSE-2006-HoodH #education #project management #simulation
Teaching software project management using simulations (DJH, CSH), pp. 289–293.
ITiCSEITiCSE-2006-LeidigFL #information management
The use of community-based non-profit organizations in information systems capstone projects (PML, RCF, JL), pp. 148–152.
ITiCSEITiCSE-2006-ShanmugasundaramJH #visualisation
Knowledge building using visualizations (VS, PJ, CDH), pp. 23–27.
ITiCSEITiCSE-2006-SpaccoHPEHP #case study #design #experience #programming #testing
Experiences with marmoset: designing and using an advanced submission and testing system for programming courses (JS, DH, WP, FE, JKH, NPP), pp. 13–17.
ITiCSEITiCSE-2006-ThomasWS #automation
Using patterns in the automatic marking of ER-diagrams (PGT, KGW, NS), pp. 83–87.
ITiCSEITiCSE-2006-Utting #education #java #problem #programming
Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME (IU), pp. 193–196.
SIGITESIGITE-2006-Rutherfoord #case study
Using personality inventories to form teams for class projects: a case study (RHR), pp. 9–14.
SCAMSCAM-J-2005-ZhangBCD06
Using source transformation to test and model check implicit-invocation systems (HZ, JSB, JRC, JD), pp. 209–227.
CSMRCSMR-2006-GraafWD #architecture #migration #model transformation
Migrating Supervisory Control Architectures Using Model Transformations (BG, SW, AvD), pp. 153–164.
CSMRCSMR-2006-IvkovicK #architecture #framework #model transformation #refactoring #semantics
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations (II, KK), pp. 135–144.
CSMRCSMR-2006-TonuAT #approach #architecture
Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
CSMRCSMR-2006-WierdaDS #architecture #case study #clustering
Using Version Information in Architectural Clustering — A Case Study (AW, ED, LJS), pp. 214–228.
ICPCICPC-2006-BermanDGG #comprehension
The Sound of Software: Using Sonification to Aid Comprehension (LIB, SD, KBG, NG), pp. 225–229.
ICPCICPC-2006-JetleyZI #analysis #slicing
Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPCICPC-2006-JinC #reverse engineering #tool support
Integrating Reverse Engineering Tools Using a Service-Sharing Methodology (DJ, JRC), pp. 94–99.
ICPCICPC-2006-KothariSMH #clustering #evolution
Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
ICPCICPC-2006-LawrieFB #assessment #information retrieval #quality
Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
ICPCICPC-2006-SafyallahS #dynamic analysis #execution #mining
Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
ICPCICPC-2006-StefikFA #comprehension #debugging #effectiveness #music #runtime
Layered Program Auralization: Using Music to Increase Runtime Program Comprehension and Debugging Effectiveness (AS, KF, RTA), pp. 89–93.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSMEICSM-2006-FisherCZ #comprehension #difference
Using Sex Differences to Link Spatial Cognition and Program Comprehension (MF, AC, LZ), pp. 289–298.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSMEICSM-2006-Hou #constraints #design #source code
Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSMEICSM-2006-JaffriK #delivery #performance
Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
ICSMEICSM-2006-LuciaPOZ #comprehension #named #traceability
COCONUT: COde COmprehension Nurturant Using Traceability (ADL, MDP, RO, FZ), pp. 274–275.
ICSMEICSM-2006-TonellaAS #ranking #testing
Using the Case-Based Ranking Methodology for Test Case Prioritization (PT, PA, AS), pp. 123–133.
ICSMEICSM-2006-ZhangCZ #e-commerce #process #re-engineering #user interface
Reengineering User Interfaces of E-Commerce Applications Using Business Processes (QZ, RC, YZ), pp. 428–437.
MSRMSR-2006-GermanRS #comprehension
Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
MSRMSR-2006-KakimotoMKTTM #identification
Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
MSRMSR-2006-SagerBPK #algorithm #detection #java
Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
MSRMSR-2006-TsunodaMKKM #developer
Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
SCAMSCAM-2006-BoogerdM #profiling
Prioritizing Software Inspection Results using Static Profiling (CB, LM), pp. 149–160.
SCAMSCAM-2006-PanKW #classification #debugging #metric #slicing
Bug Classification Using Program Slicing Metrics (KP, SK, EJWJ), pp. 31–42.
SCAMSCAM-2006-WalensteinMCL #normalisation #term rewriting
Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
WCREWCRE-2006-BeyerH #evolution #visualisation
Animated Visualization of Software History using Evolution Storyboards (DB, AEH), pp. 199–210.
WCREWCRE-2006-Cerulo #development #on the #process
On the Use of Process Trails to Understand Software Development (LC), pp. 303–304.
WCREWCRE-2006-CleveHH #dependence #graph #reverse engineering
Data Reverse Engineering using System Dependency Graphs (AC, JH, JLH), pp. 157–166.
WCREWCRE-2006-KoschkeFF #clone detection #detection #syntax
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
WCREWCRE-2006-LormansGDSS #case study #industrial #monitoring #requirements
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study (ML, HGG, AvD, RvS, AS), pp. 275–284.
CIAACIAA-2006-AntoniouHIMP #automaton #finite
Finding Common Motifs with Gaps Using Finite Automata (PA, JH, CSI, BM, PP), pp. 69–77.
DLTDLT-2006-Domaratzki
Characterizing DNA Bond Shapes Using Trajectories (MD), pp. 180–191.
ICALPICALP-v1-2006-Radhakrishnan #lazy evaluation #random
Gap Amplification in PCPs Using Lazy Random Walks (JR), pp. 96–107.
ICALPICALP-v2-2006-DodisR #on the #quantum
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer (YD, RR), pp. 204–215.
FMFM-2006-Boute #formal method #independence #problem
Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FMFM-2006-DelahayeED #security
Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
FMFM-2006-Preoteasa #logic #pointer #recursion #verification
Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
FMFM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
FMFM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented
Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
RTARTA-2006-Bruggink #finite #higher-order #product line #proving
A Proof of Finite Family Developments for Higher-Order Rewriting Using a Prefix Property (HJSB), pp. 372–386.
RTARTA-2006-Bryant #infinity #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
SEFMSEFM-2006-RodriguesBCFG #approach
A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
SEFMSEFM-2006-ZhangHW #component #declarative #modelling #performance #scheduling #uml
Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time (YZ, TH, JW), pp. 246–258.
SFMSFM-2006-Harrison #float #proving #theorem proving #verification
Floating-Point Verification Using Theorem Proving (JH), pp. 211–242.
FLOPSFLOPS-2006-DiscoloHMJS #data type #haskell
Lock Free Data Structures Using STM in Haskell (AD, TH, SM, SLPJ, SS), pp. 65–80.
FLOPSFLOPS-2006-Tozawa #transducer #type checking #xml
XML Type Checking Using High-Level Tree Transducer (AT), pp. 81–96.
ICFPICFP-2006-HickeyNYK #hybrid #representation
Mechanized meta-reasoning using a hybrid HOAS/de bruijn representation and reflection (JH, AN, XY, AK), pp. 172–183.
IFLIFL-2006-TrojahnerGS #array #on the #optimisation #source code
On Optimising Shape-Generic Array Programs Using Symbolic Structural Information (KT, CG, SBS), pp. 1–18.
AIIDEAIIDE-2006-JohanssonO #multi
Using Multi-Agent System Technology in Risk Bots (SJJ, FO), pp. 42–47.
AIIDEAIIDE-2006-Kacmarcik #natural language
Using Natural Language to Manage NPC Dialog (GK), pp. 115–117.
AIIDEAIIDE-2006-Knight #lightweight #network #simulation
Lightweight Simulation of Air Traffic Control Using Simple Temporal Networks (RK), pp. 48–53.
AIIDEAIIDE-2006-McAlindenLCT
Using Environmental Annotations and Affordances to Model Culture (RM, MvL, WC, WT), pp. 145–146.
AIIDEAIIDE-2006-PriceG #network #re-engineering
Plausible Environment Reconstruction Using Bayesian Networks (RGP, SDG), pp. 130–132.
AIIDEAIIDE-2006-SturtevantB #abstraction #collaboration
Improving Collaborative Pathfinding Using Map Abstraction (NRS, MB), pp. 80–85.
CoGCIG-2006-ConradieE #game studies #optimisation
Training Bao Game-Playing Agents using Coevolutionary Particle Swarm Optimization (JC, APE), pp. 67–74.
CoGCIG-2006-GordonR #game studies #identification #set
Trappy Minimax - using Iterative Deepening to Identify and Set Traps in Two-Player Games (VSG, AR), pp. 205–210.
CoGCIG-2006-HeinzKGBL #empirical #game studies #realtime #recognition #smarttech
Using Wearable Sensors for Real-Time Recognition Tasks in Games of Martial Arts - An Initial Experiment (EAH, KSK, MG, DB, PL), pp. 98–102.
CoGCIG-2006-MillerMC #detection #network
Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network (IM, SM, BC), pp. 236–242.
CoGCIG-2006-NakashimaITN #evolution
The Effect of Using Match History on the Evolution of RoboCup Soccer Team Strategies (TN, HI, MT, MN), pp. 60–66.
CoGCIG-2006-ReynoldsAA #algorithm #game studies #optimisation #problem
Optimization Problem Solving using Predator/Prey Games and Cultural Algorithms (RGR, MZA, RSA), pp. 119–125.
CoGCIG-2006-RiceMSS #game studies
A Player for Tactical Air Strike Games Using Evolutionary Computation (AJR, JRM, AS, SS), pp. 83–89.
CoGCIG-2006-WittkampB #adaptation #evolution #game studies #programming #search-based
Evolving Adaptive Play for the Game of Spoof Using Genetic Programming (MW, LB), pp. 164–172.
ICGTICGT-2006-BaresiS #alloy #graph transformation #on the
On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
ICGTICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability
Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
CHICHI-2006-BentleyMH #music
Personal vs. commercial content: the similarities between consumer use of photos and music (FB, CJM, GH), pp. 667–676.
CHICHI-2006-BonhardHMS #recommendation #similarity
Accounting for taste: using profile similarity to improve recommender systems (PB, CH, JDM, MAS), pp. 1057–1066.
CHICHI-2006-CosleyFTR #community #overview
Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
CHICHI-2006-DillonKCB #visual notation
Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
CHICHI-2006-GrossmanHBAB
Hover widgets: using the tracking state to extend the capabilities of pen-operated devices (TG, KH, PB, MA, RB), pp. 861–870.
CHICHI-2006-JiangOMS #interactive #pointer
Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
CHICHI-2006-KramerOF #communication
Using linguistic features to measure presence in computer-mediated communication (ADIK, LMO, SRF), pp. 913–916.
CHICHI-2006-LukPLMLH #design #interactive #mobile #prototype
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype (JL, JP, SL, KEM, VL, VH), pp. 171–180.
CHICHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online
Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHICHI-2006-PrabakerBC #authoring #documentation #evaluation #programming
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
CHICHI-2006-PuVF
Increasing user decision accuracy using suggestions (PP, PV, BF), pp. 121–130.
CHICHI-2006-WeiszEK
Synchronous broadcast messaging: the use of ICT (JDW, TE, WAK), pp. 1293–1302.
CHICHI-2006-WilsonA #game studies
Text entry using a dual joystick game controller (ADW, MA), pp. 475–478.
CHICHI-2006-ZhaoAH #multi
Zone and polygon menus: using relative position to increase the breadth of multi-stroke marking menus (SZ, MA, KH), pp. 1077–1086.
CSCWCSCW-2006-KayanFS #difference
Cultural differences in the use of instant messaging in Asia and North America (SK, SRF, LDS), pp. 525–528.
CSCWCSCW-2006-TangLMLD #interactive
Unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction (JCT, SBL, MJM, JL, CD), pp. 479–482.
SOFTVISSOFTVIS-2006-AlspaughTB #social #visualisation
Using social agents to visualize software scenarios (TAA, BT, EB), pp. 87–94.
SOFTVISSOFTVIS-2006-Reiss #abstraction #execution #visualisation
Visualizing program execution using user abstractions (SPR), pp. 125–134.
EDOCEDOC-2006-BarrettP #automation #composition #modelling #semantics #web #web service
Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics (RB, CP), pp. 417–422.
EDOCEDOC-2006-DongYZ #composition #petri net #testing #web #web service
Testing BPEL-based Web Service Composition Using High-level Petri Nets (WLD, HY, YBZ), pp. 441–444.
EDOCEDOC-2006-KunduB #xml
Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
EDOCEDOC-2006-YanZY #contract #modelling #ontology #owl #semantics
Ontology Modeling for Contract: Using OWL to Express Semantic Relations (YY, JZ, MY), pp. 409–412.
ICEISICEIS-AIDSS-2006-AbdullahPBK #architecture #development #information management #knowledge-based #modelling #uml
Knowledge Engineering Using the UML Profile — Adopting the Model-Driven Architecture for Knowledge-Based System Development (MSA, RFP, IDB, CK), pp. 74–81.
ICEISICEIS-AIDSS-2006-ProchazkaKK #fuzzy #information management #petri net #process
Various Process Wizard for Information Systems — Using Fuzzy Petri Nets for Process Definition (JP, JK, CK), pp. 235–242.
ICEISICEIS-AIDSS-2006-ThuD #predict #risk management
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
ICEISICEIS-DISI-2006-BraunerCBL
Using Gazetteers to Annotate Geographic Catalog Entries (DFB, MAC, KKB, LAPPL), pp. 215–220.
ICEISICEIS-DISI-2006-Eessaar #database #relational #repository
Using Relational Databases in the Engineering Repository Systems (EE), pp. 30–37.
ICEISICEIS-DISI-2006-PatroARMB #case study #database #information management #integration
Databases and Information Systems Integration Using CALOPUS: A Case Study (PKP, PA, MR, RMV, SB), pp. 200–207.
ICEISICEIS-HCI-2006-Bakhtyari #automation #feedback #generative #ontology #student
Automatic Feedback Generation — Using Ontology in an Intelligent Tutoring System for Both Learner and Author Based on Student Model (PB), pp. 116–123.
ICEISICEIS-HCI-2006-LiSB #correlation #hybrid #recognition #sketching #synthesis
Face Recognition from Sketches Using Advanced Correlation Filters Using Hybrid Eigenanalysis for Face Synthesis (YhL, MS, VB), pp. 11–18.
ICEISICEIS-ISAS-2006-BokhariP #information management #petri net #validation
Validation of Information Systems Using Petri Nets (AB, WFSP), pp. 284–289.
ICEISICEIS-ISAS-2006-ChengP #aspect-oriented #development #embedded #overview #realtime #resource management #scheduling
Using Aspect-Oriented Software Development in Real-Time Embedded Systems Software — A Review of Scheduling, Resource Allocation and Synchronization (PLC, GAP), pp. 388–393.
ICEISICEIS-ISAS-2006-CostelloFMLD #approach #distributed #framework #modelling #named #process
iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
ICEISICEIS-ISAS-2006-DasguptaSKG #hybrid #modelling #re-engineering
Hybrid Modeling Using I* and Agentspeak(L) Agents in Agent Oriented Software Engineering (AD, FS, AK, AKG), pp. 420–425.
ICEISICEIS-ISAS-2006-ShishkovQ #modelling #process #refinement
Refinement of SDBC Business Process Models Using ISDL (BS, DACQ), pp. 61–69.
ICEISICEIS-ISAS-2006-ZdravkovicH #flexibility #process
Flexible Realization of Business Processes Using Existing Services (JZ, MH), pp. 165–172.
ICEISICEIS-J-2006-PourrazV #approach #architecture #evolution
Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
ICEISICEIS-SAIC-2006-KoutsomitropoulosMKP #information management #logic
OWL-Based Knowledge Discovery Using Description Logics Reasoners (DAK, DPM, ANK, TSP), pp. 43–50.
ICEISICEIS-SAIC-2006-MartinelliSS
E-Procurement Adoption among Italian Firms by Using Domain Names (MM, IS, MS), pp. 124–131.
ICEISICEIS-SAIC-2006-SchwindG #combinator #grid #resource management
Using Shadow Prices for Resource Allocation in a Combinatorial Grid with Proxy-Bidding Agents (MS, OG), pp. 11–18.
CIKMCIKM-2006-BoydellS #community #personalisation #web
Capturing community search expertise for personalized web search using snippet-indexes (OB, BS), pp. 277–286.
CIKMCIKM-2006-ChirkovaS #optimisation #query
Query optimization using restructured views (RC, FS), pp. 642–651.
CIKMCIKM-2006-HoseLS #distributed #summary
Processing relaxed skylines in PDMS using distributed data summaries (KH, CL, KUS), pp. 425–434.
CIKMCIKM-2006-LiC #detection #topic
Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
CIKMCIKM-2006-MarsoloPR #query
Structure-based querying of proteins using wavelets (KM, SP, KR), pp. 24–33.
CIKMCIKM-2006-Melucci #ranking
Ranking in context using vector spaces (MM), pp. 866–867.
CIKMCIKM-2006-QamraTC #clustering #mining
Mining blog stories using community-based and temporal clustering (AQ, BLT, EYC), pp. 58–67.
CIKMCIKM-2006-RanganathanL #database #information retrieval #query #relational #semantics
Information retrieval from relational databases using semantic queries (AR, ZL), pp. 820–821.
CIKMCIKM-2006-YangJZNX #clustering #documentation #ranking #validation
Document re-ranking using cluster validation and label propagation (LY, DHJ, GZ, NY, GX), pp. 690–697.
CIKMCIKM-2006-ZhuangC #query #ranking
Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
CIKMCIKM-2006-ZieglerSL #automation #proximity #semantics #taxonomy
Automatic computation of semantic proximity using taxonomic knowledge (CNZ, KS, GL), pp. 465–474.
ECIRECIR-2006-ChenOT #image #memory management
Browsing Personal Images Using Episodic Memory (Time + Location) (CC, MPO, JT), pp. 362–372.
ECIRECIR-2006-KarbasiB #documentation #effectiveness #normalisation #scalability
Document Length Normalization Using Effective Level of Term Frequency in Large Collections (SK, MB), pp. 72–83.
ECIRECIR-2006-RodeH #query
Using Query Profiles for Clarification (HR, DH), pp. 205–216.
ECIRECIR-2006-WanY #documentation #similarity
Using Proportional Transportation Distances for Measuring Document Similarity (XW, JY), pp. 25–36.
ECIRECIR-2006-WenRB #behaviour #online #topic
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
ECIRECIR-2006-YamoutOT #feedback
Relevance Feedback Using Weight Propagation (FY, MPO, JT), pp. 575–578.
ECIRECIR-2006-ZhouZH #approach #concept #information retrieval #modelling
Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
ICMLICML-2006-AbbeelQN #learning #modelling
Using inaccurate models in reinforcement learning (PA, MQ, AYN), pp. 1–8.
ICMLICML-2006-BezakovaKS #graph
Graph model selection using maximum likelihood (IB, AK, RS), pp. 105–112.
ICMLICML-2006-BowlingMJNW #learning #policy #predict
Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICMLICML-2006-DeCoste #collaboration #matrix #predict
Collaborative prediction using ensembles of Maximum Margin Matrix Factorizations (DD), pp. 249–256.
ICMLICML-2006-LeeGW #classification
Using query-specific variance estimates to combine Bayesian classifiers (CHL, RG, SW), pp. 529–536.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICMLICML-2006-RainaNK #learning
Constructing informative priors using transfer learning (RR, AYN, DK), pp. 713–720.
ICMLICML-2006-SilvaBBE #detection
Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
ICMLICML-2006-TeoV #array #kernel #performance #string
Fast and space efficient string kernels using suffix arrays (CHT, SVNV), pp. 929–936.
ICMLICML-2006-XiKSWR #classification #performance #reduction
Fast time series classification using numerosity reduction (XX, EJK, CRS, LW, CAR), pp. 1033–1040.
ICPRICPR-v1-2006-AhmadL #image #multi #recognition #sequence
HMM-based Human Action Recognition Using Multiview Image Sequences (MA, SWL), pp. 263–266.
ICPRICPR-v1-2006-ArandjelovicC #classification #set
Face Set Classification using Maximally Probable Mutual Modes (OA, RC), pp. 511–514.
ICPRICPR-v1-2006-AsharafM #clustering #scalability
Scalable non-linear Support Vector Machine using hierarchical clustering (SA, MNM), pp. 908–911.
ICPRICPR-v1-2006-BabaMA #geometry
A Unified Camera Calibration Using Geometry and Blur of Feature Points (MB, MM, NA), pp. 816–819.
ICPRICPR-v1-2006-BartelsWM #generative
DTM Generation from LIDAR Data using Skewness Balancing (MB, HW, DCM), pp. 566–569.
ICPRICPR-v1-2006-Bayro-CorrochanoM #algebra #fuzzy #geometry #logic
Object Manipulation using Fuzzy Logic and Geometric Algebra (EBC, RMC), pp. 1120–1123.
ICPRICPR-v1-2006-BenjellounTM #detection
Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPRICPR-v1-2006-Bernier #3d #realtime
Real-Time 3D Articulated Pose Tracking using Particle Filters Interacting through Belief Propagation (OB), pp. 90–93.
ICPRICPR-v1-2006-BerrettiBP #3d #clustering
Partitioning of 3D Meshes using Reeb Gra (SB, ADB, PP), pp. 19–22.
ICPRICPR-v1-2006-BhattacharyaRD #clustering #fuzzy #image #representation #retrieval #semantics
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 929–935.
ICPRICPR-v1-2006-BuenaposadaM #animation #independence #performance
Performance driven facial animation using illumination independent appearance-based tracking (JMB, EM), pp. 303–306.
ICPRICPR-v1-2006-CaoXF #constant #self
Self-Calibration Using Constant Camera Motion (XC, JX, HF), pp. 595–598.
ICPRICPR-v1-2006-ChangCYY #estimation #interactive #realtime
An Intelligent Bulletin Board System with Real-time Vision-based Interaction Using Head Pose Estimation (CYC, PCC, YSY, JFY), pp. 1140–1143.
ICPRICPR-v1-2006-ChaoTTJ #detection #fault
Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
ICPRICPR-v1-2006-ChenCLT #algorithm #automation #graph #image #segmentation
Automatic Segmentation of Lung Fields from Radiographic Images of SARS Patients Using a New Graph Cuts Algorithm (SC, LC, JL, XT), pp. 271–274.
ICPRICPR-v1-2006-ChenHHH #segmentation
Segmentation of Human Body Parts Using Deformable Triangulation (CCC, JWH, YTH, CYH), pp. 355–358.
ICPRICPR-v1-2006-ConduracheA #2d #classification #image #linear #segmentation
Vessel Segmentation in 2D-Projection Images Using a Supervised Linear Hysteresis Classifier (AC, TA), pp. 343–346.
ICPRICPR-v1-2006-DongWH #gesture #segmentation #sequence #similarity #video
Gesture Segmentation from a Video Sequence Using Greedy Similarity Measure (QD, YW, ZH), pp. 331–334.
ICPRICPR-v1-2006-DoYC #detection #estimation
Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPRICPR-v1-2006-DuCXL #interactive #network #process
Recognizing Interaction Activities using Dynamic Bayesian Network (YD, FC, WX, YL), pp. 618–621.
ICPRICPR-v1-2006-FaggianPC #recognition #segmentation #video
Face Recognition From Video using Active Appearance Model Segmentation (NF, APP, TJC), pp. 287–290.
ICPRICPR-v1-2006-FrippWCO #3d #automation #modelling #segmentation
Automatic Segmentation of the Knee Bones using 3D Active Shape Models (JF, SKW, SC, SO), pp. 167–170.
ICPRICPR-v1-2006-FuTC #orthogonal
Specular Free Spectral Imaging Using Orthogonal Subspace Projection (ZF, RTT, TC), pp. 812–815.
ICPRICPR-v1-2006-GaoWFZ #recognition
Face Recognition Using Most Discriminative Local and Global Features (YG, YW, XF, XZ), pp. 351–354.
ICPRICPR-v1-2006-ItoO #detection #invariant #recognition
Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
ICPRICPR-v1-2006-Katayama
Camera Calibration with a Transparent Calibration Tool Using Color Filters: Application to Stereo Camera Calibration for a Distant Object (YK), pp. 607–612.
ICPRICPR-v1-2006-KaufholdCHR #classification #recognition #segmentation
Recognition and Segmentation of Scene Content using Region-Based Classification (JPK, RC, AH, PR), pp. 755–760.
ICPRICPR-v1-2006-KawasakiFN #3d
3D acquisition system using uncalibrated line-laser projec (HK, RF, YN), pp. 1071–1075.
ICPRICPR-v1-2006-KimK #classification
Simultaneous Classification and VisualWord Selection using Entropy-based Minimum Description Length (SK, ISK), pp. 650–653.
ICPRICPR-v1-2006-KimK06a #parametricity
Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
ICPRICPR-v1-2006-KushalRFPH #locality #modelling #visual notation
Audio-Visual Speaker Localization Using Graphical Models (AK, MR, FFL, JP, TSH), pp. 291–294.
ICPRICPR-v1-2006-LaggerF #multi
Using Specularities to Recover Multiple Light Sources in the Presence of Texture (PL, PF), pp. 587–590.
ICPRICPR-v1-2006-Lhuillier #effectiveness #fault
Effective and Generic Structure from Motion using Angular Error (ML), pp. 67–70.
ICPRICPR-v1-2006-LiangA
Fingerprint Matching Using Minutia Polygons (XL, TA), pp. 1046–1049.
ICPRICPR-v1-2006-LiSH #image #recognition
Face Recognition using Patch-based Spin Images (YL, WAPS, ERH), pp. 408–411.
ICPRICPR-v1-2006-LiuLYAL #coordination
Object Tracking Using Globally Coordinated Nonlinear Manifolds (CBL, RSL, MHY, NA, SEL), pp. 844–847.
ICPRICPR-v1-2006-LladoBA #parametricity #re-engineering
Euclidean Reconstruction of Deformable Structure Using a Perspective Camera with Varying Intrinsic Parameters (XL, ADB, LdA), pp. 139–142.
ICPRICPR-v1-2006-Lopez-FrancoB #algebra #geometry #invariant #navigation
Omnidirectional Vision and Invariant Theory for Robot Navigation Using Conformal Geometric Algebra (CLF, EBC), pp. 570–573.
ICPRICPR-v1-2006-LublinermanOZC #linear #process #recognition #validation
Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
ICPRICPR-v1-2006-MarmoAC #classification #set
Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
ICPRICPR-v1-2006-MenezesLD #3d #data fusion #gesture
Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot (PM, FL, JD), pp. 464–467.
ICPRICPR-v1-2006-MiaoQS #composition #principle
Unsupervised Decomposition of Mixed Pixels Using the Maximum Entropy Principle (LM, HQ, HS), pp. 1067–1070.
ICPRICPR-v1-2006-OhayonR #3d #estimation #robust
Robust 3D Head Tracking Using Camera Pose Estimation (SO, ER), pp. 1063–1066.
ICPRICPR-v1-2006-PerrinDZ #2d #3d #assessment #parametricity #process
2D and 3D Vegetation Resource Parameters Assessment using Marked Point Processes (GP, XD, JZ), pp. 1–4.
ICPRICPR-v1-2006-PongC #3d #detection #modelling
Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
ICPRICPR-v1-2006-PradeepR
Improving Shape from Focus Using Defocus Information (KSP, ANR), pp. 731–734.
ICPRICPR-v1-2006-PrehnS #adaptation #algorithm #classification #clustering #incremental #robust
An Adaptive Classification Algorithm Using Robust Incremental Clustering (HP, GS), pp. 896–899.
ICPRICPR-v1-2006-PupilliC #3d #modelling #realtime
Real-Time Camera Tracking Using Known 3D Models and a Particle Filter (MP, AC), pp. 199–203.
ICPRICPR-v1-2006-QiuGDC #image #optimisation
Tone Mapping for HDR Image using Optimization A New Closed Form Solution (GQ, JG, JD, MC), pp. 996–999.
ICPRICPR-v1-2006-RavulapalliS #video
Association of Sound to Motion in Video using Perceptual Organization (SR, SS), pp. 1216–1219.
ICPRICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPRICPR-v1-2006-RiponTKI #algorithm #clustering #multi #search-based
Multi-Objective Evolutionary Clustering using Variable-Length Real Jumping Genes Genetic Algorithm (KSNR, CHT, SK, MKI), pp. 1200–1203.
ICPRICPR-v1-2006-SungLK #realtime #recognition
A Real-Time Facial Expression Recognition using the STAAM (JS, SL, DK), pp. 275–278.
ICPRICPR-v1-2006-TakeshimaIK #detection #self
Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
ICPRICPR-v1-2006-TakizawaY #3d #modelling #re-engineering
Surface Reconstruction from Stereovision Data Using a 3-D MRF of Discrete Object Models (HT, SY), pp. 27–30.
ICPRICPR-v1-2006-TanakaHOK
Use of Viewpoint Information for Example Selection in CBIR (KT, MH, NO, EK), p. 1054.
ICPRICPR-v1-2006-TongWZJ #multi
Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
ICPRICPR-v1-2006-TrujilloO #detection #evolution #how
Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
ICPRICPR-v1-2006-WangB #3d #automation #estimation
Automatic Estimation of 3D Transformations using Skeletons for Object Alignment (TW, AB), pp. 51–54.
ICPRICPR-v1-2006-WeiB #data analysis #segmentation #statistics
Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
ICPRICPR-v1-2006-WijewickremaPE #image #re-engineering
Reconstruction of Spheres using Occluding Contours from Stereo Images (SNRW, APP, CEE), pp. 151–154.
ICPRICPR-v1-2006-WongC #classification #gesture #recognition
Continuous Gesture Recognition using a Sparse Bayesian Classifier (SFW, RC), pp. 1084–1087.
ICPRICPR-v1-2006-WuW #graph
Stereo Correspondence Using Stripe Adjacency Graph (CCW, ZFW), pp. 123–126.
ICPRICPR-v1-2006-XieL #animation #markov #modelling #speech
Speech Animation Using Coupled Hidden Markov Models (LX, ZQL), pp. 1128–1131.
ICPRICPR-v1-2006-YingZ06a #image
Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
ICPRICPR-v1-2006-YinWLB #3d #interactive
Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
ICPRICPR-v1-2006-YouZCWT #representation
Face Representation By Using Non-tensor Product Wavelets (XY, DZ, QC, PSPW, YYT), pp. 503–506.
ICPRICPR-v1-2006-ZengL #markov #random #segmentation
Stroke Segmentation of Chinese Characters Using Markov Random Fields (JZ, ZQL), pp. 868–871.
ICPRICPR-v1-2006-ZhangFX #detection #image #orthogonal
Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
ICPRICPR-v1-2006-ZhangSL #multi #segmentation
Motion Segmentation by Multibody Trifocal Tensor Using Line Correspondence (JZ, FS, YL), pp. 599–602.
ICPRICPR-v1-2006-ZhangT #documentation #image
RestoringWarped Document Images using Shape-from-Shading and Surface Interpolation (LZ, CLT), pp. 642–645.
ICPRICPR-v1-2006-ZhongMH
Camera Calibration Using Circle and Right Angles (HZ, FM, YSH), pp. 646–649.
ICPRICPR-v1-2006-ZhouW06a #verification
Face Verification Using GaborWavelets and AdaBoost (MZ, HW), pp. 404–407.
ICPRICPR-v2-2006-AhnKB #estimation #graph #robust #segmentation
Robust Object Segmentation Using Graph Cut with Object and Background Seed Estimation (JHA, KCK, HB), pp. 361–364.
ICPRICPR-v2-2006-AndelicSKK #hybrid #kernel #modelling #speech
A Hybrid HMM-Based Speech Recognizer Using Kernel-Based Discriminants as Acoustic Models (EA, MS, MK, SEK), pp. 1158–1161.
ICPRICPR-v2-2006-ArivazhaganGK #classification #statistics
Texture classification using Curvelet Statistical and Co-occurrence Features (SA, LG, TGSK), pp. 938–941.
ICPRICPR-v2-2006-BarakatB
Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
ICPRICPR-v2-2006-BhattacharyaRD06a #clustering #fuzzy #image #representation #retrieval #semantics
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 1162–1168.
ICPRICPR-v2-2006-BhuiyanN #classification #detection #image
Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
ICPRICPR-v2-2006-ChenB #classification #invariant
Invariant Texture Classification Using Ridgelet Packets (GC, PB), pp. 464–467.
ICPRICPR-v2-2006-ChenW #analysis #component #independence #segmentation
Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPRICPR-v2-2006-ChenY #modelling #video
Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
ICPRICPR-v2-2006-ChiangK #classification
Classification of Line and Character Pixels on Raster Maps Using Discrete Cosine Transformation Coefficients and Support Vector Machine (YYC, CAK), pp. 1034–1037.
ICPRICPR-v2-2006-ChiuL #invariant
Matching Interest Points Using Affine Invariant Concentric Circles (HPC, TLP), pp. 167–170.
ICPRICPR-v2-2006-ChoiLY #classification #feature model
Feature Extraction for Bank Note Classification Using Wavelet Transform (EC, JL, JY), pp. 934–937.
ICPRICPR-v2-2006-CourteilleDM #problem
A Global Solution to the SFS Problem Using B-spline Surface and Simulated Annealing (FC, JDD, GM), pp. 332–335.
ICPRICPR-v2-2006-DornaikaD #modelling #recognition
Facial Expression Recognition using Auto-regressive Models (FD, FD), pp. 520–523.
ICPRICPR-v2-2006-DowsonBK #image
Image template matching using Mutual Information and NP-Windows (NDHD, RB, TK), pp. 1186–1191.
ICPRICPR-v2-2006-Ekbal #classification #predict
Improvement of Prediction Accuracy Using Discretization and Voting Classifier (AE), pp. 695–698.
ICPRICPR-v2-2006-FangC #detection #robust #statistics
Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
ICPRICPR-v2-2006-FloreaBRB #image #representation
Using texture-based symbolic features for medical image representation (FF, EB, AR, AB), pp. 946–949.
ICPRICPR-v2-2006-FuLHB #image #retrieval
Content-based Image Retrieval Using Gabor-Zernike Features (XF, YL, RWH, SB), pp. 417–420.
ICPRICPR-v2-2006-GanD #relational
Differentiating Between Many Similar Features using Relational Information in Space and Scale (TSYG, TD), pp. 638–641.
ICPRICPR-v2-2006-GongY #estimation #orthogonal #programming
Disparity Flow Estimation using Orthogonal Reliability-based Dynamic Programming (MG, YHY), pp. 70–73.
ICPRICPR-v2-2006-GrimHSP #approach #modelling
A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
ICPRICPR-v2-2006-Guo #perspective
Plane Rectification Using a Circle and Points from a Single View (FG), pp. 9–12.
ICPRICPR-v2-2006-GuptaD #detection #multi
Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
ICPRICPR-v2-2006-HaindlM #approach #modelling #multi #segmentation
Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
ICPRICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPRICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation
New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
ICPRICPR-v2-2006-Kita #detection
Change detection using joint intensity histogram (YK), pp. 351–356.
ICPRICPR-v2-2006-KuijperOBG #2d #set #symmetry
Matching 2D Shapes using their Symmetry Sets (AK, OFO, PB, PJG), pp. 179–182.
ICPRICPR-v2-2006-LeS #detection #named #robust
Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
ICPRICPR-v2-2006-LiLL #framework #geometry #multi
A Geometric Active Contour Framework using Multi-Cue and Local Feature (ZL, QL, HL), pp. 113–116.
ICPRICPR-v2-2006-LiLWH #detection #framework #image #novel
A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
ICPRICPR-v2-2006-LimCG #identification
Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
ICPRICPR-v2-2006-Liu #classification #feature model #polynomial #recognition
High Accuracy Handwritten Chinese Character Recognition Using Quadratic Classifiers with Discriminative Feature Extraction (CLL), pp. 942–945.
ICPRICPR-v2-2006-LiuL #classification #image
Genus-Zero Shape Classification Using Spherical Normal Image (SL, JL), pp. 126–129.
ICPRICPR-v2-2006-LocteauRALHT #algorithm #approximate #multi #search-based
Approximation of Digital Curves using a Multi-Objective Genetic Algorithm (HL, RR, SA, YL, PH, ÉT), pp. 716–719.
ICPRICPR-v2-2006-Mainar-RuizP #approximate #multi #nearest neighbour
Approximate Nearest Neighbor Search using a Single Space-filling Curve and Multiple Representations of the Data Points (GMR, JCPC), pp. 502–505.
ICPRICPR-v2-2006-MakkapatiM #encoding
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPRICPR-v2-2006-Mancas-ThillouG
Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPRICPR-v2-2006-MaZSCG #estimation #robust
Robust Head Pose Estimation Using LGBP (BM, WZ, SS, XC, WG), pp. 512–515.
ICPRICPR-v2-2006-MeleMS #categorisation #image #probability
Image Categorization Using Local Probabilistic Descriptors (KM, JM, DS), pp. 336–340.
ICPRICPR-v2-2006-NedzvedAU #pseudo
Gray-scale thinning by using a pseudo-distance map (AN, SA, SU), pp. 239–242.
ICPRICPR-v2-2006-OsawaWWY #3d
Human Tracking by Particle Filtering Using Full 3D Model of Both Target and Environment (TO, XW, KW, TY), pp. 25–28.
ICPRICPR-v2-2006-PanBD #bottom-up #contest #functional #image #segmentation
Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional (YP, JDB, SMD), pp. 117–121.
ICPRICPR-v2-2006-PriorW #fault #parametricity #probability #random
Parameter Tuning using the Out-of-Bootstrap Generalisation Error Estimate for Stochastic Discrimination and Random Forests (MP, TW), pp. 498–501.
ICPRICPR-v2-2006-QiaoY06a #bidirectional #image #multi
Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search (YQ, MY), pp. 970–973.
ICPRICPR-v2-2006-RamalhoM #detection #image
Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
ICPRICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-ShiratoriGK #performance
An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPRICPR-v2-2006-SomolP #algorithm #feature model #keyword #multi #prototype
Multi-Subset Selection for Keyword Extraction and Other Prototype Search Tasks Using Feature Selection Algorithms (PS, PP), pp. 736–739.
ICPRICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPRICPR-v2-2006-Sun06a #multi #recognition
Multi-Linguistic Optical Font Recognition Using Stroke Templates (HMS), pp. 889–892.
ICPRICPR-v2-2006-SunV #detection #linear #multi #performance
Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPRICPR-v2-2006-TangT #analysis #linear #performance
Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPRICPR-v2-2006-TerradesTV #adaptation
Combination of shape descriptors using an adaptation of boosting (ORT, ST, EV), pp. 764–767.
ICPRICPR-v2-2006-UsoPSG #clustering #multi
Clustering-based multispectral band selection using mutual information (AMU, FP, JMS, PGS), pp. 760–763.
ICPRICPR-v2-2006-WangH #equation #probability
Probabilistic Relaxation using the Heat Equation (HW, ERH), pp. 666–669.
ICPRICPR-v2-2006-WangZC #locality #performance
Efficient Topological Localization Using Orientation Adjacency Coherence Histograms (JW, HZ, RC), pp. 271–274.
ICPRICPR-v2-2006-YangG #composition #invariant
Line-Based Affine Invariant Object Location Using Transformation Space Decomposition (RY, YG), pp. 646–649.
ICPRICPR-v2-2006-YangQHE #adaptation #geometry #image #recognition #retrieval
Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids (MY, GQ, JH, DE), pp. 958–961.
ICPRICPR-v2-2006-YangS #detection #random
Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
ICPRICPR-v2-2006-YaslanC #classification #feature model #music
Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ), pp. 573–576.
ICPRICPR-v2-2006-YokobayashiW #correlation #recognition
Binarization and Recognition of Degraded Characters Using a Maximum Separability Axis in Color Space and GAT Correlation (MY, TW), pp. 885–888.
ICPRICPR-v2-2006-YuC #image #segmentation #semantics
Joint Image Segmentation and Interpretation Using Iterative Semantic Region Growing on SAR Sea Ice Imagery (QY, DAC), pp. 223–226.
ICPRICPR-v2-2006-ZhangJHW #detection
Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
ICPRICPR-v2-2006-Zheng #recognition
Machine Printed Arabic Character Recognition Using S-GCM (LZ), pp. 893–896.
ICPRICPR-v2-2006-ZhouBS #image
Extracting Lines in Noisy Image Using Directional Information (JZ, WFB, GASA), pp. 215–218.
ICPRICPR-v3-2006-AbateNRS #3d #fourier #recognition
3D Face Recognition using Normal Sphere and General Fourier Descriptor (AFA, MN, DR, GS), pp. 1183–1186.
ICPRICPR-v3-2006-AbdallahHB #composition #image #performance #robust
A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
ICPRICPR-v3-2006-AgrawalK #locality #realtime
Real-time Localization in Outdoor Environments using Stereo Vision and Inexpensive GPS (MA, KK), pp. 1063–1068.
ICPRICPR-v3-2006-AlleneP #image #optimisation
Image Renaissance Using Discrete Optimization (CA, NP), pp. 631–634.
ICPRICPR-v3-2006-ArreolaFB #classification #linear #performance
Fast Support Vector Machine Classification using linear SVMs (KZA, JF, HB), pp. 366–369.
ICPRICPR-v3-2006-AsanoTTTANTHM
Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology (AA, TT, AT, CMA, TN, KT, TH, MM), pp. 988–991.
ICPRICPR-v3-2006-AssabieB #recognition
Ethiopic Character Recognition Using Direction Field Tensor (YA, JB), pp. 284–287.
ICPRICPR-v3-2006-BarbuRLAHT #algorithm #classification #graph #recognition #search-based
Graph Classification Using Genetic Algorithm and Graph Probing Application to Symbol Recognition (EB, RR, HL, SA, PH, ÉT), pp. 296–299.
ICPRICPR-v3-2006-BeleznaiFB #multi
Multiple Object Tracking Using Local PCA (CB, BF, HB), pp. 79–82.
ICPRICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes
A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
ICPRICPR-v3-2006-BianchiniMS #locality #network #recursion
Object Localization Using Input/Output Recursive Neural Networks (MB, MM, LS), pp. 95–98.
ICPRICPR-v3-2006-BouchaffraT #markov #recognition
Protein Fold Recognition using a Structural Hidden Markov Model (DB, JT), pp. 186–189.
ICPRICPR-v3-2006-CaronV #evaluation #image #modelling #quality
Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
ICPRICPR-v3-2006-ChairunnandaGC #distance #edit distance #sequence
Enhancing Edit Distance on Real Sequences Filters using Histogram Distance on Fixed Reference Ordering (PC, VG, LC), pp. 582–585.
ICPRICPR-v3-2006-ChoiAB #segmentation
Face Alignment Using Segmentation and a Combined AAM in a PTZ Camera (KC, JHA, HB), pp. 1191–1194.
ICPRICPR-v3-2006-EmmsHW #graph #quantum
Graph Matching using Interference of Coined Quantum Walks (DE, ERH, RCW), pp. 133–136.
ICPRICPR-v3-2006-ErikssonA #image
Bijective Image Registration using Thin-Plate Splines. (APE, ), pp. 798–801.
ICPRICPR-v3-2006-GuoL #image #multi
Multi-modality Image Registration Using Mutual Information Based on Gradient Vector Flow (YG, CCL), pp. 697–700.
ICPRICPR-v3-2006-GutmanWLCT #analysis
Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPRICPR-v3-2006-HuangL #image
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPRICPR-v3-2006-KananFE #locality #performance #recognition
An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPRICPR-v3-2006-KlausSK #adaptation #difference #self
Segment-Based Stereo Matching Using Belief Propagation and a Self-Adapting Dissimilarity Measure (AK, MS, KFK), pp. 15–18.
ICPRICPR-v3-2006-KohmuraW #algorithm #search-based
Determining Optimal Filters for Binarization of Degraded Characters in Color Using Genetic Algorithms (HK, TW), pp. 661–664.
ICPRICPR-v3-2006-KyweFM #algorithm #image #realtime #scheduling
Scheduling of Image Processing Using Anytime Algorithm for Real-time System (WWK, DF, KM), pp. 1095–1098.
ICPRICPR-v3-2006-LakamperL #3d
Using Extended EM to Segment Planar Structures in 3D (RL, LJL), pp. 1077–1082.
ICPRICPR-v3-2006-LamL #identification
Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
ICPRICPR-v3-2006-LeeE06a
Simultaneous Inference of View and Body Pose using Torus Manifolds (CSL, AME), pp. 489–494.
ICPRICPR-v3-2006-LeoputraTL #distributed
Non-overlapping Distributed Tracking using Particle Filter (WSL, TT, FLL), pp. 181–185.
ICPRICPR-v3-2006-LernerV #classification #fuzzy #image #search-based
Image Classification for Genetic Diagnosis using Fuzzy ARTMAP (BL, BV), pp. 362–365.
ICPRICPR-v3-2006-LiC #classification #nearest neighbour #probability
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), pp. 1220–1223.
ICPRICPR-v3-2006-LiPKZ #multimodal
Multimodal Registration using the Discrete Wavelet Frame Transform (SL, JP, JTK, JZ), pp. 877–880.
ICPRICPR-v3-2006-MakkapatiM06a
Vector Quantization Using Reflections of Triangular Subcodevectors (VM, PRM), pp. 701–704.
ICPRICPR-v3-2006-NgOFGN #automation #image #information management #segmentation
Automatic Segmentation of Muscles of Mastication from Magnetic Resonance Images Using Prior Knowledge (HPN, SHO, KWCF, PSG, WLN), pp. 968–971.
ICPRICPR-v3-2006-NguyenSQN #fuzzy #predict
Traffic Prediction Using Ying-Yang Fuzzy Cerebellar Model Articulation Controller (MNN, DS, CQ, GSN), pp. 258–261.
ICPRICPR-v3-2006-NieuwenhuisY #image #knowledge base #network
Knowledge Based Image Enhancement Using Neural Networks (CN, MY), pp. 814–817.
ICPRICPR-v3-2006-PalenichkaZ #image #network
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), pp. 1216–1219.
ICPRICPR-v3-2006-ParkJKKH #multi #named #visual notation
ViSE: Visual Search Engine Using Multiple Networked Cameras (UP, AKJ, IK, KK, NH), pp. 1204–1207.
ICPRICPR-v3-2006-ParkLL #3d
Superimposing 3D Virtual Objects using Markerless Tracking (SCP, SWL, SWL), pp. 897–900.
ICPRICPR-v3-2006-PetterssonKB #automation #segmentation
Automatic Hip Bone Segmentation Using Non-Rigid Registration (JP, HK, MB), pp. 946–949.
ICPRICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability
Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
ICPRICPR-v3-2006-QiuH #graph
Graph Matching using Commute Time Spanning Trees (HQ, ERH), pp. 1224–1227.
ICPRICPR-v3-2006-QiuXT #clustering #feedback #kernel #performance
Efficient Relevance Feedback Using Semi-supervised Kernel-specified K-means Clustering (BQ, CX, QT), pp. 316–319.
ICPRICPR-v3-2006-RendekW #consistency #set
Extraction of Consistent Subsets of Descriptors using Choquet Integral (JR, LW), pp. 208–211.
ICPRICPR-v3-2006-SakaiA #detection #metric
Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
ICPRICPR-v3-2006-ScheundersB #component #image #multi
Wavelet denoising of multicomponent images, using a Gaussian Scale Mixture model (PS, SDB), pp. 754–757.
ICPRICPR-v3-2006-SchlapbachB #identification #modelling
Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
ICPRICPR-v3-2006-ShinozakiUGR #image
Correction of intensity of a color image using a range intensity image (MS, KU, GG, MR), pp. 774–777.
ICPRICPR-v3-2006-SmithKHI #recognition
Face Recognition Using Angular LDA and SVM Ensembles (RSS, JK, MH, JI), pp. 1008–1012.
ICPRICPR-v3-2006-TianK06a #algorithm #distance #performance
An Efficient Algorithm for Point Matching Using Hilbert Scanning Distance (LT, SiK), pp. 873–876.
ICPRICPR-v3-2006-Wang06a #analysis
Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPRICPR-v3-2006-WangGZLZ #identification
Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
ICPRICPR-v3-2006-WangWKH #probability #video
Tracking a Variable Number of Human Groups in Video Using Probability Hypothesis Density (YDW, JKW, AAK, WH), pp. 1127–1130.
ICPRICPR-v3-2006-WongWC #classification #robust
Robust Appearance-based Tracking using a sparse Bayesian classifier (SFW, KYKW, RC), pp. 47–50.
ICPRICPR-v3-2006-XueD #2d #3d #locality #multi
3D+2D Face Localization Using Boosting in Multi-Modal Feature Space (FX, XD), pp. 499–502.
ICPRICPR-v3-2006-XueLF #image
Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator (FX, QSL, WF), pp. 766–769.
ICPRICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel
Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPRICPR-v3-2006-YamazoeUA #constraints #geometry #multi #optimisation
Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints (HY, AU, SA), pp. 960–963.
ICPRICPR-v3-2006-YangL06a #3d #image #learning #sequence
Reconstructing 3D Human Body Pose from Stereo Image Sequences Using Hierarchical Human Body Model Learning (HDY, SWL), pp. 1004–1007.
ICPRICPR-v3-2006-YuL #distance #recognition
Shape Recognition using Curve Segment Hausdorff Distance (XY, MKHL), pp. 441–444.
ICPRICPR-v3-2006-YunBK #dependence #realtime #recognition #relational #visual notation
Real-time Object Recognition using Relational Dependency based on Graphical Model (WHY, SYB, DK), pp. 28–32.
ICPRICPR-v3-2006-ZhangY #image #multi
Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPRICPR-v3-2006-ZouariHL #comparison
Experimental Comparison of Combination Rules using Simulated Data (HZ, LH, YL), pp. 152–155.
ICPRICPR-v4-2006-AndersenJM #estimation
Estimation of Dynamic Light Changes in Outdoor Scenes Without the use of Calibration Objects (MSA, TJ, CBM), pp. 91–94.
ICPRICPR-v4-2006-ChenLL #video
Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
ICPRICPR-v4-2006-ChikkerurPJRB #locality #representation
Fingerprint Representation Using Localized Texture Features (SC, SP, AJ, NKR, RMB), pp. 521–524.
ICPRICPR-v4-2006-Choi #cumulative #recognition #robust #speech
A Noise Robust Front-end for Speech Recognition Using Hough Transform and Cumulative Distribution Mapping (EHCC), pp. 286–289.
ICPRICPR-v4-2006-CuiZZS #multi #people #robust
Robust Tracking of Multiple People in Crowds Using Laser Range Scanners (JC, HZ, HZ, RS), pp. 857–860.
ICPRICPR-v4-2006-DhandraHHM #analysis #image #segmentation
Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPRICPR-v4-2006-FengC #invariant
Fingerprint Indexing Using Ridge Invariants (JF, AC), pp. 433–436.
ICPRICPR-v4-2006-FusseneggerOP #locality #segmentation
Object localization/segmentation using generic shape priors (MF, AO, AP), pp. 41–44.
ICPRICPR-v4-2006-Garcia-PerezMBB #image #retrieval
Object-Based Image Retrieval Using Active Nets (DGP, AMG, SB, ADB), pp. 750–753.
ICPRICPR-v4-2006-HafezJ #estimation #visual notation
Target Model Estimation using Particle Filters for Visual Servoing (AHAH, CVJ), pp. 651–654.
ICPRICPR-v4-2006-HeYTWX #image #matrix #novel #retrieval #symmetry
Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices (ZH, XY, YYT, PSPW, YX), pp. 161–164.
ICPRICPR-v4-2006-JainCD
Pores and Ridges: Fingerprint Matching Using Level 3 Features (AKJ, YC, MD), pp. 477–480.
ICPRICPR-v4-2006-KimPL #3d
Tracking 3D Human Body using Particle Filter in Moving Monocular Camera (SK, CBP, SWL), pp. 805–808.
ICPRICPR-v4-2006-KropotovPVV #kernel #on the #principle
On Kernel Selection in Relevance Vector Machines Using Stability Principle (DK, NP, OV, DV), pp. 233–236.
ICPRICPR-v4-2006-KryszczukD #detection
Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
ICPRICPR-v4-2006-KwonYKL #clustering
Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPRICPR-v4-2006-KyweYM #lens
Contact Lens Extraction by Using Thermo-Vision (WWK, MY, KM), pp. 570–573.
ICPRICPR-v4-2006-LaurendeauB #distance
Shape-Based Contour Interpolation and Extrapolation Using Distance Mapping (DL, OB), pp. 659–662.
ICPRICPR-v4-2006-LiC06a #classification #nearest neighbour #probability
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), p. 954.
ICPRICPR-v4-2006-LienY #performance #predict
A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
ICPRICPR-v4-2006-LiL06a #identification
Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
ICPRICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPRICPR-v4-2006-LuC06a #3d #analysis #metric
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MacenkoCM #detection #segmentation
Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
ICPRICPR-v4-2006-MellakhPD
Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics (MAM, DPD, BD), pp. 574–577.
ICPRICPR-v4-2006-MoncrieffVW #modelling
Unifying Background Models over Complex Audio using Entropy (SM, SV, GAWW), pp. 249–253.
ICPRICPR-v4-2006-NagaharaMIYS #generative #video
High-resolution Video Generation Using Morphing (HN, TM, YI, MY, TS), pp. 338–341.
ICPRICPR-v4-2006-NagarC #design #fuzzy #symmetry
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
ICPRICPR-v4-2006-NiuG #network
Recovering Non-overlapping Network Topology Using Far-field Vehicle Tracking Data (CN, EG), pp. 944–949.
ICPRICPR-v4-2006-NosratighodsAE #novel #set #verification
Speaker Verification Using A Novel Set of Dynamic Features (MN, EA, JE), pp. 266–269.
ICPRICPR-v4-2006-Onoguchi #correlation #detection
Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
ICPRICPR-v4-2006-PalenichkaZ06a #image #network
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), p. 953.
ICPRICPR-v4-2006-QiuH06a #graph
Graph Matching using Commute Time Spanning Tr (HQ, ERH), p. 955.
ICPRICPR-v4-2006-QuanZ
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
ICPRICPR-v4-2006-ReisertB #3d #data-driven #database #integration #invariant
Invariant Features for 3D-Data based on Group Integration using Directional Information and Spherical Harmonic Expansion (MR, HB), pp. 206–209.
ICPRICPR-v4-2006-Rivera-RoveloB #algebra #framework #geometry #realtime
Non-Rigid Alignment and Real-Time Tracking Using the Geometric Algebra Framework (JRR, EBC), pp. 675–678.
ICPRICPR-v4-2006-ShaZT #set
Minutiae-based Fingerprint Matching Using Subset Combination (LS, FZ, XT), pp. 566–569.
ICPRICPR-v4-2006-ShibuyaU #image #mobile #self #standard
Self-Localization of a Mobile Robot Using Compressed Image Data of Average and Standard Deviation (NS, KU), pp. 614–617.
ICPRICPR-v4-2006-SmithH
Estimating Cast Shadows using SFS and Class-based Surface Completion (WAPS, ERH), pp. 86–90.
ICPRICPR-v4-2006-SvenssonGFSOS #composition #framework #fuzzy #image
Using a fuzzy framework for delineation and decomposition of Immunoglobulin G in cryo electron tomographic images (SS, MG, DF, US, LGO, SS), pp. 687–690.
ICPRICPR-v4-2006-TodorovicA #3d #classification #segmentation
3D Texture Classification Using the Belief Net of a Segmentation Tree (ST, NA), pp. 33–36.
ICPRICPR-v4-2006-UranishiNYIMC #metric
Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror (YU, MN, YY, MI, YM, KC), pp. 866–869.
ICPRICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime
Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
ICPRICPR-v4-2006-WangAC #identification #multi #recognition
Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
ICPRICPR-v4-2006-WangC #detection #video
Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
ICPRICPR-v4-2006-WangK #approach #automation #estimation
Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
ICPRICPR-v4-2006-WangWLJK #analysis #classification #component #independence
Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPRICPR-v4-2006-WangXC #2d #automation #classification #pseudo #video
Automatic Sports Video Genre Classification using Pseudo-2D-HMM (JW, CX, EC), pp. 778–781.
ICPRICPR-v4-2006-WuQ #geometry #identification
A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPRICPR-v4-2006-YamaguchiKN #detection #estimation
Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
ICPRICPR-v4-2006-YangG06a #multi #verification
Multi-SNR GMMs-Based Noise-Robust Speaker Verification Using 1/fa Noises (LY, WG), pp. 241–244.
ICPRICPR-v4-2006-YaoLYZL06a #algorithm #recognition
Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
ICPRICPR-v4-2006-YiA
An Omnidirectional Stereo Vision System Using a Single Camera (SY, NA), pp. 861–865.
ICPRICPR-v4-2006-YuanMZL #matrix #recognition
Ear Recognition using Improved Non-Negative Matrix Factorization (LY, ZM, YZ, KL), pp. 501–504.
ICPRICPR-v4-2006-YuC06a #segmentation #statistics
Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
ICPRICPR-v4-2006-ZaimQSIT #clustering #image #robust #segmentation
A Robust and Accurate Segmentation of Iris Images Using Optimal Partitioning (AZ, MKQ, JS, JI, RT), pp. 578–581.
ICPRICPR-v4-2006-ZhaoCLP #recognition
Gait Recognition Using Fractal Scale and Wavelet Moments (GZ, LC, HL, MP), pp. 453–456.
ICPRICPR-v4-2006-ZhaoG06a #automation #energy #estimation #modelling
Automated Face Pose Estimation Using Elastic Energy Models (SZ, YG), pp. 618–621.
ICPRICPR-v4-2006-ZhaoSC #clustering
Fingerprint Registration Using Minutia Clusters and Centroid Structure 1 (DZ, FS, AC), pp. 413–416.
ICPRICPR-v4-2006-ZhengLZ #encryption #generative
Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDDKDD-2006-BarbaraDR #detection #statistics #testing
Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
KDDKDD-2006-KeCN #approach #correlation #mining
Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
KDDKDD-2006-LiuZBX #analysis
Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDDKDD-2006-LoekitoB #diagrams #mining #performance
Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
KDDKDD-2006-ManiyarN #algorithm #data mining #mining #visual notation #visualisation
Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
KDDKDD-2006-NathBM #approach #classification #clustering #scalability
Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
KDDKDD-2006-RattiganMJ #approximate #network #performance
Using structure indices for efficient approximation of network properties (MJR, MEM, DJ), pp. 357–366.
KDDKDD-2006-WangP #modelling #probability
Summarizing itemset patterns using probabilistic models (CW, SP), pp. 730–735.
KDDKDD-2006-XuWPWSF
Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
KRKR-2006-BonetG #heuristic
Heuristics for Planning with Penalties and Rewards using Compiled Knowledge (BB, HG), pp. 452–462.
KRKR-2006-ClassenL #knowledge-based #source code
Foundations for Knowledge-Based Programs using ES (JC, GL), pp. 318–328.
SEKESEKE-2006-HuangC #probability #rule-based #similarity
Using Conditional Probability to Measure Rule-based Knowledge Similarity (CJH, MYC), pp. 41–44.
SEKESEKE-2006-HungL #data mining #mining #performance
Using Data Mining Schemes for Improvement on System Performance in Virtual Environments (SSH, DSML), pp. 61–66.
SEKESEKE-2006-KuleszaLAG #aspect-oriented #generative
Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
SEKESEKE-2006-MazzoleniVFMB #image #towards
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
SEKESEKE-2006-Merz #approach #java #security
Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
SEKESEKE-2006-MichielsRBBD #modelling #testing
Program Testing Using High-Level Property-Driven Models (IM, CDR, JB, EGB, TD), pp. 489–494.
SEKESEKE-2006-PilskalnsA #design #ocl #security #testing #uml
Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
SEKESEKE-2006-SornilS #detection
Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
SEKESEKE-2006-SteinmacherLH #analysis #process #simulation #workflow
Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKESEKE-2006-YuLSH #modelling
Modeling Complex Software Systems Using an Aspect Extension of Object-Z (HY, DL, ZS, XH), pp. 11–16.
SIGIRSIGIR-2006-AlonsoG #clustering
Clustering of search results using temporal attributes (OA, MG), pp. 597–598.
SIGIRSIGIR-2006-AnhM #evaluation #query
Pruned query evaluation using pre-computed impacts (VNA, AM), pp. 372–379.
SIGIRSIGIR-2006-AslamPY #evaluation #statistics
A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
SIGIRSIGIR-2006-DiazM #corpus #estimation #modelling #scalability
Improving the estimation of relevance models using large external corpora (FD, DM), pp. 154–161.
SIGIRSIGIR-2006-FernandezVC #rank
Using historical data to enhance rank aggregation (MF, DV, PC), pp. 643–644.
SIGIRSIGIR-2006-LiR #named #web
DeWild: a tool for searching the web using wild cards (HL, DR), p. 731.
SIGIRSIGIR-2006-MacdonaldO06a #framework #platform
Searching for expertise using the terrier platform (CM, IO), p. 732.
SIGIRSIGIR-2006-MayfieldM #documentation #retrieval
Improving QA retrieval using document priors (JM, PM), pp. 677–678.
SIGIRSIGIR-2006-MinkovCN #ambiguity #email #graph
Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SIGIRSIGIR-2006-ParikhK #feedback #named #query
Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIRSIGIR-2006-RadlinskiD #personalisation #web
Improving personalized web search using result diversification (FR, STD), pp. 691–692.
SIGIRSIGIR-2006-RamirezWV #xml
Using small XML elements to support relevance (GR, TW, APdV), pp. 693–694.
SIGIRSIGIR-2006-TreeratpitukC #automation #case study #clustering #statistics
An experimental study on automatically labeling hierarchical clusters using statistical features (PT, JPC), pp. 707–708.
SIGIRSIGIR-2006-VaradarajanHL #web
Searching the web using composed pages (RV, VH, TL), pp. 713–714.
SIGIRSIGIR-2006-VassilvitskiiB #distance #feedback #web
Using web-graph distance for relevance feedback in web search (SV, EB), pp. 147–153.
ECMFAECMDA-FA-2006-BraheO #modelling #process #uml
Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles (SB, ), pp. 241–255.
ECMFAECMDA-FA-2006-EngelPK #model merging
Using a Model Merging Language for Reconciling Model Versions (KDE, RFP, DSK), pp. 143–157.
MODELSMoDELS-2006-DuarteKU #information management
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
SPLCSPL-BOOK-2006-Engelsma #diagrams #evolution #incremental #integration #multi #product line
Incremental Systems Integration within Multidisciplinary Product Line Engineering Using Configuration Item Evolution Diagrams (EE), pp. 523–555.
SPLCSPLC-2006-HallsteinsenSSF #adaptation #product line
Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
SPLCSPLC-2006-SpinczykP #feature model #modelling
Using Feature Models for Product Derivation (OS, HP), p. 225.
SPLCSPLC-2006-TraskRPB #component #modelling #product line
Using Model-Driven Engineering to Complement Software Product Line Engineering in Developing Software Defined Radio Components and Applications (BT, AR, DP, VB), pp. 192–202.
MODELSMoDELS-2006-DuarteKU #information management
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
OOPSLAOOPSLA-2006-CavazosO #compilation
Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
OOPSLAOOPSLA-2006-FairbanksGS #design #framework
Design fragments make using frameworks easier (GF, DG, WLS), pp. 75–88.
OOPSLAOOPSLA-2006-Hutchins #prototype
Eliminating distinctions of class: using prototypes to model virtual classes (DH), pp. 1–20.
OOPSLAOOPSLA-2006-KitMB #analysis #requirements #semantics
Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
QAPLQAPL-2005-BinderH06 #bytecode #cpu #metric
Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
AdaEuropeAdaEurope-2006-Maurer #ada
Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
LOPSTRLOPSTR-2006-ArroyoRSV #graph #partial evaluation
Improving Offline Narrowing-Driven Partial Evaluation Using Size-Change Graphs (GA, JGR, JS, GV), pp. 60–76.
LOPSTRLOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code
Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
LOPSTRLOPSTR-2006-Payet #detection #term rewriting
Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
PADLPADL-2006-GouraudG #functional #java #testing #virtual machine
Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine (SDG, AG), pp. 1–15.
PADLPADL-2006-NavasBH #analysis #clique #performance #top-down
Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
PADLPADL-2006-QuesadaRDC #problem
Using Dominators for Solving Constrained Path Problems (LQ, PVR, YD, RC), pp. 73–87.
PEPMPEPM-2006-Edwards #fixpoint #simulation
Using program specialization to speed SystemC fixed-point simulation (SAE), pp. 21–28.
PLDIPLDI-2006-LauAHC #online #optimisation #performance
Online performance auditing: using hot optimizations without getting burned (JL, MA, MH, BC), pp. 239–251.
QAPLQAPL-2006-BinderH06a #bytecode #profiling #virtual machine
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
SASSAS-2006-Arnold #analysis #logic #refinement
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SASSAS-2006-ChangHN #analysis #low level
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
AdaSIGAda-2006-Carlisle #ada #automation #generative #object-oriented #parsing
Automatic OO parser generation using visitors for Ada 2005 (MCC), pp. 3–8.
AdaSIGAda-2006-Klein #ada
Use of Ada in Lockheed Martin for air traffic management and beyond (JK), p. 1.
AdaSIGAda-2006-Taft #ada #exclamation #why
Why you should be using Ada 2005 now! (STT), p. 75.
RERE-2006-AlencarMACSM #aspect-oriented
Using Aspects to Simplify iModels (FMRA, AMDM, JA, JC, CTLLS, JM), pp. 328–329.
RERE-2006-Gonzalez-BaixauliLL #elicitation #interactive #non-functional #requirements
Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory (BGB, JCSdPL, MAL), pp. 340–341.
RERE-2006-GordijnPW #comprehension #modelling
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
RERE-2006-KaiyaS #elicitation #ontology #requirements
Using Domain Ontology as Domain Knowledge for Requirements Elicitation (HK, MS), pp. 186–195.
ASEASE-2006-Antkiewicz #modelling
Round-Trip Engineering of Framework-Based Software using Framework-Specific Modeling Languages (MA), pp. 323–326.
ASEASE-2006-FalbRA #automation #design #interactive #specification #synthesis #user interface
Using communicative acts in interaction design specifications for automated synthesis of user interfaces (JF, TR, EA), pp. 261–264.
ASEASE-2006-HassanZ #certification #predict
Using Decision Trees to Predict the Certification Result of a Build (AEH, KZ), pp. 189–198.
ASEASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
ASEASE-2006-LiuYR #library #model checking
Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
ASEASE-2006-RobbyDH #framework #model checking
Domain-specific Model Checking Using The Bogor Framework (R, MBD, JH), pp. 369–370.
FSEFSE-2006-GirouxR #detection #testing
Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
FSEFSE-2006-HalfondOM #evaluation #injection #sql
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
FSEFSE-2006-KerstenM
Using task context to improve programmer productivity (MK, GCM), pp. 1–11.
FSEFSE-2006-StorzerRRT #classification #java #source code
Finding failure-inducing changes in java programs using change classification (MS, BGR, XR, FT), pp. 57–68.
ICSEICSE-2006-AbeMKKH #classification #estimation
Estimation of project success using Bayesian classifier (SA, OM, TK, NK, MH), pp. 600–603.
ICSEICSE-2006-Dolins #process
Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-HalfondO #injection #sql
Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
ICSEICSE-2006-Holmes #reuse #scalability
Unanticipated reuse of large-scale software features (RH), pp. 961–964.
ICSEICSE-2006-JiamthubthugsinS #development
Portfolio management of software development projects using COCOMO II (WJ, DS), pp. 889–892.
ICSEICSE-2006-KrugerMM #architecture #aspect-oriented #performance
Efficient exploration of service-oriented architectures using aspects (IHK, RM, MM), pp. 62–71.
ICSEICSE-2006-NakamichiSSM #behaviour #detection #usability #web
Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
ICSEICSE-2006-RundleD #agile
Using return on investment to compare agile and plan-driven practices in undergraduate group projects (PJR, RGD), pp. 649–654.
ICSEICSE-2006-Sindhgatta #information retrieval #source code
Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSEICSE-2006-YangBC #estimation #integration #off the shelf
Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
ICSEICSE-2006-ZouZ #automation #e-commerce #evolution #framework #generative #process
A framework for automatic generation of evolvable e-commerce workplaces using business processes (YZ, QZ), pp. 799–802.
SACSAC-2006-AlmeidaG #algorithm #database #incremental #nearest neighbour #network
Using Dijkstra’s algorithm to incrementally find the k-Nearest Neighbors in spatial network databases (VTdA, RHG), pp. 58–62.
SACSAC-2006-AltLM #linear #on the #probability #problem
On the numerical solution to linear problems using stochastic arithmetic (RA, JLL, SM), pp. 1635–1639.
SACSAC-2006-Bellur #consistency #object-oriented #on the #workflow
On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
SACSAC-2006-BernsteinK #ontology #retrieval #similarity #towards
Imprecise RDQL: towards generic retrieval in ontologies using similarity joins (AB, CK), pp. 1684–1689.
SACSAC-2006-BonnetEV #ad hoc #mobile #network
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts (FB, PDE, EV), pp. 670–674.
SACSAC-2006-ChongL
An extension of dead end elimination for protein side-chain conformation using merge-decoupling (KFC, HWL), pp. 195–199.
SACSAC-2006-CraigL #classification #learning
Protein classification using transductive learning on phylogenetic profiles (RAC, LL), pp. 161–166.
SACSAC-2006-CutelloNP #algorithm #hybrid #optimisation
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
SACSAC-2006-DinechinLM #verification
Assisted verification of elementary functions using Gappa (FdD, CQL, GM), pp. 1318–1322.
SACSAC-2006-GuoW #data mining #mining #on the #privacy
On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SACSAC-2006-JacquenetL #documentation
Using the structure of documents to improve the discovery of unexpected information (FJ, CL), pp. 1036–1042.
SACSAC-2006-KacemKJD #architecture #uml
Describing dynamic software architectures using an extended UML model (MHK, AHK, MJ, KD), pp. 1245–1249.
SACSAC-2006-KatsimpaPSTT #modelling #reverse engineering
Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
SACSAC-2006-KramerMH #case study #elicitation #mobile
Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-SauvagnatHB #question #retrieval #what #xml
XML retrieval: what about using contextual relevance? (KS, LH, MB), pp. 1114–1115.
SACSAC-2006-SharminAA #adaptation #middleware #resource management #self #usability
Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) (MS, SA, SIA), pp. 1013–1017.
SACSAC-2006-SinghXMH #geometry #linear #locality #problem #programming
Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
SACSAC-2006-SoaresB #kernel #parametricity
Selecting parameters of SVM using meta-learning and kernel matrix-based meta-features (CS, PB), pp. 564–568.
SACSAC-2006-SzlavikTL #interactive #retrieval #summary #xml
Investigating the use of summarisation for interactive XML retrieval (ZS, AT, ML), pp. 1068–1072.
SACSAC-2006-WuBGRM #compilation #development
Separation of concerns in compiler development using aspect-orientation (XW, BRB, JGG, SR, MM), pp. 1585–1590.
SACSAC-2006-YuJV #kernel #privacy
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
SACSAC-2006-ZhouAL #database #image #interactive #retrieval #similarity
Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph (XMZ, CHA, TWL), pp. 46–51.
GPCEGPCE-2006-BromanNF #constraints #equation
Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #identification #named
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASPLOSASPLOS-2006-KgilDSBDMRF #3d #energy #multi #named #performance
PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessor (TK, SD, AGS, NLB, RGD, TNM, SKR, KF), pp. 117–128.
ASPLOSASPLOS-2006-NarayanasamyPC #dependence #memory management
Recording shared memory dependencies using strata (SN, CP, BC), pp. 229–240.
ASPLOSASPLOS-2006-TarditiPO #named #parallel
Accelerator: using data parallelism to program GPUs for general-purpose uses (DT, SP, JO), pp. 325–335.
CASECASE-2006-ChaoSZJM #analysis #automation #information management
Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASECASE-2006-GuoLX #modelling #on the #petri net
On Modeling a Soccer Robot System Using Petri Nets (BG, ZL, SX), pp. 460–465.
CASECASE-2006-HuSHL #modelling #probability
Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASECASE-2006-KwokHLF #image #multi #optimisation
Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
CASECASE-2006-KwokLWY #framework #platform #replication
Evolutionary Replication of Calligraphic Characters By A Robot Drawing Platform Using Experimentally Acquired Brush Footprint (KWK, KWL, SMW, YY), pp. 466–471.
CASECASE-2006-LamiriX
Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
CASECASE-2006-LiLWC #automation #component #equation #generative #graph #linear
Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASECASE-2006-LopatinY #algorithm #approximate #polynomial
Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator’s control in an unknown environment (PKL, ASY), pp. 206–211.
CASECASE-2006-RaghavanV #optimisation #parallel #product line #scheduling
Scheduling Parallel Batch Processors with Incompatible Job Families Using Ant Colony Optimization (NRSR, MV), pp. 507–512.
CASECASE-2006-SchiffG #automation #network
Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
CASECASE-2006-ShaoHM #algorithm #analysis #component #linear #multi
Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASECASE-2006-XuLT #visual notation
Visual Positioning Using Four-Point Planar Patterns (DX, YL, MT), pp. 600–605.
CASECASE-2006-XuWZZ #algorithm #automation #detection
An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
CASECASE-2006-YoungSB #implementation #interactive
Implementing Bubblegrams: The Use of Haar-Like Features for Human-Robot Interaction (JEY, ES, JEB), pp. 298–303.
CCCC-2006-DiasR #assembly #declarative
Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
CCCC-2006-Necula #dependent type #low level #type system
Using Dependent Types to Port Type Systems to Low-Level Languages (GCN), p. 1.
CGOCGO-2006-AgakovBCFFOTTW #machine learning #optimisation
Using Machine Learning to Focus Iterative Optimization (FVA, EVB, JC, BF, GF, MFPO, JT, MT, CKIW), pp. 295–305.
CGOCGO-2006-NandaLLC #named #runtime
BIRD: Binary Interpretation using Runtime Disassembly (SN, WL, LCL, TcC), pp. 358–370.
DACDAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis
Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
DACDAC-2006-BrahmbhattZWQ #adaptation #algorithm #encoding #hybrid #power management
Low-power bus encoding using an adaptive hybrid algorithm (ARB, JZ, QW, QQ), pp. 987–990.
DACDAC-2006-BrierM #architecture #c #c++ #modelling #verification
Use of C/C++ models for architecture exploration and verification of DSPs (DB, RSM), pp. 79–84.
DACDAC-2006-ChaoCWCW #analysis
Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DACDAC-2006-FatemiNP #analysis #logic #statistics
Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DACDAC-2006-GoffioulVDDC #consistency #design #object-oriented
Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
DACDAC-2006-GopalakrishnanLP #architecture #metric
Architecture-aware FPGA placement using metric embedding (PG, XL, LTP), pp. 460–465.
DACDAC-2006-GuthausSB #programming
Clock buffer and wire sizing using sequential programming (MRG, DS, RBB), pp. 1041–1046.
DACDAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics
Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DACDAC-2006-TanimotoYNH #realtime
A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DACDAC-2006-WangGDK #design #optimisation
Design space exploration using time and resource duality with the ant colony optimization (GW, WG, BD, RK), pp. 451–454.
DACDAC-2006-YuhYC
Placement of digital microfluidic biochips using the t-tree formulation (PHY, CLY, YWC), pp. 931–934.
DACDAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry
Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
DACDAC-2006-ZhaoPSYF #algorithm #linear #megamodelling #performance #programming
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming (MZ, RP, SS, SY, YF), pp. 217–222.
DATEDATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis
Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATEDATE-2006-AhmedM #design #performance #uml
Faster exploration of high level design alternatives using UML for better partitions (WA, DM), pp. 579–580.
DATEDATE-2006-Al-JunaidK #modelling
HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope (HAJ, TJK), pp. 644–645.
DATEDATE-2006-AmelifardFP
Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
DATEDATE-2006-BanerjeeRMB #fine-grained #logic #power management #synthesis
Low power synthesis of dynamic logic circuits using fine-grained clock gating (NB, KR, HMM, SB), pp. 862–867.
DATEDATE-2006-Beutel #framework #platform #prototype
Fast-prototyping using the BTnode platform (JB), pp. 977–982.
DATEDATE-2006-BudnikR #distributed #network #novel #power management
Minimizing ohmic loss and supply voltage variation using a novel distributed power supply network (MMB, KR), pp. 1116–1121.
DATEDATE-2006-ChaoWCWC
Coverage loss by using space compactors in presence of unknown values (MCTC, SW, STC, WW, KTC), pp. 1053–1054.
DATEDATE-2006-CherrounDF #constraints #equation #scheduling
Scheduling under resource constraints using dis-equations (HC, AD, PF), pp. 1067–1072.
DATEDATE-2006-DuttA #incremental #locality #performance
Efficient timing-driven incremental routing for VLSI circuits using DFS and localized slack-satisfaction computations (SD, HA), pp. 768–773.
DATEDATE-2006-FrehseKR #abstraction #refinement #verification
Verifying analog oscillator circuits using forward/backward abstraction refinement (GF, BHK, RAR), pp. 257–262.
DATEDATE-2006-GandhiM #energy #multi
Exploiting data-dependent slack using dynamic multi-VDD to minimize energy consumption in datapath circuits (KRG, NRM), pp. 1001–1006.
DATEDATE-2006-GuillotBRCGA #diagrams #performance
Efficient factorization of DSP transforms using taylor expansion diagrams (JG, EB, QR, MJC, DGP, SA), pp. 754–755.
DATEDATE-2006-HabibiTSLM #performance #verification
Efficient assertion based verification using TLM (AH, ST, AS, DL, OAM), pp. 106–111.
DATEDATE-2006-HeniaE #multi
Improved offset-analysis using multiple timing-references (RH, RE), pp. 450–455.
DATEDATE-2006-HosangadiFK #optimisation
Optimizing high speed arithmetic circuits using three-term extraction (AH, FF, RK), pp. 1294–1299.
DATEDATE-2006-KanajanZPS #architecture #distributed #integration #trade-off
Exploring trade-off’s between centralized versus decentralized automotive architectures using a virtual integration environment (SK, HZ, CP, ALSV), pp. 548–553.
DATEDATE-2006-KarlssonEP #design #petri net #representation #verification
Formal verification of systemc designs using a petri-net based representation (DK, PE, ZP), pp. 1228–1233.
DATEDATE-2006-KavousianosKN #multi #performance #testing
Efficient test-data compression for IP cores using multilevel Huffman coding (XK, EK, DN), pp. 1033–1038.
DATEDATE-2006-KempfKWALM #estimation #fine-grained #framework #performance
A SW performance estimation framework for early system-level-design using fine-grained instrumentation (TK, KK, SW, GA, RL, HM), pp. 468–473.
DATEDATE-2006-KimHG #execution #parallel
Parallel co-simulation using virtual synchronization with redundant host execution (DK, SH, RG), pp. 1151–1156.
DATEDATE-2006-KooM #functional #generative #pipes and filters #testing #validation
Functional test generation using property decompositions for validation of pipelined processors (HMK, PM), pp. 1240–1245.
DATEDATE-2006-KrautzP0TWV #detection #fault #formal method #logic
Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
DATEDATE-2006-LeeKKCY #adaptation
A network-on-chip with 3Gbps/wire serialized on-chip interconnect using adaptive control schemes (SJL, KK, HK, NC, HJY), pp. 79–80.
DATEDATE-2006-LiuI #optimisation #scheduling
Test scheduling with thermal optimization for network-on-chip systems using variable-rate on-chip clocking (CL, VI), pp. 652–657.
DATEDATE-2006-MartinezLC #order #reduction
Nonlinear model order reduction using remainder functions (JAM, SPL, DMC), pp. 281–282.
DATEDATE-2006-Maurer #simulation #symmetry
Using conjugate symmetries to enhance gate-level simulations (PMM), pp. 638–643.
DATEDATE-2006-MeiR #analysis #performance
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread
An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
DATEDATE-2006-SethuramanV #architecture #automation #generative #multi #named
optiMap: a tool for automated generation of noc architectures using multi-port routers for FPGAs (BS, RV), pp. 947–952.
DATEDATE-2006-SridharanC #modelling #multi
Modeling multiple input switching of CMOS gates in DSM technology using HDMR (JS, TC), pp. 626–631.
DATEDATE-2006-TanjiWKA #analysis #scalability
Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
DATEDATE-2006-TsengLC #2d
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap (TWT, JFL, DMC), pp. 53–58.
DATEDATE-2006-WangBC #performance
Efficient unknown blocking using LFSR reseeding (SW, KJB, STC), pp. 1051–1052.
DATEDATE-2006-WangCG #fault #formal method #probability #testing
Test set enrichment using a probabilistic fault model and the theory of output deviations (ZW, KC, MG), pp. 1270–1275.
DATEDATE-2006-WildHO #architecture #evaluation #performance #simulation #transaction
Performance evaluation for system-on-chip architectures using trace-based transaction level simulation (TW, AH, RO), pp. 248–253.
DATEDATE-2006-ZengI #concurrent #testing
Concurrent core test for SOC using shared test set and scan chain disable (GZ, HI), pp. 1045–1050.
DATEDATE-2006-ZhouSMS #analysis #composition #grid #power management #scalability
Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
HPCAHPCA-2006-JosephVT #analysis #linear #modelling #performance
Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
HPDCHPDC-2006-AliL #performance
Improving the Performance of Remote I/O Using Asynchronous Primitives (NA, ML), pp. 218–228.
HPDCHPDC-2006-ChungH #automation #case study #performance #scalability #source code
A Case Study Using Automatic Performance Tuning for Large-Scale Scientific Programs (IHC, JKH), pp. 45–56.
HPDCHPDC-2006-SandholmLOO #grid #performance #predict #resource management
Market-Based Resource Allocation using Price Prediction in a High Performance Computing Grid for Scientific Applications (TS, KL, JAO, JO), pp. 132–143.
HPDCHPDC-2006-YehAWCT #performance
Using File Grouping to Improve the Disk Performance (TY, JA, JSW, IFC, KHT), pp. 365–366.
LCTESLCTES-2006-KreahlingHWT #comparison #cost analysis #specification
Reducing the cost of conditional transfers of control by using comparison specifications (WCK, SH, DBW, GST), pp. 64–71.
OSDIOSDI-2006-ZhouCABEHNB #named
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques (FZ, JC, ZRA, IB, RE, MH, GCN, EAB), pp. 45–60.
PDPPDP-2006-AlbrechtDPSS #design #parallel #thread
Impact of Coprocessors on a Multithreaded Processor Design Using Prioritized Threads (CA, ACD, FP, TS, HS), pp. 109–115.
PDPPDP-2006-BorkowskiKT #grid #parallel #source code
Application Control on Grid Using Predicates Defined on Global States of Co-Operating Parallel Programs (JB, DK, MT), pp. 248–255.
PDPPDP-2006-GarciaHL #communication #petri net #protocol #validation
Validation of a Protocol for Communication Management in CSCW Systems Using a Coloured-Petri Net Modelization (ÉG, JH, JCL), pp. 272–275.
PDPPDP-2006-Hosseini-MoghaddamN
A New Processor Allocation Strategy Using ESS (Expanding Square Strategy) (SMHM, MN), pp. 137–140.
PDPPDP-2006-RibasG #branch #predict
Evaluating Branch Prediction Using Two-Level Perceptron Table (LVMR, RAdLG), pp. 145–148.
FASEFASE-2006-KobW #calculus #debugging
Fundamentals of Debugging Using a Resolution Calculus (DK, FW), pp. 278–292.
FASEFASE-2006-RobbyDK #design #flexibility #metric #predict
Using Design Metrics for Predicting System Flexibility (R, SAD, VAK), pp. 184–198.
STOCSTOC-2006-Clarkson
Building triangulations using epsilon-nets (KLC), pp. 326–335.
STOCSTOC-2006-KhandekarRV #clustering #graph
Graph partitioning using single commodity flows (RK, SR, UVV), pp. 385–390.
TACASTACAS-2006-ThomasCP #performance #reachability
Efficient Guided Symbolic Reachability Using Reachability Expressions (DT, SC, PKP), pp. 120–134.
AMOSTA-MOST-J-2005-Robinson-MallettLMG06 #identification #model checking #verification
Extended state identification and verification using a model checker (CRM, PL, TM, UG), pp. 981–992.
CAVCAV-2006-JainIGSW #abstraction #invariant #refinement
Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop (HJ, FI, AG, IS, CW), pp. 137–151.
CAVCAV-2006-KahlonGS #concurrent #model checking #on the fly #partial order #source code #transaction
Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions (VK, AG, NS), pp. 286–299.
FATESFATES-RV-2006-ElmasQT #named
Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets (TE, SQ, ST), pp. 193–208.
FATESFATES-RV-2006-ErnitsKRV #generative #model checking #modelling #refinement #testing
Generating Tests from EFSM Models Using Guided Model Checking and Iterated Search Refinement (JPE, AK, KR, JV), pp. 85–99.
ICLPICLP-2006-BaralDT #composition #metaprogramming #set
Macros, Macro Calls and Use of Ensembles in Modular Answer Set Programming (CB, JD, HT), pp. 376–390.
ICLPICLP-2006-Brain #declarative #problem #semantics #set
Declarative Problem Solving Using Answer Set Semantics (MB), pp. 459–460.
ICLPICLP-2006-CabalarOPV #equilibrium #logic #semantics
Analysing and Extending Well-Founded and Partial Stable Semantics Using Partial Equilibrium Logic (PC, SPO, DP, AV), pp. 346–360.
ICLPICLP-2006-MeraLPCH #estimation #execution #logic programming #profiling #static analysis
Using Combined Static Analysis and Profiling for Logic Program Execution Time Estimation (EM, PLG, GP, MC, MVH), pp. 431–432.
ICLPICLP-2006-OrtizV #combinator #logic #natural language
Natural Language Processing Using Lexical and Logical Combinators (JFO, JV), pp. 444–446.
ICLPICLP-2006-QuintanoR #database #framework #logic programming #natural language #query
Using a Logic Programming Framework to Control Database Query Dialogues in Natural Language (LQ, IPR), pp. 406–420.
ICLPICLP-2006-RamakrishnanRW #deduction #logic programming #spreadsheet
Deductive Spreadsheets Using Tabled Logic Programming (CRR, IVR, DSW), pp. 391–405.
ICLPICLP-2006-SchwaigerF #assessment #automation #compilation #programming #testing
Using Answer Set Programming for the Automatic Compilation of Assessment Tests (PS, BF), pp. 300–314.
IJCARIJCAR-2006-SutcliffeSCG #finite
Using the TPTP Language for Writing Derivations and Finite Interpretations (GS, SS, KC, AVG), pp. 67–81.
ISSTAISSTA-2006-KiviluomaKM #architecture #aspect-oriented #behaviour #monitoring #runtime
Run-time monitoring of architecturally significant behaviors using behavioral profiles and aspects (KK, JK, TM), pp. 181–190.
ISSTAISSTA-2006-SiegelMAC #execution #model checking #parallel #source code #symbolic computation #verification
Using model checking with symbolic execution to verify parallel numerical programs (SFS, AM, GSA, LAC), pp. 157–168.
ISSTAISSTA-2006-VisserPP #generative #java
Test input generation for java containers using state matching (WV, CSP, RP), pp. 37–48.
LICSLICS-2006-BarthM #linear #logic
Managing Digital Rights using Linear Logic (AB, JCM), pp. 127–136.
LICSLICS-2006-Bryant #infinity #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 3–4.
LICSLICS-2006-CoquandS #normalisation #proving
A Proof of Strong Normalisation using Domain Theory (TC, AS), pp. 307–316.
MBTMBT-2006-KervinenMK #architecture #testing
Controlling Testing Using Three-Tier Model Architecture (AK, MM, MK), pp. 53–66.
ICSTSAT-2006-JainBC #satisfiability
Satisfiability Checking of Non-clausal Formulas Using General Matings (HJ, CB, EMC), pp. 75–89.
ICSTSAT-2006-NishimuraRS #satisfiability
Solving #SAT Using Vertex Covers (NN, PR, SS), pp. 396–409.
ICTSSTestCom-2006-BerradaCFS #bound #realtime #testing
Test Case Minimization for Real-Time Systems Using Timed Bound Traces (IB, RC, PF, AS), pp. 289–305.
ICTSSTestCom-2006-KeumKKBC #finite #generative #state machine #testing #web #web service
Generating Test Cases for Web Services Using Extended Finite State Machine (CK, SK, IYK, JB, YIC), pp. 103–117.
ICTSSTestCom-2006-Nyberg #testing
Use of TTCN-3 for Software Module Testing (AJN), pp. 161–176.
ICTSSTestCom-2006-WangWYST #communication #realtime #testing
Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems (ZW, JW, XY, XS, BT), pp. 324–340.
ICTSSTestCom-2006-YalcinY #sequence
Using Distinguishing and UIO Sequences Together in a Checking Sequence (MCY, HY), pp. 259–273.
CBSECBSE-2005-CooperCLSSW #component #empirical #fuzzy #logic #specification
An Empirical Study on the Specification and Selection of Components Using Fuzzy Logic (KMLC, JWC, RL, GS, RS, WEW), pp. 155–170.
CBSECBSE-2005-LiuG #performance #predict #protocol
Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
WICSAWICSA-2005-SmedaOK #uml
Mapping ADLs into UML 2.0 Using a Meta ADL (AS, MO, TK), pp. 247–248.
WICSAWICSA-2005-TekinerdoganSA #analysis #architecture #reliability
Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
WICSAWICSA-2005-WoodsR #architecture
Using Architectural Perspectives (EW, NR), pp. 25–35.
WICSAWICSA-2005-ZhuLGB #benchmark #generative #metric
Customized Benchmark Generation Using MDA (LZ, YL, IG, NBB), pp. 35–44.
DocEngDocEng-2005-MacdonaldBB #component #encapsulation
Encapsulating and manipulating component object graphics (COGs) using SVG (AJM, DFB, SRB), pp. 61–63.
DocEngDocEng-2005-ThomasB #documentation #xml
Enhancing composite digital documents using XML-based standoff markup (PLT, DFB), pp. 177–186.
DRRDRR-2005-MaD #identification
Font identification using the grating cell texture operator (HM, DSD), pp. 148–156.
DRRDRR-2005-OertelOBB #documentation #recognition #validation #web
Using the web to validate document recognition results: experiments with business cards (CO, SO, AB, DB), pp. 17–27.
DRRDRR-2005-ShiG #documentation #image #normalisation #segmentation
Historical document image segmentation using background light intensity normalization (ZS, VG), pp. 167–174.
DRRDRR-2005-TaghvaCPN #markov #modelling
Address extraction using hidden Markov models (KT, JSC, RP, TAN), pp. 119–126.
TPDLECDL-2005-AlmpanidisKP #crawling #semantics
Focused Crawling Using Latent Semantic Indexing — An Application for Vertical Search Engines (GA, CK, IP), pp. 402–413.
TPDLECDL-2005-FulopKKM #metadata
Using a Metadata Schema Registry in the National Digital Data Archive of Hungary (CF, GK, LK, AM), pp. 314–322.
TPDLECDL-2005-GohSZWLTHC #learning #personalisation
Managing Geography Learning Objects Using Personalized Project Spaces in G-Portal (DHLG, AS, WZ, DW, EPL, YLT, JGH, CHC), pp. 336–343.
TPDLECDL-2005-PesenhoferBR #perspective
Supporting ECDL’05 Using TCeReview (AP, HB, AR), pp. 535–536.
TPDLECDL-2005-SunHW #comprehension #information management
Aiding Comprehension in Electronic Books Using Contextual Information (YS, DJH, SNKW), pp. 504–506.
TPDLECDL-2005-VakkariT #case study
The Influence of the Scatter of Literature on the Use of Electronic Resources Across Disciplines: A Case Study of FinELib (PV, ST), pp. 207–217.
TPDLECDL-2005-WeaverDTN #library
Using a Path-Based Thesaurus Model to Enhance a Domain-Specific Digital Library (MW, LMLD, TT, MLN), pp. 511–512.
HTHT-2005-BerlangaG #adaptation #design #learning #modelling #navigation #specification
Modelling adaptive navigation support techniques using the IMS learning design specification (AJB, FJG), pp. 148–150.
HTHT-2005-BhagwatP #file system #semantics
Searching a file system using inferred semantic links (DB, NP), pp. 85–87.
HTHT-2005-MantratzisOC #analysis #html #navigation
Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
ICDARICDAR-2005-AlonAS #online #prototype #recognition
Online and Offline Character Recognition Using Alignment to Prototypes (JA, VA, SS), pp. 839–845.
ICDARICDAR-2005-BaiH #case study #online #recognition
A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition (ZLB, QH), pp. 262–266.
ICDARICDAR-2005-BarbuHAT #clustering #documentation #image #representation
Clustering document images using a bag of symbols representation (EB, PH, SA, ÉT), pp. 1216–1220.
ICDARICDAR-2005-BeheraLI #documentation #geometry #identification
Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution (AB, DL, RI), pp. 468–472.
ICDARICDAR-2005-BhagvatiD #classification
Classification of Liquid and Viscous Inks using HSV Colour Space (CB, HD), pp. 660–664.
ICDARICDAR-2005-ChengB #heuristic #segmentation #word
The Neural-based Segmentation of Cursive Words using Enhanced Heuristics (CKC, MB), pp. 650–654.
ICDARICDAR-2005-ChenS #verification
Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
ICDARICDAR-2005-DrakeB #geometry
Distinguishing Mathematics Notation from English Text using Computational Geometry (DMD, HSB), pp. 1270–1274.
ICDARICDAR-2005-El-HajjLM #markov #modelling #recognition
Arabic Handwriting Recognition Using Baseline Dependant Features and Hidden Markov Modeling (REH, LLS, CM), pp. 893–897.
ICDARICDAR-2005-HadjarI #logic
Logical Labeling of Arabic Newspapers using Artificial Neural Nets (KH, RI), pp. 426–431.
ICDARICDAR-2005-HandleyNZ #comprehension #context-free grammar #documentation #probability
Document Understanding System Using Stochastic Context-Free Grammars (JCH, AMN, RZ), pp. 511–515.
ICDARICDAR-2005-HtweHLY #network #online
Transliteration of Online Handwritten Phonetic Pitman’s Shorthand with the Use of a Bayesian Network (SMH, CH, GL, MY), pp. 1090–1094.
ICDARICDAR-2005-KeyesSW #modelling #recognition #statistics #visual notation
Graphical Object Recognition using Statistical Language Models (LK, AO, ACW), pp. 1095–1099.
ICDARICDAR-2005-KimPK #image
Text Locating from Natural Scene Images Using Image Intensitie (JSK, SCP, SHK), pp. 655–659.
ICDARICDAR-2005-KumarKCJ #image
Locating Text in Images using Matched Wavelets (SK, NK, SC, SDJ), pp. 595–599.
ICDARICDAR-2005-LamH #data type #performance
A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access (YKL, QH), pp. 506–510.
ICDARICDAR-2005-LeeKO #documentation #image #retrieval
Hangul Document Image Retrieval System Using Rank-based Recognitio (DRL, WYK, ISO), pp. 615–619.
ICDARICDAR-2005-LiuCL #identification #image #machine learning
Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
ICDARICDAR-2005-LiuD #classification #multi #polynomial #recognition
Handwritten Character Recognition Using Gradient Feature and Quadratic Classifier with Multiple Discrimination Schemes (HL, XD), pp. 19–25.
ICDARICDAR-2005-LiuMK #classification #feature model #recognition #scalability #set
Building Compact Classifier for Large Character Set Recognition Using Discriminative Feature Extraction (CLL, RM, MK), pp. 846–850.
ICDARICDAR-2005-MouchereAR #adaptation #fuzzy #online #recognition
On-line Writer Adaptation for Handwriting Recognition using Fuzzy Inference Systems (HM, ÉA, NR), p. 1075.
ICDARICDAR-2005-MozaffariFZ #encoding #recognition #representation
Character Representation and Recognition Using Quadtree-based Fractal Encoding Scheme (SM, KF, MZ), pp. 819–823.
ICDARICDAR-2005-NelPH #markov #modelling #multi
Estimating the Pen Trajectories of Multi-Path Static Scripts Using Hidden Markov Models (EMN, JAdP, BMH), pp. 41–47.
ICDARICDAR-2005-NicolasKPH #documentation #markov #random #segmentation
Handwritten Document Segmentation Using Hidden Markov Random Fields (SN, YK, TP, LH), pp. 212–216.
ICDARICDAR-2005-OjimaKW #algorithm #search-based
Determining Optimal Filters for Binarization of Degraded Grayscale Characters Using Genetic Algorithms (YO, SK, TW), pp. 555–559.
ICDARICDAR-2005-PanSB #identification
Script Identification Using Steerable Gabor Filters (WP, CYS, TDB), pp. 883–887.
ICDARICDAR-2005-RussellHBHM #verification
Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
ICDARICDAR-2005-RusuG #algorithm #interactive #proving #recognition
A Human Interactive Proof Algorithm Using Handwriting Recognition (AIR, VG), pp. 967–971.
ICDARICDAR-2005-ShiSG #adaptation #documentation #image
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map (ZS, SS, VG), pp. 794–798.
ICDARICDAR-2005-ShivakumaraKVRN #documentation #estimation #image #word
A New Moments based Skew Estimation Technique using Pixels in the Word for Binary Document Images (PS, GHK, HSV, SR, MRRN), pp. 151–156.
ICDARICDAR-2005-SteinkrauSB #algorithm #machine learning
Using GPUs for Machine Learning Algorithms (DS, PYS, IB), pp. 1115–1119.
ICDARICDAR-2005-SunHKN #recognition
Camera based Degraded Text Recognition Using Grayscale Feature (JS, YH, YK, SN), pp. 182–186.
ICDARICDAR-2005-UlgesLB #documentation #estimation #image #robust
Document Image Dewarping using Robust Estimation of Curled Text Lines (AU, CHL, TMB), pp. 1001–1005.
ICDARICDAR-2005-WangC #classification
A Hierarchical Classifier Using New Support Vector Machine (YCFW, DC), pp. 851–855.
ICDARICDAR-2005-YinLH #documentation #image
Financial Document Image Coding with Regions of Interest Using JPEG2000 (XCY, CPL, ZH), pp. 96–100.
ICDARICDAR-2005-YokobayashiW #correlation #image #recognition #segmentation
Segmentation and Recognition of Characters in Scene Images Using Selective Binarization in Color Space and GAT Correlation (MY, TW), pp. 167–171.
ICDARICDAR-2005-YoonCCT #profiling
Writer Profiling Using Handwriting Copybook Styles (SY, SSC, SHC, CCT), p. 600.
ICDARICDAR-2005-YosefBKD #image
Extraction of Specified Objects from Binary Images Using Object Based Erosion Transform: Application to Hebrew Calligraphic Manuscripts (IBY, IB, KK, ID), pp. 878–882.
ICDARICDAR-2005-ZaidiRM #design #hardware #online #recognition
Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform (RZ, SR, MY), pp. 91–95.
ICDARICDAR-2005-ZhangBZ #fuzzy #logic
Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions (LZ, DB, RZ), pp. 972–976.
ICDARICDAR-2005-ZhouS #approach #fault #recognition
Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach (JZ, CYS), pp. 484–488.
JCDLJCDL-2005-BekaertLS05a #design #development #library #standard
Using standards in digital library design & development (JB, XL, HVdS), p. 423.
JCDLJCDL-2005-FoulonneauCHS #metadata
Using collection descriptions to enhance an aggregation of harvested item-level metadata (MF, TWC, TGH, SLS), pp. 32–41.
JCDLJCDL-2005-FuKM #automation #classification #framework #multi
Automated text classification using a multi-agent framework (YF, WK, JM), pp. 157–158.
JCDLJCDL-2005-HanZG #ambiguity #clustering
Name disambiguation in author citations using a K-way spectral clustering method (HH, HZ, CLG), pp. 334–343.
JCDLJCDL-2005-HuLCMZ #automation #documentation #machine learning
Automatic extraction of titles from general documents using machine learning (YH, HL, YC, DM, QZ), pp. 145–154.
JCDLJCDL-2005-OnLKM #ambiguity #case study #comparative #framework #problem #scalability
Comparative study of name disambiguation problem using a scalable blocking-based framework (BWO, DL, JK, PM), pp. 344–353.
JCDLJCDL-2005-ReckerDDHLMPP #development #education #library
You can lead a horse to water: teacher development and use of digital library resources (MR, JD, DD, SH, YL, XM, BP, JP), pp. 1–8.
JCDLJCDL-2005-RichardsonF #concept #library #resource management
Using concept maps in digital libraries as a cross-language resource discovery tool (RR, EAF), pp. 256–257.
SIGMODSIGMOD-2005-BoulosDMMRS #named
MYSTIQ: a system for finding more answers by using probabilities (JB, NND, BM, SM, CR, DS), pp. 891–893.
SIGMODSIGMOD-2005-ChenLL #on the #pattern matching #xml
On Boosting Holism in XML Twig Pattern Matching using Structural Indexing Techniques (TC, JL, TWL), pp. 455–466.
SIGMODSIGMOD-2005-GovindarajuRM #approximate #mining #performance
Fast and Approximate Stream Mining of Quantiles and Frequencies Using Graphics Processors (NKG, NR, DM), pp. 611–622.
VLDBVLDB-2005-AugstenBG #approximate
Approximate Matching of Hierarchical Data Using pq-Grams (NA, MHB, JG), pp. 301–312.
VLDBVLDB-2005-HuSCS #data type
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype (YH, SS, TC, JS), pp. 1140–1151.
VLDBVLDB-2005-MeierWAS #classification #fuzzy #query
Using a Fuzzy Classification Query Language for Customer Relationship Management (AM, NW, MA, MS), pp. 1089–1096.
VLDBVLDB-2005-MetwallyAA #detection #network #web
Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
VLDBVLDB-2005-SayyadianLDR
Tuning Schema Matching Software using Synthetic Scenarios (MS, YL, AD, AR), pp. 994–1005.
VLDBVLDB-2005-WangWLJLL #performance #query #xml
Efficient Processing of XML Path Queries Using the Disk-based F&B Index (WW, HW, HL, HJ, XL, JL), pp. 145–156.
VLDBVLDB-2005-XuO #query #xpath
Rewriting XPath Queries Using Materialized Views (WX, ZMÖ), pp. 121–132.
CSEETCSEET-2005-DutoitWPBR #education #re-engineering
Using Rationale for Software Engineering Education (AHD, TW, BP, LB, JR), pp. 129–136.
CSEETCSEET-2005-Liu #communication #issue tracking #learning #re-engineering #student #tool support
Using Issue Tracking Tools to Facilitate Student Learning of Communication Skills in Software Engineering Courses (CL), pp. 61–68.
CSEETCSEET-2005-PavlovY #education #object-oriented #uml
Using Pantomime in Teaching OOA&OOD with UML (VLP, AY), pp. 77–84.
CSEETCSEET-2005-WangS #analysis #architecture #student
Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
ITiCSEITiCSE-2005-BassL #education
Teaching to analyze solutions using FGA (IB, DL), p. 360.
ITiCSEITiCSE-2005-Guimaraes #database #dot-net #framework
Constructing database applications for PDA using the .NET framework (MG), p. 417.
ITiCSEITiCSE-2005-HoodH #concept #education #programming
Teaching programming and language concepts using LEGOs (CSH, DJH), pp. 19–23.
ITiCSEITiCSE-2005-MaiaMP #education #framework #operating system
A constructivist framework for operating systems education: a pedagogic proposal using the SOsim (LPM, FBM, ACPJ), pp. 218–222.
ITiCSEITiCSE-2005-MarquesAMC #programming #student
Using Octave to introduce programming to technical science students (NCM, FA, CM, JFC), pp. 198–202.
ITiCSEITiCSE-2005-MedeirosDGM #programming
Using a PC simulator to illustrate input-output programming techniques (PDM, VD, MCG, RFM), p. 388.
ITiCSEITiCSE-2005-MendesGEMBR #collaboration #simulation
Using simulation and collaboration in CS1 and CS2 (AJM, AJG, ME, MJM, CB, MAR), pp. 193–197.
ITiCSEITiCSE-2005-PaisB05a #education #programming #user interface
Use of flash movies for teaching GUI programming (RP, JPB), p. 390.
ITiCSEITiCSE-2005-PatersonHBM #data type #ide
Using the BlueJ IDE in a data structures course (JHP, JH, MB, AM), p. 349.
ITiCSEITiCSE-2005-Rosenthal #multi #recursion
Introducing recursion by using multimedia (TR), p. 374.
ITiCSEITiCSE-2005-TobinW #education #security
Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
ITiCSEITiCSE-2005-XinogalosS #concept #object-oriented #process #student
Using hands-on activities for motivating students with OOP concepts before they are asked to implement them (SX, MS), p. 380.
SIGITESIGITE-2005-Bailey #network
Malware resistant networking using system diversity (MGB), pp. 191–197.
SIGITESIGITE-2005-CampbellC #education
Using system administrator education in eeveloping an IT eegree in a computer science department (WC, RC), pp. 319–321.
SIGITESIGITE-2005-ChastineP #2d #array #education #realtime #video
Teaching 2D arrays using real-time video filters (JWC, JAP), pp. 133–137.
SIGITESIGITE-2005-GuimaraesV #development #modelling
Comparing software development models using CDM (LRG, PRSV), pp. 339–347.
SIGITESIGITE-2005-HiggsS #online #towards
Towards using online portfolios in computing courses (BH, MS), pp. 323–328.
SIGITESIGITE-2005-MarchantT #learning #student
Using pre-release software to SPUR student learning (AM, BT), pp. 143–148.
SIGITESIGITE-2005-Matthews #approach #education #network
Hands-on approach to teaching computer networking using packet traces (JNM), pp. 361–367.
SIGITESIGITE-2005-McMahon #education
Teaching information technology using the perry stages (REM), pp. 277–281.
CSMRCSMR-2005-BoronatCR #automation #logic #re-engineering
Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine (AB, JÁC, IR), pp. 228–231.
CSMRCSMR-2005-GreevyD #analysis #approach #correlation
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
ICSMEICSM-2005-BriandLL #aspectj #distributed
Tracing Distributed Systems Executions Using AspectJ (LCB, YL, JL), pp. 81–90.
ICSMEICSM-2005-HaoZZMS #case study #fault #locality #reduction #testing
Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study (DH, LZ, HZ, HM, JS), pp. 683–686.
ICSMEICSM-2005-KorelTH #modelling
Test Prioritization Using System Models (BK, LHT, MH), pp. 559–568.
ICSMEICSM-2005-Sorkowitz #maintenance #metric #testing
Using Metrics to Improve Maintenance Testing (AS), p. 725.
ICSMEICSM-2005-StorzerG #analysis #aspect-oriented #evolution
Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
ICSMEICSM-2005-SusaniD #contract #maintenance #specification
Cross-Organizational Service Maintenance Using Temporal Availability Specification and Contracts (OvS, PD), pp. 230–239.
ICSMEICSM-2005-ZhangZ #configuration management #evolution #maintenance #self
Using Self-Reconfigurable Workplaces to Automate the Maintenance of Evolving Business Applications (QZ, YZ), pp. 219–229.
ICSMEICSM-IT-2005-ShepherdRP #aspect-oriented #evolution
Using AOP to Ease Evolution (DS, TR, LLP), pp. 16–25.
IWPCIWPC-2005-EnglishBCL #c++ #empirical
An Empirical Study of the Use of Friends in C++ Software (ME, JB, TC, KL), pp. 329–332.
MSRMSR-2005-ConklinHC #analysis #collaboration #repository
Collaboration using OSSmole: a repository of FLOSS data and analyses (MC, JH, KC), pp. 76–80.
MSRMSR-2005-KimN #comprehension #evolution
Using a clone genealogy extractor for understanding and supporting evolution of code clones (MK, DN), pp. 1–5.
MSRMSR-2005-NeamtiuFH #abstract syntax tree #comprehension #evolution #source code #syntax
Understanding source code evolution using abstract syntax tree matching (IN, JSF, MWH), pp. 81–85.
MSRMSR-2005-OhiraOOM #collaboration #network #social
Accelerating cross-project knowledge collaboration using collaborative filtering and social networks (MO, NO, TO, KiM), pp. 71–75.
SCAMSCAM-2005-ZhangBCD #implementation #verification
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation (HZ, JSB, JRC, JD), pp. 87–96.
WCREWCRE-2005-WangCD #security
Enhancing Security Using Legality Assertions (LW, JRC, TRD), pp. 35–44.
CIAACIAA-2005-JurdzinskiO #automaton #strict
Restricting the Use of Auxiliary Symbols for Restarting Automata (TJ, FO), pp. 176–187.
CIAACIAA-2005-SubramanianS #automaton #documentation #finite #recursion #xml
Compressing XML Documents Using Recursive Finite State Automata (HS, PS), pp. 282–293.
FMFM-2005-DonaldsonM #automation #detection #model checking #symmetry
Automatic Symmetry Detection for Model Checking Using Computational Group Theory (AFD, AM), pp. 481–496.
FMFM-2005-Johnson #debugging #formal method
The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions (CWJ), pp. 9–25.
FMFM-2005-PierikCB
Controlling Object Allocation Using Creation Guards (CP, DC, FSdB), pp. 59–74.
IFMIFM-2005-BostromW #development #distributed #fault tolerance #grid
Development of Fault Tolerant Grid Applications Using Distributed B (PB, MAW), pp. 167–186.
IFMIFM-2005-LamP #consistency #diagrams #sequence chart #statechart #π-calculus
Consistency Checking of Sequence Diagrams and Statechart Diagrams Using the π-Calculus (VSWL, JAP), pp. 347–365.
SEFMSEFM-2005-BarthePS #analysis #logic #memory management #precise
Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
SEFMSEFM-2005-CeroneLC #analysis #formal method #human-computer #interactive #model checking
Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
SEFMSEFM-2005-SubramaniamS #protocol
Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
SEFMSEFM-2005-Trakhtenbrot #debugging #testing #verification
Use of Verification for Testing and Debugging of Complex Reactive Systems (MBT), pp. 13–22.
SEFMSEFM-2005-Trentelman #correctness #proving
Proving Correctness of JavaCard DL Taclets using Bali (KT), pp. 160–169.
TLCATLCA-2005-MatwinFHC #data mining #formal method #mining #privacy
Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
HaskellHaskell-2005-AbelBBHN #haskell #source code #type system #verification
Verifying haskell programs using constructive type theory (AA0, MB, AB, JH, UN), pp. 62–73.
ICFPICFP-2005-Nilsson #algebra #data type #functional #optimisation #programming
Dynamic optimization for functional reactive programming using generalized algebraic data types (HN), pp. 54–65.
IFLIFL-2005-ShafarenkoSHGT #case study #equation #experience #implementation #lessons learnt
Implementing a Numerical Solution of the KPI Equation Using Single Assignment C: Lessons and Experiences (AVS, SBS, SH, CG, KT), pp. 160–177.
AIIDEAIIDE-2005-SchaefferCCMORS #interactive
Interactive Story Writing Using ScriptEase (JS, MC, MC, MM, CO, TR, DS), pp. 163–164.
AIIDEAIIDE-2005-ShapiroAPNKT #artificial reality
The Trial The Trail, Act 3: A Virtual Reality Drama Using Intelligent Agents (SCS, JA, DEP, TDN, MK, OT), pp. 157–158.
CoGCIG-2005-BradleyH #adaptation #game studies #learning
Adapting Reinforcement Learning for Computer Games: Using Group Utility Functions (JB, GH).
CoGCIG-2005-ChisholmF #case study #game studies #machine learning
A Study of Machine Learning using the Game of Fox and Geese (KC, DF).
CoGCIG-2005-LeenF #game studies
Training an AI Player to play Pong Using the GTM (GL, CF).
CoGCIG-2005-PapacostantisEF #algorithm #game studies #optimisation #probability
Coevolving Probabilistic Game Playing Agents using Particle Swarm Optimization Algorithm (EP, APE, NF).
CoGCIG-2005-Steffens #modelling #similarity
Similarity-based Opponent Modelling using Imperfect Domain Theories (TS).
DiGRADiGRA-2005-KatchabawH #execution #game studies #quality
Bringing New HOPE to Networked Games: Using Optimistic Execution to Improve Quality of Service (MK, RH).
DiGRADiGRA-2005-MulliganDM #game studies #video
The use of Video Game Technology for Investigating Perceptual and Cognitive Awareness in Sports (DEM, MWD, JM).
DiGRADiGRA-2005-OwstonKHP #evaluation #game studies #simulation #usability
Evaluation of Web-based Games and Simulations Using the Virtual Usability Laboratory (RDO, AK, FH, KP).
DiGRADiGRA-2005-PeitzEB #game studies
Augmented Board Games - Using Electronics to Enhance Gameplay in Board Games (JP, DE, SB).
DiGRADiGRA-2005-SchaefferCSCMORGK #game studies #interactive
Interactive Story Writing in the Classroom: Using Computer Games (JS, MC, DS, MC, MM, CO, TR, SG, SK).
DiGRADiGRA-2005-Stevenson #game studies
Affective Gaming: Using pupil dilation to determine player arousal (CS).
DiGRADiGRA-2005-Weiler #game studies #music #visualisation
Computer Games to Visualize Music: Using a 270-year-old Tradition to Imagine Digital Possibilities (MW).
CHICHI-2005-Ahlstrom #modelling
Modeling and improving selection in cascading pull-down menus using Fitts’ law, the steering law and force fields (DA), pp. 61–70.
CHICHI-2005-CostanzaIA #interface #mobile #towards
Toward subtle intimate interfaces for mobile devices using an EMG controller (EC, SAI, RA), pp. 481–489.
CHICHI-2005-HoI #mobile
Using context-aware computing to reduce the perceived burden of interruptions from mobile devices (JH, SSI), pp. 909–918.
CHICHI-2005-Johnson #design #interactive #lessons learnt #simulation
Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuation simulations (CWJ), pp. 651–660.
CHICHI-2005-MarshallB
Saving and using encountered information: implications for electronic periodicals (CCM, SAB), pp. 111–120.
CHICHI-2005-SadasivanGGD #eye tracking
Use of eye movements as feedforward training for a synthetic aircraft inspection task (SS, JSG, AKG, ATD), pp. 141–149.
CHICHI-2005-YeeP #learning #named #online
StudioBRIDGE: using group, location, and event information to bridge online and offline encounters for co-located learning groups (SY, KSP), pp. 551–560.
SOFTVISSOFTVIS-2005-BaloianBL #algorithm #concept #visualisation
Algorithm visualization using concept keyboards (NAB, HB, WL), pp. 7–16.
SOFTVISSOFTVIS-2005-GhoniemCFJ #constraints #graph #programming #visualisation
Peeking in solver strategies using explanations visualization of dynamic graphs for constraint programming (MG, HC, JDF, NJ), pp. 27–36.
SOFTVISSOFTVIS-2005-JohannesSW #algorithm #analysis #animation #visualisation
Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
SOFTVISSOFTVIS-2005-StoreyCG #development #framework #on the #overview #process #visualisation
On the use of visualization to support awareness of human activities in software development: a survey and a framework (MADS, DC, DMG), pp. 193–202.
VISSOFTVISSOFT-2005-BalzerD #graph
Exploring Relations within Software Systems Using Treemap Enhanced Hierarchical Graphs (MB, OD), pp. 89–94.
VISSOFTVISSOFT-2005-DucasseLR #comprehension #multi
Multi-level Method Understanding Using Microprints (SD, ML, RR), pp. 33–38.
CAiSECAiSE-2005-DongenAV #petri net #reduction #verification
Verification of EPCs: Using Reduction Rules and Petri Nets (BFvD, WMPvdA, HMWV), pp. 372–386.
CAiSECAiSE-2005-Evermann #analysis #concept #modelling #ontology
The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
CAiSECAiSE-2005-Franch #lightweight #modelling #on the
On the Lightweight Use of Goal-Oriented Models for Software Package Selection (XF), pp. 551–566.
CAiSECAiSE-2005-HodelHD #documentation #editing
Using Text Editing Creation Time Meta Data for Document Management (TBH, RH, KRD), pp. 105–118.
CAiSECAiSE-2005-NecibF #ontology #query
Query Processing Using Ontologies (CBN, JCF), pp. 167–186.
CAiSECAiSE-2005-TheodoratosD #graph #query
Querying Tree-Structured Data Using Dimension Graphs (DT, TD), pp. 201–215.
EDOCEDOC-2005-QuartelDS #approach
An approach to relate business and application services using ISDL (DACQ, RMD, MvS), pp. 157–168.
EDOCEDOC-2005-WangWCWFUCGL #adaptation #enterprise #monitoring
Service Level Management using QoS Monitoring, Diagnostics, and Adaptation for Networked Enterprise Systems (GW, CW, AC, HW, CKF, SAU, YLC, WG, JL), pp. 239–250.
EDOCEDOC-2005-WitthawaskulJ #modelling #transaction
Transaction Support Using Unit of Work Modeling in the Context of MDA (WW, REJ), pp. 131–141.
ICEISICEIS-v1-2005-FaverioSB #enterprise #implementation #process
Using Critical Success Factors for Assessing Critical Activities in ERP Implementation within SMEs (PF, DS, GB), pp. 285–292.
ICEISICEIS-v1-2005-Fernandez #design #security #uml
Security Patterns and Secure Systems Design Using UML (EBF), p. 21.
ICEISICEIS-v1-2005-PequenoA #semantics
Using Correspondence Assertions to Specify the Semantics of Views in an Object-Relational Data Warehouse (VMP, JNA), pp. 219–225.
ICEISICEIS-v2-2005-AhmanH #approach #game studies #reduction #simulation
Using a Game Theoretical Approach for Experimental Simulation of Brood Reduction — Conflict and Co-Operation, Effect on Brood Size with Limited Resources (, LH), pp. 220–225.
ICEISICEIS-v2-2005-CarrascoVG #clustering
Using DMFSQL for Financial Clustering (RAC, MAVM, JG), pp. 135–141.
ICEISICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based
Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
ICEISICEIS-v2-2005-Fu
Construction of Decision Trees Using Data Cube (LF), pp. 119–126.
ICEISICEIS-v2-2005-KumarKDB #clustering #mining #web
Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
ICEISICEIS-v2-2005-NilssonFX #classification
Clinical Decision Support by Time Series Classification Using Wavelets (MN, PF, NX), pp. 169–175.
ICEISICEIS-v3-2005-TanL #enterprise #framework #modelling #problem #simulation
Enterprise Infrastructure Planning — Modelling and Simulation Using the Problem Articulation Method (ST, KL), pp. 240–245.
ICEISICEIS-v4-2005-CardosoSS #ontology #web
Using Ontologies to Prospect Offers on the Web (RCC, FdFdS, ACS), pp. 200–207.
ICEISICEIS-v4-2005-RamirezB #enterprise #web #web service
Integrating Agent Technologies into Enterprise Systems Using Web Services (EHR, RFB), pp. 11–15.
ICEISICEIS-v4-2005-SaleemB #algorithm #grid #scheduling #search-based
Job Scheduling in Computational Grid Using Genetic Algorithm (MS, SB), pp. 163–169.
ICEISICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
ICEISICEIS-v5-2005-DixitM #classification #documentation
Electronic Document Classification Using Support Vector Machine — An Application for E-Learning (SD, LKM), pp. 191–198.
ICEISICEIS-v5-2005-GarciaLMGGL #empirical #usability
A Controlled Experiment for Measuring the Usability of Webapps Using Patterns (FJG, MDL, FMS, JAG, PG, CL), pp. 67–74.
CIKMCIKM-2005-AfratiLL #adaptation #query #web
Answering aggregation queries on hierarchical web sites using adaptive sampling (FNA, PVL, CL), pp. 237–238.
CIKMCIKM-2005-AminiTULG #documentation #learning #xml
Learning to summarise XML documents using content and structure (MRA, AT, NU, ML, PG), pp. 297–298.
CIKMCIKM-2005-BaiSBNC #information retrieval #modelling #query
Query expansion using term relationships in language models for information retrieval (JB, DS, PB, JYN, GC), pp. 688–695.
CIKMCIKM-2005-BotWCL #automation #classification #concept #documentation #generative
Generating better concept hierarchies using automatic document classification (RSB, YfBW, XC, QL), pp. 281–282.
CIKMCIKM-2005-ChiritaDN #detection #named #ranking
MailRank: using ranking for spam detection (PAC, JD, WN), pp. 373–380.
CIKMCIKM-2005-Collins-ThompsonC #modelling #query #random
Query expansion using random walk models (KCT, JC), pp. 704–711.
CIKMCIKM-2005-GuptaNR #performance
Efficient data dissemination using locale covers (SG, JN, CVR), pp. 243–244.
CIKMCIKM-2005-HalachevST #sequence
Exact match search in sequence data using suffix trees (MH, NS, AT), pp. 123–130.
CIKMCIKM-2005-HaradaH #order
Order checking in a CPOE using event analyzer (LH, YH), pp. 549–555.
CIKMCIKM-2005-JiangZ #markov #modelling
Accurately extracting coherent relevant passages using hidden Markov models (JJ, CZ), pp. 289–290.
CIKMCIKM-2005-KangHLM #feedback #modelling #statistics
Establishing value mappings using statistical models and user feedback (JK, TSH, DL, PM), pp. 68–75.
CIKMCIKM-2005-KanT #classification #performance
Fast webpage classification using URL features (MYK, HONT), pp. 325–326.
CIKMCIKM-2005-KoloniariPPT #query
Query workload-aware overlay construction using histograms (GK, YP, EP, TT), pp. 640–647.
CIKMCIKM-2005-LeonardiB #approach #database #detection #documentation #relational #xml
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
CIKMCIKM-2005-MangoldSM #database #information management #intranet
Improving intranet search-engines using context information from databases (CM, HS, BM), pp. 349–350.
CIKMCIKM-2005-Melucci #modelling
Context modeling and discovery using vector space bases (MM), pp. 808–815.
CIKMCIKM-2005-MiaoKM #clustering #comparative #documentation #evaluation #n-gram
Document clustering using character N-grams: a comparative evaluation with term-based and word-based clustering (YM, VK, EEM), pp. 357–358.
CIKMCIKM-2005-OrlandicLY #clustering #effectiveness #performance #reduction
Clustering high-dimensional data using an efficient and effective data space reduction (RO, YL, WGY), pp. 201–208.
CIKMCIKM-2005-PrasadK #performance #query #sequence #xml
Efficient indexing and querying of XML data using modified Prüfer sequences (KHP, PSK), pp. 397–404.
CIKMCIKM-2005-TheodoratosDKG #data flow #query #semantics
Semantic querying of tree-structured data sources using partially specified tree patterns (DT, TD, AK, NHG), pp. 712–719.
CIKMCIKM-2005-VuG #retrieval
Using RankBoost to compare retrieval systems (HTV, PG), pp. 309–310.
CIKMCIKM-2005-WhitelawGA #analysis #sentiment
Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
ECIRECIR-2005-AyacheQC #classification #video
Video Shot Classification Using Lexical Context (SA, GQ, MC), pp. 549–551.
ECIRECIR-2005-CliftonT #framework #named
Knowing-Aboutness: Question-Answering Using a Logic-Based Framework (TC, WJT), pp. 230–244.
ECIRECIR-2005-CoyleS #interactive #web
Enhancing Web Search Result Lists Using Interaction Histories (MC, BS), pp. 543–545.
ECIRECIR-2005-SiersdorferW #classification #strict
Using Restrictive Classification and Meta Classification for Junk Elimination (SS, GW), pp. 287–299.
ECIRECIR-2005-YangJZY #documentation #effectiveness #retrieval
Improving Retrieval Effectiveness by Using Key Terms in Top Retrieved Documents (LY, DHJ, GZ, NY), pp. 169–184.
ICMLICML-2005-BurgesSRLDHH #learning #rank
Learning to rank using gradient descent (CJCB, TS, ER, AL, MD, NH, GNH), pp. 89–96.
ICMLICML-2005-CalinonB #framework #gesture #probability #recognition
Recognition and reproduction of gestures using a probabilistic framework combining PCA, ICA and HMM (SC, AB), pp. 105–112.
ICMLICML-2005-CarneyCDL #network #predict #probability
Predicting probability distributions for surf height using an ensemble of mixture density networks (MC, PC, JD, CL), pp. 113–120.
ICMLICML-2005-GuptaG #clustering #hybrid #robust
Robust one-class clustering using hybrid global and local search (GG, JG), pp. 273–280.
ICMLICML-2005-IeWNL #adaptation #multi #recognition
Multi-class protein fold recognition using adaptive codes (EI, JW, WSN, CSL), pp. 329–336.
ICMLICML-2005-JinCS #information retrieval
Learn to weight terms in information retrieval using category information (RJ, JYC, LS), pp. 353–360.
ICMLICML-2005-JinZ #algorithm #probability
A smoothed boosting algorithm using probabilistic output codes (RJ, JZ), pp. 361–368.
ICMLICML-2005-KolterM #concept
Using additive expert ensembles to cope with concept drift (JZK, MAM), pp. 449–456.
ICMLICML-2005-LiuXC #graph #predict
Predicting protein folds with structural repeats using a chain graph model (YL, EPX, JGC), pp. 513–520.
ICMLICML-2005-MadsenKE #modelling #word
Modeling word burstiness using the Dirichlet distribution (REM, DK, CE), pp. 545–552.
ICMLICML-2005-MichelsSN #learning
High speed obstacle avoidance using monocular vision and reinforcement learning (JM, AS, AYN), pp. 593–600.
ICMLICML-2005-Pietraszek #analysis #classification #optimisation
Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
ICMLICML-2005-PoczosL #analysis #independence
Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
ICMLICML-2005-SajamaO05a #modelling #reduction
Supervised dimensionality reduction using mixture models (S, AO), pp. 768–775.
ICMLICML-2005-WilliamsLXC #classification
Incomplete-data classification using logistic regression (DW, XL, YX, LC), pp. 972–979.
KDDKDD-2005-FujimakiYM #approach #detection #kernel #problem
An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
KDDKDD-2005-ManeSH #classification #independence
Estimating missed actual positives using independent classifiers (SM, JS, SYH), pp. 648–653.
KDDKDD-2005-NasraouiCR #metric #mining #retrieval #similarity #web
Using retrieval measures to assess similarity in mining dynamic web clickstreams (ON, CC, CR), pp. 439–448.
KDDKDD-2005-NevilleSJKPG #information management #relational
Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
KDDKDD-2005-Petrushin #mining #multi #self #video
Mining rare and frequent events in multi-camera surveillance video using self-organizing maps (VAP), pp. 794–800.
KDDKDD-2005-Sandler #classification #linear #on the #programming
On the use of linear programming for unsupervised text classification (MS), pp. 256–264.
KDDKDD-2005-WangLLMZ #web
Web object indexing using domain knowledge (MW, ZL, LL, WYM, NZ), pp. 294–303.
KDDKDD-2005-ZakiR #mining #reasoning #set
Reasoning about sets using redescription mining (MJZ, NR), pp. 364–373.
KDDKDD-2005-ZhouFSU #feature model #streaming
Streaming feature selection using alpha-investing (JZ, DPF, RAS, LHU), pp. 384–393.
LSOLSO-2005-DingsoyrB
Using Open Space Technology as a Method to Share Domain Knowledge (TD, FOB), pp. 102–106.
LSOLSO-2005-SantosMRFMAPA #development #information management #process
Using a Software Development Environment with Knowledge Management to Support Deploying Software Processes in Small and Medium Size Companies (GS, MM, ARR, SF, SM, AA, BDP, MA), pp. 72–76.
LSOLSO-2005-ZuserG #feedback
Using Feedback for Supporting Software Team Improvement (WZ, TG), pp. 119–123.
MLDMMLDM-2005-BarbuHAT #clustering #documentation #graph #image #summary
Clustering Document Images Using Graph Summaries (EB, PH, SA, ÉT), pp. 194–202.
MLDMMLDM-2005-EickRBV #assessment #clustering #distance #similarity
Using Clustering to Learn Distance Functions for Supervised Similarity Assessment (CFE, AR, AB, RV), pp. 120–131.
MLDMMLDM-2005-GuptaKB #classification #concept analysis #incremental
Incremental Classification Rules Based on Association Rules Using Formal Concept Analysis (AG, NK, VB), pp. 11–20.
MLDMMLDM-2005-HalveyKS #clustering #internet #navigation #predict
Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
MLDMMLDM-2005-HanCY #analysis #component #feature model #image #independence
Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
MLDMMLDM-2005-LegrandN #feature model
Feature Selection Method Using Preferences Aggregation (GL, NN), pp. 203–217.
MLDMMLDM-2005-LiFKL #automation #image #modelling #segmentation
Automatic Clinical Image Segmentation Using Pathological Modelling, PCA and SVM (SL, TF, AK, SL), pp. 314–324.
MLDMMLDM-2005-MakrehchiK #classification
Text Classification Using Small Number of Features (MM, MSK), pp. 580–589.
MLDMMLDM-2005-OhnishiI #analysis #component #detection #independence
Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
MLDMMLDM-2005-SiaL #clustering #dataset #scalability
Clustering Large Dynamic Datasets Using Exemplar Points (WS, MML), pp. 163–173.
MLDMMLDM-2005-SilvaJNP #geometry #learning #metric
Diagnosis of Lung Nodule Using Reinforcement Learning and Geometric Measures (ACS, VRdSJ, AdAN, ACdP), pp. 295–304.
MLDMMLDM-2005-VermaVV #approach #mining
Temporal Approach to Association Rule Mining Using T-Tree and P-Tree (KV, OPV, RV), pp. 651–659.
SEKESEKE-2005-BabarNJ #architecture #framework #overview
Assessing a Framework of Comparing Architecture Review Methods Using CMMI (MAB, MN, DRJ), pp. 400–403.
SEKESEKE-2005-BasitRJ #empirical #unification
An Empirical Study on Limits of Clone Unification Using Generics (HAB, DCR, SJ), pp. 109–114.
SEKESEKE-2005-BenavidesTC #constraints #feature model #modelling #programming
Using Constraint Programming to Reason on Feature Models (DB, PT, ARC), pp. 677–682.
SEKESEKE-2005-BrandaoSL #design #knowledge-based #multi #reasoning #verification
Multi-Agent System Design Verification Using Knowledge-based Reasoning (AB, VTdS, CJPdL), pp. 602–607.
SEKESEKE-2005-CangussuK #evaluation #integration #modelling #testing
Using Dynamic Models for the Evaluation of Integration and System Testing (JWC, RMK), pp. 436–441.
SEKESEKE-2005-ChiangTK #classification #multi #performance
Fast Class Rendering Using Multiresolution Classification in Discrete Cosine Transform Domain (TWC, TT, LJK), pp. 689–694.
SEKESEKE-2005-FalboRM #ontology #re-engineering #semantics
Using Ontologies to Add Semantics to a Software Engineering Environment (RdAF, FBR, RDM), pp. 151–156.
SEKESEKE-2005-GuanG #constraints #web #web service
Dealing with Web Service QoS factors using Constraint Hierarchy (YG, AKG), pp. 578–583.
SEKESEKE-2005-LiCLY #analysis #design #evolution #feature model #legacy
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
SEKESEKE-2005-LungXZ #architecture #composition
Software Architecture Decomposition Using Attributes (CHL, XX, MZ), pp. 747–752.
SEKESEKE-2005-MarewKB #aspect-oriented #case study #composition #development #functional #product line
Case Study on Systematic Functional Decomposition in a Product Line using Aspect Oriented Software Development (TM, JK, DHB), pp. 152–157.
SEKESEKE-2005-NabliFG #adaptation #algebra #data flow #multi
Adapting Multidimensional Schemes to Data sources using Algebraic Operators (AN, JF, FG), pp. 713–718.
SEKESEKE-2005-WangDS #alloy #reasoning
Reasoning Support for SWRL-FOL Using Alloy (HHW, JSD, JS), pp. 626–631.
SIGIRSIGIR-2005-AnhM #similarity
Simplified similarity scoring using term ranks (VNA, AM), pp. 226–233.
SIGIRSIGIR-2005-BeitzelJFGLCK #automation #classification #query #web
Automatic web query classification using labeled and unlabeled training data (SMB, ECJ, OF, DAG, DDL, AC, AK), pp. 581–582.
SIGIRSIGIR-2005-ChiritaNPK #metadata #personalisation
Using ODP metadata to personalize search (PAC, WN, RP, CK), pp. 178–185.
SIGIRSIGIR-2005-CuiSLKC #dependence #retrieval
Question answering passage retrieval using dependency relations (HC, RS, KL, MYK, TSC), pp. 400–407.
SIGIRSIGIR-2005-FergusonSGW #retrieval #scalability #set
Top subset retrieval on large collections using sorted indices (PF, AFS, CG, PW), pp. 599–600.
SIGIRSIGIR-2005-Grivolla #approach #automation #documentation #natural language #query #retrieval
Using Oracle for natural language document retrieval an automatic query reformulation approach (JG), pp. 605–606.
SIGIRSIGIR-2005-JinC #information retrieval #online
Study of cross lingual information retrieval using on-line translation systems (RJ, JYC), pp. 619–620.
SIGIRSIGIR-2005-KurlandL #modelling #rank #ranking
PageRank without hyperlinks: structural re-ranking using links induced by language models (OK, LL), pp. 306–313.
SIGIRSIGIR-2005-KurlandLD #clustering #modelling #pseudo
Better than the real thing?: iterative pseudo-query processing using cluster-based language models (OK, LL, CD), pp. 19–26.
SIGIRSIGIR-2005-LiangDT #order #query #summary
Using query term order for result summarisation (SFL, SD, JT), pp. 629–630.
SIGIRSIGIR-2005-RennieJ #detection
Using term informativeness for named entity detection (JDMR, TSJ), pp. 353–360.
SIGIRSIGIR-2005-ShenTZ #feedback #information management #information retrieval
Context-sensitive information retrieval using implicit feedback (XS, BT, CZ), pp. 43–50.
SIGIRSIGIR-2005-SunSZYLC #summary
Web-page summarization using clickthrough data (JTS, DS, HJZ, QY, YL, ZC), pp. 194–201.
SIGIRSIGIR-2005-TanCWXGG #classification
Using dragpushing to refine centroid text classifiers (ST, XC, BW, HX, MG, YG), pp. 653–654.
SIGIRSIGIR-2005-TryfonopoulosIK #information retrieval #network
Publish/subscribe functionality in IR environments using structured overlay networks (CT, SI, MK), pp. 322–329.
SIGIRSIGIR-2005-UdaniDDS #induction #web
Noun sense induction using web search results (GU, SD, AD, TS), pp. 657–658.
SIGIRSIGIR-2005-ViolaN #context-free grammar #learning
Learning to extract information from semi-structured text using a discriminative context free grammar (PAV, MN), pp. 330–337.
SIGIRSIGIR-2005-XiFFZCYZ #matrix #named #similarity
SimFusion: measuring similarity using unified relationship matrix (WX, EAF, WF, BZ, ZC, JY, DZ), pp. 130–137.
SIGIRSIGIR-2005-XueLYXZYC #clustering #collaboration #scalability
Scalable collaborative filtering using cluster-based smoothing (GRX, CL, QY, WX, HJZ, YY, ZC), pp. 114–121.
SIGIRSIGIR-2005-ZhangLLJXFCM #graph #web
Improving web search results using affinity graph (BZ, HL, YL, LJ, WX, WF, ZC, WYM), pp. 504–511.
SIGIRSIGIR-2005-ZhuJXG #classification #multi
Multi-labelled classification using maximum entropy method (SZ, XJ, WX, YG), pp. 274–281.
ECMFAECMDA-FA-2005-BurgstallerWFBF #development #distributed #monitoring
Using Domain Driven Development for Monitoring Distributed Systems (RB, EW, LF, MB, TF), pp. 19–24.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-SandersMKB #composition #specification #uml
Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support
Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
SPLCSPLC-2005-HelferichHS #deployment #named #product line #quality
QFD-PPP: Product Line Portfolio Planning Using Quality Function Deployment (AH, GH, SS), pp. 162–173.
SPLCSPLC-2005-LamineJG #component #estimation #off the shelf #product line
Cost Estimation for Product Line Engineering Using COTS Components (SBABL, LLJ, HHBG), pp. 113–123.
SPLCSPLC-2005-ReiserW #set
Using Product Sets to Define Complex Product Decisions (MOR, MW), pp. 21–32.
SPLCSPLC-2005-TessierGTG #modelling #product line #system family
Using Variation Propagation for Model-Driven Management of a System Family (PT, SG, FT, JMG), pp. 222–233.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-SandersMKB #composition #specification #uml
Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support
Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
OOPSLAOOPSLA-2005-ArnoldWR #performance #repository #virtual machine
Improving virtual machine performance using a cross-run profile repository (MA, AW, VTR), pp. 297–311.
OOPSLAOOPSLA-2005-DoorenS #exception #flexibility #robust
Combining the robustness of checked exceptions with the flexibility of unchecked exceptions using anchored exception declarations (MvD, ES), pp. 455–471.
OOPSLAOOPSLA-2005-MartinLL #fault #query #security
Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
OOPSLAOOPSLA-2005-SangalJSJ #architecture #dependence #modelling
Using dependency models to manage complex software architecture (NS, EJ, VS, DJ), pp. 167–176.
OOPSLAOOPSLA-2005-ZdunA #design pattern #modelling
Modeling architectural patterns using architectural primitives (UZ, PA), pp. 133–146.
AdaEuropeAdaEurope-2005-RogersW #ada #fault tolerance
The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95 (PR, AJW), pp. 236–247.
AdaEuropeAdaEurope-2005-VergnaudPK #component #distributed #middleware
Using the AADL to Describe Distributed Applications from Middleware to Software Components (TV, LP, FK), pp. 67–78.
LOPSTRLOPSTR-2005-PettorossiPS #array #protocol #verification
Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
PADLPADL-2005-BaileyS #constraints #satisfiability #set
Discovery of Minimal Unsatisfiable Subsets of Constraints Using Hitting Set Dualization (JB, PJS), pp. 174–186.
POPLPOPL-2005-GulwaniN #analysis #interprocedural #precise #random
Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
POPLPOPL-2005-XieA #detection #fault #satisfiability #scalability
Scalable error detection using boolean satisfiability (YX, AA), pp. 351–363.
PPDPPPDP-2005-SahaR #analysis #incremental #logic programming #points-to
Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
SASSAS-2005-BagnaraRZ #algebra #generative #invariant
Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra (RB, ERC, EZ), pp. 19–34.
SASSAS-2005-HarrenN #assembly #dependent type #safety
Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
AdaSIGAda-2005-AusdenN #c++
Using ASIS to generate C++ bindings (HA, KAN), pp. 23–30.
AdaSIGAda-2005-Ruocco #case study #experience
Experiences using SPARK in an undergraduate CS course (ASR), pp. 37–40.
RERE-2005-BittnerBPRW #requirements #reuse #scalability #variability
Managing Variability and Reuse of Features and Requirements for Large and Complex Organizational Structures (MB, AB, AP, MOR, MW), pp. 469–470.
RERE-2005-DiazPM #interactive #modelling
Modeling Interactions using Role-Driven Patterns (ID, OP, AM), pp. 209–220.
RERE-2005-LutzNPFT #analysis #identification #requirements
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-PottF #modelling #requirements
Using Cognitive Modeling for Requirements Engineering in Anesthesiology (CP, JlF), pp. 491–492.
RERE-2005-RobinsonWW #analysis #design #probability #requirements
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
RERE-2005-WassonSLK #fault #requirements
Using Occurrence Properties of Defect Report Data to Improve Requirements (KSW, KNS, RRL, JCK), pp. 253–262.
ASEASE-2005-AgarwalSWS #concurrent #detection #runtime
Optimized run-time race detection and atomicity checking using partial discovered types (RA, AS, LW, SDS), pp. 233–242.
ASEASE-2005-DiaconescuM #automation #component #enterprise #performance
Automating the performance management of component-based enterprise systems through the use of redundancy (AD, JM), pp. 44–53.
ASEASE-2005-FalbPRJAK #automation #specification #synthesis #user interface
Using communicative acts in high-level specifications of user interfaces for their automated synthesis (JF, RP, TR, HJ, EA, HK), pp. 429–430.
ASEASE-2005-GuptaHZG
Locating faulty code using failure-inducing chops (NG, HH, XZ, RG), pp. 263–272.
ASEASE-2005-VisserPP #abstraction #generative
Test input generation for red-black trees using abstraction (WV, CSP, RP), pp. 414–417.
ESEC-FSEESEC-FSE-2005-GearB #component #re-engineering #towards
Reengineering towards components using “Reconn-exion” (ALG, JB), pp. 370–373.
ESEC-FSEESEC-FSE-2005-MetzLG #approach #hybrid #performance
Performance data collection using a hybrid approach (EM, RL, TFG), pp. 126–135.
ESEC-FSEESEC-FSE-2005-PetterssonJ #approach #experience #industrial #lightweight #product line #web
Industrial experience with building a web portal product line using a lightweight, reactive approach (UP, SJ), pp. 326–335.
GTTSEGTTSE-2005-BenavidesSMC #analysis #automation #csp #feature model #java #modelling
Using Java CSP Solvers in the Automated Analyses of Feature Models (DB, SS, PTMA, ARC), pp. 399–408.
GTTSEGTTSE-2005-BravenboerGV #domain-specific language #stratego
MetaBorg in Action: Examples of Domain-Specific Language Embedding and Assimilation Using Stratego/XT (MB, RdG, EV), pp. 297–311.
GTTSEGTTSE-2005-EkmanH #analysis #composition #jastadd #java
Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
GTTSEGTTSE-2005-Galhardas #ajax #framework
Data Cleaning and Transformation Using the AJAX Framework (HG), pp. 327–343.
GTTSEGTTSE-2005-Mens #graph transformation #on the #refactoring
On the Use of Graph Transformations for Model Refactoring (TM), pp. 219–257.
GTTSEGTTSE-2005-WinterB #program transformation
Program Transformation Using HATS 1.84 (VLW, JB), pp. 378–396.
ICSEICSE-2005-ApiwattanapongOH #impact analysis #performance #precise #sequence
Efficient and precise dynamic impact analysis using execute-after sequences (TA, AO, MJH), pp. 432–441.
ICSEICSE-2005-DemskyR #data type #reasoning
Data structure repair using goal-directed reasoning (BD, MCR), pp. 176–185.
ICSEICSE-2005-HolmesM #recommendation #source code
Using structural context to recommend source code examples (RH, GCM), pp. 117–125.
ICSEICSE-2005-NagappanB #fault #metric #predict
Use of relative code churn measures to predict system defect density (NN, TB), pp. 284–292.
ICSEICSE-2005-RockmanK #development
The software engineer and the development, management and use of intellectual property (HBR, VK), pp. 708–709.
ICSEICSE-2005-ZeidE #development #education #framework
Using peer reviews in teaching framework development (AZ, ME), pp. 627–628.
SACSAC-2005-AgyemangBA #mining #n-gram #web
Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
SACSAC-2005-BalsaraR #model checking #predict #search-based
Prediction of inherited and genetic mutations using the software model checker SPIN (ZB, SR), pp. 208–209.
SACSAC-2005-BeigbederM #fuzzy #information retrieval #proximity
An information retrieval model using the fuzzy proximity degree of term occurences (MB, AM), pp. 1018–1022.
SACSAC-2005-BuenoTT #algorithm #approximate #query #search-based #similarity
Accelerating approximate similarity queries using genetic algorithms (RB, AJMT, CTJ), pp. 617–622.
SACSAC-2005-CaetanoST #process
Using roles and business objects to model and understand business processes (AC, ARS, JMT), pp. 1308–1313.
SACSAC-2005-CaoBZBROA #modelling
Marshaling and unmarshaling models using the entity-relationship model (FC, BRB, WZ, CCB, RRR, AMO, MA), pp. 1553–1557.
SACSAC-2005-ChenA #analysis #approach #comparative #predict #sequence
A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
SACSAC-2005-ChoC #database #image #recognition #symmetry
Contour-based partial object recognition using symmetry in image databases (JSC, JC), pp. 1190–1194.
SACSAC-2005-FlanaginGRAS #automation #generative #overview
Automated terrain generation using LIDAR and waterbody survey data (MF, AG, JJR, MA, KS), pp. 1185–1189.
SACSAC-2005-HastingsLOKPCJS #data transformation #distributed #xml
Grid-based management of biomedical data using an XML-based distributed data management system (SH, SL, SO, TMK, TP, ÜVÇ, DJ, JHS), pp. 105–109.
SACSAC-2005-InoueU #image
Retrieving lightly annotated images using image similarities (MI, NU), pp. 1031–1037.
SACSAC-2005-JayadevaprakashMP #generative #graph #transitive
Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
SACSAC-2005-JinD #metadata
Sanitizing using metadata in MetaXQuery (HJ, CED), pp. 1732–1736.
SACSAC-2005-KvaleLC #aspect-oriented #case study #programming
A case study on building COTS-based system using aspect-oriented programming (AAK, JL, RC), pp. 1491–1498.
SACSAC-2005-LambertMS #constraints
Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
SACSAC-2005-LawL #constraints #matrix #modelling #symmetry
Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
SACSAC-2005-LiY #classification #predict #recursion
Using recursive classification to discover predictive features (FL, YY), pp. 1054–1058.
SACSAC-2005-Lu #correctness #declarative
Use of correctness assertions in declarative diagnosis (LL), pp. 1404–1408.
SACSAC-2005-MitchellP #metric #runtime
Using object-level run-time metrics to study coupling between objects (ÁM, JFP), pp. 1456–1462.
SACSAC-2005-RaposoPAV #automation #maintenance #query #web
Automatic wrapper maintenance for semi-structured web sources using results from previous queries (JR, AP, , ÁV), pp. 654–659.
SACSAC-2005-ReddyC #bound
Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
SACSAC-2005-SpohnG #network #problem #set
A solution for the location problem in arbitrary computer networks using generic dominating sets (MAS, JJGLA), pp. 739–743.
SACSAC-2005-TangsripairojS #repository #self #visualisation
Organizing and visualizing software repositories using the growing hierarchical self-organizing map (ST, MHS), pp. 1539–1545.
SACSAC-2005-TruongS #behaviour #modelling #uml #verification
Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
SACSAC-2005-WalkerMH #re-engineering
Surface reconstruction using shadow profilometry (CPW, NM, MGH), pp. 1250–1251.
SACSAC-2005-WanMA #array #markov #random #similarity
Cleaning microarray expression data using Markov random fields based on profile similarity (RW, HM, KFA), pp. 206–207.
ATEMATEM-2004-GirbaFD05 #evolution #metamodelling #model transformation
Using Meta-Model Transformation to Model Software Evolution (TG, JMF, SD), pp. 57–64.
GPCEGPCE-2005-WuL #programming #reasoning #source code
Shadow Programming: Reasoning About Programs Using Lexical Join Point Information (PW, KJL), pp. 141–156.
LDTALDTA-2005-SloaneW #eclipse #education #eli #programming language
Eclipse Support for Using Eli and Teaching Programming Languages (AMS, WMW), pp. 189–194.
CASECASE-2005-CengicALYF #composition #implementation
Implementation of full synchronous composition using IEC 61499 function blocks (GC, , BL, CY, PMF), pp. 267–272.
CASECASE-2005-ChangLJ #detection #fault #network
Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
CASECASE-2005-ChengY #bound
Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
CASECASE-2005-FalkmanLT #algebra #petri net #process #specification
Specification of a batch plant using process algebra and Petri nets (PF, BL, MT), pp. 339–344.
CASECASE-2005-FigueiredoJ
Nonholonomic systems stabilization and tracking control using discontinuous control (LCF, FGJ), pp. 142–147.
CASECASE-2005-JainR #analysis #modelling
Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
CASECASE-2005-KimD #metric #process #quality
Quality measurement of production process plan using tolerance chart (IHK, ZD), pp. 25–30.
CASECASE-2005-KimKYT #identification #realtime
Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
CASECASE-2005-LiuHL #flexibility #scheduling
Dynamic scheduling of flexible manufacturing system using support vector machines (YHL, HPH, YSL), pp. 387–392.
CASECASE-2005-LowWW #development #on the #realtime
On the development of a real time control system by using xPC Target: solution to robotic system control (KHL, HW, MYW), pp. 345–350.
CASECASE-2005-MillerSSLM #analysis
Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
CASECASE-2005-SchmidW
Path planning for a humanoid using NURBS curves (AJS, HW), pp. 351–356.
CASECASE-2005-SongHQG #automation #documentation
Automating inspection and documentation of remote building construction using a robotic camera (DS, QH, NQ, KG), pp. 172–177.
CASECASE-2005-TanonkouBBX #approach #probability #problem
Solving a stochastic inventory-location problem using Lagrangian relaxation approach (GAT, LB, RB, XX), pp. 279–284.
CASECASE-2005-WangCL #capacity #robust
Using shared resource capacity for robust control of failure prone manufacturing systems (SW, SFC, MAL), pp. 369–374.
CASECASE-2005-WangLWK #architecture #distributed #simulation
Collision resolution simulation for distributed control architectures using LonWorks (MW, EL, EW, MK), pp. 319–326.
CASECASE-2005-WeiL #concurrent #policy #programming
A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
CCCC-2005-JiangMHLZZZ #multi #performance
Boosting the Performance of Multimedia Applications Using SIMD Instructions (WJ, CM, BH, JL, JZ, BZ, CZ), pp. 59–75.
CCCC-2005-LeLH #interprocedural #jit #optimisation
Using Inter-Procedural Side-Effect Information in JIT Optimizations (AL, OL, LJH), pp. 287–304.
CCCC-2005-Padovani #c++ #compilation
Compilation of Generic Regular Path Expressions Using C++ Class Templates (LP), pp. 27–42.
CCCC-2005-SadeSS #c #memory management #optimisation #parallel #thread
Optimizing C Multithreaded Memory Management Using Thread-Local Storage (YS, SS, RS), pp. 137–155.
CGOCGO-2005-DaiZHY #compilation #framework #optimisation
A General Compiler Framework for Speculative Optimizations Using Data Speculative Code Motion (XD, AZ, WCH, PCY), pp. 280–290.
CGOCGO-2005-StephensonA #classification #predict
Predicting Unroll Factors Using Supervised Classification (MS, SPA), pp. 123–134.
DACDAC-2005-AgarwalCBZ #analysis #optimisation #statistics
Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
DACDAC-2005-AminID #approximate
Piece-wise approximations of RLCK circuit responses using moment matching (CSA, YII, FD), pp. 927–932.
DACDAC-2005-BhuniaBCMR #approach #novel #power management #reduction #synthesis
A novel synthesis approach for active leakage power reduction using dynamic supply gating (SB, NB, QC, HMM, KR), pp. 479–484.
DACDAC-2005-HuLWD #analysis #integration #novel
Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
DACDAC-2005-KimYH
Trace-driven HW/SW cosimulation using virtual synchronization technique (DK, YY, SH), pp. 345–348.
DACDAC-2005-LuoYYB #design #network #power management
Low power network processor design using clock gating (YL, JY, JY, LNB), pp. 712–715.
DACDAC-2005-MitraYP #named #performance #simulation
RADAR: RET-aware detailed routing using fast lithography simulations (JM, PY, DZP), pp. 369–372.
DACDAC-2005-NookalaCLS #approach #architecture #design #statistics
Microarchitecture-aware floorplanning using a statistical design of experiments approach (VN, YC, DJL, SSS), pp. 579–584.
DACDAC-2005-PengL #named #performance #power management
Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method (YP, XL), pp. 813–818.
DACDAC-2005-VolkerinkM #architecture
Response compaction with any number of unknowns using a new LFSR architecture (EHV, SM), pp. 117–122.
DACDAC-2005-ZhangPHS #abstraction #satisfiability
Dynamic abstraction using SAT-based BMC (LZ, MRP, MSH, TS), pp. 754–757.
DATEDATE-2005-AgarwalCB #optimisation #statistics
Statistical Timing Based Optimization using Gate Sizing (AA, KC, DB), pp. 400–405.
DATEDATE-2005-BalakrishnanT #configuration management #linear
Reconfigurable Linear Decompressors Using Symbolic Gaussian Elimination (KJB, NAT), pp. 1130–1135.
DATEDATE-2005-EeckelaertMG #multi #performance #synthesis
Efficient Multiobjective Synthesis of Analog Circuits using Hierarchical Pareto-Optimal Performance Hypersurfaces (TE, TM, GGEG), pp. 1070–1075.
DATEDATE-2005-GadkariR #automation #monitoring #specification #synthesis #visual notation
Automated Synthesis of Assertion Monitors using Visual Specifications (AAG, SR), pp. 390–395.
DATEDATE-2005-GanaiGA #embedded #memory management #modelling #performance #verification
Verification of Embedded Memory Systems using Efficient Memory Modeling (MKG, AG, PA), pp. 1096–1101.
DATEDATE-2005-HanlaiMJ #control flow #graph #memory management #optimisation #performance
Extended Control Flow Graph Based Performance Optimization Using Scratch-Pad Memory (PH, LM, JJ), pp. 828–829.
DATEDATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #safety
The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
DATEDATE-2005-KangPR #analysis #statistics
Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
DATEDATE-2005-KeezerGMT #low cost #multi
Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL (DCK, CG, AMM, NT), pp. 152–157.
DATEDATE-2005-LiLLPN #modelling #order #parametricity #performance #reduction #variability
Modeling Interconnect Variability Using Efficient Parametric Model Order Reduction (PL, FL, XL, LTP, SRN), pp. 958–963.
DATEDATE-2005-LyseckyV #case study #clustering #hardware
A Study of the Speedups and Competitiveness of FPGA Soft Processor Cores using Dynamic Hardware/Software Partitioning (RLL, FV), pp. 18–23.
DATEDATE-2005-MartensG #integration #orthogonal #polynomial #simulation
Time-Domain Simulation of Sampled Weakly Nonlinear Systems Using Analytical Integration and Orthogonal Polynomial Series (EM, GGEG), pp. 120–125.
DATEDATE-2005-MaslovYMD #quantum
Quantum Circuit Simplification Using Templates (DM, CY, DMM, GWD), pp. 1208–1213.
DATEDATE-2005-MishchenkoBJVY #equation #performance
Efficient Solution of Language Equations Using Partitioned Representations (AM, RKB, JHRJ, TV, NY), pp. 418–423.
DATEDATE-2005-NaculG #compilation #embedded #lightweight #multi
Lightweight Multitasking Support for Embedded Systems using the Phantom Serializing Compiler (ACN, TG), pp. 742–747.
DATEDATE-2005-NegreirosCS #evaluation #low cost
Noise Figure Evaluation Using Low Cost BIST (MN, LC, AAS), pp. 158–163.
DATEDATE-2005-NeiroukhS #statistics
Improving the Process-Variation Tolerance of Digital Circuits Using Gate Sizing and Statistical Techniques (ON, XS), pp. 294–299.
DATEDATE-2005-OgrasM #approach #architecture #communication #composition #energy #synthesis
Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach (ÜYO, RM), pp. 352–357.
DATEDATE-2005-SuCP #configuration management
Yield Enhancement of Digital Microfluidics-Based Biochips Using Space Redundancy and Local Reconfiguration (FS, KC, VKP), pp. 1196–1201.
DATEDATE-2005-Takeuchi #debugging #lightweight #monitoring #virtual machine
OS Debugging Method Using a Lightweight Virtual Machine Monitor (TT), pp. 1058–1059.
DATEDATE-2005-VargheseCY #analysis
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
DATEDATE-2005-YangHSP #logic #multi #quantum #synthesis
Exact Synthesis of 3-Qubit Quantum Circuits from Non-Binary Quantum Gates Using Multiple-Valued Logic and Group Theory (GY, WNNH, XS, MAP), pp. 434–435.
HPCAHPCA-2005-JaleelJ #memory management
Using Virtual Load/Store Queues (VLSQs) to Reduce the Negative Effects of Reordered Memory Instructions (AJ, BLJ), pp. 191–200.
HPCAHPCA-2005-MartyBHHMW #multi
Improving Multiple-CMP Systems Using Token Coherence (MRM, JDB, MDH, AJH, MMKM, DAW), pp. 328–339.
HPDCHPDC-2005-AlbrechtTSV #distributed
Distributed application management using Plush (JRA, CT, ACS, AV), pp. 281–282.
HPDCHPDC-2005-GrothMFWZM #empirical
Recording and using provenance in a protein compressibility experiment (PTG, SM, WF, SCW, KPZ, LM), pp. 201–208.
HPDCHPDC-2005-HuangS #adaptation #self
Building self-adapting services using service-specific knowledge (ACH, PS), pp. 34–43.
PDPPDP-2005-CalderonCCPS #fault tolerance #file system #implementation #parallel
A Fault Tolerant MPI-IO Implementation using the Expand Parallel File System (AC, FGC, JC, JMP, LMS), pp. 274–281.
PDPPDP-2005-ClematisDGM #framework #parallel #visualisation
Using a CCA Compliant Framework for Parallel Remote Visualization (AC, DD, AG, MM), pp. 227–234.
PDPPDP-2005-GuitartCTAL #analysis #web
Tuning Dynamic Web Applications using Fine-Grain Analysis (JG, DC, JT, EA, JL), pp. 84–91.
PDPPDP-2005-ManciniVMRT #development #web #web service
Performance-Driven Development of a Web Services Application using MetaPL/HeSSE (EM, UV, NM, MR, RT), pp. 12–19.
PPoPPPPoPP-2005-FreehL #clustering #energy #multi #source code
Using multiple energy gears in MPI programs on a power-scalable cluster (VWF, DKL), pp. 164–173.
PPoPPPPoPP-2005-ShachamSS #information management #model checking #scalability
Scaling model checking of dataraces using dynamic information (OS, MS, AS), pp. 107–118.
SOSPSOSP-2005-SoulesG #named
Connections: using context to enhance file search (CANS, GRG), pp. 119–132.
SOSPSOSP-2005-WitchelRA #linux #memory management #named
Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
WRLAWRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-LeeYY #analysis #automation #grammarware #pointer #source code #verification
Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
FASEFASE-2005-EichbergSM
Using Annotations to Check Structural Properties of Classes (ME, TS, MM), pp. 237–252.
FASEFASE-2005-HammoudaHPK #variability
Managing Variability Using Heterogeneous Feature Variation Patterns (IH, JH, MP, KK), pp. 145–159.
FASEFASE-2005-RodriguesRU #component #concurrent #predict #reliability
Using Scenarios to Predict the Reliability of Concurrent Component-Based Software Systems (GNR, DSR, SU), pp. 111–126.
FoSSaCSFoSSaCS-2005-BouyerCD #automaton #fault
Fault Diagnosis Using Timed Automata (PB, FC, DD), pp. 219–233.
TACASTACAS-2005-BouquetDLU #ml #named #specification
JML-Testing-Tools: A Symbolic Animator for JML Specifications Using CLP (FB, FD, BL, MU), pp. 551–556.
TACASTACAS-2005-Marrero
Using BDDs to Decide CTL (WM), pp. 222–236.
TACASTACAS-2005-VardhanSVA #verification
Using Language Inference to Verify ω-Regular Properties (AV, KS, MV, GA), pp. 45–60.
TACASTACAS-2005-XieMSN #execution #framework #generative #named #object-oriented #symbolic computation #testing
Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic Execution (TX, DM, WS, DN), pp. 365–381.
ICSTSAT-J-2004-GummadiNV05 #algorithm #independence #satisfiability #set
Algorithms for Satisfiability Using Independent Sets of Variables (RG, NSN, VR), pp. 133–144.
ICSTSAT-J-2004-HuangD05 #performance
Using DPLL for Efficient OBDD Construction (JH, AD), pp. 157–172.
AMOSTA-MOST-2005-ClermontP #testing
Using information about functions in selecting test cases (MC, DLP), pp. 96–102.
AMOSTA-MOST-2005-KarrP #distributed #modelling #performance #statistics #testing
Distributed performance testing using statistical modeling (AFK, AAP), pp. 77–83.
AMOSTA-MOST-2005-SherriffNWV #estimation #fault #haskell #metric
Early estimation of defect density using an in-process Haskell metrics model (MS, NN, LAW, MAV), pp. 64–69.
CADECADE-2005-Lev-AmiIRSSY #data type #first-order #linked data #logic #open data #reachability #simulation #verification
Simulating Reachability Using First-Order Logic with Applications to Verification of Linked Data Structures (TLA, NI, TWR, SS, SS, GY), pp. 99–115.
CAVCAV-2005-BarnerGR #concurrent #debugging #formal method #named
Wolf — Bug Hunter for Concurrent Software Using Formal Methods (SB, ZG, IR), pp. 153–157.
CAVCAV-2005-DwyerHHR #framework #model checking
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework (MBD, JH, MH, R), pp. 148–152.
ICLPICLP-2005-Ferreira #database #deduction
The MYDDAS Project: Using a Deductive Database for Traffic Characterization (MF), pp. 424–426.
ICLPICLP-2005-Fruhwirth #analysis #confluence #constraints
Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
ICLPICLP-2005-Saidi #bound #mining #process
Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
ICLPICLP-2005-Santos #concurrent #logic #semantics #transaction
Denotational Semantics Using Horn Concurrent Transaction Logic (MVS), pp. 431–432.
ICLPICLP-2005-Wilson #logic programming
Use of Logic Programming for Complex Business Rules (WGW), pp. 14–20.
LICSLICS-2005-WashburnW #data flow #parametricity
Generalizing Parametricity Using Information-flow (GW, SW), pp. 62–71.
ICSTSAT-2005-HeuleM #bound #linear #programming #random #satisfiability
Observed Lower Bounds for Random 3-SAT Phase Transition Density Using Linear Programming (MH, HvM), pp. 122–134.
ICSTSAT-2005-LingSB #logic #quantifier #satisfiability #synthesis
FPGA Logic Synthesis Using Quantified Boolean Satisfiability (ACL, DPS, SDB), pp. 444–450.
ICTSSTestCom-2005-BatoriA #framework #independence #modelling #platform #testing
Using TTCN-3 for Testing Platform Independent Models (GB, DA), pp. 304–317.
ICTSSTestCom-2005-FlochRSV #empirical #lessons learnt #testing
Some Lessons from an Experiment Using TTCN-3 for the RIPng Testing (AF, FR, AS, CV), pp. 318–332.
ICTSSTestCom-2005-LeeJL #analysis #detection #smarttech
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
ICTSSTestCom-2005-LiL #anti #diagrams #thread #uml
Using Anti-Ant-like Agents to Generate Test Threads from the UML Diagrams (HL, CPL), pp. 69–80.
VMCAIVMCAI-2005-SankaranarayananSM #analysis #linear #programming #scalability
Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
CBSECBSE-2004-MinCK #component #off the shelf #problem
Using Smart Connectors to Resolve Partial Matching Problems in COTS Component Acquisition (HGM, SWC, SDK), pp. 40–47.
WICSAWICSA-2004-BachmannBKS #architecture #design #experience
Experience Using an Expert System to Assist an Architect in Designing for Modifiability (FB, LJB, MK, CPS), pp. 281–284.
WICSAWICSA-2004-PettitG #architecture #behaviour #concurrent #modelling #petri net
Modeling Behavioral Patterns of Concurrent Software Architectures Using Petri Nets (RGPI, HG), pp. 57–68.
DocEngDocEng-2004-BagleyB #composition
Page composition using PPML as a link-editing script (SRB, DFB), pp. 134–136.
DocEngDocEng-2004-HardyBT #xml
Creating structured PDF files using XML templates (MRBH, DFB, PLT), pp. 99–108.
DocEngDocEng-2004-UlgesLB #documentation
Document capture using stereo vision (AU, CHL, TMB), pp. 198–200.
DocEngDocEng-2004-WatanabeSYO
A question answer system using mails posted to a mailing list (YW, KS, KY, YO), pp. 67–73.
DRRDRR-2004-Najman #documentation #estimation
Using mathematical morphology for document skew estimation (LN), pp. 182–191.
DRRDRR-2004-ShinJKKK #adaptation #image #polynomial
Block-adaptive binarization of business card images in PDA using modified quadratic filter (KTS, IHJ, NCK, CHK, TSK), pp. 92–101.
DRRDRR-2004-ZhangSH #image #retrieval #word
Word image retrieval using binary features (BZ, SNS, CH), pp. 45–53.
TPDLECDL-2004-Brase #library
Using Digital Library Techniques — Registration of Scientific Primary Data (JB), pp. 488–494.
TPDLECDL-2004-OkadaTA #component #markov #modelling
Bibliographic Component Extraction Using Support Vector Machines and Hidden Markov Models (TO, AT, JA), pp. 501–512.
HTHT-2004-HorieY #analysis #documentation #set #web
Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
JCDLJCDL-2004-BartoloLPPSVS
Use of MatML with software applications for e-learning (LMB, CSL, ACP, DRS, JV, KS), pp. 190–191.
JCDLJCDL-2004-JerezLHS #multi #repository
The multi-faceted use of the OAI-PMH in the lanl repository (HNJ, XL, PH, HVdS), pp. 11–20.
JCDLJCDL-2004-SealesL
Digital restoration using volumetric scanning (WBS, YL), pp. 117–124.
JCDLJCDL-2004-WangMFSG #fuzzy #generative #image #metadata #semantics
Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram (YW, FM, JF, LS, DQG), pp. 202–211.
JCDLJCDL-2004-WangTCLC #approach #library #query
Translating unknown cross-lingual queries in digital libraries using a web-based approach (JHW, JWT, PJC, WHL, LFC), pp. 108–116.
JCDLJCDL-2004-YangL #approach #fault #segmentation #statistics
Error anaylsis of Chinese text segmentation using statistical approach (CCY, KWL), pp. 256–257.
PODSPODS-2004-Tsaparas #ranking #web
Using Non-Linear Dynamical Systems for Web Searching and Ranking (PT), pp. 59–70.
SIGMODSIGMOD-2004-AgrawalAS #information management #web #web service
Enabling Sovereign Information Sharing Using Web Services (RA, DA, RS), pp. 873–877.
SIGMODSIGMOD-2004-BowmanS #optimisation #query #semantics
Optimization of Query Streams Using Semantic Prefetching (ITB, KS), pp. 179–190.
SIGMODSIGMOD-2004-ChaudhuriDS #effectiveness #estimation #statistics
Effective Use of Block-Level Sampling in Statistics Estimation (SC, GD, US), pp. 287–298.
SIGMODSIGMOD-2004-GovindarajuLWLM #database #performance
Fast Computation of Database Operations using Graphics Processors (NKG, BL, WW, MCL, DM), pp. 215–226.
SIGMODSIGMOD-2004-IpeirotisG #database
When one Sample is not Enough: Improving Text Database Selection Using Shrinkage (PGI, LG), pp. 767–778.
SIGMODSIGMOD-2004-JainCW #adaptation #resource management
Adaptive Stream Resource Management Using Kalman Filters (AJ, EYC, YFW), pp. 11–22.
SIGMODSIGMOD-2004-LermanGMK #automation #segmentation #web
Using the Structure of Web Sites for Automatic Segmentation of Tables (KL, LG, SM, CAK), pp. 119–130.
SIGMODSIGMOD-2004-TianDPRMM #database #implementation #relational #scalability #xml
Implementing a Scalable XML Publish/Subscribe System Using a Relational Database System (FT, BR, HP, TM, JM), pp. 479–490.
VLDBVLDB-2004-BalminOBCP #framework #query #xml #xpath
A Framework for Using Materialized XPath Views in XML Query Processing (AB, , KSB, RC, HP), pp. 60–71.
VLDBVLDB-2004-JohnsonKCKV #matrix #order #scalability
Compressing Large Boolean Matrices using Reordering Techniques (DSJ, SK, JC, SK, SV), pp. 13–23.
CSEETCSEET-2004-HassonC #case study #re-engineering #requirements #specification
A Case Study Involving the Use of Z to Aid Requirements Specification in the Software Engineering Course (PH, SC), pp. 84–90.
CSEETCSEET-2004-LeBlancLS #education #generative #re-engineering #source code
Generating Undergraduate Software Engineering Courses/Programs Using the Computing Curricula Software Engineering Volume (RJL, TCL, AEKS), pp. 167–168.
CSEETCSEET-2004-McKimE #design #education #multi #object-oriented #programming
Using a Multiple Term Project to Teach Object Oriented Programming and Design (JCM, HJCE), pp. 59–64.
ITiCSEITiCSE-2004-AdamsT #compilation #xml
Using XML in a compiler course (DRA, CT), pp. 4–6.
ITiCSEITiCSE-2004-CasselFLPKIG
Using CITIDEL to develop and share class plans (LNC, EAF, JL, MAPQ, DK, JI, CLG), p. 270.
ITiCSEITiCSE-2004-ConradF #object-oriented #paradigm #source code
Using the synergies between the object-oriented paradigm and mathematics in joint mathematics/computer science programs (MC, TF), p. 254.
ITiCSEITiCSE-2004-English #assessment #automation #source code #user interface
Automated assessment of GUI programs using JEWL (JE), pp. 137–141.
ITiCSEITiCSE-2004-Garner #learning #programming
The use of a code restructuring tool in the learning of programming (SG), p. 277.
ITiCSEITiCSE-2004-Hamer #approach #composition #design pattern #education
An approach to teaching design patterns using musical composition (JH), pp. 156–160.
ITiCSEITiCSE-2004-ImpagliazzoL
Using history to enhance computing courses (JI, JANL), p. 238.
ITiCSEITiCSE-2004-JippingKKL #network #programmable
Investigating wired and wireless networks using a java-based programmable sniffer (MJJ, AJK, NK, KL), pp. 12–16.
ITiCSEITiCSE-2004-Leska #education #programming
Introducing undergraduates to programming using robots in the general education curriculum (CL), p. 263.
ITiCSEITiCSE-2004-LeskaR #concept #game studies #learning
Learning O-O concepts in CS I using game projects (CL, JRR), p. 237.
ITiCSEITiCSE-2004-Lopez-HerrejonS #case study #experience #interactive #java
Using interactive technology in a short java course: an experience report (RELH, MS), pp. 203–207.
ITiCSEITiCSE-2004-ThomasM #database #education #research #scalability
Use of large databases for group projects at the nexus of teaching and research (RCT, RM), pp. 161–165.
ITiCSEITiCSE-2004-Waraich #education #logic
Using narrative as a motivating device to teach binary arithmetic and logic gates (AW), pp. 97–101.
ITiCSEITiCSE-WGR-2004-CanningMRR #c
Reading types in C using the right left walk method (JC, WM, AR, DR), pp. 52–54.
SIGITESIGITE-2004-BierreP #java #programming
The use of MUPPETS in an introductory java programming course (KJB, AMP), pp. 122–127.
SIGITESIGITE-2004-EdwardsB #case study #experience #programming #tablet
Experiences using tablet PCs in a programming laboratory (SHE, NDB), pp. 160–164.
SIGITESIGITE-2004-Fernandez #community #student
Engaging students with community organizations by using computer technology (JDF), pp. 1–5.
SIGITESIGITE-2004-Fulbright #education
Teaching critical thinking skills in IT using PINE-TRIZ (RF), pp. 38–42.
SIGITESIGITE-2004-SwainS #design #development #network #object-oriented #programming
Design and development of computer networking modules using virtual instruments and object oriented programming (NS, MS), p. 270.
SIGITESIGITE-2004-TabriziCOL #development #implementation #object-oriented #uml
Implementation of object-orientation using UML in entry level software development courses (MHNT, CBC, EO, KL), pp. 128–131.
CSMRCSMR-2004-Al-EkramK #composition #concept #slicing #source code
Source Code Modularization Using Lattice of Concept Slices (RAE, KK), pp. 195–203.
CSMRCSMR-2004-HammoudaH #maintenance
Documenting Maintenance Tasks Using Maintenance Patterns (IH, MH), pp. 37–47.
CSMRCSMR-2004-RatiuDGM #design #detection
Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
CSMRCSMR-2004-Zdun #maintenance #re-engineering
Using Split Objects for Maintenance and Reengineering Tasks (UZ), pp. 105–114.
ICSMEICSM-2004-DangLMPPT #design #realtime #video #visual notation
Design Recovery of Real-Time Graphical Applications Using Video (CD, AVL, AM, KCP, TQP, JT), pp. 338–347.
ICSMEICSM-2004-MohanGL #approach #complexity #comprehension #concept
An Approach to Understanding Program Comprehensibility Using Spatial Complexity, Concept Assignment and Typographical Style (AM, NG, PJL), p. 530.
ICSMEICSM-2004-WernickH #evolution #programming
The Impact of Using Pair Programming on System Evolution: A Simulation-Based Study (PW, TH), pp. 422–426.
ICSMEICSM-2004-WhiteR #analysis #industrial #realtime #testing
Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
ICSMEICSM-2004-Woodworth #metric #quality
Using Metrics to Drive Quality Improvements and Value — Company Wide (BW), p. 2.
IWPCIWPC-2004-DanicicLH #execution #slicing
Building Executable Union Slices using Conditioned Slicing (SD, ADL, MH), pp. 89–99.
IWPCIWPC-2004-HassanH #architecture #development
Using Development History Sticky Notes to Understand Software Architecture (AEH, RCH), pp. 183–193.
IWPCIWPC-2004-KuzniarzSW #comprehension #empirical #modelling #uml
An Empirical Study on Using Stereotypes to Improve Understanding of UML Models (LK, MS, CW), pp. 14–23.
SCAMSCAM-2004-BruntinkD #metric #object-oriented #predict #testing
Predicting Class Testability using Object-Oriented Metrics (MB, AvD), pp. 136–145.
SCAMSCAM-2004-FatiregunHH #algorithm #evolution #search-based #sequence
Evolving Transformation Sequences using Genetic Algorithms (DF, MH, RMH), pp. 66–75.
SCAMSCAM-2004-MaruyamaY #automation #framework #java #platform #representation #source code #xml
A CASE Tool Platform Using an XML Representation of Java Source Code (KM, SY), pp. 158–167.
SCAMSCAM-2004-Rothermel #analysis #source code
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
SCAMSCAM-2004-TourweM #concept analysis #mining
Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
WCREWCRE-2004-AbbasTC
Using DDL to Understand and Modify SimpleScalar (NA, ST, JEC), pp. 296–297.
WCREWCRE-2004-EmmerikW #decompiler
Using a Decompiler for Real-World Source Recovery (MVE, TW), pp. 27–36.
WCREWCRE-2004-MarinDM #analysis #aspect-oriented #identification
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
WCREWCRE-2004-MohanGL #approach #complexity #concept
An Initial Approach to Assessing Program Comprehensibility Using Spatial Complexity, Number of Concepts and Typographical Style (AM, NG, PJL), pp. 246–255.
WCREWCRE-2004-WuHH #evolution
Exploring Software Evolution Using Spectrographs (JW, RCH, AEH), pp. 80–89.
CIAACIAA-2004-Polak #automaton #nondeterminism
Minimalizations of NFA Using the Universal Automaton (LP), pp. 325–326.
ICALPICALP-2004-AbbottAG #induction #representation
Representing Nested Inductive Types Using W-Types (MA, TA, NG), pp. 59–71.
IFMIFM-2004-Bujorianu #integration #specification
Integration of Specification Languages Using Viewpoints (MCB), pp. 421–440.
IFMIFM-2004-PickinJ #diagrams #sequence chart #uml
Using UML Sequence Diagrams as the Basis for a Formal Test Description Language (SP, JMJ), pp. 481–500.
RTARTA-2004-Takai #abstract interpretation #term rewriting #verification
A Verification Technique Using Term Rewriting Systems and Abstract Interpretation (TT), pp. 119–133.
SEFMSEFM-2004-BertoliniFFO #analysis #automaton #generative #network #probability #testing
Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
SEFMSEFM-2004-Fronk #algebra #analysis #approach #automation #petri net
Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
SEFMSEFM-2004-KazhamiakinPR #case study #requirements #verification #web #web service
Formal Verification of Requirements using SPIN: A Case Study on Web Services (RK, MP, MR), pp. 406–415.
SEFMSEFM-2004-Roy #finite #infinity #verification
Symbolic Verification of Infinite Systems using a Finite Union of DFAs (SR), pp. 56–66.
SEFMSEFM-2004-SistlaWZ
Checking Extended CTL properties Using Guarded Quotient Structures (APS, XW, MZ), pp. 87–94.
SEFMSEFM-2004-ZhangXW #constraints #execution #generative #symbolic computation #testing #theorem proving
Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques (JZ, CX, XW), pp. 242–250.
FLOPSFLOPS-2004-HagiyaTYS #abstraction #analysis #automaton #logic
Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
ICFPICFP-2004-TolmachAN #functional #implementation #logic #multi #thread
Implementing functional logic languages using multiple threads and stores (APT, SA, MN), pp. 90–102.
ICGTICGT-2004-CherchagoH #graph transformation #specification #web #web service
Specification Matching of Web Services Using Conditional Graph Transformation Rules (AC, RH), pp. 304–318.
ICGTICGT-2004-Rensink #first-order #graph #logic #representation
Representing First-Order Logic Using Graphs (AR), pp. 319–335.
CHICHI-2004-LudfordCFT #community #difference #online
Think different: increasing online community participation using uniqueness and group dissimilarity (PJL, DC, DF, LGT), pp. 631–638.
CHICHI-2004-VemuriDBS #recognition #speech
Improving speech playback using time-compression and speech recognition (SV, PD, WB, CS), pp. 295–302.
CSCWCSCW-2004-BeenenLWCFRK #community #motivation #online #social
Using social psychology to motivate contributions to online communities (GB, KSL, XW, KC, DF, PR, REK), pp. 212–221.
CAiSECAiSE-2004-MunozO #adaptation #development #metadata #ontology #standard
Adaptive Web-Based Courseware Development Using Metadata Standards and Ontologies (LSM, JPMdO), pp. 414–428.
CAiSECAiSE-2004-NuffelenCDAB #integration
Data Integration Using ID-Logic (BVN, ACC, MD, OA, MB), pp. 67–81.
CAiSECAiSE-2004-SalinesiEZ #approach #evolution #modelling #requirements #similarity
A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
EDOCEDOC-2004-JaegerRM #composition #web #web service #workflow
QoS Aggregation for Web Service Composition using Workflow Patterns (MCJ, GRG, GM), pp. 149–159.
EDOCEDOC-2004-Patrascoiu #web #web service
Mapping EDOC to Web Services using YATL (OP), pp. 286–297.
EDOCEDOC-2004-PignatonVAB #component
Developing QoS-aware Component-Based Applications Using MDA Principles (RP, VAV, JIA, JB), pp. 172–183.
EDOCEDOC-2004-TandonG #modelling
Using Subject-Oriented Modeling to Develop Jini Applications (GT, SG), pp. 111–122.
ICEISICEIS-v1-2004-BaiHM #query #semantics
Improving View Selection in Query Rewriting Using Domain Semantics (QB, JH, MFM), pp. 177–183.
ICEISICEIS-v1-2004-FengMR #multi #performance #query
Improving Query Performance on OLAP-Data Using Enhanced Multidimensional Indices (YF, AM, HR), pp. 282–289.
ICEISICEIS-v1-2004-FerrandinC #consistency #database #integration #power of #semistructured data #xml
Referencial Integrity Model for XML Data Integrated from Heterogeneous Databases Systems — Using the Power of XML for Consistent Data Integration (MF, MSdC), pp. 15–20.
ICEISICEIS-v1-2004-LuciaST #clone detection #identification #similarity #web
Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
ICEISICEIS-v1-2004-Riaz-ud-DinK #adaptation #database #multi #named
ACME-DB: An Adaptive Caching Mechanism Using Multiple Experts For Database Buffers (FRuD, MK), pp. 192–201.
ICEISICEIS-v1-2004-ZhouNB #c++ #implementation #performance
An Efficient B+-Tree Implementation in C++ Using the STL Style (JZ, BN, GB), pp. 163–168.
ICEISICEIS-v2-2004-HamzaY #constraints #mining #regular expression
Mining Sequential Patterns with Regular Expression Constraints Using Sequential Pattern Tree (MH, KM, MY), pp. 116–121.
ICEISICEIS-v2-2004-KooptiwootS #mining #set
Mining the Relationships in the Form of the Predisposing Factors and Coincident Factors Among Numerical Dynamic Attributes in Time Series Data Set by Using the Combination of Some Existing Techniques (SK, MAS), pp. 327–334.
ICEISICEIS-v2-2004-KooptiwootS04a #idea #mining #set
Mining the Relationships in the Form of Predisposing Factor and Coincident Factor in Time Series Data Set by Using the Combination of some Existing Ideas with a new Idea from the Fact in the Chemical Reaction (SK, MAS), pp. 531–534.
ICEISICEIS-v2-2004-KotsiantisP #classification #hybrid
A Hybrid Decision Support Tool — Using Ensemble of Classifiers (SBK, PEP), pp. 448–456.
ICEISICEIS-v2-2004-LesslerERK
Dynamic Interest Profiles: Tracking User Interests Using Personal Information (JL, SE, JR, VK), pp. 281–288.
ICEISICEIS-v2-2004-MoutinhoTNC #approach #detection #network
Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
ICEISICEIS-v2-2004-MuesHVB #diagrams #visualisation
Comprehensible Credit-Scoring Knowledge Visualization Using Decision Tables and Diagrams (CM, JH, JV, BB), pp. 226–232.
ICEISICEIS-v2-2004-NetoCVMM #estimation #network
Monthly Flow Estimation Using Elman Neural Networks (LBN, PHGC, MLFV, JCCBSdM, LAM), pp. 153–158.
ICEISICEIS-v2-2004-SilvaCSGN #multi #network
Multiple Organ Failure Diagnosis Using Adverse Events and Neural Networks (ÁMS, PC, MFS, LG, JN), pp. 401–408.
ICEISICEIS-v2-2004-WuW #predict #probability #web
Predicting Web Requests Efficiently Using a Probability Model (SW, WW), pp. 48–53.
ICEISICEIS-v3-2004-AllouiO #architecture #process #uml
Describing Software-Intensive Process Architectures Using a UML-Based ADL (IA, FO), pp. 201–208.
ICEISICEIS-v3-2004-BragaMG #development #pattern matching
System Development Using a Pattern Language-Based Tool (RTVB, PCM, FSRG), pp. 155–162.
ICEISICEIS-v3-2004-Hiramatsu #concept #modelling #ontology #taxonomy
Ontology Modeling Tool Using Concept Dictionary and Inference (YH), pp. 225–230.
ICEISICEIS-v3-2004-MouratidisGM #design #information management #security
Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
ICEISICEIS-v3-2004-MukkamalaSAR #adaptation #detection
Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
ICEISICEIS-v3-2004-Salimifard #component #modelling #petri net
Component-Based Modelling of Organisational Resources Using Coloured Petri Nets (KS), pp. 577–580.
ICEISICEIS-v3-2004-Tu #security
Using SAP System Configuration Security Test to Comply with Sarbanesoxley Act (JHT), pp. 581–583.
ICEISICEIS-v3-2004-VachonM #aspect-oriented #development #requirements
Achieving Supplementary Requirements Using Aspect-Oriented Development (JV, FM), pp. 584–587.
ICEISICEIS-v4-2004-KotinurmiLJS #design #documentation #framework
Integrating Design Document Management Systems Using the Rosettanet E-Business Framework (PK, HL, KJ, TS), pp. 502–509.
ICEISICEIS-v4-2004-MavromoustakosA #design #quality #web
Designing Quality Web Applications Using Patterns (SM, ASA), pp. 421–424.
ICEISICEIS-v4-2004-PoggiTT #composition
Using Agent Platforms for Service Composition (AP, MT, PT), pp. 98–105.
ICEISICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #protocol
Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
ICEISICEIS-v5-2004-Gouveia
Using Visuals to Convey Information (LBG), pp. 216–220.
ICEISICEIS-v5-2004-RousseauBMFM #multi #personalisation #profiling #repository #resource management
Personalised Resource Discovery Searching over Multiple Repository Types: Using User and Information Provider Profiling (BR, PB, PM, PF, VM), pp. 35–43.
CIKMCIKM-2004-AghiliAA #geometry
Protein structure alignment using geometrical features (SAA, DA, AEA), pp. 148–149.
CIKMCIKM-2004-BotW #algorithm #documentation #feedback
Improving document representations using relevance feedback: the RFA algorithm (RSB, YfBW), pp. 270–278.
CIKMCIKM-2004-ChomickiMS #consistency #query
Computing consistent query answers using conflict hypergraphs (JC, JM, SS), pp. 417–426.
CIKMCIKM-2004-ChungJM #clustering #dataset #mining
Mining gene expression datasets using density-based clustering (SC, JJ, DM), pp. 150–151.
CIKMCIKM-2004-Efron #documentation #web
The liberal media and right-wing conspiracies: using cocitation information to estimate political orientation in web documents (ME), pp. 390–398.
CIKMCIKM-2004-MaG #detection #feedback #information retrieval
Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
CIKMCIKM-2004-MaZMS #framework #learning #query #similarity
A framework for refining similarity queries using learning techniques (YM, QZ, SM, DYS), pp. 158–159.
CIKMCIKM-2004-MekhaldiLI #clustering #documentation #speech
Using bi-modal alignment and clustering techniques for documents and speech thematic segmentations (DM, DL, RI), pp. 69–77.
CIKMCIKM-2004-TomitaNI #graph #representation #similarity
Calculating similarity between texts using graph-based text representation model (JT, HN, MI), pp. 248–249.
CIKMCIKM-2004-XueZCYMXF #optimisation #web
Optimizing web search using web click-through data (GRX, HJZ, ZC, YY, WYM, WX, WF), pp. 118–126.
CIKMCIKM-2004-ZouLC #query #xml
Using a compact tree to index and query XML data (QZ, SL, WWC), pp. 234–235.
ECIRECIR-2004-ChenTH #corpus #identification #novel
Identification of Relevant and Novel Sentences Using Reference Corpus (HHC, MFT, MHH), pp. 85–98.
ECIRECIR-2004-CloughS04a #ambiguity #information retrieval #word
Cross-Language Information Retrieval Using EuroWordNet and Word Sense Disambiguation (PDC, MS), pp. 327–337.
ECIRECIR-2004-StokesNCS #analysis
Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
ICMLICML-2004-BlumLRR #learning #random
Semi-supervised learning using randomized mincuts (AB, JDL, MRR, RR).
ICMLICML-2004-FungDBR #algorithm #kernel #performance
A fast iterative algorithm for fisher discriminant using heterogeneous kernels (GF, MD, JB, RBR).
ICMLICML-2004-GabrilovichM #categorisation #feature model
Text categorization with many redundant features: using aggressive feature selection to make SVMs competitive with C4.5 (EG, SM).
ICMLICML-2004-HerschtalR #optimisation
Optimising area under the ROC curve using gradient descent (AH, BR).
ICMLICML-2004-NguyenS #clustering #learning
Active learning using pre-clustering (HTN, AWMS).
ICMLICML-2004-NguyenWJ #classification #detection #distributed #kernel
Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
ICMLICML-2004-RosalesAF #clustering #learning
Learning to cluster using local neighborhood structure (RR, KA, BJF).
ICMLICML-2004-SimsekB #abstraction #identification #learning
Using relative novelty to identify useful temporal abstractions in reinforcement learning (ÖS, AGB).
ICMLICML-2004-Zhang #algorithm #linear #predict #probability #problem #scalability
Solving large scale linear prediction problems using stochastic gradient descent algorithms (TZ0).
ICMLICML-2004-ZhangYK #algorithm #kernel #learning #matrix
Bayesian inference for transductive learning of kernel matrix using the Tanner-Wong data augmentation algorithm (ZZ, DYY, JTK).
ICPRICPR-v1-2004-AllierE #documentation #image #segmentation
Segmentation and Typography Extraction in Document Images Using Geodesic Active Regions (BA, HE), pp. 409–412.
ICPRICPR-v1-2004-BhowmickB #approximate
Approximate Fingerprint Matching Using Kd-Tree (PB, BBB), pp. 544–547.
ICPRICPR-v1-2004-BourlaiMK #architecture #smarttech #verification
Face Verification System Architecture Using Smart Cards (TB, KM, JK), pp. 793–796.
ICPRICPR-v1-2004-CaoF #metric
Simple Calibration Without Metric Information Using an Isoceles Trapezoid (XC, HF), pp. 104–107.
ICPRICPR-v1-2004-CevikalpW #recognition
Face Recognition by Using Discriminative Common Vectors (HC, DMW), pp. 326–329.
ICPRICPR-v1-2004-ChengLLC #classification #component #independence #kernel
Texture Classification Using Kernel Independent Component Analysi (JC, QL, HL, YWC), pp. 620–623.
ICPRICPR-v1-2004-ClausiY #comparison #markov #random #segmentation
Texture Segmentation Comparison Using Grey Level Co-Occurrence Probabilities and Markov Random Fields (DAC, BY), pp. 584–587.
ICPRICPR-v1-2004-CoskerMRH #animation #markov #speech
Speech Driven Facial Animation using a Hidden Markov Coarticulation Model (DC, ADM, PLR, YH), pp. 128–131.
ICPRICPR-v1-2004-FungM #parallel
Using Multiple Graphics Cards as a General Purpose Parallel Computer : Applications to Computer Vision (JF, SM), pp. 805–808.
ICPRICPR-v1-2004-HoriSNK #detection #multi #realtime
A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
ICPRICPR-v1-2004-HseN #recognition #sketching
Sketched Symbol Recognition using Zernike Moments (HHH, ARN), pp. 367–370.
ICPRICPR-v1-2004-KavallieratouS
Discrimination of Machine-Printed from Handwritten Text Using Simple Structural Characteristics (EK, ES), pp. 437–440.
ICPRICPR-v1-2004-KimYL #algorithm #distance #graph #relational
A New Attributed Relational Graph Matching Algorithm Using the Nested Structure of Earth Mover’s Distance (DHK, IDY, SUL), pp. 48–51.
ICPRICPR-v1-2004-LebrunCC #reduction
SVM Training Time Reduction using Vector Quantization (GL, CC, HC), pp. 160–163.
ICPRICPR-v1-2004-LeL #image #markov #modelling
Recognizing Frontal Face Images Using Hidden Markov Models with One Training Image per Person (HSL, HL), pp. 318–321.
ICPRICPR-v1-2004-LiBS #image #recognition
Object Class Recognition using Images of Abstract Regions (YL, JAB, LGS), pp. 40–43.
ICPRICPR-v1-2004-LiHS #feature model #image #programming #retrieval #search-based #semantics
Semantic Feature Extraction Using Genetic Programming in Image Retrieval (QL, HH, ZS), pp. 648–651.
ICPRICPR-v1-2004-NakamuraHFS #image #parallel
Fingerprint Image Enhancement using a Parallel Ridge Filter (TN, MH, HF, KS), pp. 536–539.
ICPRICPR-v1-2004-NaroditskyD #3d
3D Scanning Using Spatiotemporal Orientation (ON, KD), pp. 5–9.
ICPRICPR-v1-2004-OnishiF #comprehension #evaluation #image #video
Shooting the Lecture Scene Using Computer-controlled Cameras Based on Situation Understanding and Evaluation of Video Images (MO, KF), pp. 781–784.
ICPRICPR-v1-2004-ParkL #distance #fault #identification #image
Enhancing Low-Resolution Facial Images Using Error Back-Projection for Human Identification at a Distance (JSP, SWL), pp. 346–349.
ICPRICPR-v1-2004-RahtuSH #multi #recognition
Convexity Recognition Using Multi-Scale Autoconvolution (ER, MS, JH), pp. 692–695.
ICPRICPR-v1-2004-ShiG #documentation #image #normalisation
Historical Document Image Enhancement Using Background Light Intensity Normalization (ZS, VG), pp. 473–476.
ICPRICPR-v1-2004-SirisathitkulAU #distance #image #performance
Fast Color Image Quantization using Squared Euclidean Distance of Adjacent Color Points along the Highest Color Variance Axis (YS, SA, BU), pp. 656–659.
ICPRICPR-v1-2004-TodorovicN #detection #image
Detection of Artificial Structures in Natural-Scene Images Using Dynamic Trees (ST, MCN), pp. 35–39.
ICPRICPR-v1-2004-TominagaTK #estimation #multi
Estimation of Surface Properties of Art Paintings Using a Multi-band Camera (ST, NT, TK), pp. 92–95.
ICPRICPR-v1-2004-TremblaySM #algorithm #multi #nearest neighbour #optimisation #random #search-based
Optimizing Nearest Neighbour in Random Subspaces using a Multi-Objective Genetic Algorithm (GT, RS, PM), p. 208.
ICPRICPR-v1-2004-TsuiTC #image #metric
Metric Measurement on Arbitrary Planes in 2 Images Using the Conformal Point (PTT, HTT, WkC), pp. 108–111.
ICPRICPR-v1-2004-ValienteACG #design #image
Structural Description of Textile and Tile Pattern Designs Using Image Processing (JMV, FA, CC, JMG), pp. 498–503.
ICPRICPR-v1-2004-Wakahara #adaptation #correlation #modelling #normalisation
Adaptive Normalization of Handwritten Characters Using GAT Correlation and Mixture Models (TW), pp. 393–396.
ICPRICPR-v1-2004-WangA #composition #multi #representation
Compact Representation of Multidimensional Data Using Tensor Rank-One Decomposition (HW, NA), pp. 44–47.
ICPRICPR-v1-2004-WangJW #approach #detection #integration #multi #novel #video
A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
ICPRICPR-v1-2004-YangFTH #detection #multi
Skin Color Detection Using Multiple Cues (JY, ZF, TT, WH), pp. 632–635.
ICPRICPR-v2-2004-BaiH04a #detection #documentation #image #multi
Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
ICPRICPR-v2-2004-BanerjeeKM #detection
Corner Detection Using Support Vector Machines (MB, MKK, PM), pp. 819–822.
ICPRICPR-v2-2004-BeginF #approach
Blind Super-Resolution Using a Learning-Based Approach (IB, FPF), pp. 85–89.
ICPRICPR-v2-2004-BeierholmB #music #speech
Speech Music Discrimination Using Class-Specific Features (TB, PMB), pp. 379–382.
ICPRICPR-v2-2004-CaetanoCB #algorithm #comparison #distance #metric
A Comparison of Junction Tree and Relaxation Algorithms for Point Matching using Different Distance Metrics (TSC, TC, DACB), pp. 124–127.
ICPRICPR-v2-2004-Clocksin #order #recognition
Handwritten Syriac Character Recognition using Order Structure Invariance (WFC), pp. 562–565.
ICPRICPR-v2-2004-DengC #image #implementation #segmentation
Unsupervised Image Segmentation Using A Simple MRF Model with A New Implementation Scheme (HD, DAC), pp. 691–694.
ICPRICPR-v2-2004-EngWKY #detection #framework #robust
A Bayesian Framework for Robust Human Detection and Occlusion Handling using Human Shape Model (HLE, JW, AHK, WYY), pp. 257–260.
ICPRICPR-v2-2004-FarmerBJ #feature model #random #scalability
Large Scale Feature Selection Using Modified Random Mutation Hill Climbing (MEF, SB, AKJ), pp. 287–290.
ICPRICPR-v2-2004-FayolleRT #3d #algorithm #modelling #re-engineering #search-based
3D Shape Reconstruction of Template Models Using Genetic Algorithms (PAF, CR, CT), pp. 269–272.
ICPRICPR-v2-2004-FritzPB #information management #recognition
Object Recognition Using Local Information Content (GF, LP, HB), pp. 15–18.
ICPRICPR-v2-2004-GaoHBW #analysis #markov #process
Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
ICPRICPR-v2-2004-GritaiSS #analysis #invariant #on the
On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
ICPRICPR-v2-2004-HuR #classification #clustering #probability
Probability Table Compression Using Distributional Clustering for Scanning N-Tuple Classifiers (JH, ER), pp. 533–536.
ICPRICPR-v2-2004-Ikeda #approximate #re-engineering
An Accurate Shape Reconstruction from Photometric Stereo Using Four Approximations of Surface Normal (OI), pp. 220–223.
ICPRICPR-v2-2004-IurgelR #classification #documentation #probability
Spoken Document Classification with SVMs Using Linguistic Unit Weighting and Probabilistic Couplers (UI, GR), pp. 667–670.
ICPRICPR-v2-2004-KaratzasA #image #segmentation #web
Text Extraction from Web Images Based on A Split-and-Merge Segmentation Method Using Colour Perception (DK, AA), pp. 634–637.
ICPRICPR-v2-2004-KimBSCCKC #image #verification
Scene Text Extraction in Natural Scene Images using Hierarchical Feature Combining and Verification (KCK, HRB, YJS, YWC, SYC, KKK, YC), pp. 679–682.
ICPRICPR-v2-2004-KimuraKK #image #multi #retrieval #similarity
Acceleration of Similarity-Based Partial Image Retrieval using Multistage Vector Quantization (AK, TK, KK), pp. 993–996.
ICPRICPR-v2-2004-LindeL #higher-order #recognition
Object Recognition Using Composed Receptive Field Histograms of Higher Dimensionality (OL, TL), pp. 1–6.
ICPRICPR-v2-2004-LinYL #analysis #incremental
Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
ICPRICPR-v2-2004-LiuLW
Free Form Shape Matching Using Deterministic Annealing and Softassign (YL, LL, YW), pp. 128–131.
ICPRICPR-v2-2004-LourakisAM #approach #graph #information management #similarity
A Graph-Based Approach to Corner Matching Using Mutual Information as a Local Similarity Measure (MIAL, AAA, KM), pp. 827–830.
ICPRICPR-v2-2004-MachadoMC #adaptation #clustering #image
The Influence of the Noise in the Restoration of Solar Radio Images using Adaptive Regularization Techniques Based on Clustering (WRSM, NDAM, JERC), pp. 371–374.
ICPRICPR-v2-2004-MaD #adaptation #classification #word
Adaptive Word Style Classification Using a Gaussian Mixture Model (HM, DSD), pp. 606–609.
ICPRICPR-v2-2004-MozaffarifK #classification #comparison #recognition
Feature Comparison between Fractal Codes and Wavelet Transform in Handwritten Alphanumeric Recognition Using SVM Classifier (SM, KF, HRK), pp. 331–334.
ICPRICPR-v2-2004-OhteraH #identification
Faxed Form Identification using Histogram of the Hough-Space (RO, TH), pp. 566–569.
ICPRICPR-v2-2004-OudotPMM #adaptation #concept #online #recognition #self
Self-Supervised Writer Adaptation using Perceptive Concepts: Application to On-Line Text Recognition (LO, LP, AM, MM), pp. 598–601.
ICPRICPR-v2-2004-QuanZ #adaptation
Perceptual Criterion Based Fragile Audio Watermarking Using Adaptive Wavelet Packets (XQ, HZ), pp. 867–870.
ICPRICPR-v2-2004-Rodriguez-DamianCFS #classification
Pollen Classification using Brightness-Based and Shape-Based Descriptors (MRD, EC, AF, PdSO), pp. 212–215.
ICPRICPR-v2-2004-SahaDC #metric
CBIR using Perception based Texture and Colour Measures (SKS, AKD, BC), pp. 985–988.
ICPRICPR-v2-2004-SantamariaBS #analysis #statistics
Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
ICPRICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online
Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
ICPRICPR-v2-2004-SchlapbachB #identification
Off-line Handwriting Identification Using HMM Based Recognizers (AS, HB), pp. 654–658.
ICPRICPR-v2-2004-SenerG #analysis #component #independence
Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
ICPRICPR-v2-2004-SerbyKG #multi #probability
Probabilistic Object Tracking Using Multiple Features (DS, EKM, LJVG), pp. 184–187.
ICPRICPR-v2-2004-ShihL #analysis #detection #video
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
ICPRICPR-v2-2004-SuW #normalisation
Decomposing Chinese Characters into Stroke Segments Using SOGD Filters and Orientation Normalization (YMS, JFW), pp. 351–354.
ICPRICPR-v2-2004-TahirBKA #classification #feature model
Feature Selection using Tabu Search for Improving the Classification Rate of Prostate Needle Biopsies (MAT, AB, FK, AA), pp. 335–338.
ICPRICPR-v2-2004-ToyozumiYMKMST #case study #recognition #segmentation
A Study of Symbol Segmentation Method for Handwritten Mathematical Formula Recognition using Mathematical Structure Information (KT, NY, KM, TK, KM, YS, TT), pp. 630–633.
ICPRICPR-v2-2004-VargaB04a #recognition
Off-line Handwritten Textline Recognition Using a Mixture of Natural and Synthetic Training Data (TV, HB), pp. 545–549.
ICPRICPR-v2-2004-VillegerAB #image #probability
Image Disocclusion Using a Probabilistic Gradient Orientation (EV, GA, LBF), pp. 52–55.
ICPRICPR-v2-2004-Yang
Sammon’s Nonlinear Mapping Using Geodesic Distances (LY), pp. 303–306.
ICPRICPR-v2-2004-YuXA #graph #sequence #video
Reconstructing a Dynamic Surface from Video Sequences Using Graph Cuts in 4D Space-Time (TY, NX, NA), pp. 245–248.
ICPRICPR-v2-2004-ZhangLG #detection #realtime
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces (DZ, SZL, DGP), pp. 411–414.
ICPRICPR-v2-2004-ZhengZZ #realtime #recognition
Real-Time Face Recognition Using Gram-Schmidt Orthogonalization for LDA (WZ, CZ, LZ), pp. 403–406.
ICPRICPR-v2-2004-ZiouB #analysis #finite #image #learning
Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
ICPRICPR-v3-2004-BadawyK #retrieval
Shape Retrieval using Concavity Trees (OEB, MK), pp. 111–115.
ICPRICPR-v3-2004-BagciAKC #eye tracking #markov #modelling
Eye Tracking Using Markov Models (AMB, RA, AAK, EC), pp. 818–821.
ICPRICPR-v3-2004-BaiYH #graph
Graph Matching using Spectral Embedding and Alignment (XB, HY, ERH), pp. 398–401.
ICPRICPR-v3-2004-BarnardO #adaptation #robust #segmentation
Robust Playfield Segmentation using MAP Adaptation (MB, JMO), pp. 610–613.
ICPRICPR-v3-2004-BoccignoneCMP #segmentation #video
Using Attention for Video Segmentation (GB, AC, VM, AP), pp. 838–841.
ICPRICPR-v3-2004-CarneiroJ
Pruning Local Feature Correspondences Using Shape Context (GC, ADJ), pp. 16–19.
ICPRICPR-v3-2004-ChenB #3d #image #recognition
3D Free-Form Object Recognition in Range Images Using Local Surface Patches (HC, BB), pp. 136–139.
ICPRICPR-v3-2004-DavidL #search-based
Signal Discrimination Using a Support Vector Machine for Genetic Syndrome Diagnosis (AD, BL), pp. 490–493.
ICPRICPR-v3-2004-FaragEGF #detection #recognition
Detection and Recognition of Lung Abnormalities Using Deformable Templates (AAF, AEB, GLG, RF), pp. 738–741.
ICPRICPR-v3-2004-FurukawaKMSMT #3d #approximate #estimation #image #physics
Spine Posture Estimation Method from Human Images Using 3D Spine Model — Computation of the rough approximation of the physical forces working on vertebral bodies (DF, TK, KM, YS, KM, TT), pp. 322–325.
ICPRICPR-v3-2004-FusseneggerOPA #detection #recognition #segmentation
Object Recognition Using Segmentation for Feature Detection (MF, AO, AP, PA), pp. 41–44.
ICPRICPR-v3-2004-GoriMS #graph #random
Graph matching using Random Walks (MG, MM, LS), pp. 394–397.
ICPRICPR-v3-2004-HardingE #fourier #gesture
Recognizing Hand Gesture using Fourier Descriptors (PRGH, TJE), pp. 286–289.
ICPRICPR-v3-2004-HautamakiKF #detection #graph #nearest neighbour
Outlier Detection Using k-Nearest Neighbour Graph (VH, IK, PF), pp. 430–433.
ICPRICPR-v3-2004-HuangMP #hybrid #markov #random #recognition
A Hybrid Face Recognition Method using Markov Random Fields (RH, DNM, VP), pp. 157–160.
ICPRICPR-v3-2004-IrnigerB #database #graph
Graph Database Filtering Using Decision Trees (CI, HB), pp. 383–388.
ICPRICPR-v3-2004-IshiiO #3d
Perfect Perspective Projection using a Varifocal Mirror and Its Application to Three-Dimensional Close-Up Imaging (AI, RO), pp. 270–273.
ICPRICPR-v3-2004-JagmohanSA #estimation #kernel
Dense Stereo Matching Using Kernel Maximum Likelihood Estimation (AJ, MKS, NA), pp. 28–31.
ICPRICPR-v3-2004-KawanishiKKT #adaptation #algorithm #performance
A Fast Template Matching Algorithm with Adaptive Skipping Using Inner-Subtemplates’ Distances (TK, TK, KK, ST), pp. 654–657.
ICPRICPR-v3-2004-KuhlKWK #classification
Training of Classifiers Using Virtual Samples Only (AK, LK, CW, UK), pp. 418–421.
ICPRICPR-v3-2004-LanMZ #detection #multimodal
Multi-level Anchorperson Detection Using Multimodal Association (DJL, YFM, HZ), pp. 890–893.
ICPRICPR-v3-2004-LiH #recognition
Face Recognition using Shading-Based Curvature Attributes (YL, ERH), pp. 538–541.
ICPRICPR-v3-2004-MaPH #recognition
Using B-Spline Curves for Hand Recognition (YM, FEP, WTH), pp. 274–277.
ICPRICPR-v3-2004-MatsuiCUM #markov #monte carlo #recognition
Bayesian Face Recognition using a Markov Chain Monte Carlo Method (AM, SC, FU, TM), pp. 918–921.
ICPRICPR-v3-2004-McCallT #analysis #invariant
Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
ICPRICPR-v3-2004-MoW #modelling #segmentation #video
Video Modelling and Segmentation Using Gaussian Mixture Models (XM, RW), pp. 854–857.
ICPRICPR-v3-2004-NaderiMC #algorithm #image #optimisation #verification
1D-HMM for Face Verification: Model Optimization Using Improved Algorithm and Intelligent Selection of Training Images (SN, MSM, NMC), pp. 330–333.
ICPRICPR-v3-2004-NaganumaTMM #analysis
Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
ICPRICPR-v3-2004-NishiF #analysis #video
Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
ICPRICPR-v3-2004-NovakLCMAHA #analysis #markov #modelling
Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
ICPRICPR-v3-2004-PalenichkaMZ #image #locality #multi #performance
Fast Object Localization using Multi-Scale Image Relevance Function (RMP, RM, MBZ), pp. 227–230.
ICPRICPR-v3-2004-Pernkopf #3d
3D Surface Inspection using Coupled HMMs (FP), pp. 223–226.
ICPRICPR-v3-2004-RamstromC #detection
Object Detection using Background Context (OR, HIC), pp. 45–48.
ICPRICPR-v3-2004-ReiterR #classification #multi #programming #segmentation
Segmentation and Classification of Meeting Events using Multiple Classifier Fusion and Dynamic Programming (SR, GR), pp. 434–437.
ICPRICPR-v3-2004-SalbergH #estimation #segmentation
Object Segmentation and Feature Estimation Using Shadows (ABS, AH), pp. 674–678.
ICPRICPR-v3-2004-SatakeS #multi
Multiple Target Tracking by Appearance-Based Condensation Tracker using Structure Information (JS, TS), pp. 294–297.
ICPRICPR-v3-2004-ShanWQT #gesture #recognition
Gesture Recognition Using Temporal Template Based Trajectories (CS, YW, XQ, TT), pp. 954–957.
ICPRICPR-v3-2004-SolemH
Estimating Surface Shape and Extending Known Structure using Specular Reflections (JES, AH), pp. 173–176.
ICPRICPR-v3-2004-SotocaPK #image #multi
Unsupervised Band Selection for Multispectral Images using Information Theory (JMS, FP, ACK), pp. 510–513.
ICPRICPR-v3-2004-SotocaSP #multi #naive bayes #set
Attribute Relevance in Multiclass Data Sets Using the Naive Bayes Rule (JMS, JSS, FP), pp. 426–429.
ICPRICPR-v3-2004-SugimotoTTO #detection #image #sequence #visualisation
Obstacle Detection Using Millimeter-Wave Radar and Its Visualization on Image Sequence (SS, HT, HT, MO), pp. 342–345.
ICPRICPR-v3-2004-UmedaGR #constraints #image
Registration of Range and Color Images Using Gradient Constraints and Range Intensity Images (KU, GG, MR), pp. 12–15.
ICPRICPR-v3-2004-VosBASMVV #statistics
A Statistical Shape Model without Using Landmarks (FV, PWdB, JGMA, GJS, MM, LJvV, AMV), pp. 714–717.
ICPRICPR-v3-2004-WuZZ #feature model #linear
Relevant Linear Feature Extraction Using Side-information and Unlabeled Data (FW, YZ, CZ), pp. 582–585.
ICPRICPR-v3-2004-ZhangM #recognition
Recognition of Expression Variant Faces Using Weighted Subspaces (YZ, AMM), pp. 149–152.
ICPRICPR-v4-2004-ArnabatCM #3d #consistency #modelling #multi #sequence
3D Modeling from Turntable Sequences Using Dense Stereo Carving and Multi-View Consistency (JA, SC, GGM), pp. 36–39.
ICPRICPR-v4-2004-BelkhoucheQGJ #2d #image
Binary Image Transformation Using Two-Dimensional Chaotic Maps (FB, UQ, IG, DJ), pp. 823–826.
ICPRICPR-v4-2004-BhanuZ #recognition
Face Recognition from Face Profile Using Dynamic Time Warping (BB, XZ), pp. 499–502.
ICPRICPR-v4-2004-BoubchirFB #approximate
Bayesian Denoising in the Wavelet-Domain Using an Analytical Approximate a-Stable Prior (LB, MJF, DB), pp. 889–892.
ICPRICPR-v4-2004-BradleyL #estimation
Sample Size Estimation using the Receiver Operating Characteristic Curve (APB, IDL), pp. 428–431.
ICPRICPR-v4-2004-ChanHSP #detection #semantics #video
Detecting Rare Events in Video Using Semantic Primitives with HMM (MTC, AH, JS, MP), pp. 150–154.
ICPRICPR-v4-2004-CongEPB #equation #morphism
Shape Metamorphism using p-Laplacian Equation (GC, ME, BP, GB), pp. 15–18.
ICPRICPR-v4-2004-DebiollesOA #network
Combined Use of Partial Least Squares Regression and Neural Network for Diagnosis Tasks (AD, LO, PA), pp. 573–576.
ICPRICPR-v4-2004-DehaisDMC #artificial reality #perspective #realtime #sequence #video
Augmented Reality through Real-Time Tracking of Video Sequences Using a Panoramic View (CD, MD, GM, VC), pp. 995–998.
ICPRICPR-v4-2004-DharaC #approach #estimation #hybrid #predict #video
Video Motion Estimation Using Prediction Based Hybrid Approach (BCD, BC), pp. 737–740.
ICPRICPR-v4-2004-FabletJB #automation #estimation #image #learning #statistics
Automatic Fish Age Estimation from Otolith Images using Statistical Learning (RF, NLJ, AB), pp. 503–506.
ICPRICPR-v4-2004-FanL #image #verification
The Using of Thermal Images of Palm-dorsa Vein-patterns for Biometric Verification (KCF, CLL), pp. 450–453.
ICPRICPR-v4-2004-FigueroaLBCM #graph #representation
Tracking Soccer Players using the Graph Representation (PJF, NJL, RMLB, IC, GGM), pp. 787–790.
ICPRICPR-v4-2004-FuYHT #clustering #detection #multi
Mixture Clustering Using Multidimensional Histograms for Skin Detection (ZF, JY, WH, TT), pp. 549–552.
ICPRICPR-v4-2004-GaoA #parallel
Single Camera Stereo using Planar Parallel Plate (CG, NA), pp. 108–111.
ICPRICPR-v4-2004-Gong #estimation #programming
Motion Estimation using Dynamic Programming with Selective Path Search (MG), pp. 203–206.
ICPRICPR-v4-2004-HagaSY #analysis #detection
Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
ICPRICPR-v4-2004-HanafiahYNK #comprehension
Understanding Inexplicit Utterances Using Vision for Helper Robots (ZMH, CY, AN, YK), pp. 925–928.
ICPRICPR-v4-2004-HaritC #video
Video Shot Interpretation using Principles of Perceptual Prominence and Perceptual Grouping in Spatio-Temporal Domain (GH, SC), pp. 256–259.
ICPRICPR-v4-2004-HottaKM #category theory #nearest neighbour #pattern matching #pattern recognition #recognition
Pattern Recognition Using Average Patterns of Categorical k-Nearest Neighbors (SH, SK, SM), pp. 412–415.
ICPRICPR-v4-2004-IrfanogluGA #3d #automation #recognition
3D Shape-based Face Recognition using Automatically Registered Facial Surfaces (MOI, BG, LA), pp. 183–186.
ICPRICPR-v4-2004-KangCM #invariant
Object Reacquisition Using Invariant Appearance Model (JK, IC, GGM), pp. 759–762.
ICPRICPR-v4-2004-KimP #hypermedia
Geographic Hypermedia using Search Space Transformation (SSK, JHP), pp. 368–371.
ICPRICPR-v4-2004-KimPL #bound
Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
ICPRICPR-v4-2004-KobayashiO #higher-order #identification #multi #polynomial
Action and Simultaneous Multiple-Person Identification Using Cubic Higher-Order Local Auto-Correlation (TK, NO), pp. 741–744.
ICPRICPR-v4-2004-KrichenMGD #identification
Iris Identification Using Wavelet Packets (EK, MAM, SGS, BD), pp. 335–338.
ICPRICPR-v4-2004-LiuSCH #clustering #personalisation #verification
Personalized Face Verification System Using Owner-Specific Cluster-Dependent LDA-Subspace (HCL, CHS, YHC, YPH), pp. 344–347.
ICPRICPR-v4-2004-Lopez-FrancoB #algebra #framework #geometry
Unified Model for Omnidirectional Vision Using the Conformal Geometric Algebra Framework (CLF, EBC), pp. 48–51.
ICPRICPR-v4-2004-MaityK #image
An Image Watermarking Scheme using HVS Characteristics and Spread Transform (SPM, MKK), pp. 869–872.
ICPRICPR-v4-2004-McKennaN #learning
Learning Spatial Context from Tracking using Penalised Likelihoods (SJM, HNC), pp. 138–141.
ICPRICPR-v4-2004-MurakitaII #markov #monte carlo
Human Tracking using Floor Sensors based on the Markov Chain Monte Carlo Method (TM, TI, HI), pp. 917–920.
ICPRICPR-v4-2004-NakamuraFTMYMTI #image #recognition
Eigen Nodule: View-Based Recognition of Lung Nodule in Chest X-ray CT Images Using Subspace Method (YN, GF, HT, SM, SY, TM, YT, TI), pp. 681–684.
ICPRICPR-v4-2004-NumadaNKKT #image #polynomial
Sharpening of CT Images by Cubic Interpolation using B-Spline (MN, TN, KK, HK, HT), pp. 701–704.
ICPRICPR-v4-2004-OuMF #classification #multi #network
Multiclass Pattern Classification Using Neural Networks (GO, YLM, LAF), pp. 585–588.
ICPRICPR-v4-2004-OyekoyaS #behaviour #visual notation
Exploring Human Eye Behaviour using a Model of Visual Attention (OO, FS), pp. 945–948.
ICPRICPR-v4-2004-PeursumBVW #segmentation
Human Action Segmentation via Controlled Use of Missing Data in HMMs (PP, HHB, SV, GAWW), pp. 440–445.
ICPRICPR-v4-2004-PrasadSK #image #set
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images (MNP, AS, IK), pp. 515–518.
ICPRICPR-v4-2004-SangiHS #analysis #difference #metric
Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
ICPRICPR-v4-2004-SatoKYI #interface
An Immersive Telepresence System with a Locomotion Interface Using High-Resolution Omnidirectional Movies (SI, TS, MK, NY), pp. 396–399.
ICPRICPR-v4-2004-StevensSEM #navigation
Motion Imagery Navigation Using Terrain Estimates (MRS, MS, RSE, JCM), pp. 272–275.
ICPRICPR-v4-2004-SungLPL #bound #locality #recognition
Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
ICPRICPR-v4-2004-TaguchiOA #performance #visual notation
Fast Visual Search Using Simplified Pruning Rules — Streamlined Active Search (ST, SO, HA), pp. 937–940.
ICPRICPR-v4-2004-TanakaOKK #locality #mobile #probability
Probabilistic Localization for Mobile Robots using Incomplete Maps (KT, NO, EK, YK), pp. 709–712.
ICPRICPR-v4-2004-TanCZ #image #kernel #metric #robust
Robust Image Denoising Using Kernel-Induced Measures (KT, SC, DZ), pp. 685–688.
ICPRICPR-v4-2004-TothSWA #clustering #detection
Detection of Moving Shadows using Mean Shift Clustering and a Significance Test (DT, IS, AW, TA), pp. 260–263.
ICPRICPR-v4-2004-WallhoffZRP
Face Tracking in Meeting Room Scenarios Using Omnidirectional Views (FW, MZ, GR, IP), pp. 933–936.
ICPRICPR-v4-2004-WuWZ #energy #recognition
Palmprint Recognition Using Directional Line Energy Feature (XW, KW, DZ), pp. 475–478.
ICPRICPR-v4-2004-XuTAA #generative #graph #image
Generating Omnifocus Images Using Graph Cuts and a New Focus Measure (NX, KHT, HA, NA), pp. 697–700.
ICPRICPR-v4-2004-YamamotoYS #gesture #interface
Arm-Pointing Gesture Interface Using Surrounded Stereo Cameras System (YY, IY, KS), pp. 965–970.
ICPRICPR-v4-2004-YingH04a #detection
Catadioptric Line Features Detection using Hough Transform (XY, ZH), pp. 839–842.
ICPRICPR-v4-2004-ZaveriMD #image #information retrieval #modelling #multi #sequence
Tracking of Point Targets in IR Image Sequence using Multiple Model Based Particle Filtering and MRF Based Data Association (MAZ, SNM, UBD), pp. 729–732.
ICPRICPR-v4-2004-ZhaiRS #detection #finite #state machine
Conversation Detection in Feature Films Using Finite State Machines (YZ, ZR, MS), pp. 458–461.
ICPRICPR-v4-2004-ZhangLT #analysis #image #recognition #word
Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
ICPRICPR-v4-2004-ZhouWG #estimation
Tracking Periodic Motion using Bayesian Estimation (HZ, AMW, PRG), pp. 725–728.
KDDKDD-2004-AliS #architecture #collaboration #distributed #named #recommendation
TiVo: making show recommendations using a distributed collaborative filtering architecture (KA, WvS), pp. 394–401.
KDDKDD-2004-JaroszewiczS #network
Interestingness of frequent itemsets using Bayesian networks as background knowledge (SJ, DAS), pp. 178–186.
KDDKDD-2004-MorinagaY #finite #roadmap #topic
Tracking dynamics of topic trends using a finite mixture model (SM, KY), pp. 811–816.
KDDKDD-2004-TruongLB #dataset #learning #random
Learning a complex metabolomic dataset using random forests and support vector machines (YT, XL, CB), pp. 835–840.
KDDKDD-2004-WuGH #clustering #mining #network
Mining scale-free networks using geodesic clustering (AYW, MG, JH), pp. 719–724.
KDDKDD-2004-ZhaoLTS #coordination #design #named #parallel #testing
V-Miner: using enhanced parallel coordinates to mine product design and test data (KZ, BL, TMT, AS), pp. 494–502.
KRKR-2004-AmgoudC #on the
On the Use of an ATMS for Handling Conflicting Desires (LA, CC), pp. 194–202.
LSOLSO-2004-FalboRBT #how #learning #risk management
Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
SEKESEKE-2004-CostagliolaFGTV #development #predict #web
Using COSMIC-FFP for Predicting Web Application Development Effort (GC, FF, CG, GT, GV), pp. 439–444.
SEKESEKE-2004-Cruz-LemusGORP #diagrams #fuzzy #predict #statechart #uml
Predicting UML Statechart Diagrams Understandability Using Fuzzy Logic-Based Techniques (JACL, MG, JAO, FPR, MP), pp. 238–245.
SEKESEKE-2004-CubraniM #automation #categorisation #debugging
Automatic bug triage using text categorization (DC, GCM), pp. 92–97.
SEKESEKE-2004-GermanHJ #evolution #visualisation
Visualizing the evolution of software using softChange (DMG, AH, NJ), pp. 336–341.
SEKESEKE-2004-GomesPCPSFB #composition #diagrams #reuse #uml
Reuse of UML Class Diagrams Using Case-Based Composition (PG, FCP, PC, PP, NS, JLF, CB), pp. 258–263.
SEKESEKE-2004-Hobbs #design pattern #specification
Using A Scenario Specification Language to Add Context to Design Patterns (RLH), pp. 330–335.
SEKESEKE-2004-JahnkeB #architecture #clustering #reverse engineering
Reverse Engineering Software Architecture using Rough Clusters (JHJ, YB), pp. 270–275.
SEKESEKE-2004-LiLCWL
Extracting Minimal Non-Redundant Implication Rules by Using Quantized Closed Itemset Lattice (YL, ZL, WC, QW, WL), pp. 402–405.
SEKESEKE-2004-WeigangCDM #distributed #grid #knowledge base #realtime
Distributed Knowledge Based System Using Grid Computing for Real Time Air Traffic Synchronization — ATFMGC (WL, DAC, MVPD, ACMAdM), pp. 396–401.
SEKESEKE-2004-WihartoS #logic #xml
Future Proofing and Retargeting Application Logic Using O2XML (MW, PS), pp. 173–178.
SIGIRSIGIR-2004-AmitayCLS #evaluation #scalability #set
Scaling IR-system evaluation using term relevance sets (EA, DC, RL, AS), pp. 10–17.
SIGIRSIGIR-2004-BellGL #challenge
Challenges in using lifetime personal information stores (GB, JG, RL), p. 1.
SIGIRSIGIR-2004-Cowans #information retrieval #process
Information retrieval using hierarchical dirichlet processes (PJC), pp. 564–565.
SIGIRSIGIR-2004-DiazJ #precise #predict #query
Using temporal profiles of queries for precision prediction (FD, RJ), pp. 18–24.
SIGIRSIGIR-2004-FanGLX #automation #concept #image #representation
Automatic image annotation by using concept-sensitive salient objects for image content representation (JF, YG, HL, GX), pp. 361–368.
SIGIRSIGIR-2004-GreevyS
Classifying racist texts using a support vector machine (EG, AFS), pp. 468–469.
SIGIRSIGIR-2004-GuL #comparison #documentation #feedback #information retrieval
Comparison of using passages and documents for blind relevance feedback in information retrieval (ZG, ML), pp. 482–483.
SIGIRSIGIR-2004-KimCK #dependence #documentation
Refining term weights of documents using term dependencies (HSK, IC, MK), pp. 552–553.
SIGIRSIGIR-2004-KimSR #approach #information retrieval #word
Information retrieval using word senses: root sense tagging approach (SBK, HCS, HCR), pp. 258–265.
SIGIRSIGIR-2004-LiuC #clustering #modelling #retrieval
Cluster-based retrieval using language models (XL, WBC), pp. 186–193.
SIGIRSIGIR-2004-MaS #information management
Information extraction using two-phase pattern discovery (LM, JS), pp. 534–535.
SIGIRSIGIR-2004-MladenicBGM #classification #feature model #interactive #linear #modelling
Feature selection using linear classifier weights: interaction with classification models (DM, JB, MG, NMF), pp. 234–241.
SIGIRSIGIR-2004-Ogilvie #comprehension #generative #information retrieval #modelling #probability
Understanding combination of evidence using generative probabilistic models for information retrieval (PO), p. 603.
SIGIRSIGIR-2004-Zhang #adaptation #classification
Using bayesian priors to combine classifiers for adaptive filtering (YZ0), pp. 345–352.
SIGIRSIGIR-2004-ZhangPZ #machine learning #recognition
Focused named entity recognition using machine learning (LZ, YP, TZ), pp. 281–288.
SIGIRSIGIR-2004-ZhangV #automation #information retrieval #web
Using the web for automated translation extraction in cross-language information retrieval (YZ, PV), pp. 162–169.
SPLCSPLC-2004-CzarneckiHE #feature model #modelling #staged
Staged Configuration Using Feature Models (KC, SH, UWE), pp. 266–283.
SPLCSPLC-2004-Greenfield04a #domain-specific language #framework #tool support
Using Domain-Specific Languages, Patterns, Frameworks, and Tools to Assemble Applications (JG), p. 324.
UMLUML-2004-DologN #collaboration #diagrams #feature model #modelling #uml
Using UML-based Feature Models and UML Collaboration Diagrams to Information Modelling for Web-Based Applications (PD, WN), pp. 425–439.
UMLUML-2004-GoniE #concurrent #ocl #precise #uml
Building Precise UML Constructs to Model Concurrency Using OCL (AG, YE), pp. 212–225.
ECOOPECOOP-2004-SutterTD #constraints #java #library
Customization of Java Library Classes Using Type Constraints and Profile Information (BDS, FT, JD), pp. 585–610.
ECOOPECOOP-2004-VitenbergKS #concurrent #database #program analysis
Increasing Concurrency in Databases Using Program Analysis (RV, KK, AKS), pp. 341–363.
AdaEuropeAdaEurope-2004-AlvarezPOSN #ada #education #framework #platform #realtime
Teaching Real-Time Systems Around a Digital Model Railroad Platform Using Ada (, JAP, FJO, PS, PJNL), pp. 213–224.
AdaEuropeAdaEurope-2004-VrandecicS #ada #xml
XML4Ada95 Accessing XML Using the DOM in Ada95 (ZV, DS), pp. 178–189.
LOPSTRLOPSTR-2004-Lopez-GarciaBH #analysis #logic programming #source code
Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
PADLPADL-2004-MoralesCH #c #compilation #prolog
Improved Compilation of Prolog to C Using Moded Types and Determinism Information (JFM, MC, MVH), pp. 86–103.
LOPSTRPDCL-2004-ColvinGHHNS #logic programming #refinement #source code #specification
Developing Logic Programs from Specifications Using Stepwise Refinement (RC, LG, IJH, DH, RN, PAS), pp. 66–89.
LOPSTRPDCL-2004-LeuschelCBV #deduction
Specialising Interpreters Using Offline Partial Deduction (ML, SJC, MB, WV), pp. 340–375.
PLDIPLDI-2004-WhaleyL #alias #analysis #diagrams #pointer
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
PLDIPLDI-2004-YahavR #abstraction #safety #verification
Verifying safety properties using separation and heterogeneous abstractions (EY, GR), pp. 25–34.
PLDIPLDI-2004-ZhongOSD #array
Array regrouping and structure splitting using whole-program reference affinity (YZ, MO, XS, CD), pp. 255–266.
POPLPOPL-2004-GulwaniN #random
Global value numbering using random interpretation (SG, GCN), pp. 342–352.
POPLPOPL-2004-SankaranarayananSM #generative #invariant
Non-linear loop invariant generation using Gröbner bases (SS, HS, ZM), pp. 318–329.
AdaSIGAda-2004-Brown #ada #education
Teaching graphics using Ada (CWB), pp. 47–50.
RERE-2004-LaneyBJN #problem #requirements
Composing Requirements Using Problem Frames (RCL, LB, MJ, BN), pp. 122–131.
RERE-2004-LinNIJ #bound #problem #security
Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
RERE-2004-NurmulianiZW #requirements #sorting
Using Card Sorting Technique to Classify Requirements Change (NN, DZ, SPW), pp. 240–248.
SACSAC-J-2003-BorgerCR04 #formal method #on the #state machine #uml
On formalizing UML state machines using ASM (EB, AC, ER), pp. 287–292.
ASEASE-2004-Arshad #automation #configuration management
Automated Dynamic Reconfiguration using AI Planning (NA), pp. 402–405.
ASEASE-2004-Betin-CanB #concurrent #programming
Verifiable Concurrent Programming Using Concurrency Controllers (ABC, TB), pp. 248–257.
ASEASE-2004-BreuK #mining
Aspect Mining Using Event Traces (SB, JK), pp. 310–315.
ASEASE-2004-HotzKW
Using a Structure-based Configuration Tool for Product Derivation (LH, TK, KW), pp. 388–391.
ASEASE-2004-KhorG #algorithm #automation #branch #concept analysis #search-based #testing
Using a Genetic Algorithm and Formal Concept Analysis to Generate Branch Coverage Test Data Automatically (SK, PG), pp. 346–349.
ASEASE-2004-MemonX #automation #fault #persistent #testing
Using Transient/Persistent Errors to Develop Automated Test Oracles for Event-Driven Software (AMM, QX), pp. 186–195.
FSEFSE-2004-CabalT #database #metric #sql #testing
Using an SQL coverage measurement for testing database applications (MJSC, JT), pp. 253–262.
FSEFSE-2004-DingelL #analysis #automation #concurrent #safety #source code #txl
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
FSEFSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support
Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
ICSEICSE-2004-BriandLW #empirical #simulation #statechart #test coverage
Using Simulation to Empirically Investigate Test Coverage Criteria Based on Statechart (LCB, YL, YW), pp. 86–95.
ICSEICSE-2004-CervantesH #adaptation #component
Autonomous Adaptation to Dynamic Availability Using a Service-Oriented Component Model (HC, RSH), pp. 614–623.
ICSEICSE-2004-ChatterjeeAASV #database #development #version control
Using Data Versioning in Database Application Development (RC, GA, SA, BS, RV), pp. 315–325.
ICSEICSE-2004-Jones #fault #locality #visualisation
Fault Localization Using Visualization of Test Information (JAJ), pp. 54–56.
ICSEICSE-2004-RyanW #evolution #protocol
Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
ICSEICSE-2004-TurnerZKRBBBKLR #case study #experience #web #web service
Using Web Service Technologies to Create an Information Broker: An Experience Report (MT, FZ, IAK, MR, DB, KHB, PB, JAK, PJL, MR), pp. 552–561.
ICSEICSE-2004-WangR #bytecode #java #slicing #source code
Using Compressed Bytecode Traces for Slicing Java Programs (TW, AR), pp. 512–521.
ICSEICSE-2004-ZhangGZ #diagrams #dynamic analysis #order #performance #slicing
Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams (XZ, RG, YZ), pp. 502–511.
SACSAC-2004-AbulAPB #generative
Finding differentially expressed genes: pattern generation using Q-values (OA, RA, FP, KB), pp. 138–142.
SACSAC-2004-Al-SadiA #algorithm #fault tolerance #performance
Efficient fault-tolerant routing algorithm for OTIS-cube using unsafety vectors (JAS, AMA), pp. 1426–1430.
SACSAC-2004-AversanoBCET #approach #evolution #process #towards
Evolution of business processes towards eBusiness using a critiquing approach (LA, TB, GC, RE, MT), pp. 1351–1358.
SACSAC-2004-BistarelliFO #constraints #detection #modelling #problem
Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
SACSAC-2004-BlaserSMJKL #fault
Potential prevention of medical errors in casualty surgery by using information technology (RB, MS, DM, PJ, KK, RL), pp. 285–290.
SACSAC-2004-BoughaciD #metaheuristic #optimisation #problem #satisfiability
Solving weighted Max-Sat optimization problems using a Taboo Scatter Search metaheuristic (DB, HD), pp. 35–36.
SACSAC-2004-BrowneS #feedback #information retrieval #video
Video information retrieval using objects and ostensive relevance feedback (PB, AFS), pp. 1084–1090.
SACSAC-2004-CaldeiraMR #algorithm #hybrid #problem
Using a hybrid Evolutionary-Taboo Algorithm to solve Job Shop Problem (JPC, FM, ACR), pp. 1446–1451.
SACSAC-2004-CarvalhoCSBF #mobile #network #security
Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
SACSAC-2004-Cebulla #architecture #concept #modelling
Modeling sociotechnical specifics using architectural concepts (MC), pp. 1559–1563.
SACSAC-2004-CoutoMS #biology #web
Classifying biological articles using web resources (FMC, BM, MJS), pp. 111–115.
SACSAC-2004-IoannidisSSPHM #standard #xml
Using XML and related standards to support Location Based Services (AI, MS, PS, GP, SH, LFM), pp. 1629–1633.
SACSAC-2004-KarabudakHB #algorithm #search-based
A call admission control scheme using genetic algorithms (DK, CCH, BB), pp. 1151–1158.
SACSAC-2004-KasturiA #clustering
Clustering of diverse genomic data using information fusion (JK, RA), pp. 116–120.
SACSAC-2004-Liew #algorithm #search-based
Using a genetic algorithm to optimize the gape of a snake jaw (CWL), pp. 975–979.
SACSAC-2004-LosadaDBB #ad hoc #fuzzy #quantifier #retrieval
Experiments on using fuzzy quantified sentences in adhoc retrieval (DEL, FDH, AB, SB), pp. 1059–1064.
SACSAC-2004-MarkWC #automation #code generation #modelling
Using semi-lagrangian formulations with automatic code generation for environmental modeling (PvdM, LW, GC), pp. 229–234.
SACSAC-2004-MatsushitaKI #distributed #peer-to-peer
Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
SACSAC-2004-MichaelsonHS #automaton #bound #named #programming
FSM-Hume: programming resource-limited systems using bounded automata (GM, KH, JS), pp. 1455–1461.
SACSAC-2004-PardedeRT #on the #xml
On using collection for aggregation and association relationships in XML object-relational storage (EP, JWR, DT), pp. 703–710.
SACSAC-2004-PereiraS #architecture #enterprise #framework
A method to define an Enterprise Architecture using the Zachman Framework (CMP, PMAS), pp. 1366–1371.
SACSAC-2004-PinhoT #image #physics
Morphing of image represented objects using a physical methodology (RRP, JMRST), pp. 10–15.
SACSAC-2004-RahalP #approach #categorisation
An optimized approach for KNN text categorization using P-trees (IR, WP), pp. 613–617.
SACSAC-2004-RamirezS #concurrent #constraints #distributed #logic programming #source code
Concurrent and distributed programming using constraint logic programs (RR, AES), pp. 508–509.
SACSAC-2004-SilvaCG #image
Diagnosis of lung nodule using Gini coefficient and skeletonization in computerized tomography images (ACS, PCPC, MG), pp. 243–248.
SACSAC-2004-TangMC #embedded #fixpoint #implementation #mobile #performance #verification
Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic (TYT, YSM, KCC), pp. 821–825.
SACSAC-2004-VincentR #analysis #framework
A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
SACSAC-2004-WeisserK #identification #metric #sequence #statistics
Identification of fundamental building blocks in protein sequences using statistical association measures (DKW, JKS), pp. 154–161.
GPCEGPCE-2004-SeefriedCK #domain-specific language #embedded #haskell #optimisation
Optimising Embedded DSLs Using Template Haskell (SS, MMTC, GK), pp. 186–205.
LDTALDTA-2004-GoldreiS #attribute grammar #formal method #off the shelf #verification
Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties (SG, AMS), pp. 33–54.
ASPLOSASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics
Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
ASPLOSASPLOS-2004-HuhCBS
Coherence decoupling: making use of incoherence (JH, JC, DB, GSS), pp. 97–106.
CCCC-2004-JohnsonM #memory management #multi
Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
CCCC-2004-OzerNG #approximate #probability
Stochastic Bit-Width Approximation Using Extreme Value Theory for Customizable Processors (, AN, DG), pp. 250–264.
CGOCGO-2004-HuS
Using Dynamic Binary Translation to Fuse Dependent Instructions (SH, JES), pp. 213–226.
CGOCGO-2004-RastelloFG #constraints #optimisation
Optimizing Translation Out of SSA Using Renaming Constraints (FR, FdF, CG), pp. 265–278.
CGOCGO-2004-WuPSRCA #memory management #profiling
Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
DACDAC-2004-Baron #configuration management #platform #roadmap
Trends in the use of re-configurable platforms (MB), p. 415.
DACDAC-2004-LeeZB #analysis
Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
DACDAC-2004-LiLH #configuration management #reduction
FPGA power reduction using configurable dual-Vdd (FL, YL, LH), pp. 735–740.
DACDAC-2004-LiYYYL #adaptation #algorithm #design #representation
A packing algorithm for non-manhattan hexagon/triangle placement design by using an adaptive o-tree representation (JL, TY, BY, JY, CL), pp. 646–651.
DACDAC-2004-LuJ #verification
Verifying a gigabit ethernet switch using SMV (YL, MJ), pp. 230–233.
DACDAC-2004-NakamuraHKYY #c #c++ #communication #hardware #performance
A fast hardware/software co-verification method for system-on-a-chip by using a C/C++ simulator and FPGA emulator with shared register communication (YN, KH, IK, KY, TY), pp. 299–304.
DACDAC-2004-ObermeierJ #polynomial
Quadratic placement using an improved timing model (BO, FMJ), pp. 705–710.
DACDAC-2004-OhbaT #design #embedded
An SoC design methodology using FPGAs and embedded microprocessors (NO, KT), pp. 747–752.
DACDAC-2004-SrivastavaSB #optimisation #power management #process #statistics
Statistical optimization of leakage power considering process variations using dual-Vth and sizing (AS, DS, DB), pp. 773–778.
DACDAC-2004-SrivastavaSB04a #power management
Power minimization using simultaneous gate sizing, dual-Vdd and dual-Vth assignment (AS, DS, DB), pp. 783–787.
DACDAC-2004-VanderhaegenB #automation #design #geometry #programming
Automated design of operational transconductance amplifiers using reversed geometric programming (JPV, RWB), pp. 133–138.
DATEDATE-DF-2004-BainbridgePF #design #self
The Design and Test of a Smartcard Chip Using a CHAIN Self-Timed Network-on-Chip (WJB, LAP, SBF), pp. 274–279.
DATEDATE-DF-2004-ChenYSMGH #design
Demonstration of a SiGe RF LNA Design Using IBM Design Kits in 0.18um SiGe BiCMOS Technology (YC, XY, DS, JM, JG, DLH), pp. 22–27.
DATEDATE-DF-2004-SchmittR #design #low cost #prototype #verification
Verification of a Microcontroller IP Core for System-on-a-Chip Designs Using Low-Cost Prototyping Environments (SS, WR), pp. 96–101.
DATEDATE-v1-2004-BhuniaRR #analysis
Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
DATEDATE-v1-2004-BjesseK #abstraction #debugging #refinement
Using Counter Example Guided Abstraction Refinement to Find Complex Bugs (PB, JHK), pp. 156–161.
DATEDATE-v1-2004-BurnsSKY #synthesis #tool support
An Asynchronous Synthesis Toolset Using Verilog (FPB, DS, AK, AY), pp. 724–725.
DATEDATE-v1-2004-CaiL #power management
Dynamic Power Management Using Data Buffers (LC, YHL), pp. 526–531.
DATEDATE-v1-2004-DebJO #design
System Design for DSP Applications Using the MASIC Methodology (AKD, AJ, ), pp. 630–635.
DATEDATE-v1-2004-KielyG #modelling #performance
Performance Modeling of Analog Integrated Circuits Using Least-Squares Support Vector Machines (TK, GGEG), pp. 448–453.
DATEDATE-v1-2004-ManoliosS #automation #liveness #modelling #safety #verification #web
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements (PM, SKS), pp. 168–175.
DATEDATE-v1-2004-PadmanabanT #fault #identification #performance
Using BDDs and ZBDDs for Efficient Identification of Testable Path Delay Faults (SP, ST), pp. 50–55.
DATEDATE-v1-2004-PerezMT #scheduling
A New Optimized Implemention of the SystemC Engine Using Acyclic Scheduling (DGP, GM, OT), pp. 552–557.
DATEDATE-v1-2004-RanjanVASVG #modelling #performance #synthesis
Fast, Layout-Inclusive Analog Circuit Synthesis using Pre-Compiled Parasitic-Aware Symbolic Performance Models (MR, WV, AA, HS, RV, GGEG), pp. 604–609.
DATEDATE-v1-2004-SehgalC #architecture #composition #performance #testing
Efficient Modular Testing of SOCs Using Dual-Speed TAM Architectures (AS, KC), pp. 422–427.
DATEDATE-v1-2004-SrinivasanBCC #metric #performance
Efficient Test Strategy for TDMA Power Amplifiers Using Transient Current Measurements: Uses and Benefit (GS, SB, SC, AC), pp. 280–285.
DATEDATE-v1-2004-StefanovZTKD #approach #design #network #process
System Design Using Kahn Process Networks: The Compaan/Laura Approach (TS, CZ, AT, BK, EFD), pp. 340–345.
DATEDATE-v1-2004-ZambrenoCSN #flexibility #hardware
Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
DATEDATE-v1-2004-ZhangV #memory management
Using a Victim Buffer in an Application-Specific Memory Hierarchy (CZ, FV), pp. 220–227.
DATEDATE-v1-2004-ZhanS #optimisation #polynomial #programming
Optimization of Integrated Spiral Inductors Using Sequential Quadratic Programming (YZ, SSS), pp. 622–629.
DATEDATE-v2-2004-BobrekPNPT #approach #hybrid #modelling #simulation
Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach (AB, JJP, JEN, JMP, DET), pp. 1144–1149.
DATEDATE-v2-2004-CheungPHC #equivalence #named
MINCE: Matching INstructions Using Combinational Equivalence for Extensible Processor (NC, SP, JH, JC), pp. 1020–1027.
DATEDATE-v2-2004-KumarBK #algorithm #analysis #array #embedded #memory management #named #reduction
MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
DATEDATE-v2-2004-LampropoulosAR
Minimization of Crosstalk Noise, Delay and Power Using a Modified Bus Invert Technique (ML, BMAH, PMR), pp. 1372–1373.
DATEDATE-v2-2004-LaouamriA #network #protocol #testing
Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
DATEDATE-v2-2004-LeiningerGM #configuration management
Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
DATEDATE-v2-2004-LorenzM #algorithm #code generation #search-based
Phase Coupled Code Generation for DSPs Using a Genetic Algorithm (ML, PM), pp. 1270–1275.
DATEDATE-v2-2004-MillbergNTJ #network
Guaranteed Bandwidth Using Looped Containers in Temporally Disjoint Networks within the Nostrum Network on Chip (MM, EN, RT, AJ), pp. 890–895.
DATEDATE-v2-2004-MondalCM #analysis #approach #logic
A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
DATEDATE-v2-2004-OlbrichB #locality #probability
Placement Using a Localization Probability Model (LPM) (MO, EB), p. 1412.
DATEDATE-v2-2004-YooYBJD #concept #design #multi
Multi-Processor SoC Design Methodology Using a Concept of Two-Layer Hardware-Dependent Software (SY, MWY, AB, AAJ, MDN), pp. 1382–1383.
DATEDATE-v2-2004-ZhouZLLZC #analysis
Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
DATEDATE-v2-2004-ZhuM #architecture #communication #framework #multi #platform #prototype #specification
Using a Communication Architecture Specification in an Application-Driven Retargetable Prototyping Platform for Multiprocessing (XZ, SM), pp. 1244–1249.
HPCAHPCA-2004-EhrhartP #predict #scheduling
Reducing the Scheduling Critical Cycle Using Wakeup Prediction (TEE, SJP), pp. 222–231.
HPCAHPCA-2004-KharbutliISL
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses (MK, KI, YS, JL), pp. 288–299.
HPCAHPCA-2004-NarayanasamyHSC #convergence #string
Creating Converged Trace Schedules Using String Matching (SN, YH, SS, BC), pp. 210–221.
HPCAHPCA-2004-NesbitS
Data Cache Prefetching Using a Global History Buffer (KJN, JES), pp. 96–105.
HPCAHPCA-2004-ZhuDDLZC #energy #power management
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management (QZ, FMD, CFD, ZL, YZ, PC), pp. 118–129.
HPDCHPDC-2004-HuangS #configuration management #self
Building Self-Configuring Services Using Service-Specific Knowledge (ACH, PS), pp. 45–54.
HPDCHPDC-2004-KramerM #grid
Utilization of a Local Grid of Mac OS X-Based Computers using Xgrid (DAK, MM), pp. 264–265.
HPDCHPDC-2004-WalkerM #coordination #workflow
Orchestrating and Coordinating Scientific/Engineering Workflows using GridShell (EW, TM), pp. 270–271.
HPDCHPDC-2004-WeinbergJDFH #execution #matrix #query
Gridflow Description, Query, and Execution at SCEC using the SDSC Matrix (JW, AJ, AD, MF, YH), pp. 262–263.
HPDCHPDC-2004-ZangrilliL #monitoring #network
Using Passive Traces of Application Traffic in a Network Monitoring System (MZ, BL), pp. 77–86.
HPDCHPDC-2004-ZhangKPCNWS #algorithm #parallel
Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms (XZ, TMK, TP, ÜVÇ, SN, PW, JHS), pp. 4–13.
LCTESLCTES-2004-ImH #multi #realtime #scalability #scheduling
Dynamic voltage scaling for real-time multi-task scheduling using buffers (CI, SH), pp. 88–94.
OSDIOSDI-2004-BarhamDIM #modelling
Using Magpie for Request Extraction and Workload Modelling (PB, AD, RI, RM), pp. 259–272.
OSDIOSDI-2004-YangTEM #fault #file system #model checking
Using Model Checking to Find Serious File System Errors (JY, PT, DRE, MM), pp. 273–288.
PDPPDP-2004-GuiradoRRL #performance #predict
Performance Prediction Using an Application-Oriented Mapping Tool (FG, AR, CR, EL), pp. 184–191.
PDPPDP-2004-LiuSK #energy #multi #optimisation
Optimizing Bus Energy Consumption of On-Chip Multiprocessors Using Frequent Values (CL, AS, MTK), p. 340–?.
DATEDATE-2005-BernardiMQR04 #approach #logic #testing
Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study (PB, GM, FQ, MSR), pp. 228–233.
DATEDATE-2005-Hillman04 #power management #reduction
Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm (DH), pp. 240–246.
FASEFASE-2004-ChoppyR #case study #requirements #specification
Improving Use Case Based Requirements Using Formally Grounded Specifications (CC, GR), pp. 244–260.
FASEFASE-2004-HeG #automation #debugging
Automated Debugging Using Path-Based Weakest Preconditions (HH, NG), pp. 267–280.
FASEFASE-2004-KimRFL #data access #modelling #uml
Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
FASEFASE-2004-OlveczkyM #analysis #maude #realtime #specification
Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
FoSSaCSFoSSaCS-2004-GenestMMP #partial order #specification #verification
Specifying and Verifying Partial Order Properties Using Template MSCs (BG, MM, AM, DP), pp. 195–210.
STOCSTOC-2004-HealyVV #nondeterminism
Using nondeterminism to amplify hardness (AH, SPV, EV), pp. 192–201.
STOCSTOC-2004-KleinbergS #collaboration #modelling
Using mixture models for collaborative filtering (JMK, MS), pp. 569–578.
TACASTACAS-2004-DiethersH #design #named #object-oriented #verification
Vooduu: Verification of Object-Oriented Designs Using UPPAAL (KD, MH), pp. 139–143.
TACASTACAS-2004-KrcalY #analysis #automaton #decidability #problem #scheduling
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
TACASTACAS-2004-MailundW #graph #reachability
Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method (TM, MW), pp. 177–191.
TACASTACAS-2004-RasmussenLS #automaton #scheduling
Resource-Optimal Scheduling Using Priced Timed Automata (JIR, KGL, KS), pp. 220–235.
TACASTACAS-2004-RobbyRDH #framework #model checking #specification
Checking Strong Specifications Using an Extensible Software Model Checking Framework (R, ER, MBD, JH), pp. 404–420.
CAVCAV-2004-ChangBD #design #interface #refinement #verification
Using Interface Refinement to Integrate Formal Verification into the Design Cycle (JC, SB, DLD), pp. 122–134.
CAVCAV-2004-RayH #deduction #first-order #pipes and filters #quantifier #verification
Deductive Verification of Pipelined Machines Using First-Order Quantification (SR, WAHJ), pp. 31–43.
FATESFATES-2004-BlomHJP #automaton #generative #specification #testing
Specifying and Generating Test Cases Using Observer Automata (JB, AH, BJ, PP), pp. 125–139.
FATESFATES-2004-HongU #cost analysis #generative #model checking #testing
Using Model Checking for Reducing the Cost of Test Generation (HSH, HU), pp. 110–124.
FATESFATES-2004-LarsenMN #online #realtime #testing
Online Testing of Real-time Systems Using Uppaal (KGL, MM, BN), pp. 79–94.
FATESFATES-2004-YoonKSC #analysis #component #empirical #fault #injection #mutation testing #testing
Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
ICLPICLP-2004-ErdemW #programming #set
Rectilinear Steiner Tree Construction Using Answer Set Programming (EE, MDFW), pp. 386–399.
ICLPICLP-2004-Smaus #logic programming #source code #termination
Termination of Logic Programs Using Various Dynamic Selection Rules (JGS), pp. 43–57.
IJCARIJCAR-2004-DenneyFS #automation #proving #theorem proving
Using Automated Theorem Provers to Certify Auto-generated Aerospace Software (ED, BF, JS), pp. 198–212.
IJCARIJCAR-2004-MengP #interactive #proving
Experiments on Supporting Interactive Proof Using Resolution (JM, LCP), pp. 372–384.
IJCARIJCAR-2004-ThiemannGS #composition #dependence #proving #termination
Improved Modular Termination Proofs Using Dependency Pairs (RT, JG, PSK), pp. 75–90.
LICSLICS-2004-SeshiaB #bound #quantifier
Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds (SAS, REB), pp. 100–109.
SATSAT-2004-GummadiNV #algorithm #independence #satisfiability #set
Algorithms for Satisfiability using Independent Sets of Variables (RG, NSN, VR), pp. 56–63.
SATSAT-2004-HuangD #performance
Using DPLL for Efficient OBDD Construction (JH, AD), pp. 127–136.
SATSAT-2004-ManquinhoM #bound #optimisation #pseudo #satisfiability
Using Lower-Bound Estimates in SAT-Based Pseudo-Boolean Optimization (VMM, JPMS), pp. 120–126.
ICTSSTestCom-2004-NeukirchenDG #communication #realtime #requirements #testing
Communication Patterns for Expressing Real-Time Requirements Using MSC and Their Application to Testing (HN, ZRD, JG), pp. 144–159.
ICTSSTestCom-2004-Vassiliou-GiolesDS #execution
Execution of External Applications using TTCN-3 (TVG, GD, IS), pp. 209–223.
VMCAIVMCAI-2004-Etessami #analysis #data flow #equation #game studies #graph #recursion
Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
VMCAIVMCAI-2004-HatcliffRD #concurrent #model checking #object-oriented #specification #verification
Verifying Atomicity Specifications for Concurrent Object-Oriented Software Using Model-Checking (JH, R, MBD), pp. 175–190.
VMCAIVMCAI-2004-PaceS #difference #kernel #model checking
Model Checking Polygonal Differential Inclusions Using Invariance Kernels (GJP, GS), pp. 110–121.
DocEngDocEng-2003-Bulterman #interactive #multi
Using SMIL to encode interactive, peer-level multimedia annotations (DCAB), pp. 32–41.
DocEngDocEng-2003-MongB #visual notation #web
Using SVG as the rendering model for structured and graphically complex web material (JCM, DFB), pp. 88–91.
DRRDRR-2003-MaderlechnerS #recognition #set
Extraction of valid data sets in registers using recognition of invalidation lines (GM, PS), pp. 67–72.
DRRDRR-2003-SuwaN #algorithm #composition #image
Separation algorithm of superimposed pattern using directional decomposition of an image (MS, SN), pp. 278–285.
HTHT-2003-DelortBR #documentation #summary #web
Enhanced web document summarization using hyperlinks (JYD, BBM, MR), pp. 208–215.
HTHT-2003-FallensteinLHA #named #web
Storm: using P2P to make the desktop part of the web (BF, TJL, HH, TA), pp. 150–151.
HTHT-2003-SugiyamaHYU #refinement #web
Refinement of TF-IDF schemes for web pages using their hyperlinked neighboring pages (KS, KH, MY, SU), pp. 198–207.
ICDARICDAR-2003-AlamKNRTW #design #documentation #summary
Structured and Unstructured Document Summarization: Design of a Commercial Summarizer using Lexical Chains (HA, AK, MN, AFRR, YT, CW), pp. 1147–1152.
ICDARICDAR-2003-AllierE #prototype
Font Type Extraction and Character Prototyping Using Gabor Filters (BA, HE), pp. 799–803.
ICDARICDAR-2003-BaldiMS #classification #set
Using tree-grammars for training set expansion in page classification (SB, SM, GS), pp. 829–833.
ICDARICDAR-2003-BrittoSSSB #algorithm #clustering #low cost #parallel
A Low-Cost Parallel K-Means VQ Algorithm Using Cluster Computing (AdSBJ, PSLdS, RS, SdRSdS, DLB), pp. 839–843.
ICDARICDAR-2003-BulacuSV #identification
Writer Identification Using Edge-Based Directional Features (MB, LS, LV), pp. 937–941.
ICDARICDAR-2003-ChangC #algorithm #component
A Component-Labeling Algorithm Using Contour Tracing Technique (FC, CJC), pp. 741–745.
ICDARICDAR-2003-ChaTS #algorithm #optimisation #recognition #search-based #similarity
Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition (SHC, CCT, SNS), pp. 662–665.
ICDARICDAR-2003-El-NasanVN #n-gram #recognition
Handwriting Recognition Using Position Sensitive Letter N-Gram Matching (AEN, SV, GN), p. 577–?.
ICDARICDAR-2003-GuestCFP #analysis #automation #classification #geometry #sequence
Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
ICDARICDAR-2003-HuoF #modelling #performance
Improving Chinese/English OCR Performance by Using MCE-based Character-Pair Modeling and Negative Training (QH, ZDF), pp. 364–368.
ICDARICDAR-2003-LauYT #image #sequence
Recovery of Writing Sequence of Static Images of Handwriting using UWM (KKL, PCY, YYT), pp. 1123–1127.
ICDARICDAR-2003-LeedhamC #identification
Writer Identification using Innovative Binarised Features of Handwritten Numerals (GL, SC), pp. 413–417.
ICDARICDAR-2003-LiWZ #approach #image #statistics #string
String Extraction From Color Airline Coupon Image Using Statistical Approach (YL, ZW, HZ), pp. 289–293.
ICDARICDAR-2003-LooT #image #segmentation
Using Irregular Pyramid for Text Segmentation and Binarization of Gray Scale Image (PKL, CLT), pp. 594–598.
ICDARICDAR-2003-LuoL #approach #recognition
Engineering Drawings Recognition Using a Case-based Approach (YL, LW), pp. 190–194.
ICDARICDAR-2003-Mori #feature model #recognition #video
Video text recognition using feature compensation as category-dependent feature extraction (MM), pp. 645–649.
ICDARICDAR-2003-MoritaSBS03a #algorithm #feature model #multi #recognition #search-based #word
Unsupervised Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Word Recognition (MEM, RS, FB, CYS), pp. 666–670.
ICDARICDAR-2003-MuramatsuKSA #evaluation #flexibility #recognition #standard
Improvement of Matching and Evaluation in Handwritten Numeral Recognition Using Flexible Standard Patterns (HM, TK, TS, KA), pp. 273–277.
ICDARICDAR-2003-NishimuraT #online #recognition
Off-line Character Recognition using On-line Character Writing Information (HN, TT), pp. 168–172.
ICDARICDAR-2003-PechwitzM #approach #database #recognition #word
HMM Based Approach for Handwritten Arabic Word Recognition Using the IFN/ENIT- Database (MP, VM), pp. 890–894.
ICDARICDAR-2003-RadtkeOSW #algorithm #design #multi
Intelligent Zoning Design Using Multi-Objective Evolutionary Algorithms (PVWR, LESdO, RS, TW), pp. 824–828.
ICDARICDAR-2003-SchenkerLBK #classification #documentation #graph #web
Classification of Web Documents Using a Graph Model (AS, ML, HB, AK), pp. 240–244.
ICDARICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #verification
A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
ICDARICDAR-2003-ShiG #detection #documentation #fuzzy #image
Skew Detection for Complex Document Images Using Fuzzy Runlength (ZS, VG), pp. 715–719.
ICDARICDAR-2003-SimardSBCC #recognition #segmentation
Using Character Recognition and Segmentation to Tell Computer from Humans (PYS, RS, JB, JC, IC), pp. 418–423.
ICDARICDAR-2003-SouzaCNS #assessment #automation #image #quality
Automatic Filter Selection Using Image Quality Assessment (AS, MC, SN, CYS), p. 508–?.
ICDARICDAR-2003-TomaiS
Combination of Type III Digit Recognizers using the Dempster-Shafer Theory of Evidence (CIT, SNS), pp. 854–858.
ICDARICDAR-2003-UchidaS #recognition
Handwritten character recognition using elastic matching based on a class-dependent deformation model (SU, HS), pp. 163–167.
ICDARICDAR-2003-Ueda #pattern matching #verification
Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
ICDARICDAR-2003-Wakahara #correlation #recognition
Shape Matching Using GAT Correlation against Nonlinear Distortion and its Application to Handwritten Numeral Recognition (TW), p. 54–?.
ICDARICDAR-2003-WangDL #identification #linear
Writer Identification Using Directional Element Features and Linear Transform (XW, XD, HL), pp. 942–945.
ICDARICDAR-2003-WendlingT #geometry #recognition
Recognition of Arrows in Line Drawings based on the Aggregation of Geometric Criteria using the Choquet Integral (LW, ST), pp. 299–303.
ICDARICDAR-2003-WuA #approach #automation #multi
Automatic Thresholding of Gray-level Using Multi-stage Approach (SW, AA), pp. 493–497.
ICDARICDAR-2003-YamazakiNK #markov #modelling #verification
Text-indicated Writer Verification Using Hidden Markov Models (YY, TN, NK), pp. 329–332.
ICDARICDAR-2003-YangVN #recognition #scalability #set
Accelerating Large Character Set Recognition using Pivots (YY, OV, MN), pp. 262–267.
ICDARICDAR-2003-YouK #approach #network #segmentation #string
An approach for locating segmentation points of handwritten digit strings using a neural network (DY, GK), p. 142–?.
ICDARICDAR-2003-ZhangS #analysis #word
Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
ICDARICDAR-2003-ZhengLD03a #documentation #identification #image #markov #random
Text Identification in Noisy Document Images Using Markov Random Field (YZ, HL, DSD), p. 599–?.
ICDARICDAR-2003-ZouTLL #analysis #online #verification
On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
JCDLJCDL-2003-HanGMZZF #automation #documentation #metadata
Automatic Document Metadata Extraction Using Support Vector Machines (HH, CLG, EM, HZ, ZZ, EAF), pp. 37–48.
PODSPODS-2003-GarofalakisK #correlation #data type #distance #edit distance #xml
Correlating XML data streams using tree-edit distance embeddings (MNG, AK), pp. 143–154.
PODSPODS-2003-GrahneT #constraints #query
Query containment and rewriting using views for regular path queries under constraints (GG, AT), pp. 111–122.
PODSPODS-2003-HeerenJP
Optimal indexing using near-minimal space (CH, HVJ, LP), pp. 244–251.
SIGMODSIGMOD-2003-DeHaanTCO #encoding #sql #xquery
A Comprehensive XQuery to SQL Translation using Dynamic Interval Encoding (DD, DT, MPC, MTÖ), pp. 623–634.
SIGMODSIGMOD-2003-GotoK #integration #mobile
Integration of Electronic Tickets and Personal Guide System for Public Transport using Mobile Terminals (KG, YK), pp. 642–646.
SIGMODSIGMOD-2003-KimC #adaptation #clustering #feedback #image #named #retrieval
Qcluster: Relevance Feedback Using Adaptive Clustering for Content-Based Image Retrieval (DHK, CWC), pp. 599–610.
SIGMODSIGMOD-2003-KriegelBKPS #set #similarity
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects (HPK, SB, PK, MP, MS), pp. 587–598.
SIGMODSIGMOD-2003-ZhangDWEMPMDR #multi #named #optimisation #xml
Rainbow: Multi-XQuery Optimization Using Materialized XML Views (XZ, KD, LW, MES, BM, BP, MM, LD, EAR), p. 671.
SIGMODSIGMOD-2003-ZuzartePMCLW
WinMagic : Subquery Elimination Using Window Aggregation (CZ, HP, WM, QC, LL, KW), pp. 652–656.
VLDBVLDB-2003-HardingLM #named #xml
XISS/R: XML Indexing and Storage System using RDBMS (PJH, QL, BM), pp. 1073–1076.
VLDBVLDB-2003-MiklauS #encryption
Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
VLDBVLDB-2003-NieKH #effectiveness #integration #mining #named #statistics
BibFinder/StatMiner: Effectively Mining and Using Coverage and Overlap Statistics in Data Integration (ZN, SK, TH), pp. 1097–1100.
VLDBVLDB-2003-Schoning #database
Commercial Use of Database Technology (HS), p. 1034.
VLDBVLDB-2003-WitkowskiBBFGSS #modelling #spreadsheet #sql
Business Modelling Using SQL Spreadsheets (AW, SB, TB, NF, AG, LS, SS), pp. 1117–1120.
ITiCSEITiCSE-2003-BarrosEDPS #programming
Using lab exams to ensure programming practice in an introductory programming course (JPB, LE, RD, RP, ES), pp. 16–20.
ITiCSEITiCSE-2003-Becker03a #programming
Grading programming assignments using rubrics (KB), p. 253.
ITiCSEITiCSE-2003-Cassel
Using CITIDEL resources to support documenting objectives and outcomes (LNC), p. 255.
ITiCSEITiCSE-2003-CasselIKGFLP #education #library
Using an education oriented digital library to organize and present classes in computing and information (LNC, JI, DK, CLG, EAF, JL, MAPQ), p. 260.
ITiCSEITiCSE-2003-DemetriadisTP #learning #multi #student #towards
A phenomenographic study of students’ attitudes toward the use of multiple media for learning (SND, ET, ASP), pp. 183–187.
ITiCSEITiCSE-2003-Fone #education #performance
Using semiotics to analyze the efficiency of a model in teaching (WF), p. 232.
ITiCSEITiCSE-2003-HollowayR #development #programming #student
Development of a MLE by students for students using extreme programming techniques (JH, MR), p. 225.
ITiCSEITiCSE-2003-HuangS #design #education
Teaching undergraduate software design in a liberal arts environment using RoboCup (TH, FS), pp. 114–118.
ITiCSEITiCSE-2003-JulianoCK #architecture #education
Observations from using two modes of teaching undergraduate computer architecture (BAJ, CHC, EK), p. 248.
ITiCSEITiCSE-2003-KnoxCI #education
Using the NSDL and CITIDEL to enhance teaching (DK, LNC, JI), p. 246.
ITiCSEITiCSE-2003-KolasF #game studies #motivation
Increasing assignment motivation using a game Al tournament (ØK, IF), p. 269.
ITiCSEITiCSE-2003-KoldehofePT #case study #distributed #visualisation
Integrating a simulation-visualisation environment in a basic distributed systems course: a case study using LYDIAN (BK, MP, PT), pp. 35–39.
ITiCSEITiCSE-2003-LassCBCPHZ #off the shelf #scalability #tool support
Tools and techniques for large scale grading using Web-based commercial off-the-shelf software (RNL, CDC, NTB, BWC, JLP, NH, PZ), pp. 168–172.
ITiCSEITiCSE-2003-Leska #java #learning #user interface
Learning to develop GUIs in Java using closed labs (CL), p. 228.
ITiCSEITiCSE-2003-MeedenNBK #difference #gender
Using departmental surveys to assess computing culture: quantifying gender differences in the classroom (LM, TN, DSB, DK), pp. 188–192.
ITiCSEITiCSE-2003-NevisonW #case study #design pattern #education #java
Teaching objects early and design patterns in Java using case studies (CN, BW), pp. 94–98.
ITiCSEITiCSE-2003-PapadopoulosP #algorithm #authoring #education
Using ToolBook authoring tool to facilitate the teaching of algorithms (GP, HMP), p. 277.
ITiCSEITiCSE-2003-PatersonH #database #education #ide #java #object-oriented
Teaching Java: using an object-oriented database and the BlueJ IDE (JHP, JH), p. 273.
ITiCSEITiCSE-2003-SchwarmV #assessment #concept #elicitation #information management #student
Making connections: using classroom assessment to elicit students’ prior knowledge and construction of concepts (SES, TV), pp. 65–69.
ITiCSEITiCSE-2003-Sojka03a #agile #evaluation #multi #testing #tex
Rapid evaluation using multiple choice tests and TeX (PS), p. 265.
ITiCSEITiCSE-2003-Sojka03b #education #interactive #javascript
Interactive teaching materials in PDF using JavaScript (PS), p. 275.
CSMRCSMR-2003-CasanovaSJ #component #development #evolution #library
Supporting Evolution in Component-Based Development Using Component Libraries (MC, RVDS, VJ), pp. 123–132.
CSMRCSMR-2003-ClarkeMG #identification #object-oriented #taxonomy
Using a Taxonomy Tool to Identify Changes in OO Softwar (PJC, BAM, JPG), pp. 213–222.
CSMRCSMR-2003-JinCD #adaptation #concept #integration #reverse engineering #tool support #transaction
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter (DJ, JRC, TRD), pp. 399–408.
CSMRCSMR-2003-Latendresse #c #c++ #evaluation #performance #preprocessor #symbolic computation
Fast Symbolic Evaluation of C/C++ Preprocessing Using Conditional Value (ML), p. 170–?.
CSMRCSMR-2003-MoeCP #distributed #refinement
Using Observation and Refinement to Improve Distributed Systems Test (JM, DAC, MP), pp. 153–159.
CSMRCSMR-2003-RaoS #empirical #maintenance #outsourcing
Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
CSMRCSMR-2003-SaeedMBHS #algorithm #clustering
Software Clustering Techniques and the Use of Combined Algorithm (MS, OM, HAB, SZH, SMS), pp. 301–306.
CSMRCSMR-2003-SciascioDMP #design #maintenance #model checking #web
Web Applications Design and Maintenance Using Symbolic Model Checking (EDS, FMD, MM, GP), pp. 63–72.
CSMRCSMR-2003-TourweM #identification #logic #metaprogramming #refactoring
Identifying Refactoring Opportunities Using Logic Meta Programming (TT, TM), pp. 91–100.
ICSMEICSM-2003-AntoniolP #information management #library
Library Miniaturization Using Static and Dynamic Information (GA, MDP), p. 235–?.
ICSMEICSM-2003-BaldassarreCV #estimation
Software Renewal Projects Estimation Using Dynamic Calibration (MTB, DC, GV), pp. 105–115.
ICSMEICSM-2003-JohnsonD #experience #information management #legacy #reverse engineering
Experience in developing interoperations among legacy information systems using partial reverse engineering (MJ, CNGD), pp. 369–372.
ICSMEICSM-2003-LovrekJKLCHDL #maintenance
Improving Software Maintenance by using Agent-based Remote Maintenance Shell (IL, GJ, MK, IL, AC, DH, SD, OL), pp. 440–449.
ICSMEICSM-2003-MensPG #maintenance #source code
Using Intentional Source-Code Views to Aid Software Maintenance (KM, BP, SG), pp. 169–178.
ICSMEICSM-2003-Mul #internet #legacy
Making maximum use of legacy code: Transavia internet booking engine (CM), p. 466.
ICSMEICSM-2003-QuahT #metric #network #object-oriented #predict #quality
Application of Neural Networks for Software Quality Prediction Using Object-Oriented Metrics (TSQ, MMTT), p. 116–?.
IWPCIWPC-2003-AntoniolPM #abstract syntax tree #ocl
YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs (GA, MDP, EM), pp. 13–22.
IWPCIWPC-2003-ChiricotaJM #clustering #component #graph
Software Components Capture Using Graph Clustering (YC, FJ, GM), pp. 217–226.
IWPCIWPC-2003-Cordy #agile #semiparsing #source code #xml
Generalized Selective XML Markup of Source Code Using Agile Parsing (JRC), pp. 144–153.
IWPCIWPC-2003-CoxC #analysis #approximate #semiparsing
Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
IWPCIWPC-2003-GschwindOP #comprehension #runtime
Using Run-Time Data for Program Comprehension (TG, JO, MP), pp. 245–250.
IWPCIWPC-2003-MarcusFM #3d #analysis #comprehension #visualisation
Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
IWPCIWPC-2003-RiccaT #clustering #migration #web
Using Clustering to Support the Migration from Static to Dynamic Web Pages (FR, PT), pp. 207–216.
IWPCIWPC-2003-RillingK #complexity #comprehension #identification #metric #slicing
Identifying Comprehension Bottlenecks Using Program Slicing and Cognitive Complexity Metric (JR, TK), pp. 115–124.
SCAMSCAM-2003-GuoCD #java
Unique Renaming of Java Using Source Transformation (XG, JRC, TRD), pp. 151–160.
SCAMSCAM-2003-Leitao #2d #detection
Detection of Redundant Code using R2D2 (AML), pp. 183–192.
SCAMSCAM-2003-Verhoef #analysis #multi #source code
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
WCREWCRE-2003-BodhuinGT #migration #web
Migration of non-decomposable software systems to the Web using screen proxies (TB, EG, MT), pp. 165–174.
WCREWCRE-2003-DahnM #c #program transformation #source code
Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
WCREWCRE-2003-ZouG #analysis #detection
Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
CIAACIAA-2003-FerroDFL #programming #robust #semiparsing
Robust Parsing Using Dynamic Programming (MVF, VMD, JVF, LRL), pp. 258–268.
CIAACIAA-2003-Fritz #automaton #linear #logic #simulation
Constructing Büchi Automata from Linear Temporal Logic Using Simulation Relations for Alternating Büchi Automata (CF), pp. 35–48.
CIAACIAA-2003-XieLD #complexity #equation #linear #problem
New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (GX, CL, ZD), pp. 163–175.
FMFME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-Henderson #correctness #proving
Proving the Correctness of Simpson’s 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method (NH), pp. 244–263.
FMFME-2003-Lettrari #abstraction #heuristic #object-oriented
Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems (ML), pp. 462–481.
FMFME-2003-StidolphW #formal method
Managerial Issues for the Consideration and Use of Formal Methods (DCS, EJWJ), pp. 170–186.
SEFMSEFM-2003-BeckertS #verification
Program Verification Using Change Information (BB, PHS), p. 91–?.
SEFMSEFM-2003-GawanmehTW #design #verification
Formal Verification of ASM Designs Using the MDG Tool (AG, ST, KW), pp. 210–219.
SEFMSEFM-2003-McCombS #animation #specification
Animation of Object-Z Specifications Using a Z Animator (TM, GS), p. 191–?.
SEFMSEFM-2003-Sangiorgi #mobile #process
Taming Mobile Processes Using Types (DS), p. 64–?.
IFLIFL-2003-Choppella #equation #polymorphism #re-engineering
Polymorphic Type Reconstruction Using Type Equations (VC), pp. 53–68.
DiGRADiGRA-2003-ChristensenJJ #hybrid #usability
Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar (LJC, TTYJ, AHJ).
DiGRADiGRA-2003-KirriemuirM #game studies #video
Use of Computer and Video Games in the Classroom (JK, AM).
AGTIVEAGTIVE-2003-DottiRS #analysis #behaviour #fault #graph grammar #specification
Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
AGTIVEAGTIVE-2003-Rotschke #graph transformation #re-engineering
Re-engineering a Medical Imaging System Using Graph Transformations (TR), pp. 185–201.
CHICHI-2003-ChiRSWRCRDCC #automation #usability #web
The bloodhound project: automating discovery of web usability issues using the InfoScent simulator (EHhC, AR, GS, AW, CR, CC, ER, BD, JC, SBC), pp. 505–512.
CHICHI-2003-ForlizziLH
The kinedit system: affective messages using dynamic texts (JF, JCL, SEH), pp. 377–384.
CHICHI-2003-FurnasQ #interactive
Using pixel rewrites for shape-rich interaction (GWF, YQ), pp. 369–376.
CHICHI-2003-GrossmanBS #interface
An interface for creating and manipulating curves using a high degree-of-freedom curve input device (TG, RB, KS), pp. 185–192.
CHICHI-2003-VertegaalWSC #named #video
GAZE-2: conveying eye contact in group video conferencing using eye-controlled camera direction (RV, IW, CS, CC), pp. 521–528.
CHICHI-2003-YamauchiWB
Information use of service technicians in difficult cases (YY, JW, DGB), pp. 81–88.
VISSOFTVISSOFT-2003-WheeldonCK #comprehension #named
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 48–52.
VISSOFTVISSOFT-2003-WheeldonCK1 #comprehension #named
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 56–57.
CAiSECAiSE-2003-DammHG #ontology
Translating and Searching Service Descriptions Using Ontologies (DD, FH, AG), pp. 308–323.
EDOCEDOC-2003-DebusmannSSK #monitoring
Unified Service Level Monitoring using CIM (MD, MS, MS, RK), pp. 76–85.
EDOCEDOC-2003-TrastourPC #integration #semantics #web
Using Semantic Web Technology to Enhance Current Business-to-Business Integration Approaches (DT, CP, DC), pp. 222–231.
ICEISICEIS-v1-2003-FatoohiG #distributed #execution #web
A Distributed Job Execution Environment Using Asynchronous Messaging and Web Technologies (RF, NG), pp. 246–251.
ICEISICEIS-v1-2003-LeongL #approach #component #development #generative #named
REPCOM: A Customisable Report Generator Component System Using XML-Driven, Component-Based Development Approach (CHL, SPL), pp. 499–504.
ICEISICEIS-v1-2003-MedcraftSB #integration #named
DIA: Data Integration Using Agents (PSM, US, CdSB), pp. 79–86.
ICEISICEIS-v1-2003-Seriai #named #object-oriented #query
QUEROM: An Object-Oriented Model to Rewriting Query Using Views (AS), pp. 389–395.
ICEISICEIS-v1-2003-SilvaSL
Updating GIS Data Using Personal Digital Assistants (HS, AVS, JCL), pp. 566–569.
ICEISICEIS-v1-2003-ZarourBS
Using Information Technologies for Managing Cooperative Information Agent-Based Systems (NZ, MB, LS), pp. 430–440.
ICEISICEIS-v2-2003-Abdel-WahaabBHH #3d #invariant #network #recognition
Three-Dimensional Object Recognition Using Support Vector Machine Neural Network Based on Moment Invariant Features (MSAW, SFB, ASH, DMH), pp. 583–588.
ICEISICEIS-v2-2003-BaesensMBVS
Building Intelligent Credit Scoring Systems Using Decision Tables (BB, CM, MDB, JV, RS), pp. 19–25.
ICEISICEIS-v2-2003-CamposGM #abduction #network #probability
Partial Abductive Inference in Bayesian Networks By Using Probability Trees (LMdC, JAG, SM), pp. 83–91.
ICEISICEIS-v2-2003-ChadesSC #markov #multi #process
Planning Cooperative Homogeneous Multiagent Systems Using Markov Decision Processes (IC, BS, FC), pp. 426–429.
ICEISICEIS-v2-2003-Drori #documentation #identification #information management #research
Using Knowledge Engineering Tool to Identify the Subject of a Document — Research Results (OD), pp. 442–445.
ICEISICEIS-v2-2003-HattoriKY03a #fourier
Extraction of Feeling Information From Characters Using a Modified Fourier Transform (TH, HK, TY), pp. 461–464.
ICEISICEIS-v2-2003-HogoLS #clustering #network
Conventional Versus Interval Clustering Using Kohonen Networks (MH, PL, MS), pp. 250–257.
ICEISICEIS-v2-2003-KeeniGS #learning #network #on the #performance
On Fast Learning of Neural Networks Using Back Propagation (KK, KG, HS), pp. 266–271.
ICEISICEIS-v2-2003-KuusikL #approach #data mining #mining
An Approach of Data Mining Using Monotone Systems (RK, GL), pp. 482–485.
ICEISICEIS-v2-2003-MendesA
Using the I. S. as a (Dis)Organization Gauge (PM, PA), pp. 171–176.
ICEISICEIS-v2-2003-NetoCMG #analysis #network #simulation
Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
ICEISICEIS-v2-2003-OrtegaDA #design #evolution
Using Grammatical Evolution to Design Curves with a Given Fractal Dimension (AO, ALAD, MA), pp. 395–398.
ICEISICEIS-v2-2003-SalemSA #algorithm #self
Improving Self-Organizing Feature Map (SOFM) Training Algorithm Using K-Means Initialization (ABMS, MMS, AFA), pp. 399–405.
ICEISICEIS-v2-2003-SilvaIE #analysis #database #identification #information management
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v2-2003-TchikouG #process
Production Activity Control Using Autonomous Agents (MT, EG), pp. 365–371.
ICEISICEIS-v2-2003-TolbaMGA #algorithm #analysis #image #multi #segmentation
MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
ICEISICEIS-v2-2003-Zarri #information management #representation #semantics #web
Semantic Annotations and Semantic Web Using NKRL (Narrative Knowledge Representation Language) (GPZ), pp. 387–394.
ICEISICEIS-v2-2003-ZhengE #automation #documentation #summary #web
Using Specialized Knowledge in Automated Web Document Summarization (ZZ, GE), pp. 579–582.
ICEISICEIS-v3-2003-AllouiMO #approach #architecture #generative #modelling
Modelling and Generating Business-To-Business Applications Using an Architecture Description Language — Based Approach (IA, KM, FO), pp. 201–210.
ICEISICEIS-v3-2003-CarchioloLM #specification #workflow
Using Lotos in Workflow Specification (VC, AL, MM), pp. 364–369.
ICEISICEIS-v3-2003-CaveroMVC #modelling #query #uml
Modelling ORDB Queries Using UML (JMC, EM, BV, CC), pp. 535–539.
ICEISICEIS-v3-2003-DarrasGP #deployment #enterprise
Using Model of Enterprise and Software for Deployment of ERP Software (FD, PG, HP), pp. 558–565.
ICEISICEIS-v3-2003-Honkaranta #content management #documentation #enterprise #lens
Developing Document and Content Management in Enterprises Using a “Genre Lens” (AH), pp. 334–340.
ICEISICEIS-v3-2003-MangoldRM #named #semistructured data
Föderal: Management of Engineering Data Using a Semistructured Data Model (CM, RR, BM), pp. 382–389.
ICEISICEIS-v3-2003-MouratidisMGG #information management #requirements #security
Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
ICEISICEIS-v3-2003-YamaguchiWS #design #petri net #reliability
A High Reliability Design for Nfs Server Software By Using an Extended Petri Net (SY, KW, YS), pp. 498–502.
ICEISICEIS-v4-2003-BalavijendranCM #experience #personalisation
Enhancing News Reading Experience Through Personalization of News Content and Services Using Intelligent Agents (LB, SNC, AKM), pp. 404–407.
ICEISICEIS-v4-2003-KoideNKGM #scalability
Operation-Support System for Large-Scale System Using Information Technology (SK, HN, YK, AG, RM), pp. 430–437.
ICEISICEIS-v4-2003-LimP #clustering #web
Dynamically Reconstructive Web Server Cluster Using a Hierarchical Grouping Mechanism (SiL, MSP), pp. 271–279.
ICEISICEIS-v4-2003-LopesO #distributed
Application Scenarios for Distributed Management Using Snmp Expressions (RPL, JLO), pp. 49–54.
ICEISICEIS-v4-2003-NagaoK #architecture #evaluation #web #web service
Evaluation of Mainframe Computer System Using Web Service Architecture (MN, YK), pp. 460–463.
ICEISICEIS-v4-2003-Oriogun #analysis #case study #online #re-engineering #reliability
Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
ICEISICEIS-v4-2003-PennacchioR #automation #e-commerce #mobile
Automatic E-Commerce Using a Mobile Agents Model (SP, FMR), pp. 468–472.
ICEISICEIS-v4-2003-SonneckM #graph #personalisation #web
One-To-One Personalization of Web Applications Using a Graph Based Model (GS, TAM), pp. 95–102.
CIKMCIKM-2003-BeitzelJCG #automation #evaluation #taxonomy
Using titles and category names from editor-driven taxonomies for automatic evaluation (SMB, ECJ, AC, DAG), pp. 17–23.
CIKMCIKM-2003-BillerbeckSWZ #query
Query expansion using associated queries (BB, FS, HEW, JZ), pp. 2–9.
CIKMCIKM-2003-BroderCHSZ #evaluation #performance #process #query #retrieval
Efficient query evaluation using a two-level retrieval process (AZB, DC, MH, AS, JYZ), pp. 426–434.
CIKMCIKM-2003-CampbellMCD #email #identification
Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
CIKMCIKM-2003-LinK #mining #web
Question answering from the web using knowledge annotation and knowledge mining techniques (JJL, BK), pp. 116–123.
CIKMCIKM-2003-MayfieldMPP
Lattice-based tagging using support vector machines (JM, PM, CDP, CP), pp. 303–308.
CIKMCIKM-2003-OgrasF #approximate #reduction
Dimensionality reduction using magnitude and shape approximations (ÜYO, HF), pp. 99–107.
CIKMCIKM-2003-RadevT #evaluation #summary
Summarization evaluation using relative utility (DRR, DT), pp. 508–511.
CIKMCIKM-2003-ZhangOR #learning
Learning cross-document structural relationships using boosting (ZZ, JO, DRR), pp. 124–130.
ECIRECIR-2003-Bigi #categorisation #distance
Using Kullback-Leibler Distance for Text Categorization (BB), pp. 305–319.
ECIRECIR-2003-CachedaCGV #data type #hybrid #optimisation #strict #web
Optimization of Restricted Searches in Web Directories Using Hybrid Data Structures (FC, VC, CG, ÁV), pp. 436–451.
ECIRECIR-2003-XuYTXW #classification
Representative Sampling for Text Classification Using Support Vector Machines (ZX, KY, VT, XX, JW), pp. 393–407.
ICMLICML-2003-Bar-HillelHSW #distance #equivalence #learning
Learning Distance Functions using Equivalence Relations (ABH, TH, NS, DW), pp. 11–18.
ICMLICML-2003-BrownW #ambiguity #composition #learning #network
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods (GB, JLW), pp. 67–74.
ICMLICML-2003-Elkan #difference
Using the Triangle Inequality to Accelerate k-Means (CE), pp. 147–153.
ICMLICML-2003-Harrington #algorithm #collaboration #online #ranking
Online Ranking/Collaborative Filtering Using the Perceptron Algorithm (EFH), pp. 250–257.
ICMLICML-2003-LachicheF #classification #multi #probability
Improving Accuracy and Cost of Two-class and Multi-class Probabilistic Classifiers Using ROC Curves (NL, PAF), pp. 416–423.
ICMLICML-2003-LeeL #learning
Learning with Positive and Unlabeled Examples Using Weighted Logistic Regression (WSL, BL), pp. 448–455.
ICMLICML-2003-LiWL #classification #generative #keyword #probability
Text Classification Using Stochastic Keyword Generation (CL, JRW, HL), pp. 464–471.
ICMLICML-2003-McGovernJ #identification #learning #multi #predict #relational
Identifying Predictive Structures in Relational Data Using Multiple Instance Learning (AM, DJ), pp. 528–535.
ICMLICML-2003-Mesterharm #algorithm #multi
Using Linear-threshold Algorithms to Combine Multi-class Sub-experts (CM), pp. 544–551.
ICMLICML-2003-PerkinsT #feature model #online
Online Feature Selection using Grafting (SP, JT), pp. 592–599.
ICMLICML-2003-ZhuGL #learning
Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions (XZ, ZG, JDL), pp. 912–919.
KDDKDD-2003-AliK #clustering #divide and conquer #web
Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
KDDKDD-2003-BilenkoM #adaptation #detection #metric #similarity #string
Adaptive duplicate detection using learnable string similarity measures (MB, RJM), pp. 39–48.
KDDKDD-2003-CasaliCL #semantics
Extracting semantics from data cubes using cube transversals and closures (AC, RC, LL), pp. 69–78.
KDDKDD-2003-DuZ #data mining #mining #privacy #random
Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
KDDKDD-2003-EirinakiVV #named #personalisation #process #semantics #taxonomy #web
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process (ME, MV, IV), pp. 99–108.
KDDKDD-2003-SripadaRHY #generative #summary
Generating English summaries of time series data using the Gricean maxims (SS, ER, JH, JY), pp. 187–196.
KDDKDD-2003-SteinbachTKKP #clustering
Discovery of climate indices using clustering (MS, PNT, VK, SAK, CP), pp. 446–455.
KDDKDD-2003-TaoMF #framework #mining
Weighted Association Rule Mining using weighted support and significance framework (FT, FM, MMF), pp. 661–666.
KDDKDD-2003-WangFYH #classification #concept #data type #mining
Mining concept-drifting data streams using ensemble classifiers (HW, WF, PSY, JH), pp. 226–235.
KDDKDD-2003-YuYH #clustering #scalability #set
Classifying large data sets using SVMs with hierarchical clusters (HY, JY, JH), pp. 306–315.
KDDKDD-2003-ZakiG #mining #performance
Fast vertical mining using diffsets (MJZ, KG), pp. 326–335.
MLDMMLDM-2003-Barsi #graph #self
Neural Self-Organization Using Graphs (AB), pp. 343–352.
MLDMMLDM-2003-BicegoMF #clustering #markov #modelling #sequence #similarity
Similarity-Based Clustering of Sequences Using Hidden Markov Models (MB, VM, MATF), pp. 86–95.
MLDMMLDM-2003-DeventerDNK #modelling #testing
Using Test Plans for Bayesian Modeling (RD, JD, HN, OK), pp. 307–316.
MLDMMLDM-2003-KimJ #network
Using Bayesian Networks to Analyze Medical Data (ICK, YGJ), pp. 317–327.
MLDMMLDM-2003-LazliS #fuzzy #logic #probability #recognition #speech
Connectionist Probability Estimators in HMM Arabic Speech Recognition Using Fuzzy Logic (LL, MS), pp. 379–388.
MLDMMLDM-2003-MagnussonV #network #sequence #visualisation
Visualizing Sequences of Texts Using Collocational Networks (CM, HV), pp. 276–283.
MLDMMLDM-2003-MiteranBB #approximate #bound #classification #image #realtime #segmentation
Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
MLDMMLDM-2003-TanakaU #analysis #component #multi #principle
Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
SEKESEKE-2003-BarberL #architecture #framework #specification
Specifying and Analyzing Agent Architectures using the Agent Competency Framework (KSB, DNL), pp. 232–239.
SEKESEKE-2003-Cebulla #adaptation #architecture #reasoning #variability
Reasoning about Variability and structural Adaptation in Sociotechnical Systems Using Dynamic Architectures (MC), pp. 406–413.
SEKESEKE-2003-GomesPPSCFB #design pattern #reuse
Selection and Reuse of Software Design Patterns Using CBR and WordNet (PG, FCP, PP, NS, PC, JLF, CB), pp. 289–296.
SEKESEKE-2003-GomesPPSCFB03a #diagrams #reuse #uml
Case-Based Reuse of UML Diagrams (PG, FCP, PP, NS, PC, JLF, CB), pp. 335–339.
SEKESEKE-2003-JiangH
Exploring UDDI Registries Using Modified OFDAV Browser (BJ, MLH), pp. 119–123.
SEKESEKE-2003-NetiniantiE #approach #aspect-oriented #verification
Adding Verification Property of Inter-Processes Using Aspect-Oriented Approach (PN, TE), pp. 54–60.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #risk management
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
SEKESEKE-2003-PeriniS #design
Dealing with software design issues using an Agent-Oriented methodology (AP, AS), pp. 224–231.
SEKESEKE-2003-SouzaORGR #consistency #detection #modelling #nondeterminism #re-engineering
Using Critiquing Systems for Inconsistency Detection in Software Engineering Models (CRBdS, HLRO, CRPdR, KMG, DFR), pp. 196–203.
SEKESEKE-2003-ThwinQ #maintenance #metric #network #object-oriented
Application of Neural Networks for Estimating Software Maintainability Using Object-Oriented Metrics (MMTT, TSQ), pp. 69–73.
SIGIRSIGIR-2003-Anick #feedback #refinement #web
Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
SIGIRSIGIR-2003-BeitzelJCGF #automation #evaluation #retrieval #web
Using manually-built web directories for automatic evaluation of known-item retrieval (SMB, ECJ, AC, DAG, OF), pp. 373–374.
SIGIRSIGIR-2003-Bennett #classification #probability #symmetry
Using asymmetric distributions to improve text classifier probability estimates (PNB), pp. 111–118.
SIGIRSIGIR-2003-Broder #graph #modelling #web
Keynote Address — exploring, modeling, and using the web graph (AZB), p. 1.
SIGIRSIGIR-2003-BruzaS #comparison #dependence #modelling #probability
A comparison of various approaches for using probabilistic dependencies in language modeling (PB, DS), pp. 419–420.
SIGIRSIGIR-2003-ChoiK #concept #topic
Topic distillation using hierarchy concept tree (IC, MK), pp. 371–372.
SIGIRSIGIR-2003-JeonLM #automation #image #modelling #retrieval
Automatic image annotation and retrieval using cross-media relevance models (JJ, VL, RM), pp. 119–126.
SIGIRSIGIR-2003-JiZ #independence #programming #segmentation
Domain-independent text segmentation using anisotropic diffusion and dynamic programming (XJ, HZ), pp. 322–329.
SIGIRSIGIR-2003-LinNNNSTNA #multimodal #video
User-trainable video annotation using multimodal cues (CYL, MRN, AN, CN, JRS, BLT, HJN, WHA), pp. 403–404.
SIGIRSIGIR-2003-PintoMWC #random
Table extraction using conditional random fields (DP, AM, XW, WBC), pp. 235–242.
SIGIRSIGIR-2003-TeevanK #analysis #development #empirical #exponential #probability #retrieval
Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
SIGIRSIGIR-2003-TsaiMT #classification #hybrid #image #network
Image classification using hybrid neural networks (CFT, KM, JT), pp. 431–432.
SIGIRSIGIR-2003-YangCWK
Structured use of external knowledge for event-based open domain question answering (HY, TSC, SW, CKK), pp. 33–40.
SIGIRSIGIR-2003-YuJR #keyword #query #xml
Querying XML using structures and keywords in timber (CY, HVJ, DRR), p. 463.
SIGIRSIGIR-2003-ZhangL #classification
Question classification using support vector machines (DZ, WSL), pp. 26–32.
UMLUML-2003-DologN #adaptation #generative #navigation #sequence #uml #xmi
Using UML and XMI for Generating Adaptive Navigation Sequences in Web-Based Systems (PD, WN), pp. 205–219.
UMLUML-2003-StraetenMSJ #consistency #logic #maintenance #modelling #uml
Using Description Logic to Maintain Consistency between UML Models (RVDS, TM, JS, VJ), pp. 326–340.
OOPSLAOOPSLA-2003-TipKB #constraints #refactoring
Refactoring for generalization using type constraints (FT, AK, DB), pp. 13–26.
AdaEuropeAdaEurope-2003-AlvesJH #ada #xml
The Use of Ada, GNAT.Spitbol, and XML in the Sol-Eu-Net Project (MAA, AJ, MH), pp. 196–207.
AdaEuropeAdaEurope-2003-BliebergerB #evaluation #symbolic computation
Eliminating Redundant Range Checks in GNAT Using Symbolic Evaluation (JB, BB), pp. 153–167.
AdaEuropeAdaEurope-2003-JeppuKS #ada #realtime #safety #testing
Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
AdaEuropeAdaEurope-2003-Mikkonen #case study #experience #specification #tool support
Experiences on Developing and Using a Tool Support for Formal Specification (TM), pp. 297–308.
AdaEuropeAdaEurope-2003-MinguetGFL #metric
Getting System Metrics Using POSIX Tracing Services (AEM, VLG, AGF, ACiL), pp. 220–231.
AdaEuropeAdaEurope-2003-OrtizAPS #architecture #case study #evaluation #performance #realtime #uml
A Case Study in Performance Evaluation of Real-Time Teleoperation Software Architectures Using UML-MAST (FJO, , JAP, PS), pp. 417–428.
LOPSTRLOPSTR-2003-BerghammerM #algorithm #approximate #development #verification
Formal Development and Verification of Approximation Algorithms Using Auxiliary Variables (RB, MMO), pp. 59–74.
LOPSTRLOPSTR-2003-LehmannL #generative #induction #proving #theorem proving
Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
PADLPADL-2003-ErdemLNR #programming #set
Reconstructing the Evolutionary History of Indo-European Languages Using Answer Set Programming (EE, VL, LN, DR), pp. 160–176.
PLDIPLDI-2003-BerndlLQHU #analysis #points-to
Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
POPLPOPL-2003-GulwaniN #random
Discovering affine equalities using random interpretation (SG, GCN), pp. 74–84.
SASSAS-2003-HermenegildoPBL #abstract interpretation #development #preprocessor
Program Development Using Abstract Interpretation (And The Ciao System Preprocessor) (MVH, GP, FB, PLG), pp. 127–152.
SASSAS-2003-KremenekE #approximate #named #static analysis #statistics
Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations (TK, DRE), pp. 295–315.
REFSQREFSQ-J-2002-CrookIN03 #modelling #policy #requirements
Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
RERE-2003-Barnes #ambiguity #convergence #design #process #requirements
Using Convergent Design Processes to Surface Hidden Ambiguity and Conflict in Requirements (RJB), p. 281.
RERE-2003-BushF #assessment #requirements
Requirements Stability Assessment Using Scenarios (DB, AF), pp. 23–32.
RERE-2003-RifautMMPSLV #analysis #formal method #named #specification #tool support
FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
RERE-2003-SenguptaC #modelling #requirements #sequence chart
Refinement-Based Requirements Modeling Using TriggeredMessage Sequence Charts (BS, RC), pp. 95–104.
ASEASE-2003-AbergLSMM #aspect-oriented #automation #evolution #kernel #logic #on the
On the automatic evolution of an OS kernel using temporal logic and AOP (RAÅ, JLL, MS, GM, AFLM), pp. 196–204.
ASEASE-2003-ChoiH #abstraction #model checking #reduction #requirements #specification
Model Checking Software Requirement Specifications using Domain Reduction Abstraction (YC, MPEH), pp. 314–317.
ASEASE-2003-DiazTB #automation #metaheuristic #testing
Automated Software Testing Using a Metaheuristic Technique Based on Tabu Search (ED, JT, RB), pp. 310–313.
ASEASE-2003-Moore #communication #requirements #user interface
Communicating Requirements Using End-User GUI Constructions with Argumentation (JMM), pp. 360–363.
ASEASE-2003-ShlyakhterSJST #debugging #declarative #modelling #satisfiability
Debugging Overconstrained Declarative Models Using Unsatisfiable Cores (IS, RS, DJ, MS, MT), pp. 94–105.
ESEC-FSEESEC-FSE-2003-CangussuDM #approach #monitoring #process #statistics #testing
Monitoring the software test process using statistical process control: a logarithmic approach (JWC, RAD, APM), pp. 158–167.
ESEC-FSEESEC-FSE-2003-UchitelKM #behaviour #lts
Behaviour model elaboration using partial labelled transition systems (SU, JK, JM), pp. 19–27.
ESEC-FSEESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
ICSEICSE-2003-BagertM #education #process #re-engineering
Using a Web-Based Project Process Throughout the Software Engineering Curriculum (DJB, SAM), pp. 634–640.
ICSEICSE-2003-Kylmakoski #agile #authoring #documentation #performance
Efficient Authoring of Software Documentation Using RaPiD7 (RK), pp. 255–261.
ICSEICSE-2003-MarcusM #semantics #traceability
Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing (AM, JIM), pp. 125–137.
ICSEICSE-2003-SimEH #benchmark #challenge #metric #re-engineering #research
Using Benchmarking to Advance Research: A Challenge to Software Engineering (SES, SME, RCH), pp. 74–83.
ICSEICSE-2003-ValettoK #adaptation #coordination #process
Using Process Technology to Control and Coordinate Software Adaptation (GV, GEK), pp. 262–273.
SACSAC-2003-CanWWS #3d #java #named #performance #visualisation
FPV: Fast Protein Visualization Using Java 3D (TC, YW, YFW, JS), pp. 88–95.
SACSAC-2003-Cerrito #estimation #kernel #visualisation
Data Visualization Using Kernel Density Estimation to Examine Patterns of Physician Practice (PBC), pp. 275–279.
SACSAC-2003-Gee #semantics
Using Latent Semantic Indexing to Filter Spam (KRG), pp. 460–464.
SACSAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance
ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
SACSAC-2003-KaramHGR #evaluation #image #retrieval
Enhancement of Wavelet-Based Medical Image Retrieval Through Feature Evaluation Using an Information Gain Measure (OHK, AMH, SG, SR), pp. 220–226.
SACSAC-2003-KimP #replication #xml #xquery
Xquery Speedup Using Replication in Mapping XML into Relations (JK, SP), pp. 536–543.
SACSAC-2003-MaI
Long Time Step Molecular Dynamics using Targeted Langevin Stabilization (QM, JAI), pp. 178–182.
SACSAC-2003-NaganumaTM #3d #estimation #image #multi
Estimation of 3D Shape and Reflectance using Multiple Moire Images and Shading Model (SN, NT, AM), pp. 943–950.
SACSAC-2003-NittoGS #multi #web
Using Agents for Multi-target Search on the Web (EDN, CG, PS), pp. 828–833.
SACSAC-2003-Wainer #hardware #interactive #standard #visualisation
Interactive Computation and Visualization of Fetch Using Standard Computer Graphics Hardware (MW), pp. 961–965.
SACSAC-2003-Weyuker #testing
Using Operational Distributions to Judge Testing Progress (EJW), pp. 1118–1122.
SACSAC-2003-XiangYSRS #quantifier
Quantification of Trabecular Bone Mass and Orientation Using Gabor Wavelets (YX, VY, JS, TR, MBS), pp. 183–188.
SACSAC-2003-YangH #classification #data flow #image
Image Texture Classification Using Datagrams and Characteristic Views (SY, CCH), pp. 22–26.
SACSAC-2003-YuNPC #classification #on the #testing
On the Use of the Classification-Tree Method by Beginning Software Testers (YTY, SPN, PLP, TYC), pp. 1123–1127.
SACSAC-2003-ZhuHY #network #web
Recognizing the Relations between Web Pages Using Artificial Neural Network (XZ, SH, YY), pp. 1217–1221.
GPCEGPCE-2003-CalcagnoTHL #abstract syntax tree #implementation #multi
Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection (CC, WT, LH, XL), pp. 57–76.
CCCC-2003-GagnonH #bytecode #effectiveness #java #sequence #thread
Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences (EG, LJH), pp. 170–184.
CCCC-2003-JohnsonM #dependence #graph
Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
CCCC-2003-LhotakH #analysis #java #points-to #scalability
Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
CCCC-2003-Reeuwijk #agile #compilation #robust
Rapid and Robust Compiler Construction Using Template-Based Metacompilation (KvR), pp. 247–261.
CGOCGO-2003-ChenHC #hardware #monitoring #performance
Dynamic Trace Selection Using Performance Monitoring Hardware Sampling (HC, WCH, DyC), pp. 79–90.
CGOCGO-2003-DehnertGBJKKM #adaptation #challenge
The Transmeta Code Morphing — Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges (JCD, BG, JPB, RJ, TK, AK, JM), pp. 15–24.
CGOCGO-2003-LinCHY
Speculative Register Promotion Using Advanced Load Address Table (ALAT) (JL, TC, WCH, PCY), pp. 125–134.
DACDAC-2003-AlpertLKD #metric
Delay and slew metrics using the lognormal distribution (CJA, FL, CVK, AD), pp. 382–385.
DACDAC-2003-ClarkeKY #behaviour #bound #c #consistency #model checking #source code
Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
DACDAC-2003-CroixW #analysis #modelling
Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
DACDAC-2003-DescampsBGIP #design #network
Design of a 17-million gate network processor using a design factory (GED, SB, SG, SI, AP), pp. 844–849.
DACDAC-2003-FineZ #functional #generative #network #testing #verification
Coverage directed test generation for functional verification using bayesian networks (SF, AZ), pp. 286–291.
DACDAC-2003-GadN #congruence #order #reduction
Model order reduction of nonuniform transmission lines using integrated congruence transform (EG, MSN), pp. 238–243.
DACDAC-2003-HuangC #embedded #framework #verification
Using embedded infrastructure IP for SOC post-silicon verification (YH, WTC), pp. 674–677.
DACDAC-2003-LauP #algorithm #design
Fractional-N frequency synthesizer design at the transfer function level using a direct closed loop realization algorithm (CYL, MHP), pp. 526–531.
DACDAC-2003-LeeCHY #multi #scalability
Multilevel floorplanning/placement for large-scale modules using B*-trees (HCL, YWC, JMH, HHY), pp. 812–817.
DACDAC-2003-LiYRP #generative #markov
A scan BIST generation method using a markov source and partial bit-fixing (WL, CY, SMR, IP), pp. 554–559.
DACDAC-2003-MishchenkoS #composition #functional #scalability
Large-scale SOP minimization using decomposition and functional properties (AM, TS), pp. 149–154.
DACDAC-2003-NohlGBALSM #architecture #encoding #modelling #synthesis
Instruction encoding synthesis for architecture exploration using hierarchical processor models (AN, VG, GB, AH, RL, OS, HM), pp. 262–267.
DACDAC-2003-OMahonyYHW #design #network
Design of a 10GHz clock distribution network using coupled standing-wave oscillators (FO, CPY, MH, SSW), pp. 682–687.
DACDAC-2003-QinC #reduction
Realizable parasitic reduction using generalized Y-Delta transformation (ZQ, CKC), pp. 220–225.
DACDAC-2003-SehgalIKC #multi #reduction
Test cost reduction for SOCs using virtual TAMs and lagrange multipliers (AS, VI, MDK, KC), pp. 738–743.
DACDAC-2003-SoDH #behaviour #design #synthesis #tool support
Using estimates from behavioral synthesis tools in compiler-directed design space exploration (BS, PCD, MWH), pp. 514–519.
DACDAC-2003-Tahoori #satisfiability #testing
Using satisfiability in application-dependent testing of FPGA interconnects (MBT), pp. 678–681.
DACDAC-2003-TasiranYB #model checking #monitoring #simulation #specification
Using a formal specification and a model checker to monitor and direct simulation (ST, YY, BB), pp. 356–361.
DACDAC-2003-VasudevanR
Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique (VV, MR), pp. 538–541.
DACDAC-2003-WangM #multi #network #optimisation #power management
On-chip power supply network optimization using multigrid-based technique (KW, MMS), pp. 113–118.
DACDAC-2003-ZhuYC #adaptation #algebra #analysis #approach #multi #network
Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
DATEDATE-2003-AgarwalBZV #analysis #bound #statistics
Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATEDATE-2003-Al-ArsGBR #fault #optimisation #simulation #testing
Optimizing Stresses for Testing DRAM Cell Defects Using Electrical Simulation (ZAA, AJvdG, JB, DR), pp. 10484–10489.
DATEDATE-2003-CaldariCCCPT #architecture #modelling #transaction
Transaction-Level Models for AMBA Bus Architecture Using SystemC 2.0 (MC, MC, MC, SC, LP, CT), pp. 20026–20031.
DATEDATE-2003-CarbognaniLICB #modelling #precise #standard #verification
Qualifying Precision of Abstract SystemC Models Using the SystemC Verification Standard (FC, CKL, CNI, AC, PB), pp. 20088–20094.
DATEDATE-2003-Castro-LopezFMR #behaviour #hardware #modelling #simulation
Behavioural Modelling and Simulation of SigmaDelta Modulators Using Hardware Description Languages (RCL, FVF, FM, ÁRV), pp. 10168–10175.
DATEDATE-2003-ChoiB #migration #network
Hierarchical Global Floorplacement Using Simulated Annealing and Network Flow Area Migration (WC, KB), pp. 11104–11105.
DATEDATE-2003-DebOJ #analysis #embedded #simulation
Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, , AJ), pp. 11100–11101.
DATEDATE-2003-DoboliGD #clustering #modelling #network
Extraction of Piecewise-Linear Analog Circuit Models from Trained Neural Networks Using Hidden Neuron Clustering (SD, GG, AD), pp. 11098–11099.
DATEDATE-2003-IskanderDAMHSM #synthesis
Synthesis of CMOS Analog Cells Using AMIGO (RI, MD, MA, MM, NH, NS, SM), pp. 20297–20302.
DATEDATE-2003-IyengarCSC #approach #optimisation #testing
A Unified Approach for SOC Testing Using Test Data Compression and TAM Optimization (VI, AC, SS, KC), pp. 11188–11190.
DATEDATE-2003-MeiVVML #architecture #configuration management #parallel #scheduling
Exploiting Loop-Level Parallelism on Coarse-Grained Reconfigurable Architectures Using Modulo Scheduling (BM, SV, DV, HDM, RL), pp. 10296–10301.
DATEDATE-2003-MoussaGN #modelling #performance #transaction
Exploring SW Performance Using SoC Transaction-Level Modeling (IM, TG, GN), pp. 20120–20125.
DATEDATE-2003-OhKWS #architecture #feedback
Test Pattern Compression Using Prelude Vectors in Fan-Out Scan Chain with Feedback Architecture (NO, RK, TWW, JS), pp. 10110–10115.
DATEDATE-2003-OhtakeOF #algorithm #fault #generative #testing
A Method of Test Generation fo Path Delay Faults Using Stuck-at Fault Test Generation Algorithms (SO, KO, HF), pp. 10310–10315.
DATEDATE-2003-OikonomakosZA #metric #online #self #synthesis #testing
Versatile High-Level Synthesis of Self-Checking Datapaths Using an On-Line Testability Metric (PO, MZ, BMAH), pp. 10596–10601.
DATEDATE-2003-RoychoudhuryMK #debugging #protocol
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
DATEDATE-2003-SayintaCPAD #abstraction #case study #verification
A Mixed Abstraction Level Co-Simulation Case Study Using SystemC for System on Chip Verification (AS, GC, MP, AA, WD), pp. 20095–20100.
DATEDATE-2003-SeidlEJ
Performance-Directed Retiming for FPGAs Using Post-Placement Delay Information (US, KE, FMJ), pp. 10770–10777.
DATEDATE-2003-ShengH #novel #performance
Efficient Preimage Computation Using A Novel Success-Driven ATPG (SS, MSH), pp. 10822–10827.
DATEDATE-2003-WangM #multi #optimisation
Power/Ground Mesh Area Optimization Using Multigrid-Based Technique (KW, MMS), pp. 10850–10855.
DATEDATE-2003-WedlerSK #encoding #induction
Using RTL Statespace Information and State Encoding for Induction Based Property Checking (MW, DS, WK), pp. 11156–11157.
DATEDATE-2003-ZengZHC #correlation #performance
Fast Computation of Data Correlation Using BDDs (ZZ, QZ, IGH, MJC), pp. 10122–10129.
DATEDATE-2003-ZhangM #implementation #independence #satisfiability #validation
Validating SAT Solvers Using an Independent Resolution-Based Checker: Practical Implementations and Other Applications (LZ, SM), pp. 10880–10885.
HPDCHPDC-2003-Cuenca-AcunaPMN #community #information management #named #peer-to-peer
PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities (FMCA, CP, RPM, TDN), pp. 236–249.
HPDCHPDC-2003-IvanK #component #framework #reuse
Using Views for Customizing Reusable Components in Component-Based Frameworks (AAI, VK), pp. 194–204.
HPDCHPDC-2003-SundaresanLKPS #adaptation #grid #monitoring
Adaptive Polling of Grid Resource Monitors Using a Slacker Coherence Model (RS, ML, TMK, SP, JHS), pp. 260–269.
LCTESLCTES-2003-Krishnaswamy #performance
Enhancing the performance of 16-bit code using augmenting instructions (AK, RG), pp. 254–264.
PDPPDP-2003-BatistaCM #clustering #consistency
Computing Binary Space Partition Trees using a Scope Consistent DSM System in a Cluster of Workstations (RBB, ALACC, ACMAdM), pp. 93–100.
PDPPDP-2003-ProdanFGMFM #architecture #clustering #grid #on the #parametricity #performance
On Using ZENTURIO for Performance and Parameter Studies on Cluster and Grid Architectures (RP, TF, MG, GM, FF, HM), pp. 185–192.
PDPPDP-2003-SeragiottoFGMM #automation #distributed #on the #parallel #performance #problem #source code
On Using Aksum for Semi-Automatically Searching of Performance Problems in Parallel and Distributed Programs (CSJ, TF, MG, GM, HM), pp. 385–392.
PDPPDP-2003-SuppiSL #distributed
Web-Based Distributed Computing Using Parasite (RS, MS, EL), pp. 467–474.
PPoPPPPoPP-2003-PrabhuO #concurrent #parallel #thread
Using thread-level speculation to simplify manual parallelization (MKP, KO), pp. 1–12.
PPoPPPPoPP-2003-Puppin #adaptation #convergence #machine learning #scheduling
Adapting convergent scheduling using machine learning (DP), p. 1.
PPoPPPPoPP-2003-TanSSAM #design pattern #distributed #generative #memory management #parallel
Using generative design patterns to generate parallel code for a distributed memory environment (KT, DS, JS, JA, SM), pp. 203–215.
SOSPSOSP-2003-KosticRAV #named
Bullet: high bandwidth data dissemination using an overlay mesh (DK, AR, JRA, AV), pp. 282–297.
SOSPSOSP-2003-PatelWWLS #mobile #protocol
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
ESOPESOP-2003-AltisenCMR
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
ESOPESOP-2003-Flanagan #automation #model checking
Automatic Software Model Checking Using CLP (CF), pp. 189–203.
FASEFASE-2003-HeckelL #development #modelling #visual notation #web
Model-Based Development of Web Applications Using Graphical Reaction Rules (RH, ML), pp. 170–183.
FASEFASE-2003-Kruger
Capturing Overlapping, Triggered, and Preemptive Collaborations Using MSCs (IK), pp. 387–402.
TACASTACAS-2003-FersmanMPY #analysis #scheduling
Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
TACASTACAS-2003-Schmidt #invariant #petri net
Using Petri Net Invariants in State Space Construction (KS0), pp. 473–488.
TACASTACAS-2003-UchitelCKM #behaviour #named #tool support
LTSA-MSC: Tool Support for Behaviour Model Elaboration Using Implied Scenarios (SU, RC, JK, JM), pp. 597–601.
CAVCAV-2003-BoigelotHJ #automaton #hybrid
Hybrid Acceleration Using Real Vector Automata (BB, FH, SJ), pp. 193–205.
CAVCAV-2003-ColonSS #constraints #generative #invariant #linear #theorem proving
Linear Invariant Generation Using Non-linear Constraint Solving (MC, SS, HS), pp. 420–432.
CAVCAV-2003-FlanaganJOS #lazy evaluation #proving #theorem proving
Theorem Proving Using Lazy Proof Explication (CF, RJ, XO, JBS), pp. 355–367.
CAVCAV-2003-SeshiaB #automaton #bound #model checking
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
FATESFATES-2003-GuoHHD #algorithm #search-based #sequence
Computing Unique Input/Output Sequences Using Genetic Algorithms (QG, RMH, MH, KD), pp. 164–177.
FATESFATES-2003-HahnleW #proving #testing #theorem proving
Using a Software Testing Technique to Improve Theorem Proving (RH, AW), pp. 30–41.
FATESFATES-2003-HeimdahlRVDG #case study #model checking #sequence #testing
Auto-generating Test Sequences Using Model Checkers: A Case Study (MPEH, SR, WV, GD, JG), pp. 42–59.
FATESFATES-2003-HesselLNPS #generative #realtime #testing
Time-Optimal Real-Time Test Case Generation Using Uppaal (AH, KGL, BN, PP, AS), pp. 114–130.
FATESFATES-2003-SungC #embedded #fault #hardware #injection #interactive #testing
Interaction Testing in an Embedded System Using Hardware Fault Injection and Program Mutation (AS, BC), pp. 192–204.
ICSTSAT-2003-LiSB #effectiveness #performance #satisfiability
A Local Search SAT Solver Using an Effective Switching Strategy and an Efficient Unit Propagation (XYL, MFMS, FB), pp. 53–68.
ICSTSAT-2003-SabharwalBK #learning #performance #problem
Using Problem Structure for Efficient Clause Learning (AS, PB, HAK), pp. 242–256.
ICTSSTestCom-2003-RanganathanDM #protocol #testing #xml
Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
VMCAIVMCAI-2003-Monniaux #abstraction
Abstraction of Expectation Functions Using Gaussian Distributions (DM), pp. 161–173.
VMCAIVMCAI-2003-WinEGKL #algorithm #distributed #execution #verification
Using Simulated Execution in Verifying Distributed Algorithms (TNW, MDE, SJG, DKK, NAL), pp. 283–297.
VMCAIVMCAI-2003-YangRS #encoding #logic #mobile #model checking #process #π-calculus
A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution (PY, CRR, SAS), pp. 116–131.
CBSECBSE-2002-LarssonWNC #architecture #embedded #predict #product line
Using Prediction Enabled Technologies for Embedded Product Line Architectures (ML, AW, CN, IC), p. 12.
WICSAWICSA-2002-ChengGSSSS #architecture #self
Using Architectural Style as a Basis for System Self-repair (SWC, DG, BRS, JPS, BS, PS), pp. 45–59.
WICSAWICSA-2002-ShiH #architecture #communication #modelling #protocol
Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
CBSECBSE-2003-MehlitzP #design pattern #reliability #verification
Design for Verification: Using Design Patterns to Build Reliable Systems (PCM, JJP), p. 10.
DocEngDocEng-2002-AllierE #approach #image
Degraded character image restoration using active contours: a first approach (BA, HE), pp. 142–148.
TPDLECDL-2002-BontchevaMCS #automation #library
Using Human Language Technology for Automatic Annotation and Indexing of Digital Library Content (KB, DM, HC, HS), pp. 613–625.
TPDLECDL-2002-Heggland #ad hoc #named #ontology
OntoLog: Temporal Annotation Using Ad Hoc Ontologies and Application Profiles (JH), pp. 118–128.
TPDLECDL-2002-Ruthven #feedback #on the
On the Use of Explanations as Mediating Device for Relevance Feedback (IR), pp. 338–345.
TPDLECDL-2002-SerralheiroCMT #word
Word Alignment in Digital Talking Books Using WFSTs (AJS, DC, HM, IT), pp. 508–515.
HTHT-2002-SinclairMMW #artificial reality #hypermedia
Links in the palm of your hand: tangible hypermedia using augmented reality (PASS, KM, DEM, MJW), pp. 127–136.
HTHT-2002-WangH #distributed #hypermedia #visual notation
Supporting distributed meetings using cooperative, visual, process-enabled hypermedia (WW, JMH), pp. 147–148.
HTHT-2002-Whitehead #comparison #modelling
Uniform comparison of data models using containment modeling (EJWJ), pp. 182–191.
HTHT-2002-ZhuHH #markov #modelling #predict #web
Using Markov models for web site link prediction (JZ, JH, JGH), pp. 169–170.
JCDLJCDL-2002-AbbasNS #library
Middle school children’s use of the ARTEMIS digital library (JMA, CAN, ES), pp. 98–105.
JCDLJCDL-2002-AnanLMNZFFS #architecture
Preservation and transition of NCSTRL using an OAI-based architecture (HA, XL, KM, MLN, MZ, JCF, EAF, PS), pp. 181–182.
JCDLJCDL-2002-DroettboomFMCDPA #framework #recognition
Using the Gamera framework for the recognition of cultural heritage materials (MD, IF, KM, GSC, TD, MP, TA), pp. 11–17.
JCDLJCDL-2002-HauptmannJN #information retrieval #multi #recognition #speech #video
Multi-modal information retrieval from broadcast video using OCR and speech recognition (AGH, RJ, TDN), pp. 160–161.
JCDLJCDL-2002-HuD #comparison #database #query #retrieval
A comparison of melodic database retrieval techniques using sung queries (NH, RBD), pp. 301–307.
JCDLJCDL-2002-KanK #automation #information retrieval #summary
Using librarian techniques in automatic text summarization for information retrieval (MYK, JK), pp. 36–45.
JCDLJCDL-2002-McDonaldC #heuristic #rank
Using sentence-selection heuristics to rank text segments in TXTRACTOR (DM, HC), pp. 28–35.
JCDLJCDL-2002-PintoBCCKLW #named
QuASM: a system for question answering using semi-structured data (DP, MB, RGC, WBC, MK, WL, XW), pp. 46–55.
JCDLJCDL-2002-PromH #protocol
Using the open archives initiative protocols with EAD (CJP, TGH), pp. 171–180.
JCDLJCDL-2002-SooLYC #image #ontology
Using sharable ontology to retrieve historical images (VWS, CYL, JJY, CcC), pp. 197–198.
JCDLJCDL-2002-WactlarC
Enhanced perspectives for historical and cultural documentaries using informedia technologies (HDW, CcC), pp. 338–339.
JCDLJCDL-2002-Witten #how #library #open source
How to build a digital library using open-source software (IHW), p. 416.
PODSPODS-2002-AfratiLM #query
Answering Queries Using Views with Arithmetic Comparisons (FNA, CL, PM), pp. 209–220.
PODSPODS-2002-SpielmannTB #automaton #distributed #query #web
Distributed Computation of Web Queries Using Automata (MS, JT, JVdB), pp. 97–108.
SIGMODSIGMOD-2002-KanthRA #comparison
Quadtree and R-tree indexes in oracle spatial: a comparison using GIS data (KVRK, SR, DA), pp. 546–557.
SIGMODSIGMOD-2002-TatarinovVBSSZ #database #order #query #relational #xml
Storing and querying ordered XML using a relational database system (IT, SV, KSB, JS, EJS, CZ), pp. 204–215.
SIGMODSIGMOD-2002-TheobaldW #ontology #retrieval #xml
The XXL search engine: ranked retrieval of XML data using indexes and ontologies (AT, GW), p. 615.
SIGMODSIGMOD-2002-ZhouR #database #implementation
Implementing database operations using SIMD instructions (JZ, KAR), pp. 145–156.
VLDBVLDB-2002-AshwinGG #adaptation #similarity
Adaptable Similarity Search using Non-Relevant Information (TVA, RG, SG), pp. 47–58.
VLDBVLDB-2002-BrightR #web
Using Latency-Recency Profiles for Data Delivery on the Web (LB, LR), pp. 550–561.
VLDBVLDB-2002-ChoN #detection #effectiveness
Effective Change Detection Using Sampling (JC, AN), pp. 514–525.
VLDBVLDB-2002-ConradGJM #database #logic #physics
Database Selection Using Actual Physical and Acquired Logical Collection Resources in a Massive Domain-specific Operational Environment (JGC, XSG, PJ, MM), pp. 71–82.
VLDBVLDB-2002-CormodeDIM #data type #how
Comparing Data Streams Using Hamming Norms (How to Zero In) (GC, MD, PI, SM), pp. 335–345.
VLDBVLDB-2002-CosleyLP #framework #named #recommendation #testing
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex (DC, SL, DMP), pp. 35–46.
VLDBVLDB-2002-GotoK #database #mobile
A New Passenger Support System for Public Transport using Mobile Database Access (KG, YK), pp. 908–919.
VLDBVLDB-2002-LamKR #mobile #monitoring #named #realtime
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies (KyL, AK, KR), pp. 1063–1066.
VLDBVLDB-2002-Mohan02a #performance
An Efficient Method for Performing Record Deletions and Updates Using Index Scans (CM), pp. 940–949.
VLDBVLDB-2002-OhuraTPK #internet #mining #query #web
Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
CSEETCSEET-2002-BevanWM #guidelines #programming
Guidelines for the Use of Pair Programming in a Freshman Programming Class (JB, LLW, CEM), pp. 100–107.
CSEETCSEET-2002-FraileyM #education #industrial #source code
Using SWEBOK for Education Programs in Industry and Academia (DJF, JM), p. 6–?.
CSEETCSEET-2002-ThompsonE #documentation #education #re-engineering
Workshop 1: Developing Software Engineering Courses Using Computing Curriculum 2001 (CC 2001) Documentation (JBT, HME), pp. 260–261.
ITiCSEITiCSE-2002-Barros #concurrent #petri net #programming
Specific proposals for the use of petri nets in a concurrent programming course (JPB), pp. 165–167.
ITiCSEITiCSE-2002-Chalk #aspect-oriented #education #human-computer #learning
Evaluating the use of a virtual learning environment for teaching aspects of HCI (PC), pp. 125–129.
ITiCSEITiCSE-2002-RatteC #collaboration #industrial #on the #simulation #web
On using the web as a collaboration space in the context of an industrial simulation (SR, JC), pp. 141–145.
SCAMSCAM-J-2001-CordyDMS02 #re-engineering #txl
Source transformation in software engineering using the TXL transformation system (JRC, TRD, AJM, KAS), pp. 827–837.
CSMRCSMR-2002-AversanoCLG #case study #documentation #tool support #web #workflow #xml
Integrating Document and Workflow Management Tools using XML and Web Technologies: A Case Study (LA, GC, ADL, PG), p. 24–?.
CSMRCSMR-2002-Baburin #graph #re-engineering
Using Graph Based Representations in Reengineering (DEB), pp. 203–206.
CSMRCSMR-2002-YuSM #case study #industrial #metric #object-oriented #predict
Predicting Fault-Proneness using OO Metrics: An Industrial Case Study (PY, TS, HAM), pp. 99–107.
ICSMEICSM-2002-Harrison #adaptation #case study #maintenance #web #web service
Using Service Specific Proxies to Migrate Web Services to the “Wireless Web”: An Illustrative Case Study of Adaptive Maintenance (WH), pp. 300–309.
ICSMEICSM-2002-KorelTV #analysis #dependence #modelling #reduction #testing
Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
ICSMEICSM-2002-MoeS #distributed #execution
Using Execution Trace Data to Improve Distributed Systems (JM, KS), pp. 640–648.
ICSMEICSM-2002-RichnerD #information management
Using Dynamic Information for the Iterative Recovery of Collaborations and Roles (TR, SD), pp. 34–43.
IWPCIWPC-2002-BurdOW #animation #comprehension #diagrams #sequence chart
Evaluating Using Animation to Improve Understanding of Sequence Diagrams (EB, DO, AW), pp. 107–113.
IWPCIWPC-2002-DeursenV #combinator #comprehension #tool support #visitor
Building Program Understanding Tools Using Visitor Combinators (AvD, JV), pp. 137–146.
IWPCIWPC-2002-Moonen #impact analysis #lightweight #semiparsing
Lightweight Impact Analysis using Island Grammars (LM), pp. 219–228.
IWPCIWPC-2002-SimHE #benchmark #c++ #metric #on the
On Using a Benchmark to Evaluate C++ Extractors (SES, RCH, SME), pp. 114–123.
IWPCIWPC-2002-TakadaOI #information management #lightweight #slicing
Dependence-Cache Slicing: A Program Slicing Method Using Lightweight Dynamic Information (TT, FO, KI), pp. 169–177.
IWPCIWPC-2002-WuHH #graph
Using Graph Patterns to Extract Scenarios (JW, AEH, RCH), pp. 239–247.
PASTEPASTE-2002-BowringOH #monitoring
Monitoring deployed software using software tomography (JFB, AO, MJH), pp. 2–9.
PASTEPASTE-2002-Naumovich #analysis #data flow #design pattern #implementation
Using the observer design pattern for implementation of data flow analyses (GN), pp. 61–68.
SCAMSCAM-2002-Balmas #dependence #documentation #graph #source code
Using Dependence Graphs as a Support to Document Programs (FB), pp. 145–154.
SCAMSCAM-2002-ChangJH #exception #java #static analysis #visualisation
Visualization of Exception Propagation for Java Using Static Analysis (BMC, JWJ, SHH), p. 173–?.
SCAMSCAM-2002-Ghosh #concurrent #fault #metric #object-oriented #source code #testing #towards
Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation (SG), pp. 17–25.
SCAMSCAM-2002-RamseyA #framework
A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language (FVR, JJA), p. 44–?.
WCREWCRE-2002-BarowskiC #dependence #java
Extraction and Use of Class Dependency Information for Java (LAB, JHCI), p. 309–?.
WCREWCRE-2002-BodhuinGT #cobol #design pattern #migration #mvc #web
Migrating COBOL Systems to the WEB by Using the MVC Design Pattern (TB, EG, MT), pp. 329–338.
WCREWCRE-2002-DengK #comprehension #concept
Using Conceptual Roles of Data for Enhanced Program Comprehension (YD, SCK), pp. 119–127.
WCREWCRE-2002-McArthurMN #representation #source code #xml
An Extensible Tool for Source Code Representation Using XML (GM, JM, SKKN), p. 199–?.
WCREWCRE-2002-RillingM #3d #analysis #on the #source code #visual notation
On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
WCREWCRE-2002-RivaY #architecture #documentation #generative #xml
Generation of Architectural Documentation Using XML (CR, YY), p. 161–?.
WCREWCRE-2002-TahvildariK #graph #maintenance
A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph (LT, KK), p. 77–?.
ICALPICALP-2002-BeierSS #data type #energy #geometry #network
Energy Optimal Routing in Radio Networks Using Geometric Data Structures (RB, PS, NS), pp. 366–376.
ICALPICALP-2002-HermenegildoPBL #approximate #debugging #semantics #specification #validation
Program Debugging and Validation Using Semantic Approximations and Partial Specifications (MVH, GP, FB, PLG), pp. 69–72.
FMFME-2002-BackesJP #bisimulation #composition #encryption #implementation
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation (MB, CJ, BP), pp. 310–329.
FMFME-2002-Casset #development #embedded #formal method #java #verification
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
FMFME-2002-CatanoH #java #specification #static analysis
Formal Specification and Static Checking of Gemplus’ Electronic Purse Using ESC/Java (NC, MH), pp. 272–289.
FMFME-2002-GaravelH #evaluation #functional #on the #performance #verification
On Combining Functional Verification and Performance Evaluation Using CADP (HG, HH), pp. 410–429.
FMFME-2002-Pahl #abstraction #analysis #refinement
Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
FMFME-2002-Rusu #generative #testing #verification
Verification Using Test Generation Techniques (VR), pp. 252–271.
IFMIFM-2002-WinterD #model checking
Model Checking Object-Z Using ASM (KW, RD), pp. 165–184.
AFPAFP-2002-ClaessenRCHW02 #functional #lazy evaluation #quickcheck #source code #testing
Testing and Tracing Lazy Functional Programs Using QuickCheck and Hat (KC, CR, OC, JH, MW), pp. 59–99.
ICFPICFP-2002-LuthG #monad
Composing monads using coproducts (CL, NG), pp. 133–144.
IFLIFL-2002-PortilloHLV #automation #cost analysis
Cost Analysis Using Automatic Size and Time Inference (ÁJRP, KH, HWL, PBV), pp. 232–248.
ICGTICGT-2002-ReisRASN #execution #graph transformation #process #semantics
Using Graph Transformation as the Semantical Model for Software Process Execution in the APSEE Environment (CALR, RQR, MMdA, HS, DJN), pp. 254–269.
CHICHI-2002-JacobIPP #grid #interface
A tangible interface for organizing information using a grid (RJKJ, HI, GP, JP), pp. 339–346.
CSCWCSCW-2002-EdwardsNSSBSWI #ad hoc #collaboration #peer-to-peer
Using speakeasy for ad hoc peer-to-peer collaboration (WKE, MWN, JZS, TFS, DB, DKS, HCW, SI), pp. 256–265.
CSCWCSCW-2002-JonesH #coordination #distributed
Extreme work teams: using SWAT teams as a model for coordinating distributed robots (HJ, PJH), pp. 372–381.
CSCWCSCW-2002-KrautGF #development #visual notation
The use of visual information in shared visual spaces: informing the development of virtual co-presence (REK, DG, SRF), pp. 31–40.
CAiSECAiSE-2002-AoumeurS #behaviour #diagrams #logic #prototype #uml
Integrating and Rapid-Prototyping UML Structural and Behavioural Diagrams Using Rewriting Logic (NA, GS), pp. 296–310.
CAiSECAiSE-2002-BerlinM #database #feature model #machine learning
Database Schema Matching Using Machine Learning with Feature Selection (JB, AM), pp. 452–466.
CAiSECAiSE-2002-CaiY #approach #performance #requirements
Addressing Performance Requirements Using a Goal and Scenario-Oriented Approach (ZC, ESKY), pp. 706–710.
CAiSECAiSE-2002-FilhaSLE #query #representation #web
Using Nested Tables for Representing and Querying Semistructured Web Data (IMREF, ASdS, AHFL, DWE), pp. 719–723.
CAiSECAiSE-2002-IvanDP #approach #complexity #design #middleware #protocol
Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
CAiSECAiSE-2002-LeonardiL #requirements
Using Business Rules in EXtreme Requirements (MCL, JCSdPL), pp. 420–435.
EDOCEDOC-2002-MosM #approach #architecture #component #modelling #performance
Performance Management in Component-Oriented Systems Using a Model Driven ArchitectureTM Approach (AM, JM), pp. 227–237.
ICEISICEIS-2002-Al-TahatISY #approach #development #framework #multi #web
Using Hot-Spot-Driven Approach in the Development of a Framework for Multimedia Presentation on the Web (KSAT, SBI, TMTS, MY), pp. 855–860.
ICEISICEIS-2002-BarjisC #analysis #database #design #modelling #semantics
Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
ICEISICEIS-2002-DascaluGF #automaton #modelling
Using Cellular Automata in Traffic Modeling (MD, SG, EF), pp. 467–472.
ICEISICEIS-2002-GarveyJR #java #persistent
Using Persistent Java to Construct a GIS (MG, MJ, MR), pp. 257–262.
ICEISICEIS-2002-GharibMT #algorithm #clustering
High Dimensional Data Clustering Using SOFM And K-Means Algorithms (TFG, MGM, MFT), pp. 488–493.
ICEISICEIS-2002-HillbrandK #approach #metamodelling #network
Using Artificial Neural Networks to Prove Hypothetic Cause-And-Effect Relations: A Metamodel-Based Approach to Support Strategic Decisions (CH, DK), pp. 367–373.
ICEISICEIS-2002-KimT #communication #design #enterprise #modelling #ontology #process
Designing Business Processes and Communication Structures for E-Business Using Ontology-Based Enterprise Models with Mathematical Models (HMK, KDT), pp. 635–641.
ICEISICEIS-2002-LaraV
Using AToM3 as a Meta-Case Tool (JdL, HV), pp. 642–649.
ICEISICEIS-2002-LarreTMT #integration
Data Integration Using the MONIL Language (ML, JTJ, EFM, ST), pp. 115–120.
ICEISICEIS-2002-Lopez
Strategic Position of Firms in Terms of Client’s Needs Using Linguistic and Numerical Information through a New Model of SOFM (RFL), pp. 382–390.
ICEISICEIS-2002-Mahmoud #enterprise #java
Developing Enterprise Applications Using Java (QHM), p. 21.
ICEISICEIS-2002-MahmoudV #internet
Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices (QHM, LV), pp. 1048–1053.
ICEISICEIS-2002-PequenoV #self
Using Full Match Classes for Self-Maintenance of Mediated Views (VMP, VMPV), pp. 148–154.
ICEISICEIS-2002-SalimifardW #analysis #modelling #performance #petri net #workflow
Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
ICEISICEIS-2002-SalterL #analysis #semantics
Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
ICEISICEIS-2002-SanchezSVACD #data mining #mining
Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
ICEISICEIS-2002-SantosNASR #classification #data mining #database #learning #mining
Augmented Data Mining over Clinical Databases Using Learning Classifier Systems (MFS, JN, AA, ÁMS, FR), pp. 512–516.
ICEISICEIS-2002-Veryha #classification #database #fuzzy #implementation #query #relational
Implementation of Fuzzy Classification Query Language in Relational Databases Using Stored Procedures (YV), pp. 195–202.
ICEISICEIS-2002-YooM #multi #scheduling
Using Multi-Agent System for Dynamic Job Shop Scheduling (MJY, JPM), pp. 517–525.
CIKMCIKM-2002-Blake #concept #data transformation #distributed
Using specification-driven concepts for distributed data management and dissemination (MBB), pp. 629–631.
CIKMCIKM-2002-ChakrabartiF #automation #named #scalability
F4: large-scale automated forecasting using fractals (DC, CF), pp. 2–9.
CIKMCIKM-2002-CooperCB #detection #documentation
Detecting similar documents using salient terms (JWC, AC, EWB), pp. 245–251.
CIKMCIKM-2002-DeshpandeK #classification
Using conjunction of attribute values for classification (MD, GK), pp. 356–364.
CIKMCIKM-2002-LeeMCC #constraints #relational #semantics #xml
NeT & CoT: translating relational schemas to XML schemas using semantic constraints (DL, MM, FC, WWC), pp. 282–291.
CIKMCIKM-2002-LiPHL #internet
Using micro information units for internet search (XL, THP, MH, BL), pp. 566–573.
CIKMCIKM-2002-NallapatiA #dependence #modelling
Capturing term dependencies using a language model based on sentence trees (RN, JA), pp. 383–390.
CIKMCIKM-2002-SistlaHC #automaton #database #query #retrieval #sequence #similarity
Similarity based retrieval from sequence databases using automata as queries (APS, TH, VC), pp. 237–244.
CIKMCIKM-2002-WuY #adaptation #monitoring #multi #performance #query
Efficient query monitoring using adaptive multiple key hashing (KLW, PSY), pp. 477–484.
ECIRECIR-2002-BenammarHM #analysis #automation #documentation
Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
ECIRECIR-2002-BoughanemT #case study #documentation #optimisation #query #retrieval #search-based
A Study on Using Genetic Niching for Query Optimisation in Document Retrieval (MB, LT), pp. 135–149.
ECIRECIR-2002-KongoviGD #categorisation #empirical
Text Categorization: An Experiment Using Phrases (MK, JCG, VD), pp. 213–228.
ECIRECIR-2002-RajapakseD #adaptation #concept #encoding #information retrieval #representation
Concept Based Adaptive IR Model Using FCA-BAM Combination for Concept Representation and Encoding (RKR, MJD), pp. 150–168.
ECIRECIR-2002-TsikrikaL #documentation #network #web
Combining Web Document Representations in a Bayesian Inference Network Model Using Link and Content-Based Evidence (TT, ML), pp. 53–72.
ECIRECIR-2002-WhiteRJ #feedback #retrieval #web
The Use of Implicit Evidence for Relevance Feedback in Web Retrieval (RW, IR, JMJ), pp. 93–109.
ICMLICML-2002-FerriFH #learning
Learning Decision Trees Using the Area Under the ROC Curve (CF, PAF, JHO), pp. 139–146.
ICMLICML-2002-KamvarKM #algorithm #approach #clustering #modelling
Interpreting and Extending Classical Agglomerative Clustering Algorithms using a Model-Based approach (SDK, DK, CDM), pp. 283–290.
ICMLICML-2002-LebanonL #modelling #named #permutation #probability #ranking
Cranking: Combining Rankings Using Conditional Probability Models on Permutations (GL, JDL), pp. 363–370.
ICMLICML-2002-Mladenic #learning #normalisation #word
Learning word normalization using word suffix and context from unlabeled data (DM), pp. 427–434.
ICMLICML-2002-OLZ #learning
Stock Trading System Using Reinforcement Learning with Cooperative Agents (JO, JWL, BTZ), pp. 451–458.
ICMLICML-2002-RaskuttiFK #classification #clustering #parametricity
Using Unlabelled Data for Text Classification through Addition of Cluster Parameters (BR, HLF, AK), pp. 514–521.
ICMLICML-2002-Ryan #automation #behaviour #learning #modelling
Using Abstract Models of Behaviours to Automatically Generate Reinforcement Learning Hierarchies (MRKR), pp. 522–529.
ICMLICML-2002-SchapireSMLC #estimation #modelling #nondeterminism
Modeling Auction Price Uncertainty Using Boosting-based Conditional Density Estimation (RES, PS, DAM, MLL, JAC), pp. 546–553.
ICMLICML-2002-ShapiroL #learning
Separating Skills from Preference: Using Learning to Program by Reward (DGS, PL), pp. 570–577.
ICMLICML-2002-StrensBE #markov #monte carlo #optimisation
Markov Chain Monte Carlo Sampling using Direct Search Optimization (MJAS, MB, NE), pp. 602–609.
ICMLICML-2002-ThamDR #classification #learning #markov #monte carlo
Sparse Bayesian Learning for Regression and Classification using Markov Chain Monte Carlo (SST, AD, KR), pp. 634–641.
ICMLICML-2002-Ting #classification #evaluation
Issues in Classifier Evaluation using Optimal Cost Curves (KMT), pp. 642–649.
ICMLICML-2002-ZhangGYF #image #learning #multi #retrieval
Content-Based Image Retrieval Using Multiple-Instance Learning (QZ, SAG, WY, JEF), pp. 682–689.
ICPRICPR-v1-2002-BasuPCB #distributed #image #monitoring #retrieval
Distributed Retrieval of Wavelet Images Using Bandwidth Monitoring (AB, MHP, LIC, MB), pp. 604–607.
ICPRICPR-v1-2002-ChazalRH #automation #detection #metric #variability
Automatic Sleep Apnoea Detection Using Measures of Amplitude and Heart Rate Variability from the Electrocardiogram (PdC, RBR, CH), pp. 775–778.
ICPRICPR-v1-2002-DuchesneBBC #classification #image #on the
On the Classification of Temporal Lobe Epilepsy Using MR Image Appearance (SD, NB, AB, DLC), pp. 520–523.
ICPRICPR-v1-2002-HadidKP #analysis #learning #linear
Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
ICPRICPR-v1-2002-HiranoHTOE #3d #image #quantifier
Quantification of Shrinkage of Lung Lobe from Chest CT Images Using the 3D Extended Voronoi Division and its Application to the Benign/Malignant Discrimination of Tumor Shadows (YH, JiH, JiT, HO, KE), pp. 751–754.
ICPRICPR-v1-2002-JeongKSS #gesture #linear #recognition
Two-Hand Gesture Recognition using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 9–12.
ICPRICPR-v1-2002-KanekoMM #agile #constraints #correlation #difference #image
Using Constraint Inequality on Estimated Correlation for Rapid Image Search (SK, TM, AM), pp. 87–90.
ICPRICPR-v1-2002-KangKB #multi #people #realtime
Real-Time Multiple People Tracking Using Competitive Condensation (HK, DK, SYB), pp. 413–416.
ICPRICPR-v1-2002-KoB #image #retrieval
Integrated Region-Based Image Retrieval Using Region??s Spatial Relationships (BK, HB), pp. 196–199.
ICPRICPR-v1-2002-KuleshPS #recognition #video
Video Clip Recognition Using Joint Audio-Visual Processing Model (VK, VAP, IKS), pp. 500–503.
ICPRICPR-v1-2002-LamarreC #modelling
Background Subtraction Using Competing Models in the Block-DCT Domain (ML, JJC), pp. 299–302.
ICPRICPR-v1-2002-LiuCR #adaptation #estimation #parametricity
Accurate Dense Optical Flow Estimation Using Adaptive Structure Tensors and a Parametric Model (HL, RC, AR), pp. 291–294.
ICPRICPR-v1-2002-LohRW #3d #modelling #process
Refining 3D Models Using a Two-Stage Neural Network-Based Iterative Process (AWKL, MR, GAWW), pp. 172–175.
ICPRICPR-v1-2002-MaedaKI #3d #hybrid #modelling #representation
Shapes Modeling of 3-D Objects Based on A Hybrid Representation Using Extended B-spline Surface Model (MM, KK, KI), pp. 656–659.
ICPRICPR-v1-2002-MannJE #programming #segmentation
Trajectory Segmentation Using Dynamic Programming (RM, ADJ, TFEM), pp. 331–334.
ICPRICPR-v1-2002-MoreauCP #analysis #estimation
Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
ICPRICPR-v1-2002-NguyenVWB #behaviour #monitoring #multi #people
Hierarchical Monitoring of People’s Behaviors in Complex Environments Using Multiple Cameras (NTN, SV, GAWW, HHB), pp. 13–16.
ICPRICPR-v1-2002-OkataniD #3d #estimation #image #robust
Robust Estimation of Camera Translation Between Two Images Using a Camera With a 3D Orientation Sensor (TO, KD), pp. 275–278.
ICPRICPR-v1-2002-OliveiraSBS #algorithm #feature model #multi #recognition #search-based
Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Digit Recognition (LESdO, RS, FB, CYS), pp. 568–571.
ICPRICPR-v1-2002-PalenichkaZ #modelling #multi #self
Multi-Scale Model-Based Skeletonization of Object Shapes Using Self-Organizing Maps (RMP, MBZ), pp. 143–146.
ICPRICPR-v1-2002-RahmanNI #behaviour
Recognizing Human Behavior Using Universal Eigenspace (MMR, KN, SI), pp. 295–298.
ICPRICPR-v1-2002-SebeLCGH #classification #naive bayes #recognition
Emotion Recognition Using a Cauchy Naive Bayes Classifier (NS, MSL, IC, AG, TSH), p. 17–?.
ICPRICPR-v1-2002-SongCLC #approach #image #recognition
A New Approach for Line Recognition in Large-size Images Using Hough Transform (JS, MC, MRL, SC), pp. 33–36.
ICPRICPR-v1-2002-TakizawaYMTIM #3d #image #markov #modelling #random #recognition
Recognition of Lung Nodules from X-ray CT Images Using 3D Markov Random Field Models (HT, SY, TM, YT, TI, MM), pp. 99–102.
ICPRICPR-v1-2002-TuzikovCB #image #optimisation #symmetry
Brain Symmetry Plane Computation in MR Images Using Inertia Axes and Optimization (AVT, OC, IB), pp. 516–519.
ICPRICPR-v1-2002-UchidaRS #recognition
Using Eigen-Deformations in Handwritten Character Recognition (SU, MAR, HS), pp. 572–575.
ICPRICPR-v1-2002-UnsalanB #development #image #statistics
Classifying Land Development in High Resolution Satellite Images Using Straight Line Statistics (, KLB), pp. 127–130.
ICPRICPR-v1-2002-Verges-LlahiTS #estimation
Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (JVL, AT, AS), pp. 381–384.
ICPRICPR-v1-2002-WangQ #complexity #recognition
Face Recognition Using Optimal Non-Orthogonal Wavelet Basis Evaluated by Information Complexity (XW, HQ), pp. 164–167.
ICPRICPR-v1-2002-WechslerDLC #bound #predict
Motion Prediction Using VC-Generalization Bounds (HW, ZD, FL, VC), pp. 151–154.
ICPRICPR-v1-2002-Worthington #consistency #detection
Enhanced Canny Edge Detection Using Curvature Consistency (PLW), pp. 596–599.
ICPRICPR-v1-2002-YilmazSS #estimation
Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (AY, KS, MS), pp. 377–380.
ICPRICPR-v1-2002-ZhangGSS #2d #image #sequence
Recovering Elastic Property of Soft Tissues Using 2D Image Sequences With Limited Range Data (YZ, DBG, SS, MCS), pp. 755–758.
ICPRICPR-v2-2002-AlhichriK #image
Image Registration Using Virtual Circles and Edge Direction (HSA, MK), pp. 969–972.
ICPRICPR-v2-2002-Amin #learning #prototype
Prototyping Structural Description Using Decision Tree Learning Techniques (AA), pp. 76–79.
ICPRICPR-v2-2002-AuLD #segmentation #video
Object Segmentation and Tracking Using Video Locales (JA, ZNL, MSD), pp. 544–547.
ICPRICPR-v2-2002-BarataP #classification #clustering #modelling #set
Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 328–331.
ICPRICPR-v2-2002-BauerK #recognition #self
Video-Based Sign Recognition Using Self-Organizing Subunits (BB, KFK), pp. 434–437.
ICPRICPR-v2-2002-BhagavathyNM #image #modelling
Modeling Object Classes in Aerial Images Using Texture Motifs (SB, SN, BSM), pp. 981–984.
ICPRICPR-v2-2002-CarcassoniH #multi #scalability
Point-Set Alignment Using Multidimensional Scaling (MC, ERH), pp. 402–405.
ICPRICPR-v2-2002-CesarBB #graph #optimisation #probability #recognition
Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition (RMC, EB, IB), pp. 465–468.
ICPRICPR-v2-2002-ChangCH #recognition
Hand Pose Recognition Using Curvature Scale Space (CCC, IYC, YSH), pp. 386–389.
ICPRICPR-v2-2002-ErcilB #classification #polynomial
One Class Classification Using Implicit Polynomial Surface Fitting (AE, BB), pp. 152–155.
ICPRICPR-v2-2002-Fasel #analysis #network #robust
Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
ICPRICPR-v2-2002-FookesBL #image
Improved Stereo Image Matching Using Mutual Information and Hierarchical Prior Probabilities (CF, MB, AL), pp. 937–940.
ICPRICPR-v2-2002-FrantiX #classification
Classification of Binary Vectors by Using ??SC-Distance (PF, MX), pp. 52–55.
ICPRICPR-v2-2002-GibsonCT #abstraction #modelling #visual notation
Visual Abstraction of Wildlife Footage Using Gaussian Mixture Models and the Minimum Description Length Criterion (DPG, NWC, BTT), pp. 814–817.
ICPRICPR-v2-2002-GuillametV #matrix #metric
Determining a Suitable Metric when Using Non-Negative Matrix Factorization (DG, JV), pp. 128–131.
ICPRICPR-v2-2002-Han #classification
A Supervised Classification Scheme Using Positive Boolean Function (CCH), pp. 100–103.
ICPRICPR-v2-2002-HoneaSB
Active Contours Using a Potential Field (DMH, WES, GLB), pp. 757–760.
ICPRICPR-v2-2002-HsiehT #adaptation #fuzzy #image
Wavelet-based Image Coding Using Fuzzy Inference and Adaptive Quantization (MSH, DCT), pp. 265–268.
ICPRICPR-v2-2002-HuangSK #detection #network
Face Detection Using a Modified Radial Basis Function Neural Network (LLH, AS, HK), pp. 342–345.
ICPRICPR-v2-2002-HungYL #classification #image
Use of Characteristic Views in Image Classification (CCH, SY, CML), pp. 949–952.
ICPRICPR-v2-2002-Keren #identification #naive bayes
Painter Identification Using Local Features and Naive Bayes (DK), pp. 474–477.
ICPRICPR-v2-2002-KimKB #recognition
Face Recognition Using LDA Mixture Model (HCK, DK, SYB), pp. 486–489.
ICPRICPR-v2-2002-KimPJKB #classification
Pattern Classification Using Support Vector Machine Ensemble (HCK, SP, HMJ, DK, SYB), pp. 160–163.
ICPRICPR-v2-2002-KoskelaLO #image #retrieval #self
Using MPEG-7 Descriptors in Image Retrieval with Self-Organizing Maps (MK, JL, EO), pp. 1049–1052.
ICPRICPR-v2-2002-Lu #robust
Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering (CSL), pp. 1001–1004.
ICPRICPR-v2-2002-LudtkeLHW #detection
Corner Detection Using a Mixture Model of Edge Orientation (NL, BL, ERH, RCW), pp. 574–577.
ICPRICPR-v2-2002-MahmoudiD #3d #modelling #retrieval
3D Models Retrieval by Using Characteristic Views (SM, MD), pp. 457–460.
ICPRICPR-v2-2002-MarcelB #verification
Improving Face Verification Using Skin Color Information (SM, SB), pp. 378–381.
ICPRICPR-v2-2002-MaWT #recognition #symmetry
Iris Recognition Using Circular Symmetric Filters (LM, YW, TT), pp. 414–417.
ICPRICPR-v2-2002-Miyamori #behaviour #identification #retrieval #video
Improving Accuracy in Behaviour Identification for Content-Based Retrieval by Using Audio and Video Information (HM), pp. 826–830.
ICPRICPR-v2-2002-MullerWHR #3d #markov #modelling #pseudo #recognition
Facial Expression Recognition Using Pseudo 3-D Hidden Markov Models (SM, FW, FH, GR), pp. 32–35.
ICPRICPR-v2-2002-NadimiB #approach #detection
Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
ICPRICPR-v2-2002-NelsonG #recognition
Tracking Objects Using Recognition (RCN, IAG), pp. 1025–1030.
ICPRICPR-v2-2002-Paletta #classification #detection
Detection of Traffic Signs Using Posterior Classifier Combination (LP), pp. 705–708.
ICPRICPR-v2-2002-PolatYS #multi
Multiple Complex Object Tracking Using A Combined Technique (EP, MY, RS), pp. 717–720.
ICPRICPR-v2-2002-QunTHC #algorithm #automation #clustering #identification
Automatic Fingerprint Identification Using Cluster Algorithm (QR, JT, YH, JC), pp. 398–401.
ICPRICPR-v2-2002-RiviereMMTPF #graph #learning #markov #random #relational
Relational Graph Labelling Using Learning Techniques and Markov Random Fields (DR, JFM, JMM, FT, DPO, VF), pp. 172–175.
ICPRICPR-v2-2002-RonnebergerBS #3d #classification #invariant #recognition #set
General-Purpose Object Recognition in 3D Volume Data Sets Using Gray-Scale Invariants --- Classification of Airborne Pollen-Grains Recorded with a Confocal Laser Scanning Microscope (OR, HB, ES), p. 290–?.
ICPRICPR-v2-2002-SerratosaSA #3d #graph #modelling #multi
Modelling and Recognising 3D-Objects Described by Multiple Views Using Function-Described Graphs (FS, AS, RA), pp. 140–143.
ICPRICPR-v2-2002-SinghG #pattern matching #pattern recognition #recognition #slicing
Pattern Recognition Using Information Slicing Method (pRISM) (SS, AG), pp. 144–147.
ICPRICPR-v2-2002-StevensSA #automation #detection
Automatic Target Detection Using PMMW and LADAR Imagery (MRS, MS, SA), pp. 647–650.
ICPRICPR-v2-2002-SumengenMK #evolution #image #segmentation
Image Segmentation Using Curve Evolution and Region Stability (BS, BSM, CSK), pp. 965–968.
ICPRICPR-v2-2002-SvenssonNAB #distance #image #representation
Using Grey-Level and Distance Information for Medial Surface Representation of Volume Images (SS, IN, CA, GSdB), pp. 324–327.
ICPRICPR-v2-2002-TaxD #classification #multi
Using Two-Class Classifiers for Multiclass Classification (DMJT, RPWD), pp. 124–127.
ICPRICPR-v2-2002-UdeA #detection #probability
Probabilistic Detection and Tracking at High Frame Rates Using Affine Warping (AU, CGA), pp. 6–9.
ICPRICPR-v2-2002-UtsumiT #adaptation #statistics
Texture Adaptation for Human Tracking Using Statistical Shape Model (AU, NT), pp. 973–976.
ICPRICPR-v2-2002-WechslerDL #learning #process
Hierarchical Interpretation of Human Activities Using Competitive Learning (HW, ZD, FL), pp. 338–341.
ICPRICPR-v2-2002-XuMZY #recognition
Motion Based Event Recognition Using HMM (GX, YFM, HZ, SY), pp. 831–834.
ICPRICPR-v2-2002-YangDWZ #estimation #mobile #realtime
Real-Time Pose Estimation for Outdoor Mobile Robots Using Range Data (MY, BD, HW, BZ), pp. 593–596.
ICPRICPR-v2-2002-YeL #image #markov #modelling #segmentation
Wavelet-Based Unsupervised SAR Image Segmentation Using Hidden Markov Tree Models (ZY, CCL), pp. 729–732.
ICPRICPR-v2-2002-YuB #image #segmentation
Image Segmentation Using Gradient Vector Diffusion and Region Merging (ZY, CLB), pp. 941–944.
ICPRICPR-v2-2002-ZhangBS #2d #feature model #recognition
Recognition of Similar Objects Using 2-D Wavelet-Fractal Feature Extraction (PZ, TDB, CYS), pp. 316–319.
ICPRICPR-v2-2002-ZhangGST #parametricity #physics
Tracking Objects Using Recovered Physical Motion Parameters (YZ, DBG, SS, LVT), pp. 10–13.
ICPRICPR-v3-2002-Al-MaadeedHE #approach #markov #recognition #word
Recognition of Off-Line Handwritten Arabic Words Using Hidden Markov Model Approach (SAM, CH, DE), pp. 481–484.
ICPRICPR-v3-2002-BadawyK #graph #representation
Shape Representation Using Concavity Graphs (OEB, MK), pp. 461–464.
ICPRICPR-v3-2002-BaesensECV #classification #learning #markov #monte carlo #network
Learning Bayesian Network Classifiers for Credit Scoring Using Markov Chain Monte Carlo Search (BB, MEP, RC, JV), pp. 49–52.
ICPRICPR-v3-2002-CampbellF #recognition
Recognition of Free-Form Objects in Dense Range Data Using Local Features (RJC, PJF), pp. 607–610.
ICPRICPR-v3-2002-CaputoBN #markov #random #recognition #robust
Robust Appearance-Based Object Recognition Using a Fully Connected Markov Random Field (BC, SB, HN), pp. 565–568.
ICPRICPR-v3-2002-ChenKK #approach
Albedo Recovery Using a Photometric Stereo Approach (CYC, RK, RK), pp. 700–703.
ICPRICPR-v3-2002-DuricWY #adaptation #gesture #interface
Adaptive and Smart Interface for VCR Remote Control Using Hand Gestures (ZD, HW, JY), pp. 1035–1038.
ICPRICPR-v3-2002-FengDW #markov #modelling #recognition
Chinese Handwriting Recognition Using Hidden Markov Models (BF, XD, YW), pp. 212–215.
ICPRICPR-v3-2002-FolkersS #database #fourier #image #retrieval
Content-Based Image Retrieval Using Fourier Descriptors on a Logo Database (AF, HS), pp. 521–524.
ICPRICPR-v3-2002-ForsterLR #realtime
Real-Time Range Imaging for Dynamic Scenes Using Colour-Edge Based Structured Light (FF, MKL, BR), pp. 645–648.
ICPRICPR-v3-2002-HatanoASMOOK #algorithm #difference #verification
A Fingerprint Verification Algorithm Using the Differential Matching Rate (TH, TA, SS, HM, SO, YO, HK), pp. 799–802.
ICPRICPR-v3-2002-JeongKSS02a #gesture #linear #recognition
Two-Hand Gesture Recognition Using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 529–532.
ICPRICPR-v3-2002-KawaiT #3d #interface #visual notation
A Support System for Visually Impaired Persons to Understand Three-dimensional Visual Information Using Acoustic Interface (YK, FT), pp. 974–977.
ICPRICPR-v3-2002-KimCK #automation #clustering
Automatic Text Location Using Cluster-Based Template Matching (EYK, JSC, HJK), pp. 423–426.
ICPRICPR-v3-2002-KitasakaMHT #3d #automation #image #modelling
A Method for Automated Extraction of Aorta and Pulmonary Artery in the Mediastinum Using Medial Line Models from 3D Chest X-ray CT Images without Contrast Materials (TK, KM, JiH, JiT), p. 273–?.
ICPRICPR-v3-2002-Kwon #classification #clustering
Hangul Tree Classifier for Type Clustering Using Horizontal and Vertical Strokes (YBK), pp. 228–231.
ICPRICPR-v3-2002-LeeCK #algorithm #robust
A Robust Fingerprint Matching Algorithm Using Local Alignment (DL, KC, JK), pp. 803–806.
ICPRICPR-v3-2002-LeungKCT #documentation #fuzzy #image #normalisation
Normalization of Contrast in Document Images Using Generalized Fuzzy Operator with Least Square Method (CCL, PCKK, FHYC, WKT), pp. 115–118.
ICPRICPR-v3-2002-MaalmiEBVDG #detection #fault #locality
Crack Defect Detection and Localization Using Genetic-Based Inverse Voting Hough Transform (KM, AEO, RB, LFCLYV, AD, PG), pp. 257–260.
ICPRICPR-v3-2002-MacriniSDSZ #3d #graph #recognition
View-Based 3-D Object Recognition using Shock Graphs (DM, AS, SJD, KS, SWZ), p. 24–?.
ICPRICPR-v3-2002-ManabePJC #3d #metric
Three Dimensional Measurement using Color Structured Patterns and Imaging Spectrograph (YM, JP, TJ, KC), pp. 649–652.
ICPRICPR-v3-2002-MekadaT #distance
Anchor Point Thinning Using a Skeleton Based on the Euclidean Distance Transformation (YM, JiT), pp. 923–926.
ICPRICPR-v3-2002-MolinaMKV #image #modelling #multi
A General Multichannel Image Restoration Method Using Compound Models (RM, JM, AKK, MV), pp. 835–838.
ICPRICPR-v3-2002-MordohaiM #multi
Perceptual Grouping for Multiple View Stereo Using Tensor Voting (PM, GGM), pp. 639–644.
ICPRICPR-v3-2002-SatoKYT #3d #image #modelling #multi #sequence
3-D Modeling of an Outdoor Scene by Multi-Baseline Stereo Using a Long Sequence of Images (TS, MK, NY, HT), pp. 581–584.
ICPRICPR-v3-2002-SinKC #image
Locating Characters in Scene Images Using Frequency Features (BKS, SKK, BJC), pp. 489–492.
ICPRICPR-v3-2002-StevensSP #identification
Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
ICPRICPR-v3-2002-SunPKA #3d #mobile #re-engineering
3D Reconstruction of Indoor and Outdoor Scenes Using a Mobile Range Scanner (YS, JKP, AK, MAA), pp. 653–656.
ICPRICPR-v3-2002-TabboneW #2d #recognition
Technical Symbols Recognition Using the Two-Dimensional Radon Transform (ST, LW), pp. 200–203.
ICPRICPR-v3-2002-VinciarelliB #markov #modelling #recognition #word
Offline Cursive Word Recognition using Continuous Density Hidden Markov Models Trained with PCA or ICA Features (AV, SB), pp. 81–84.
ICPRICPR-v3-2002-WadaKS #approach #generative
An Evolutionary Approach for the Generation of Diversiform Characters Using a Handwriting Model (YW, HK, KS), pp. 131–134.
ICPRICPR-v3-2002-WolfD #markov #quality #random
Binarization of Low Quality Text Using a Markov Random Field Model (CW, DSD), pp. 160–163.
ICPRICPR-v3-2002-WongLC #multi #network #recognition
Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions (KWW, CSL, SJC), pp. 106–109.
ICPRICPR-v3-2002-XuWFS #adaptation
Stereo Computation Using Radial Adaptive Windows (YX, DW, TF, HS), pp. 595–598.
ICPRICPR-v3-2002-ZhouK #representation #set
Representing and Recognizing Complete Set of Geons Using Extended Superquadrics (LZ, CK), pp. 713–718.
ICPRICPR-v3-2002-ZotkinDDMR #parametricity #visual notation
Virtual Audio System Customization Using Visual Matching of Ear Parameters (DNZ, RD, LSD, AM, VCR), pp. 1003–1006.
ICPRICPR-v4-2002-BarataP02a #classification #clustering #modelling #set
Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 90–93.
ICPRICPR-v4-2002-BenAbdelkaderCD #automation #estimation #identification
Person Identification Using Automatic Height and Stride Estimation (CB, RC, LSD), pp. 377–380.
ICPRICPR-v4-2002-CinqueRLLT #image #query #retrieval
Image Retrieval Using Resegmentation Driven by Query Rectangles (LC, FDR, FL, SL, SLT), pp. 142–145.
ICPRICPR-v4-2002-DassJL #detection #markov #modelling #random #synthesis
Face Detection and Synthesis Using Markov Random Field Models (SCD, AKJ, XL), pp. 201–204.
ICPRICPR-v4-2002-DuricLSW #detection #image
Using Normal Flow for Detection and Tracking of Limbs in Color Images (ZD, FL, YS, HW), p. 268–?.
ICPRICPR-v4-2002-FialaB #re-engineering
Panoramic Stereo Reconstruction Using Non-SVP Optics (MF, AB), p. 27–?.
ICPRICPR-v4-2002-FrancoisMW #geometry #symmetry
Reconstructing Mirror Symmetric Scenes From a Single View Using 2-View Stereo Geometry (ARJF, GGM, RW), pp. 12–16.
ICPRICPR-v4-2002-FredJ #clustering
Data Clustering Using Evidence Accumulation (ALNF, AKJ), pp. 276–280.
ICPRICPR-v4-2002-HadidPM #detection
Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering (AH, MP, BM), pp. 196–200.
ICPRICPR-v4-2002-HoogsCK #3d #classification #metaprogramming
Classification of 3D Macro Texture Using Perceptual Observables (AH, RC, RK), pp. 113–117.
ICPRICPR-v4-2002-HuangT02a #array #multi #recognition #streaming #video
Streaming Face Recognition Using Multicamera Video Arrays (KSH, MMT), pp. 213–216.
ICPRICPR-v4-2002-HuY #algorithm #estimation #robust #search-based
Robust Estimation of Trifocal Tensor Using Messy Genetic Algorithm (MH, BY), pp. 347–350.
ICPRICPR-v4-2002-Ichimura #estimation #image #monte carlo #probability #sequence
Stochastic Filtering for Motion Trajectory in Image Sequences Using a Monte Carlo Filter with Estimation of Hyper-Parameters (NI), pp. 68–73.
ICPRICPR-v4-2002-JainXHX #testing
Uniformity Testing Using Minimal Spanning Tree (AKJ, XX, TKH, FX), pp. 281–284.
ICPRICPR-v4-2002-JhanwarCSZ #image #retrieval
Content Based Image Retrieval Using Optimum Peano Scan (NJ, SC, GS, BZ), pp. 130–133.
ICPRICPR-v4-2002-KangCM #estimation #image #robust
Robust Affine Motion Estimation in Joint Image Space Using Tensor Voting (EYEK, IC, GGM), pp. 256–259.
ICPRICPR-v4-2002-LamXS #difference
Differentiation between Alphabetic and Numeric Data Using NN Ensembles (LL, QX, CYS), pp. 40–43.
ICPRICPR-v4-2002-MathisB #approach #classification
Classification Using a Hierarchical Bayesian Approach (CM, TMB), p. 103–?.
ICPRICPR-v4-2002-MendelsVT #invariant #recognition #representation
Rotation and Scale Invariant Shape Representation and Recognition Using Matching Pursuit (FM, PV, JPT), pp. 326–329.
ICPRICPR-v4-2002-MorencyD #constraints
Stereo Tracking Using ICP and Normal Flow Constraint (LPM, TD), p. 367–?.
ICPRICPR-v4-2002-PalaciosVK #algorithm #distance #evaluation
An Evaluation of the WPE Algorithm Using Tangent Distance (RPP, EV, DK), pp. 48–51.
ICPRICPR-v4-2002-SrinivasanB #estimation
Head Pose Estimation Using View Based Eigenspaces (SS, KLB), pp. 302–305.
ICPRICPR-v4-2002-ToyamaFSM #algorithm #assembly #search-based
Assembly of Puzzles Using a Genetic Algorithm (FT, YF, KS, JM), pp. 389–392.
ICPRICPR-v4-2002-TraverP #estimation #image #segmentation
Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
ICPRICPR-v4-2002-XiL #detection #feature model
Face Detection and Facial Feature Extraction Using Support Vector Machines (DX, SWL), pp. 209–212.
KDDKDD-2002-AyresFGY #mining #representation
Sequential PAttern mining using a bitmap representation (JA, JF, JG, TY), pp. 429–435.
KDDKDD-2002-FangHL #identification
Tumor cell identification using features rules (BF, WH, MLL), pp. 495–500.
KDDKDD-2002-GodboleSC #multi #scalability
Scaling multi-class support vector machines using inter-class confusion (SG, SS, SC), pp. 513–518.
KDDKDD-2002-Joachims #optimisation
Optimizing search engines using clickthrough data (TJ), pp. 133–142.
KDDKDD-2002-RaskuttiFK #classification #clustering
Combining clustering and co-training to enhance text classification using unlabelled data (BR, HLF, AK), pp. 620–625.
KDDKDD-2002-SarawagiB #interactive #learning
Interactive deduplication using active learning (SS, AB), pp. 269–278.
KDDKDD-2002-StolteTH #analysis #query #visualisation
Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
KDDKDD-2002-UedaS #category theory #detection #modelling #multi #parametricity
Single-shot detection of multiple categories of text using parametric mixture models (NU, KS), pp. 626–631.
KDDKDD-2002-WalterR #interactive #on the #visualisation
On interactive visualization of high-dimensional data using the hyperbolic plane (JAW, HJR), pp. 123–132.
KDDKDD-2002-YuHC #classification #learning #named #web
PEBL: positive example based learning for Web page classification using SVM (HY, JH, KCCC), pp. 239–248.
SEKESEKE-2002-BriandFL #algorithm #integration #metric #order #search-based
Using genetic algorithms and coupling measures to devise optimal integration test orders (LCB, JF, YL), pp. 43–50.
SEKESEKE-2002-BryantBARO #assembly #component #generative #specification #two-level grammar
Formal specification of generative component assembly using two-level grammar (BRB, CCB, MA, RRR, AMO), pp. 209–212.
SEKESEKE-2002-CostagliolaDFG #modelling #visual notation
Using extended positional grammars to develop visual modeling languages (GC, VD, FF, CG), pp. 201–208.
SEKESEKE-2002-ErikssonBN #documentation #information management #java
Using knowledge engineering support for a Java documentation viewer (HE, EB, PN), pp. 57–64.
SEKESEKE-2002-Lozano-TelloG #component #how #named #process
BAREMO: how to choose the appropriate software component using the analytic hierarchy process (ALT, AGP), pp. 781–788.
SEKESEKE-2002-Morasca #classification
A proposal for using continuous attributes in classification trees (SM), pp. 417–424.
SEKESEKE-2002-RaffoHV #framework #hybrid #metric #modelling #process #trade-off
Software process decision support: making process tradeoffs using a hybrid metrics, modeling and utility framework (DR, WH, JV), pp. 803–809.
SEKESEKE-2002-XuVIY #behaviour #modelling #multi #verification
Modeling and verifying multi-agent behaviors using predicate/transition nets (DX, RAV, TRI, JY), pp. 193–200.
SIGIRSIGIR-2002-AllanR #ambiguity #query
Using part-of-speech patterns to reduce query ambiguity (JA, HR), pp. 307–314.
SIGIRSIGIR-2002-AminiG #learning #summary
The use of unlabeled data to improve supervised learning for text summarization (MRA, PG), pp. 105–112.
SIGIRSIGIR-2002-BennettDH #classification #modelling #probability #reliability
Probabilistic combination of text classifiers using reliability indicators: models and results (PNB, STD, EH), pp. 207–214.
SIGIRSIGIR-2002-Boyapati #classification
Improving hierarchical text classification using unlabeled data (VB), pp. 363–364.
SIGIRSIGIR-2002-CarmelFPS #automation #information management #query #refinement
Automatic query refinement using lexical affinities with maximal information gain (DC, EF, YP, AS), pp. 283–290.
SIGIRSIGIR-2002-FedericoB #information retrieval #query #statistics
Statistical cross-language information retrieval using n-best query translations (MF, NB), pp. 167–174.
SIGIRSIGIR-2002-GaoZNHC #ambiguity #dependence #query
Resolving query translation ambiguity using a decaying co-occurrence model and syntactic dependence relations (JG, MZ, JYN, HH, WC), pp. 183–190.
SIGIRSIGIR-2002-GravesL #network #retrieval #video
Video retrieval using an MPEG-7 based inference network (AG, ML), pp. 339–346.
SIGIRSIGIR-2002-JinSHC #information retrieval
Language model for IR using collection information (RJ, LS, AGH, JPC), pp. 419–420.
SIGIRSIGIR-2002-PengHSCR #information retrieval #segmentation #self #word
Using self-supervised word segmentation in Chinese information retrieval (FP, XH, DS, NC, SER), pp. 349–350.
SIGIRSIGIR-2002-ShouS #data fusion
Experiments on data fusion using headline information (XMS, MS), pp. 413–414.
SIGIRSIGIR-2002-SiC
Using sampled data and regression to merge search engine results (LS, JPC), pp. 19–26.
SIGIRSIGIR-2002-SlonimFT #classification #documentation
Unsupervised document classification using sequential information maximization (NS, NF, NT), pp. 129–136.
SIGIRSIGIR-2002-TakedaU #adaptation #string
Selecting indexing strings using adaptation (YT, KU), pp. 427–428.
SIGIRSIGIR-2002-WhiteJR #documentation #feedback #ranking #web
A system using implicit feedback and top ranking sentences to help users find relevant web documents (RW, JMJ, IR), p. 446.
SIGIRSIGIR-2002-WhiteRJ #documentation #evaluation #ranking
Finding relevant documents using top ranking sentences: an evaluation of two alternative schemes (RW, IR, JMJ), pp. 57–64.
SIGIRSIGIR-2002-Zha #clustering #summary
Generic summarization and keyphrase extraction using mutual reinforcement principle and sentence clustering (HZ), pp. 113–120.
SPLCSPLC-2002-DeursenJK #product line
Feature-Based Product Line Instantiation Using Source-Level Packages (AvD, MdJ, TK), pp. 217–234.
SPLCSPLC-2002-KangDKLL #development #product line
Using a Marketing and Product Plan as a Key Driver for Product Line Asset Development (KCK, PD, EK, JL, KL), pp. 366–382.
SPLCSPLC-2002-Mannion #first-order #logic #product line #validation
Using First-Order Logic for Product Line Model Validation (MM), pp. 176–187.
SPLCSPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering
Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
UMLUML-2002-FelfernigFJZ #information management #ocl #representation #uml
Configuration Knowledge Representation Using UML/OCL (AF, GF, DJ, MZ), pp. 49–62.
UMLUML-2002-FrohlichHS #industrial #modelling #multi #uml
Using UML for Information Modeling in Industrial Systems with Multiple Hierarchies (PF, ZH, MS), pp. 63–72.
UMLUML-2002-SchattkowskyL #agile #composition #development #uml #web
Rapid Development of Modular Dynamic Web Sites Using UML (TS, ML), pp. 336–350.
TOOLSTOOLS-USA-2002-HallstromS #case study #development #framework #incremental #object-oriented
Incremental Development Using Object Oriented Frameworks: A Case Study (JOH, NS), pp. 189–205.
TOOLSTOOLS-USA-2002-Nunes #contract #design
Design by Contract Using Meta-Assertions (IN), pp. 37–56.
AdaEuropeAda-2002-Thom #ada #exclamation #integration #modelling #programming language #standard #uml
Conformity! A Practical Integration of Standards — A Case for using the Unified Modelling Language (UML) with the Ada Programming Language (FT), pp. 29–36.
AdaEuropeAdaEurope-2002-AlonsoLVP #case study #object-oriented
Using Object Orientation in High Integrity Applications: A Case Study (AA, RL, TV, JAdlP), pp. 357–366.
AdaEuropeAdaEurope-2002-BinderL #embedded #execution #java #kernel #reliability
Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications (WB, BL), pp. 125–135.
AdaEuropeAdaEurope-2002-OrtizMAIF #ada #development #uml
Development of a Control System for Teleoperated Robots Using UML and Ada95 (FJO, ASM, , AI, JMF), pp. 113–124.
AdaEuropeAdaEurope-2002-ParkinsonG #composition #development
High-Integrity Systems Development for Integrated Modular Avionics Using VxWorks and GNAT (PP, FG), pp. 163–178.
PEPMASIA-PEPM-2002-ParkP #data type
Using indexed data structures for program specialization (JGP, MSP), pp. 61–69.
PEPMASIA-PEPM-2002-SheardL #analysis #search-based
Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
PEPMASIA-PEPM-2002-Voigtlander #parametricity #source code
Using circular programs to deforest in accumulating parameters (JV), pp. 126–137.
LOPSTRLOPSTR-2002-AbdennadherR #constraints #logic programming #synthesis #theorem proving
Constraint Solver Synthesis Using Tabled Resolution for Constraint Logic Programming (SA, CR), pp. 32–47.
PADLPADL-2002-Meadows #analysis #declarative
Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
PEPMPEPM-2002-LiuS #data type #optimisation #recursion
Program optimization using indexed and recursive data structures (YAL, SDS), pp. 108–118.
PLDIPLDI-2002-LeinoPZ
Using Data Groups to Specify and Check Side Effects (KRML, APH, YZ), pp. 246–257.
PPDPPPDP-2002-DrapeMS #dot-net #logic programming
Transforming the .NET intermediate language using path logic programming (SD, OdM, GS), pp. 133–144.
PPDPPPDP-2002-SomogyiS #stack
Using the heap to eliminate stack accesses (ZS, PJS), pp. 121–132.
SASSAS-2002-AdamsBDLRSW #analysis #data flow #pointer
Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
SASSAS-2002-BruynoogheCGV #analysis #logic programming #reuse #source code #termination
Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
RERE-2002-AntonER #privacy #requirements #taxonomy
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
RERE-2002-Daneva #enterprise #maturity #process #requirements
Using Maturity Assessments to Understand the ERP Requirements Engineering Process (MD), pp. 255–262.
RERE-2002-DulacVLS #on the #requirements #specification #visualisation
On the Use of Visualization in Formal Requirements Specification (ND, TV, NGL, MADS), pp. 71–80.
RERE-2002-DuranCCT #requirements #verification
Supporting Requirements Verification Using XSLT (AD, ARC, RC, MT), pp. 165–172.
RERE-2002-Garcia-DuquePB #requirements #specification
An Analysis-Revision Cycle to Evolve Requirements Specifications by Using the SCTL-MUS Methodology (JGD, JJPA, ABBM), pp. 282–288.
RERE-2002-HallJLNR #architecture #problem #requirements
Relating Software Requirements and Architectures Using Problem Frames (JGH, MJ, RCL, BN, LR), pp. 137–144.
RERE-2002-WooR #approach #automation #lightweight #relational #reuse #specification
Reuse of Scenario Specifications Using an Automated Relational Learner: A Lightweight Approach (HGW, WNR), pp. 173–180.
ASEASE-2002-Al-DallalS #framework #object-oriented #testing
System Testing for Object-Oriented Frameworks Using Hook Technology (JAD, PGS), pp. 231–236.
ASEASE-2002-BarberGH #architecture #evaluation #non-functional
Enabling Iterative Software Architecture Derivation Using Early Non-Functional Property Evaluation (KSB, TJG, JH), pp. 172–182.
ASEASE-2002-BaudryFJT #adaptation #automation #component #dot-net #optimisation #testing
Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component (BB, FF, JMJ, YLT), pp. 253–256.
ASEASE-2002-GrosserSV #predict #reasoning
Predicting Software Stability Using Case-Based Reasoning (DG, HAS, PV), p. 295–?.
ASEASE-2002-GrundyD #aspect-oriented #automation #component #validation
Automatic Validation of Deployed J2EE Components Using Aspects (JCG, GD), p. 47–?.
FSEFSE-2002-XieE #fault
Using redundancies to find errors (YX, DRE), pp. 51–60.
ICSEICSE-2002-HangalL #automation #debugging #detection
Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
ICSEICSE-2002-LenceviciusMR #validation
Software validation using power profiles (RL, EM, AR), p. 709.
ICSEICSE-2002-Michail #source code
Browsing and searching source code of applications written using a GUIframework (AM), pp. 327–337.
ICSEICSE-2002-RobillardM #dependence #graph
Concern graphs: finding and describing concerns using structural program dependencies (MPR, GCM), pp. 406–416.
ICSEICSE-2002-Wong
Use of software inspection inputs in practice (YKW), pp. 725–726.
SACSAC-2002-BillhardtBM #algorithm #retrieval #search-based
Using genetic algorithms to find suboptimal retrieval expert combinations (HB, DB, VM), pp. 657–662.
SACSAC-2002-BinderR #java #mobile #question
Secure mobile agent systems using Java: where are we heading? (WB, VR), pp. 115–119.
SACSAC-2002-ChanLMLHL #concept #documentation #mobile #multi #navigation #summary
Multiple related document summary and navigation using concept hierarchies for mobile clients (DLC, RWPL, WKM, HVL, EKSH, QL), pp. 627–632.
SACSAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #usability
A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
SACSAC-2002-DingDP #classification #data type
Decision tree classification of spatial data streams using Peano Count Trees (QD, QD, WP), pp. 413–417.
SACSAC-2002-GallardoMMR #abstraction #model checking #xml
Using XML to implement abstraction for Model Checking (MdMG, JM, PM, ER), pp. 1021–1025.
SACSAC-2002-GarigipatiN #profiling
Evaluating the use of profiling by a region-based register allocator (KVG, CN), pp. 953–957.
SACSAC-2002-Jurjens02a #development
Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
SACSAC-2002-KimL #adaptation #clustering #distance #documentation #effectiveness #metric
An effective document clustering method using user-adaptable distance metrics (HjK, SgL), pp. 16–20.
SACSAC-2002-MaciasVR #algorithm #mining
Mining interesting regions using an evolutionary algorithm (JLÁM, JMV, JCRS), pp. 498–502.
SACSAC-2002-NascimentoC #image #retrieval
Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
SACSAC-2002-NyakoeOT #algorithm #multi #search-based
Acquisition of modulation pulses for a multi-robot system using genetic algorithm (GNN, MO, ST), pp. 568–573.
SACSAC-2002-Pillay #algorithm #induction #programming #search-based
Using genetic programming for the induction of novice procedural programming solution algorithms (NP), pp. 578–583.
SACSAC-2002-SweeneyCT #delivery #mobile #summary
Mobile delivery of news using hierarchical query-biased summaries (SOS, FC, AT), pp. 634–639.
SACSAC-2002-WangHTN #ad hoc #network
AODV compatible routing with extensive use of cache information in ad-hoc networks (WGW, TH, MT, SN), pp. 852–859.
SACSAC-2002-YoungBGL #difference #object-oriented
Using an object oriented model for resolving representational differences between heterogeneous systems (PY, VB, JG, L), pp. 976–983.
GPCEGPCE-2002-BarbeauB #development #generative #programming #protocol #stack
A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
LDTALDTA-2002-GondowK #c #slicing #towards #xml
Towards ANSI C Program Slicing using XML (KG, HK), pp. 30–49.
CCCC-2002-CilioC
Global Variable Promotion: Using Registers to Reduce Cache Power Dissipation (AGMC, HC), pp. 247–260.
CCCC-2002-GaravelLM #compilation
Compiler Construction Using LOTOS NT (HG, FL, RM), pp. 9–13.
DACDAC-2002-AbramoviciSE #embedded
Using embedded FPGAs for SoC yield improvement (MA, CES, ME), pp. 713–724.
DACDAC-2002-AnisMEA #automation #clustering #performance #power management #reduction
Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique (MA, MM, MIE, SA), pp. 480–485.
DACDAC-2002-AttarhaN #analysis #fault #modelling
Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
DACDAC-2002-BadarogluTDWMVG #optimisation #reduction
Clock tree optimization in synchronous CMOS digital circuits for substrate noise reduction using folding of supply current transients (MB, KT, SD, PW, HDM, IV, GGEG), pp. 399–404.
DACDAC-2002-BernardiS #design #library
Model design using hierarchical web-based libraries (FB, JFS), pp. 14–17.
DACDAC-2002-ChandraC #reduction #testing
Reduction of SOC test data volume, scan power and testing time using alternating run-length codes (AC, KC), pp. 673–678.
DACDAC-2002-JiangB #logic #simulation #specification #synthesis
Software synthesis from synchronous specifications using logic simulation techniques (YJ, RKB), pp. 319–324.
DACDAC-2002-KapurCS #estimation #novel #optimisation #reduction
Power estimation in global interconnects and its reduction using a novel repeater optimization methodology (PK, GC, KS), pp. 461–466.
DACDAC-2002-LiouWCDMKW #fault #multi #performance #testing
Enhancing test efficiency for delay fault testing using multiple-clocked schemes (JJL, LCW, KTC, JD, MRM, RK, TWW), pp. 371–374.
DACDAC-2002-MadesG #graph #modelling
Regularization of hierarchical VHDL-AMS models using bipartite graphs (JM, MG), pp. 548–551.
DACDAC-2002-PeymandoustMS #algebra #embedded #library
Complex library mapping for embedded software using symbolic algebra (AP, GDM, TS), pp. 325–330.
DACDAC-2002-ShengTH #effectiveness #safety
Effective safety property checking using simulation-based sequential ATPG (SS, KT, MSH), pp. 813–818.
DACDAC-2002-Sotiriou #implementation
Implementing asynchronous circuits using a conventional EDA tool-flow (CPS), pp. 415–418.
DACDAC-2002-WirthlinM #delivery
IP delivery for FPGAs using Applets and JHDL (MJW, BM), pp. 2–7.
DACDAC-2002-YangP #component #multi #simulation
Time-domain steady-state simulation of frequency-dependent components using multi-interval Chebyshev method (BY, JRP), pp. 504–509.
DACDAC-2002-ZengAA #identification
False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
DATEDATE-2002-AloulMS #satisfiability #search-based
Search-Based SAT Using Zero-Suppressed BDDs (FAA, MNM, KAS), p. 1082.
DATEDATE-2002-AzevedoICGDVN #scheduling
Profile-Based Dynamic Voltage Scheduling Using Program Checkpoints (AA, II, RC, RG, NDD, AVV, AN), pp. 168–175.
DATEDATE-2002-BecerZBPH #analysis
Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
DATEDATE-2002-BeroulleBLN #on the
On the Use of an Oscillation-Based Test Methodology for CMOS Micro-Electro-Mechanical Systems (VB, YB, LL, PN), p. 1120.
DATEDATE-2002-BhuniaR #analysis #detection #fault
Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
DATEDATE-2002-BrachtendorfLLMF #continuation
Steady State Calculation of Oscillators Using Continuation Methods (HGB, SL, RL, RCM, PF), p. 1139.
DATEDATE-2002-CaiGKO #design #top-down
Top-Down System Level Design Methodology Using SpecC, VCC and SystemC (LC, DG, PK, MO), p. 1137.
DATEDATE-2002-ChenBKR #reduction
Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods (YC, VB, CKK, KR), pp. 931–935.
DATEDATE-2002-CoelhoSP #algorithm #approximate
Passive Constrained Rational Approximation Algorithm Using Nevanlinna-Pick Interpolation (CPC, LMS, JRP), pp. 923–930.
DATEDATE-2002-DingM02a #modelling
Accurate Estimating Simultaneous Switching Noises by Using Application Specific Device Modeling (LD, PM), pp. 1038–1043.
DATEDATE-2002-EdwardsG #embedded #modelling
The Modelling of Embedded Systems Using HASoC (MDE, PNG), pp. 752–759.
DATEDATE-2002-FerrandiRS #constraints #functional #theorem proving #verification
Functional Verification for SystemC Descriptions Using Constraint Solving (FF, MR, DS), pp. 744–751.
DATEDATE-2002-FerrettiB #encoding #pipes and filters
Single-Track Asynchronous Pipeline Templates Using 1-of-N Encoding (MF, PAB), pp. 1008–1015.
DATEDATE-2002-GoffioulWVD #analysis #approach #architecture
Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
DATEDATE-2002-GoldbergPB #algorithm #problem #satisfiability #symmetry
Using Problem Symmetry in Search Based Satisfiability Algorithms (EIG, MRP, RKB), pp. 134–141.
DATEDATE-2002-HalambiSBDN #compilation #performance #reduction
An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
DATEDATE-2002-Kania #approach #multi
Improved Technology Mapping for PAL-Based Devices Using a New Approach to Multi-Output Boolean Functions (DK), p. 1087.
DATEDATE-2002-KhomenkoKY #detection #integer #programming
Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
DATEDATE-2002-KimKM #algorithm #analysis #realtime #scalability
A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
DATEDATE-2002-LinCC
Arbitrary Convex and Concave Rectilinear Module Packing Using TCG (JML, HLC, YWC), pp. 69–75.
DATEDATE-2002-NitschK #embedded #runtime
The Use of Runtime Configuration Capabilities for Networked Embedded Systems (CN, UK), p. 1093.
DATEDATE-2002-PeymandoustSM #algebra #embedded #optimisation #power management
Low Power Embedded Software Optimization Using Symbolic Algebra (AP, TS, GDM), pp. 1052–1058.
DATEDATE-2002-PomeranzR #fault #multi #set
Test Enrichment for Path Delay Faults Using Multiple Sets of Target Faults (IP, SMR), pp. 722–729.
DATEDATE-2002-PomeranzZ #fault #testing
Fault Isolation Using Tests for Non-Isolated Blocks (IP, YZ), p. 1123.
DATEDATE-2002-SchwenckerSPG #adaptation #parametricity #set #worst-case
Analog Circuit Sizing Using Adaptive Worst-Case Parameter Sets (RS, FS, MP, HEG), pp. 581–585.
DATEDATE-2002-SkliarovaF #configuration management #hardware #satisfiability
A SAT Solver Using Software and Reconfigurable Hardware (IS, AdBF), p. 1094.
DATEDATE-2002-StohrSG #named #reuse #verification
FlexBench: Reuse of Verification IP to Increase Productivity (BS, MS, JG), p. 1131.
DATEDATE-2002-VanasscheGS #behaviour #matrix #modelling
Constructing Symbolic Models for the Input/Output Behavior of Periodically Time-Varying Systems Using Harmonic Transfer Matrices (PV, GGEG, WMCS), pp. 279–284.
DATEDATE-2002-Velev #similarity #verification
Using Rewriting Rules and Positive Equality to Formally Verify Wide-Issue Out-of-Order Microprocessors with a Reorder Buffer (MNV), pp. 28–35.
DATEDATE-2002-WilsonRZBK #behaviour #fault #modelling
Behavioural Modelling of Operational Amplifier Faults Using VHDL-AMS (PRW, JNR, MZ, ADB, YK), p. 1133.
DATEDATE-2002-ZhaoMB #compilation #design #modelling #set
Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models (QZ, BM, TB), pp. 1021–1026.
HPCAHPCA-2002-BrownP #pipes and filters
Using Internal Redundant Representations and Limited Bypass to Support Pipelined Adders and Register Files (MDB, YNP), pp. 289–298.
HPCAHPCA-2002-GurumurthiSIVKLJ #approach #estimation #simulation
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach (SG, AS, MJI, NV, MTK, TL, LKJ), pp. 141–150.
HPCAHPCA-2002-KampeSD #analysis #branch #fourier #predict
The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
HPCAHPCA-2002-SemeraroMBADS #design #energy #multi #scalability
Energy-Efficient Processor Design Using Multiple Clock Domains with Dynamic Voltage and Frequency Scaling (GS, GM, RB, DHA, SD, MLS), pp. 29–42.
HPDCHPDC-2002-AllenWP #adaptation #network
Adaptive Timeout Discovery Using the Network Weather Service (MSA, RW, JSP), pp. 35–41.
HPDCHPDC-2002-HumphreyAW #grid
Location-Transparent Naming in Grid Computing Using Legion-G (MH, SA, GSW), p. 418.
HPDCHPDC-2002-Schulz #clustering #parallel #performance #semantics
Using Semantic Information to Guide Efficient Parallel I/O on Clusters (MS), pp. 135–142.
HPDCHPDC-2002-SubramaniKSS #distributed #multi #scheduling
Distributed Job Scheduling on Computational Grids Using Multiple Simultaneous Requests (VS, RK, SS, PS), p. 359–?.
HPDCHPDC-2002-TaylorWGS #kernel #parallel #performance #predict
Using Kernel Couplings to Predict Parallel Application Performance (VET, XW, JG, RLS), pp. 125–134.
ISMMISMM-2002-JohanssonSW #architecture #concurrent #message passing
Heap architectures for concurrent languages using message passing (EJ, KFS, JW), pp. 195–206.
ISMMISMM-2002-VardhanA #algorithm #garbage collection
Using passive object garbage collection algorithms for garbage collection of active objects (AV, GA), pp. 213–220.
LCTESLCTES-SCOPES-2002-HunlethC #aspect-oriented #programming
Footprint and feature management using aspect-oriented programming techniques (FH, RC), pp. 38–45.
LCTESLCTES-SCOPES-2002-MohantyPND #agile #design #embedded #multi #simulation
Rapid design space exploration of heterogeneous embedded systems using symbolic search and multi-granular simulation (SM, VKP, SN, JRD), pp. 18–27.
OSDIOSDI-2002-ElsonGE #fine-grained #network
Fine-Grained Network Time Synchronization Using Reference Broadcasts (JE, LG, DE), pp. 147–163.
OSDIOSDI-2002-KumarL #debugging #model checking
Using Model Checking to Debug Device Firmware (SK, KL), pp. 61–74.
OSDIOSDI-2002-QiePP #programming #tool support
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
PDPPDP-2002-CanoM #clustering #energy #protocol
Reducing Energy Consumption in a Clustered MANET using the Intra Cluster Data-Dissemination Protocol (Icdp) (JCC, PM), pp. 411–418.
PDPPDP-2002-Volbert #ad hoc #network #simulation
A Simulation Environment for Ad Hoc Networks Using Sector Subdivision (KV), p. 419–?.
FASEFASE-2002-BradfieldFS #calculus #ocl #μ-calculus
Enriching OCL Using Observational μ-Calculus (JCB, JKF, PS), pp. 203–217.
FASEFASE-2002-NonnengartRS #modelling #requirements
Formal Requirements Engineering Using Observer Models (AN, GR, WS), pp. 264–278.
FoSSaCSFoSSaCS-2002-SchoppS #process #verification
Verifying Temporal Properties Using Explicit Approximants: Completeness for Context-free Processes (US, AKS), pp. 372–386.
STOCSTOC-2002-HellersteinR #learning
Exact learning of DNF formulas using DNF hypotheses (LH, VR), pp. 465–473.
TACASTACAS-2002-AbdeddaimM #automaton #scheduling
Preemptive Job-Shop Scheduling Using Stopwatch Automata (YA, OM), pp. 113–126.
TACASTACAS-2002-BrabermanGO #verification
Improving the Verification of Timed Systems Using Influence Information (VAB, DG, AO), pp. 21–36.
TACASTACAS-2002-GodefroidK #algorithm #scalability #search-based
Exploring Very Large State Spaces Using Genetic Algorithms (PG, SK), pp. 266–280.
TACASTACAS-2002-KimSC #functional #requirements #specification #verification
Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS (TK, DWJSC, SDC), pp. 205–220.
TACASTACAS-2002-Lang #composition #verification
Compositional Verification Using SVL Scripts (FL), pp. 465–469.
WRLAWRLA-2002-DenkerM #communication #modelling #multi #protocol #term rewriting
Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
CADECADE-2002-Ahrendt #data type #deduction #fault #generative #specification
Deductive Search for Errors in Free Data Type Specifications Using Model Generation (WA), pp. 211–225.
CAVCAV-2002-BryantLS #logic #modelling #verification
Modeling and Verifying Systems Using a Logic of Counter Arithmetic with λ Expressions and Uninterpreted Functions (REB, SKL, SAS), pp. 78–92.
CAVCAV-2002-ClarkeGKS #abstraction #machine learning #satisfiability
SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques (EMC, AG, JHK, OS), pp. 265–279.
CAVCAV-2002-GodefroidJ #abstraction #automation #model checking
Automatic Abstraction Using Generalized Model Checking (PG, RJ), pp. 137–150.
CAVCAV-2002-RybinaV #canonical #infinity #model checking
Using Canonical Representations of Solutions to Speed Up Infinite-State Model Checking (TR, AV), pp. 386–400.
CAVCAV-2002-YounesS #probability #verification
Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling (HLSY, RGS), pp. 223–235.
ICLPICLP-2002-BockmayrC #biology #concurrent #constraints #hybrid #programming
Using Hybrid Concurrent Constraint Programming to Model Dynamic Biological Systems (AB, AC), pp. 85–99.
ICLPICLP-2002-Christensen #detection #logic programming #pervasive #process
Using Logic Programming to Detect Activities in Pervasive Healthcare (HBC), pp. 421–436.
ICLPICLP-2002-PemmasaniRR #constraints #logic programming #model checking #performance #realtime
Efficient Real-Time Model Checking Using Tabled Logic Programming and Constraints (GP, CRR, IVR), pp. 100–114.
ICLPICLP-2002-VaucheretGM #fuzzy #implementation #prolog
Fuzzy Prolog: A Simple General Implementation Using CLP(R) (CV, SG, SMH), p. 469.
ISSTAISSTA-2002-BriandLS #analysis #contract #fault #object-oriented
Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
ISSTAISSTA-2002-GroceV #heuristic #java #model checking #source code
Model checking Java programs using structural heuristics (AG, WV), pp. 12–21.
ISSTAISSTA-2002-LiangPH #analysis #precise #profiling
Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
SATSAT-2002-Kullmann #adaptation #branch #database #encryption #normalisation #random #satisfiability #standard #towards
Towards an adaptive density based branching rule for SAT solvers, using a database for mixed random conjunctive normal forms built upon the Advanced Encryption Standard (AES) (OK), p. 8.
ICTSSTestCom-2002-SchulzV #implementation
Implementation of TTCN-3 Test Systems using the TRI (SS, TVG), pp. 425–442.
VMCAIVMCAI-2002-Huth #model checking
Model Checking Modal Transition Systems Using Kripke Structures (MH), pp. 302–316.
CBSECBSE-2001-Wile #architecture
Ensuring General-Purpose and Domain-Specific Properties Using Architectural Styles (DSW), p. 6.
DocEngDocEng-2001-NaF #analysis #authoring #documentation #hypermedia #petri net
Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
DocEngDocEng-2001-VarlamisV #database #documentation #generative #relational #xml
Bridging XML-schema and relational databases: a system for generating and manipulating relational databases using valid XML documents (IV, MV), pp. 105–114.
TPDLECDL-2001-BauerS #documentation #library
Enhancing Digital Library Documents by A Posteriori Cross Linking Using XSLT (MGB, GS), pp. 95–102.
TPDLECDL-2001-HunterL #distributed #multi
Building and Indexing a Distributed Multimedia Presentation Archive Using SMIL (JH, SL), pp. 415–428.
TPDLECDL-2001-MeyyappanAF
Digital Work Environment (DWE): Using Tasks to Organize Digital Resources (NM, SAH, SF), pp. 239–250.
TPDLECDL-2001-Mutschke #data flow #information retrieval #network
Enhancing Information Retrieval in Federated Bibliographic Data Sources Using Author Network Based Stratagems (PM), pp. 287–299.
TPDLECDL-2001-ZaslavskyBM #algorithm #comparison #detection #multi
Using Copy-Detection and Text Comparison Algorithms for Cross-Referencing Multiple Editions of Literary Works (ABZ, AB, KM), pp. 103–114.
HTHT-2001-AguiarB #information management #retrieval #web
Improvement of Web retrieval by the use of contextual information of pages (FA, MB), pp. 247–248.
HTHT-2001-CrowderSWG #hypermedia #overview
A review of the benefits of using hypermedia manuals (RC, YWS, GW, RG), pp. 245–246.
HTHT-2001-MooreBS #education
Personally tailored teaching in WHURLE using conditional transclusion (AM, TJB, CDS), pp. 163–164.
HTHT-2001-RubartHTW #component #enterprise #hypermedia
Organizing shared enterprise workspaces using component-based cooperative hypermedia (JR, JMH, DAT, WW), pp. 73–82.
HTHT-2001-WealMMR
Building narrative structures using context based linking (MJW, DEM, DTM, DDR), pp. 37–38.
ICDARICDAR-2001-BagdanovW #classification #documentation #fine-grained #first-order #graph #random
Fine-Grained Document Genre Classification Using First Order Random Graphs (ADB, MW), pp. 79–85.
ICDARICDAR-2001-BloombergPM #documentation #heuristic #image
Document Image Decoding Using Iterated Complete Path Search with Subsampled Heuristic Scoring (DSB, KP, TPM), pp. 344–349.
ICDARICDAR-2001-BourgeoisEB #comprehension #documentation #probability
Document Understanding Using Probabilistic Relaxation: Application on Tables of Contents of Periodicals (FL, HE, SSB), pp. 508–512.
ICDARICDAR-2001-Breuel #algorithm #programming #segmentation #string
Segmentation of Handprinted Letter Strings Using a Dynamic Programming Algorithm (TMB), pp. 821–826.
ICDARICDAR-2001-ChoisyB #normalisation #recognition
Handwriting Recognition Using Local Methods for Normalization and Global Methods for Recognition (CC, AB), pp. 23–27.
ICDARICDAR-2001-DawoudK #documentation #image
Binarization of Document Images Using Image Dependent Model (AD, MK), pp. 49–53.
ICDARICDAR-2001-EtoS #network #recognition
Mathematical Formula Recognition Using Virtual Link Network (YE, MS), pp. 762–767.
ICDARICDAR-2001-FanCW #documentation #identification
Form Document Identification Using Line Structure Based Features (KCF, MLC, YKW), pp. 704–708.
ICDARICDAR-2001-FanFT #documentation #image
Binarizing Document Image Using Coplanar Prefilter (LF, LF, CLT), pp. 34–38.
ICDARICDAR-2001-GarainC #analysis #fuzzy #multi #segmentation
Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
ICDARICDAR-2001-GuoM #markov #modelling
Separating Handwritten Material from Machine Printed Text Using Hidden Markov Models (JKG, MYM), pp. 439–443.
ICDARICDAR-2001-HadjarHI #approach #composition
Newspaper Page Decomposition Using a Split and Merge Approach (KH, OH, RI), pp. 1186–1189.
ICDARICDAR-2001-HouleBS
Handwriting Stroke Extraction Using a New XYTC Transform (GFH, KB, MS), pp. 91–95.
ICDARICDAR-2001-Hurst #layout
Layout and Language: Exploring Text Block Discovery in Tables Using Linguistic Resources (MH), pp. 523–527.
ICDARICDAR-2001-IwataYYKIM #identification #library
Book Cover Identification by Using Four Directional Features Filed for a Small-Scale Library System (KI, KY, MY, KK, MI, KM), pp. 582–586.
ICDARICDAR-2001-JinT #composition #locality
Text Area Localization under Complex-Background Using Wavelet Decomposition (NJ, YYT), pp. 1126–1130.
ICDARICDAR-2001-JustinoBS #random #verification
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
ICDARICDAR-2001-KimCKS #generative #recognition #string
Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator (KKK, YC, JHK, CYS), pp. 14–17.
ICDARICDAR-2001-KimSL #modelling #probability
Character Spotting Using Image-Based Stochastic Models (SKK, BKS, SWL), pp. 60–63.
ICDARICDAR-2001-KobayashiNMSA #flexibility #learning #recognition #statistics
Handwritten Numeral Recognition Using Flexible Matching Based on Learning of Stroke Statistics (TK, KN, HM, TS, KA), pp. 612–616.
ICDARICDAR-2001-KoshinakaNY #dependence #probability #recognition #word
A Stochastic Model for Handwritten Word Recognition Using Context Dependency Between Character Patterns (TK, DN, KY), pp. 154–158.
ICDARICDAR-2001-LeedhamTY #identification #markov
Handwritten Country Name Identification Using Vector Quantisation and Hidden Markov Model (GL, WKT, WLY), pp. 685–688.
ICDARICDAR-2001-LejtmanG #network #online #verification
On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
ICDARICDAR-2001-Likforman-Sulem #image #visual notation
Name Block Location in Facsimile Images Using Spatial/Visual Cues (LLS), pp. 680–684.
ICDARICDAR-2001-MartiMB #identification
Writer Identification Using Text Line Based Features (UVM, RM, HB), pp. 101–105.
ICDARICDAR-2001-NajmanGB #recognition
Indexing Technical Drawings Using Title Block Structure Recognition (LN, OG, SB), pp. 587–591.
ICDARICDAR-2001-NatarajanESM #markov #modelling
Videotext OCR Using Hidden Markov Models (PN, BE, RMS, JM), pp. 947–951.
ICDARICDAR-2001-NatteeN #classification #comprehension #documentation #geometry #machine learning #online
Geometric Method for Document Understanding and Classification Using On-line Machine Learning (CN, MN), pp. 602–606.
ICDARICDAR-2001-NishimuraTMMN #feature model #recognition
Off-line Hand-written Character Recognition Using Integrated 1D HMMs Based on Feature Extraction Filters (HN, MT, MM, HM, YN), pp. 417–423.
ICDARICDAR-2001-ParizeauLG #recognition
Character Recognition Experiments Using Unipen Data (MP, AL, CG), pp. 481–485.
ICDARICDAR-2001-RheeCK #feature model #online #segmentation #verification
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
ICDARICDAR-2001-RoneeUS #2d #linear #recognition
Handwritten Character Recognition Using Piecewise Linear Two-Dimensional Warping (MAR, SU, HS), pp. 39–43.
ICDARICDAR-2001-SerraduraSV #classification #markov #modelling #web
Web Sites Thematic Classification Using Hidden Markov Models (LS, MS, NV), pp. 1094–1099.
ICDARICDAR-2001-Smith #estimation #parametricity
Scanner Parameter Estimation Using Bilevel Scans of Star Charts (EHBS), pp. 1164–1168.
ICDARICDAR-2001-Souafi-BensafiPLE #logic #network
Logical Labeling Using Bayesien Networks (SSB, MP, FL, HE), pp. 832–836.
ICDARICDAR-2001-SrihariCL #pattern matching #pattern recognition #recognition
Establishing Handwriting Individuality Using Pattern Recognition Techniques (SNS, SHC, SL), p. 1195–?.
ICDARICDAR-2001-SuralD01a #fuzzy #multi #recognition
Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features (SS, PKD), pp. 1120–1125.
ICDARICDAR-2001-TaoT
Discrimination of Oriental and Euramerican Scripts Using Fractal Feature (YT, YYT), pp. 1115–1119.
ICDARICDAR-2001-UchidaTS #programming
Nonuniform Slant Correction Using Dynamic Programming (SU, ET, HS), pp. 434–438.
ICDARICDAR-2001-ValvenyM #learning
Learning of Structural Descriptions of Graphic Symbols Using Deformable Template Matching (EV, EM), pp. 455–459.
ICDARICDAR-2001-WakaharaKS #adaptation #normalisation #recognition
Handwritten Japanese Character Recognition Using Adaptive Normalization by Global Affine Transformation (TW, YK, MS), pp. 424–428.
ICDARICDAR-2001-WakedSB #documentation #image
Segmenting Document Images Using Diagonal White Runs and Vertical Edges (BW, CYS, SB), pp. 194–199.
ICDARICDAR-2001-WongSA01a #analysis #layout
Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
ICDARICDAR-2001-YeCS #classification #reduction
Reduction of the Classification Cost Using Hierarchical Classifiers based on the k-NN Rule (XY, MC, CYS), pp. 716–720.
ICDARICDAR-2001-YuanT #documentation #image
Text Extraction from Gray Scale Document Images Using Edge Information (QY, CLT), pp. 302–306.
ICDARICDAR-2001-ZhaoCSW #approach #segmentation
Handwritten Chinese Character Segmentation Using a Two-Stage Approach (SZ, ZC, PS, QW), pp. 179–183.
JCDLJCDL-2001-BlandfordSB #case study #library #multi
Use of multiple digital libraries: a case study (AB, HS, NBK), pp. 179–188.
JCDLJCDL-2001-KlavansW #online #taxonomy
Extracting taxonomic relationships from on-line definitional sources using LEXING (JK, BW), pp. 257–258.
JCDLJCDL-2001-Larson #distributed #resource management
Distributed resource discovery: using z39.50 to build cross-domain information servers (RRL), pp. 52–53.
JCDLJCDL-2001-PettigrewD #community #design #information management
Public use of digital community information systems: findings from a recent study with implications for system design (KEP, JCD), pp. 136–143.
JCDLJCDL-2001-Suleman01a #protocol #repository
Using the repository explorer to achieve OAI protocol compliance (HS), p. 459.
JCDLJCDL-2001-WangD #clustering #image #retrieval #scalability #statistics
Scalable integrated region-based image retrieval using IRM and statistical clustering (JZW, YD), pp. 268–277.
PODSPODS-2001-RajaramanU #query
Querying Websites Using Compact Skeletons (AR, JDU).
VLDBVLDB-2001-AndreiV #communication
User-Optimizer Communication using Abstract Plans in Sybase ASE (MA, PV), pp. 29–38.
VLDBVLDB-2001-ChaudhuriS #database #relational #retrieval #xml
Storage and Retrieval of XML Data Using Relational Databases (SC, KS).
VLDBVLDB-2001-MaedaT #adaptation #named
ACTIVIEW: Adaptive data presentation using SuperSQL (YM, MT), pp. 695–696.
VLDBVLDB-2001-SakuraiYKU #adaptation #query #similarity
Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation (YS, MY, RK, SU), pp. 231–240.
VLDBVLDB-2001-SundaraHCAS #documentation #framework #xml
Developing an Indexing Scheme for XML Document Collection using the Oracle8i Extensibility Framework (SS, YH, TC, NA, JS), pp. 701–702.
CSEETCSEET-2001-PortB #delivery #framework #product line #re-engineering
Using a Model Framework in Developing and Delivering a Family of Software Engineering Project Courses (DP, BWB), pp. 44–55.
ITiCSEITiCSE-2001-BerqueJJ #education
Teaching theory of computation using pen-based computers and an electronic whiteboard (DAB, DKJ, LJ), pp. 169–172.
ITiCSEITiCSE-2001-ChoiC #design #education #interactive #learning #multi #object-oriented
Using interactive multimedia for teaching and learning object oriented software design (SHC, SC), p. 176.
ITiCSEITiCSE-2001-CiesielskiM #algorithm #animation #learning #student
Using animation of state space algorithms to overcome student learning difficulties (VC, PM), pp. 97–100.
ITiCSEITiCSE-2001-DannCP #education #recursion #visualisation
Using visualization to teach novices recursion (WD, SC, RP), pp. 109–112.
ITiCSEITiCSE-2001-Fone #concept #network #spreadsheet
Using a familiar package to demonstrate a difficult concept: using an excel spreadsheet model to explain the concepts of neural networks to undergraduates (WF), pp. 165–168.
ITiCSEITiCSE-2001-Fowler #prolog
Web-based CALL using prolog (AF), p. 181.
ITiCSEITiCSE-2001-Guzdial #collaboration #multi
Use of collaborative multimedia in computer science classes (MG), pp. 17–20.
ITiCSEITiCSE-2001-KoldehofeT #animation #distributed #interactive
Using actors in an interactive animation in a graduate course on distributed system (BK, PT), pp. 149–152.
ITiCSEITiCSE-2001-Lawhead #programming
Events robots and programming using legos in CS1 (PBL), p. 183.
ITiCSEITiCSE-2001-Medley #education #research
Using qualitative research software for CS education research (MDM), pp. 141–144.
ITiCSEITiCSE-2001-Rutherfoord #re-engineering
Using personality inventories to help form teams for software engineering class projects (RHR), pp. 73–76.
ITiCSEITiCSE-2001-ThomasL #distance #fault #learning #student
Observational studies of student errors in a distance learning environment using a remote recording and replay tool (PT, KL), pp. 117–120.
CSMRCSMR-2001-PodnarM #analysis #maintenance #process #simulation
Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
ICSMEICSM-2001-CaivanoLV #comprehension #estimation #process
Software Renewal Process Comprehension using Dynamic Effort Estimation (DC, FL, GV), pp. 209–218.
ICSMEICSM-2001-ChenCWYZZM #cvs #named #source code
CVSSearch: Searching through Source Code Using CVS Comments (AC, EC, JW, AYY, QZ, SZ, AM), p. 364–?.
ICSMEICSM-2001-DeanCSM #design #legacy
Using Design Recovery Techniques to Transform Legacy Systems (TRD, JRC, KAS, AJM), pp. 622–631.
ICSMEICSM-2001-EveraarsAK #concurrent #coordination #source code
Using Coordination to Restructure Sequential Source Code into a Concurrent Program (CTHE, FA, BK), p. 342–?.
ICSMEICSM-2001-KataokaEGN #automation #invariant #refactoring
Automated Support for Program Refactoring Using Invariants (YK, MDE, WGG, DN), pp. 736–743.
ICSMEICSM-2001-Lemos #architecture #evolution
Describing Evolving Dependable Systems Using Co-Operative Software Architectures (RdL), p. 320–?.
ICSMEICSM-2001-MitchellM #algorithm #clustering #metric #similarity
Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements (BSM, SM), pp. 744–753.
ICSMEICSM-2001-OrsoHRRSD #component #testing
Using Component Metacontent to Support the Regression Testing of Component-Based Software (AO, MJH, DSR, GR, MLS, HD), pp. 716–725.
ICSMEICSM-2001-PoloPR #case study #legacy #maintenance #metric #predict #source code
Using Code Metrics to Predict Maintenance of Legacy Programs: A Case Study (MP, MP, FR), pp. 202–208.
ICSMEICSM-2001-TewksburyMM #corba #replication
Live Upgrades of CORBA Applications Using Object Replication (LAT, LEM, PMMS), p. 488–?.
IWPCIWPC-2001-EisenbarthKS #comprehension #concept analysis #execution
Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
IWPCIWPC-2001-GannodC #formal method #reverse engineering #tool support
A Suite of Tools for Facilitating Reverse Engineering Using Formal Methods (GCG, BHCC), pp. 221–232.
IWPCIWPC-2001-Sartipi01a #component #evaluation
A Software Evaluation Model Using Component Association Views (KS), pp. 259–268.
SCAMSCAM-2001-BurdR #analysis #automation #evolution #source code
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAMSCAM-2001-MaggiS #analysis #bytecode #data flow #java
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
SCAMSCAM-2001-SharmaC #maintenance
Application Maintenance Using Software Agents (AS, MAMC), pp. 57–66.
SCAMSCAM-2001-WeberSR #case study #constraints #detection #optimisation #security
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
WCREWCRE-2001-El-RamlyISSM #interactive #modelling
Modeling the System-User Dialog Using Interaction Traces (MER, PI, ES, PGS, BM), p. 208–?.
WCREWCRE-2001-MiecznikowskiH #encapsulation #java #staged
Decompiling Java Using Staged Encapsulation (JM, LJH), pp. 368–374.
WCREWCRE-2001-Moonen #generative #robust #semiparsing
Generating Robust Parsers Using Island Grammars (LM), p. 13–?.
CIAACIAA-2001-AlegriaAEEU #finite #natural language
Using Finite State Technology in Natural Language Processing of Basque (IA, MJA, NE, AE, RU), pp. 1–12.
CIAACIAA-2001-HolzerK #encoding #image #order
Improving Raster Image Run-Length Encoding Using Data Order (MH, MK), pp. 161–176.
CIAACIAA-2001-KatritzkeMT #automaton #clustering #finite #image
Enhancements of Partitioning Techniques for Image Compression Using Weighted Finite Automata (FK, WM, MT), pp. 177–189.
ICALPICALP-2001-BrodalFPO #complexity
The Complexity of Constructing Evolutionary Trees Using Experiments (GSB, RF, CNSP, ), pp. 140–151.
ICALPICALP-2001-CohenHK #aspect-oriented #consistency #distributed #performance
Performance Aspects of Distributed Caches Using TTL-Based Consistency (EC, EH, HK), pp. 744–756.
FMFME-2001-LaurentMW #simulation #verification
Using Formal Verification Techniques to Reduce Simulation and Test Effort (OL, PM, VW), pp. 465–477.
RTARTA-2001-KorovinV #order #verification
Verifying Orientability of Rewrite Rules Using the Knuth-Bendix Order (KK, AV), pp. 137–153.
RTARTA-2001-VestergaardB #confluence #first-order #proving #λ-calculus
A Formalised First-Order Confluence Proof for the λ-Calculus Using One-Sorted Variable Names (RV, JB), pp. 306–321.
TLCATLCA-2001-Hofmann #behaviour #bound #complexity #memory management #type system
From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
TLCATLCA-2001-Pinto #geometry #implementation #interactive #modelling #parallel #λ-calculus
Parallel Implementation Models for the λ-Calculus Using the Geometry of Interaction (JSP), pp. 385–399.
FLOPSFLOPS-2001-KamareddineLN #parametricity
Refining the Barendregt Cube Using Parameters (FK, TL, RN), pp. 375–390.
ICFPICFP-2001-FluetW
Contification Using Dominators (MF, SW), pp. 2–13.
GT-VMTGT-VMT-2001-CorradiniDR #graph transformation #mobile #specification
A Graph Transformation View on the Specification of Applications using Mobile Code (AC, FLD, LR0), pp. 238–246.
CHICHI-2001-BhavnaniRJ #education #identification
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
CHICHI-2001-ChiPCP #web
Using information scent to model user information needs and actions and the Web (EHhC, PP, KC, JEP), pp. 490–497.
CHICHI-2001-GarauSBS #communication
The impact of eye gaze on communication using humanoid avatars (MG, MS, SB, MAS), pp. 309–316.
CHICHI-2001-Salvucci #architecture #interface #predict
Predicting the effects of in-car interfaces on driver bahavior using a cognitive architecture (DDS), pp. 120–127.
CHICHI-2001-WoodruffFRMP #web
Using thumbnails to search the Web (AW, AF, RR, JM, PP), pp. 198–205.
VISSOFTSVIS-2001-Francik #algorithm #animation #data flow
Algorithm Animation Using Data Flow Tracing (JF), pp. 73–87.
VISSOFTSVIS-2001-OechsleS #automation #debugging #diagrams #interface #java #named #sequence chart #visualisation
JAVAVIS: Automatic Program Visualization with Object and Sequence Diagrams Using the Java Debug Interface (JDI) (RO, TS), pp. 176–190.
CAiSECAiSE-2001-GeneroOPR #information management #maintenance #metric #object-oriented #predict
Using Metrics to Predict OO Information Systems Maintainability (MG, JAO, MP, FPR), pp. 388–401.
CAiSECAiSE-2001-RoantreeKB #information management #integration #metadata
Using a Metadata Software Layer in Information Systems Integration (MR, JBK, PJB), pp. 299–314.
CAiSECAiSE-2001-SunyePHGJ #action semantics #execution #modelling #semantics #uml
Using UML Action Semantics for Executable Modeling and Beyond (GS, FP, WMH, ALG, JMJ), pp. 433–447.
EDOCEDOC-2001-ArreguiPW #middleware #scalability
Addressing Scalability Issues Using the CLF Middleware (DA, FP, JW), pp. 93–104.
EDOCEDOC-2001-LeffR #design pattern #development #mvc
Web-Application Development Using the Model/View/Controller Design Pattern (AL, JTR), pp. 118–127.
EDOCEDOC-2001-NealL #development #tool support
Tool Support for Development Using Patterns (SWN, PFL), p. 237–?.
EDOCEDOC-2001-WegmannN #concept #modelling #ontology
Conceptual Modeling of Complex Systems Using an RM-ODP Based Ontology (AW, AN), pp. 200–211.
ICEISICEIS-v1-2001-AllouiO #architecture #component #distributed #process
Supporting Decentralised Software-Intensive Processes Using ZETA Component-Based Architecture Description Language (IA, FO), pp. 207–215.
ICEISICEIS-v1-2001-BailinT #ontology
Ontology Negotiation Using JESS (SCB, WT), pp. 559–570.
ICEISICEIS-v1-2001-CarvalhoRMNK #fuzzy #logic #quantifier
Quantification of the Emotional Quotient of the Intelligence using the Classic and Fuzzy Logic (LFdC, RR, RRdM, SMN, CK), pp. 361–365.
ICEISICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation
Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
ICEISICEIS-v1-2001-DiazTO #machine learning
A Knowledge-Acquisition Methodology for a Blast Furnace Expert System Using Machine Learning Techniques (ED, JT, FO), pp. 336–339.
ICEISICEIS-v1-2001-MohanY01a #implementation #object-oriented
Implementing Business Rules in an Object-Oriented System Using JESS (PM, SY), pp. 553–558.
ICEISICEIS-v1-2001-SoonthornphisajK #algorithm #categorisation #problem #set #web
The Effects of Differnet Feature Sets on the Web Page Categorization Problem Using the Iterative Cross-Training Algorithm (NS, BK), pp. 404–410.
ICEISICEIS-v1-2001-ThorntonR #artificial reality #data mining #mining #network
Using Virtual Reality Data Mining for Network Management (KEBT, CR), pp. 340–344.
ICEISICEIS-v2-2001-FerreiraTS #internet #named
Webmaster — An Internet Information Support System for Academic Services Using ASP Technology (CF, LT, RS), pp. 967–973.
ICEISICEIS-v2-2001-JohnsonD #category theory #enterprise #information management #modelling #specification
Enterprise Information Systems: Specifying the Links among Project Data Models Using Category Theory (MJ, CNGD), pp. 619–626.
ICEISICEIS-v2-2001-OliveiraFL #framework #information management #xml
Using XML and Frameworks to Develop Information Systems (TCdO, IMF, CJPdL), pp. 571–577.
ICEISICEIS-v2-2001-TehZ #web
The Web Server Using Dynamic Histograms (YWT, ABZ), pp. 962–966.
CIKMCIKM-2001-ChoHLP #integer
Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
CIKMCIKM-2001-HansenS #information retrieval #navigation #web
Using navigation Data to Improve IR functions in the Context of Web Search (MH, ES), pp. 135–142.
CIKMCIKM-2001-Shen #image
Finding Similar Images Quickly Using Object Shapes (HTS), pp. 498–505.
CIKMCIKM-2001-ZelikovitzH #classification
Using LSI for Text Classification in the Presence of Background Text (SZ, HH), pp. 113–118.
ICMLICML-2001-BlumC #graph #learning
Learning from Labeled and Unlabeled Data using Graph Mincuts (AB, SC), pp. 19–26.
ICMLICML-2001-DruckerSG #feedback
Relevance Feedback using Support Vector Machines (HD, BS, DCG), pp. 122–129.
ICMLICML-2001-GhaniSY #categorisation #hypermedia
Hypertext Categorization using Hyperlink Patterns and Meta Data (RG, SS, YY), pp. 178–185.
ICMLICML-2001-LiuECBT #3d #mobile #modelling
Using EM to Learn 3D Models of Indoor Environments with Mobile Robots (YL, RE, DC, WB, ST), pp. 329–336.
ICMLICML-2001-McGovernB #automation #learning
Automatic Discovery of Subgoals in Reinforcement Learning using Diverse Density (AM, AGB), pp. 361–368.
ICMLICML-2001-PapagelisK
Breeding Decision Trees Using Evolutionary Techniques (AP, DK), pp. 393–400.
ICMLICML-2001-RozsypalK #algorithm #classification #nearest neighbour #search-based
Using the Genetic Algorithm to Reduce the Size of a Nearest-Neighbor Classifier and to Select Relevant Attributes (AR, MK), pp. 449–456.
ICMLICML-2001-SandM #estimation #modelling
Repairing Faulty Mixture Models using Density Estimation (PS, AWM), pp. 457–464.
ICMLICML-2001-StrensM #policy #statistics #testing
Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
ICMLICML-2001-Wiering #learning
Reinforcement Learning in Dynamic Environments using Instantiated Information (MW), pp. 585–592.
ICMLICML-2001-Wyatt #learning
Exploration Control in Reinforcement Learning using Optimistic Model Selection (JLW), pp. 593–600.
KDDKDD-2001-BasuMPG
Evaluating the novelty of text-mined rules using lexical knowledge (SB, RJM, KVP, JG), pp. 233–238.
KDDKDD-2001-CarageaCH #classification
Gaining insights into support vector machine pattern classifiers using projection-based tour methods (DC, DC, VH), pp. 251–256.
KDDKDD-2001-Dhillon #clustering #documentation #graph #word
Co-clustering documents and words using bipartite spectral graph partitioning (ISD), pp. 269–274.
KDDKDD-2001-GarckeG #data mining #mining
Data mining with sparse grids using simplicial basis functions (JG, MG), pp. 87–96.
KDDKDD-2001-HarelK #clustering #random
Clustering spatial data using random walks (DH, YK), pp. 281–286.
KDDKDD-2001-Kandogan #clustering #coordination #multi #roadmap #visualisation
Visualizing multi-dimensional clusters, trends, and outliers using star coordinates (EK), pp. 107–116.
KDDKDD-2001-SpanglerK #analysis #knowledge base #maintenance
Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
LSOLSO-2001-BrandtN #experience #project management #reuse
Computer-Supported Reuse of Project Management Experience with an Experience Base (MB, MN), pp. 178–191.
LSOLSO-2001-Differding #metric #modelling #process #quality #reuse
Reuse of Measurement Plans Based on Process and Quality Models (CMD), pp. 207–221.
MLDMMLDM-2001-FischerB #automation #identification
Automatic Identification of Diatoms Using Decision Forests (SF, HB), pp. 173–183.
MLDMMLDM-2001-Krawiec #comparison #learning #on the #visual notation
On the Use of Pairwise Comparison of Hypotheses in Evolutionary Learning Applied to Learning from Visual Examples (KK), pp. 307–321.
MLDMMLDM-2001-Krzyzak #classification #learning #network
Nonlinear Function Learning and Classification Using Optimal Radial Basis Function Networks (AK), pp. 217–225.
SEKESEKE-2001-BarberGH #architecture #correctness #model checking #simulation
Evaluating Dynamic Correctness Properties of Domain Reference Architectures Using a Combination of Simulation and Model Checking (KSB, TJG, JH), pp. 19–28.
SEKESEKE-2001-BrisaboaPPR #database #ontology #web
Using ontologies for federation of Web accessible databases (NRB, MRP, ÁSP, FJR), pp. 87–94.
SEKESEKE-2001-BuenoJ #algorithm #automation #generative #search-based #testing
Automatic Test Data Generation for Program Paths Using Genetic Algorithms (PMSB, MJ), pp. 2–9.
SEKESEKE-2001-LemosP #information management #interactive #modelling #petri net
Methodology for Modeling Interactions in Cooperative Information Systems Using Colored Petri Nets (AJPL, AP), pp. 299–306.
SEKESEKE-2001-RamosSC #modelling #petri net #reuse
Reuse of Colored Petri Nets Software Models (FR, JFS, FCS), pp. 145–152.
SIGIRSIGIR-2001-Broch
Cite Me, Cite My References? (Scholarly Use of the ACM SIGIR Proceedings Based on Two Citation Indexes) (EB), pp. 446–447.
SIGIRSIGIR-2001-ChakrabartiJT #topic
Enhanced Topic Distillation Using Text, Markup Tags, and Hyperlinks (SC, MJ, VT), pp. 208–216.
SIGIRSIGIR-2001-CraswellHR #effectiveness
Effective Site Finding Using Link Anchor Information (NC, DH, SER), pp. 250–257.
SIGIRSIGIR-2001-Crestani #documentation #retrieval #towards
Towards the use of Prosodic Information for Spoken Document Retrieval (FC), pp. 420–421.
SIGIRSIGIR-2001-DrewL #classification
Construction of a Hierarchical Classifier Schema Using a Combination of Text-Based and Image-Based Approaches (MSD, CL), pp. 438–439.
SIGIRSIGIR-2001-GaoXZHNZ #information retrieval #modelling #query #statistics
Improving Query Translation for Cross-Language Information Retrieval Using Statistical Models (JG, EX, MZ, CH, JYN, JZ), pp. 96–104.
SIGIRSIGIR-2001-GongL #analysis #semantics #summary
Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
SIGIRSIGIR-2001-LeeS #clustering #image #learning #retrieval
Intelligent Object-based Image Retrieval Using Cluster-driven Personal Preference Learning (KML, WNS), pp. 436–437.
SIGIRSIGIR-2001-MillerRS #algorithm #matrix
Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
SIGIRSIGIR-2001-RuthvenRL #abduction #empirical #query
Empirical Investigations on Query Modification Using Abductive Explanations (IR, CJvR, ML), pp. 181–189.
SIGIRSIGIR-2001-SakaiR #feedback #flexibility #optimisation #pseudo
Flexible Pseudo-Relevance Feedback Using Optimization Tables (TS, SER), pp. 396–397.
SIGIRSIGIR-2001-SongB #concept #data flow #information management
Discovering Information Flow Using a High Dimensional Conceptual Space (DS, PB), pp. 327–333.
SIGIRSIGIR-2001-StentL #segmentation
Using Event Segmentation to Improve Indexing of Consumer Photographs (AS, ACL), pp. 59–65.
SIGIRSIGIR-2001-WenZN #clustering #feedback #query #word
Query Clustering Using Content Words and User Feedback (JRW, HZ, JYN), pp. 442–443.
UMLUML-2001-BottoniKPT #ocl #visualisation
A Visualization of OCL Using Collaborations (PB, MK, FPP, GT), pp. 257–271.
UMLUML-2001-SendallS #behaviour #concurrent #constraints #ocl #specification #uml
Specifying Concurrent System Behavior and Timing Constraints Using OCL and UML (SS, AS), pp. 391–405.
ECOOPECOOP-2001-MeijerPY #dot-net
Scripting .NET Using Mondrian (EM, NP, AvY), pp. 150–164.
OOPSLAOOPSLA-2001-RountevMR #analysis #constraints #java #points-to
Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
OOPSLAOOPSLA-2001-Whaley #compilation
Partial Method Compilation using Dynamic Profile Information (JW), pp. 166–179.
TOOLSTOOLS-EUROPE-2001-Hoare
Growing Use of Assertions (CARH), p. 3.
TOOLSTOOLS-EUROPE-2001-MollerJ #xml
Enhancing Jini’s Lookup Service Using XML-Based Service Templates (MBM, BNJ), pp. 19–31.
TOOLSTOOLS-EUROPE-2001-Ramos-HernandezFBHBB #integration #object-oriented #process
Process Control Systems Integration Using Object Oriented Technology (DNRH, PJF, SB, SH, JMB, MJB), pp. 148–160.
TOOLSTOOLS-USA-2001-Behravanfar #architecture #generative #internet
Separation of Data and Presentation for the Next Generation Internet Using the Four-Tier Architecture (RB), pp. 83–88.
TOOLSTOOLS-USA-2001-Breuel #code generation #implementation #java
Implementing Dynamic Language Features in Java Using Dynamic Code Generation (TMB), pp. 143–152.
TOOLSTOOLS-USA-2001-GueheneucA #constraints #design pattern #detection #fault
Using Design Patterns and Constraints to Automate the Detection and Correction of Inter-Class Design Defects (YGG, HAA), pp. 296–306.
TOOLSTOOLS-USA-2001-Schultz
Using Mobility as a Competitive Weapon (ES), p. 9.
TOOLSTOOLS-USA-2001-Wu #enterprise #java #web
Building Web Applications Using Java 2 Enterprise Edition (CTW), pp. 355–356.
TOOLSTOOLS-USA-2001-WydaegheV #component #composition #visual notation
Visual Component Composition Using Composition Patterns (BW, WV), pp. 120–129.
AdaEuropeAdaEurope-2001-FoulgerK #fault #runtime #safety #tool support
Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
AdaEuropeAdaEurope-2001-HeraudL #ada #interactive
Using Ada in Interactive Digital Television Systems (PH, TL), pp. 21–34.
GPCEGCSE-2001-WashizakiF #component #distance
Retrieving Software Components Using Directed Replaceability Distance (HW, YF), pp. 153–162.
LOPSTRLOPSTR-2001-FioravantiPP #infinity #process #program transformation #set #verification
Verification of Sets of Infinite State Processes Using Program Transformation (FF, AP, MP), pp. 111–128.
LOPSTRLOPSTR-2001-LeuschelG #deduction #model checking
Abstract Conjunctive Partial Deduction Using Regular Types and Its Application to Model Checking (ML, SG), pp. 91–110.
PADLPADL-2001-BaldoniBCP #logic #programming #web
Programming Goal-Driven Web Sites Using an Agent Logic Language (MB, CB, AC, VP), pp. 60–75.
PADLPADL-2001-Cirstea #authentication #protocol #specification
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
PADLPADL-2001-Ramakrishnan #calculus #logic programming #model checking #μ-calculus
A Model Checker for Value-Passing μ-Calculus Using Logic Programming (CRR), pp. 1–13.
PLDIPLDI-2001-HeintzeT01a #alias #analysis #c
Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
PLDIPLDI-2001-KrintzC #optimisation
Using Annotation to Reduce Dynamic Optimization Time (CK, BC), pp. 156–167.
POPLPOPL-2001-Yahav #concurrent #java #logic #safety #source code #verification
Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
PPDPPPDP-2001-AbdennadherR #confluence #constraints #rule-based #theorem proving
Using Confluence to Generate Rule-Based Constraint Solvers (SA, CR), pp. 127–135.
SASSAS-2001-KomondoorH #identification #slicing #source code
Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
AdaSIGAda-2001-ChenBY #adaptation #algorithm #detection
Detecting concurrently executed pairs of statements using an adapted MHP algorithm (ZC, BX, HY), pp. 107–114.
AdaSIGAda-2001-FaginME #ada #education
Teaching computer science with robotics using Ada/Mindstorms 2.0 (BSF, LDM, TWE), pp. 73–78.
AdaSIGAda-2001-Fassbender #ada #information management #re-engineering #uml
Reengineering an Ada95-programmed command and control information system by using UML (HF), pp. 53–60.
AdaSIGAda-2001-Taft #ada #compilation
Using Ada 95 in a compiler course (STT), pp. 79–80.
RERE-2001-AllenbyK #requirements #safety
Deriving Safety Requirements Using Scenarios (KA, TK), pp. 228–235.
RERE-2001-Feather #detection #fault #reduction
Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
RERE-2001-MooreS #elicitation #requirements #visual notation
Requirements Elicitation Using Visual and Textual Information (JMM, FMSI), pp. 308–309.
ASEASE-2001-GannodG #automation #petri net
An Automated Tool for Analyzing Petri Nets Using SPIN (GCG, SG), pp. 404–407.
ASEASE-2001-GrosuLSSY #automation #concurrent #re-engineering
Automated Software Engineering Using Concurrent Class Machines (RG, YAL, SAS, SDS, JY), p. 297–?.
ASEASE-2001-HavelundR #monitoring #source code
Monitoring Programs Using Rewriting (KH, GR), pp. 135–143.
ASEASE-2001-InverardiMP #architecture #automation #consistency #modelling
Automated Check of Architectural Models Consistency Using SPIN (PI, HM, PP), pp. 346–349.
ASEASE-2001-McLarenW #framework #generative #xml
Developing Generative Frameworks Using XML (IM, TW), pp. 368–372.
FSEESEC-FSE-2001-CoadyKFS #composition #operating system
Using aspectC to improve the modularity of path-specific customization in operating system code (YC, GK, MJF, GS), pp. 88–98.
FSEESEC-FSE-2001-Coen-PorisiniDGP #execution #safety #symbolic computation #verification
Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
ICSEICSE-2001-Baxter #maintenance #re-engineering
Using Transformation Systems for Software Maintenance and Reengineering (IDB), pp. 739–740.
ICSEICSE-2001-CampaillaCCJV #performance
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision (AC, SC, EMC, SJ, HV), pp. 443–452.
ICSEICSE-2001-DillonS #analysis #graph #specification
Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
ICSEICSE-2001-Gray #component #framework #generative
Using Software Component Generators to Contstruct a Meta-Weaver Framework (JG), pp. 789–790.
ICSEICSE-2001-HakalaHKPVV #architecture #programming
Architecture-Oriented Programming Using FRED (MH, JH, KK, JP, AV, JV), pp. 823–824.
ICSEICSE-2001-HarmanJ #algorithm #metaheuristic #named #re-engineering
SEMINAL: Software Engineering Using Metaheuristic INnovative Algorithms (MH, BFJ), pp. 762–763.
ICSEICSE-2001-HobatrM #c++ #debugging
Using OCL-Queries for Debugging C++ (CH, BAM), pp. 839–840.
ICSEICSE-2001-HuntR #documentation #implementation #version control #web
Using the Web for Document Versioning: An Implementation Report for Delta V (JJH, JR), pp. 507–513.
ICSEICSE-2001-MaleticM #comprehension #semantics
Supporting Program Comprehension Using Semantic and Structural Information (JIM, AM), pp. 103–112.
ICSEICSE-2001-Mehta #evolution #legacy #re-engineering
Evolving Legacy Systems Using Feature Engineering and CBSE (AM), pp. 797–798.
ICSEICSE-2001-OvermyerLR #analysis #concept #modelling
Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
ICSEICSE-2001-RedondoA #incremental #process #reuse #specification
Reuse of Verificatino Efforts and Incomplete Specifications in a Formalized, Iterative and Incremental Software Process (RPDR, JJPA), pp. 801–802.
ICSEICSE-2001-ShullRB
Improving Software Inspections by Using Reading Techniques (FS, IR, VRB), pp. 726–727.
SACSAC-2001-Ben-MiledSBNLAOGKNCMS #object-oriented #transaction
Global change master directory: object-oriented active asynchronous transaction management in a federated environment using data agents (ZBM, SS, OAB, KN, EL, MA, LO, CG, DK, TN, RC, GM, JS), pp. 207–214.
SACSAC-2001-Chainbi01a #paradigm
Using the object paradigm to deal with the agent paradigm: capabilities and limits (WC), pp. 585–589.
SACSAC-2001-CiSN #network #performance
Improving performance of MAC layer by using congestion control/avoidance methods in wireless network (SC, HS, GN), pp. 420–424.
SACSAC-2001-CuestaFB #architecture #coordination
Dynamic coordination architecture through the use of reflection (CECQ, PdlF, MBS), pp. 134–140.
SACSAC-2001-FernandesTMR #algorithm #problem #search-based
Using assortative mating in genetic algorithms for vector quantization problems (CMF, RT, CM, ACR), pp. 361–365.
SACSAC-2001-KallesK #design #game studies #learning #on the #verification
On verifying game designs and playing strategies using reinforcement learning (DK, PK), pp. 6–11.
SACSAC-2001-LawrenceB #database #relational #standard #taxonomy
Integrating relational database schemas using a standardized dictionary (RL, KB), pp. 225–230.
SACSAC-2001-Pressel
Fundamental limitations on the use of prefetching and stream buffers for scientific applications (DMP), pp. 554–559.
SACSAC-2001-SabharwalS #database #fourier #image
Indexing image databases using wavelet and discrete fourier transform (CLS, SRS), pp. 434–439.
SACSAC-2001-VuongSD #distributed #policy #security #xml
Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
SACSAC-2001-ZhouCH #correlation #identification #optimisation #problem #set
Identifying the most significant pairwise correlations of residues in different positions of helices: the subset selection problem using least squares optimization (XZ, GC, MTH), pp. 51–55.
LDTALDTA-2001-GayoDLR #composition #monad #named #prototype #semantics
LPS: A Language Prototyping System Using Modular Monadic Semantics (JELG, MCLD, JMCL, ACdR), pp. 110–131.
CCCC-2001-PominvilleQVHV #framework #java #optimisation
A Framework for Optimizing Java Using Attributes (PP, FQ, RVR, LJH, CV), pp. 334–354.
DACDAC-2001-BanerjeeM #analysis #distributed #novel #optimisation #performance
Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
DACDAC-2001-BhanjaR #dependence #modelling #network #probability #process
Dependency Preserving Probabilistic Modeling of Switching Activity using Bayesian Networks (SB, NR), pp. 209–214.
DACDAC-2001-Bondalapati #architecture #configuration management
Parallelizing DSP Nested Loops on Reconfigurable Architectures using Data Context Switching (KB), pp. 273–276.
DACDAC-2001-ChangWM #logic
Layout-Driven Hot-Carrier Degradation Minimization Using Logic Restructuring Techniques (CWJC, KW, MMS), pp. 97–102.
DACDAC-2001-ChenBD #embedded #fault #testing
Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores (LC, XB, SD), pp. 317–320.
DACDAC-2001-Ciriani #logic
Logic Minimization using Exclusive OR Gates (VC), pp. 115–120.
DACDAC-2001-DanielSW #analysis #performance
Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
DACDAC-2001-GolumbicMR #recognition
Factoring and Recognition of Read-Once Functions using Cographs and Normality (MCG, AM, UR), pp. 109–114.
DACDAC-2001-HalpinCS #constraints #physics
Timing Driven Placement using Physical Net Constraints (BH, CYRC, NS), pp. 780–783.
DACDAC-2001-KimJSLK #optimisation
Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
DACDAC-2001-MajumdarW #combinator #satisfiability
Watermarking of SAT using Combinatorial Isolation Lemmas (RM, JLW), pp. 480–485.
DACDAC-2001-MathurS #analysis #precise
Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
DACDAC-2001-McDonaldB #analysis #simulation
Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
DACDAC-2001-PeymandoustM #algebra #algorithm #synthesis
Using Symbolic Algebra in Algorithmic Level DSP Synthesis (AP, GDM), pp. 277–282.
DACDAC-2001-ShinKL #analysis #energy #scheduling
Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
DACDAC-2001-SolomonH #layout
Using Texture Mapping with Mipmapping to Render a VLSI Layout (JS, MH), pp. 500–505.
DACDAC-2001-VelevB #effectiveness #satisfiability #verification
Effective Use of Boolean Satisfiability Procedures in the Formal Verification of Superscalar and VLIW Microprocessors (MNV, REB), pp. 226–231.
DACDAC-2001-YalcinPMBSH #dependence
An Advanced Timing Characterization Method Using Mode Dependency (HY, RP, MM, CB, KAS, JPH), pp. 657–660.
DACDAC-2001-YuYW #representation #synthesis
Signal Representation Guided Synthesis Using Carry-Save Adders For Synchronous Data-path Circuits (ZY, MLY, ANWJ), pp. 456–461.
DATEDATE-2001-Burdiek #generative #programming
Generation of optimum test stimuli for nonlinear analog circuits using nonlinear — programming and time-domain sensitivities (BB), pp. 603–609.
DATEDATE-2001-ChandraC #performance #testing
Efficient test data compression and decompression for system-on-a-chip using internal scan chains and Golomb coding (AC, KC), pp. 145–149.
DATEDATE-2001-ChangHM #functional #optimisation #symmetry
In-place delay constrained power optimization using functional symmetries (CWJC, BH, MMS), pp. 377–382.
DATEDATE-2001-CheungWC #clustering #logic
Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
DATEDATE-2001-DorschW #embedded #logic #testing
Using mission logic for embedded testing (RD, HJW), p. 805.
DATEDATE-2001-GoldbergPB #equivalence #satisfiability
Using SAT for combinational equivalence checking (EIG, MRP, RKB), pp. 114–121.
DATEDATE-2001-HajjarCMAB #behaviour #quality #statistics #verification
High quality behavioral verification using statistical stopping criteria (AH, TC, IM, AAA, MB), pp. 411–419.
DATEDATE-2001-HoffmannNPBM #development #generative #quality #tool support
Generating production quality software development tools using a machine description language (AH, AN, SP, GB, HM), pp. 674–678.
DATEDATE-2001-HuangM #configuration management #design #network
Managing dynamic reconfiguration overhead in systems-on-a-chip design using reconfigurable datapaths and optimized interconnection networks (ZH, SM), p. 735.
DATEDATE-2001-NeauMR #complexity
Low complexity FIR filters using factorization of perturbed coefficients (CN, KM, KR), pp. 268–272.
DATEDATE-2001-RedaS #diagrams #equivalence #satisfiability
Combinational equivalence checking using Boolean satisfiability and binary decision diagrams (SR, AS), pp. 122–126.
DATEDATE-2001-RonaK #modelling
Modelling SoC devices for virtual test using VHDL (MR, GK), pp. 770–771.
DATEDATE-2001-TeicaRV #automation #design #on the #verification
On the verification of synthesized designs using automatically generated transformational witnesses (ET, RR, RV), p. 798.
DATEDATE-2001-ThorntonD #diagrams #graph transformation
Spectral decision diagrams using graph transformations (MAT, RD), pp. 713–719.
DATEDATE-2001-VanasscheGS #exponential #performance #simulation
Efficient time-domain simulation of telecom frontends using a complex damped exponential signal model (PV, GGEG, WMCS), pp. 169–175.
DATEDATE-2001-XuM #difference #modelling #performance
Efficient and passive modeling of transmission lines by using differential quadrature method (QX, PM), pp. 437–444.
HPCAHPCA-2001-DelaluzKVSI #energy #hardware
DRAM Energy Management Using Software and Hardware Directed Power Mode Control (VD, MTK, NV, AS, MJI), pp. 159–169.
HPDCHPDC-2001-KuntrarukP #data mining #distributed #feature model #mining #parallel
Massively Parallel Distributed Feature Extraction in Textual Data Mining Using HDDI(tm) (JK, WMP), pp. 363–370.
HPDCHPDC-2001-NatrajanFHGWCB #case study #experience #grid
Studying Protein Folding on the Grid: Experiences Using CHARMM on NPACI Resources under Legion (AN, ADF, MAH, ASG, NWD, MC, CLBI), pp. 14–21.
HPDCHPDC-2001-SkicewiczDS #behaviour #multi #query
Multi-Resolution Resource Behaviour Queries Using Wavelets (JAS, PAD, JMS), pp. 395–394.
LCTESLCTES-OM-2001-LarusP #performance #scheduling
Using Cohort Scheduling to Enhance Server Performance (JRL, MP), pp. 182–187.
PDPPDP-2001-MedeirosC #parallel
Using Groups to Support the Interconnection of Parallel Applications (PDM, JCC), pp. 89–96.
PDPPDP-2001-SanchoRD #behaviour #distributed #on the
On the Relative Behavior of Source and Distributed Routing in NOWs Using Up/Down Routing Schemes (JCS, AR, JD), pp. 11–18.
PDPPDP-2001-SchmidtR #embedded #information retrieval #memory management
Content-Based Information Retrieval Using an Embedded Neural Associative Memory (MS, UR), pp. 443–450.
PPoPPPPoPP-2001-LimLL #array #clustering
Blocking and array contraction across arbitrarily nested loops using affine partitioning (AWL, SWL, MSL), pp. 103–112.
SOSPSOSP-2001-RodriguesCL #abstraction #fault tolerance #named
BASE: Using Abstraction to Improve Fault Tolerance (RR, MC, BL), pp. 15–28.
SOSPSOSP-2001-SnoerenCG #xml
Mesh Based Content Routing using XML (ACS, KC, DKG), pp. 160–173.
SOSPSOSP-2001-SpalinkKPG #network #robust
Building a Robust Software-Based Router Using Network Processors (TS, SK, LLP, YG), pp. 216–229.
ESOPESOP-2001-KomondoorH #dependence #tool support
Tool Demonstration: Finding Duplicated Code Using Program Dependences (RK, SH), pp. 383–386.
ESOPESOP-2001-Thiemann #safety
Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
FASEFASE-2001-Jurjens #development #towards
Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
STOCSTOC-2001-BolligW #bound #branch #integer #multi
A read-once branching program lower bound of Ω(2n/4) for integer multiplication using universal (BB, PW), pp. 419–424.
TACASTACAS-2001-Khurshid #algorithm #search-based #testing
Testing an Intentional Naming Scheme Using Genetic Algorithms (SK), pp. 358–372.
TACASTACAS-2001-MycroftS #co-evolution #design #functional #hardware
Hardware/Software Co-Design Using Functional Languages (AM, RS), pp. 236–251.
TACASTACAS-2001-RuysLKLM #algebra #analysis #partial order #probability #process
First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
TACASTACAS-2001-WilliamsAH #diagrams #satisfiability
Satisfiability Checking Using Boolean Expression Diagrams (PFW, HRA, HH), pp. 39–51.
CAVCAV-2001-AbdeddaimM #automaton #scheduling
Job-Shop Scheduling Using Timed Automata (YA, OM), pp. 478–492.
CAVCAV-2001-Arons #consistency #verification
Using Timestamping and History Variables to Verify Sequential Consistency (TA), pp. 423–435.
CAVCAV-2001-BjesseLM #debugging #satisfiability
Finding Bugs in an α Microprocessor Using Satisfiability Solvers (PB, TL, AM), pp. 454–464.
CAVCAV-2001-KuehlmannB #verification
Transformation-Based Verification Using Generalized Retiming (AK, JB), pp. 104–117.
CAVCAV-2001-KwiatkowskaNS #automation #distributed #protocol #random #verification
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
ICLPICLP-2001-BasuMRRV #bisimulation #constraints #logic programming
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming (SB, MM, CRR, IVR, RMV), pp. 166–180.
IJCARIJCAR-2001-BoigelotJW #automaton #integer #linear #on the
On the Use of Weak Automata for Deciding Linear Arithmetic with Integer and Real Variables (BB, SJ, PW), pp. 611–625.
IJCARIJCAR-2001-Middeldorp #approximate #automaton #dependence #graph
Approximating Dependency Graphs Using Tree Automata Techniques (AM), pp. 593–610.
IJCARIJCAR-2001-Peltier #automation #deduction
A General Method for Using Schematizations in Automated Deduction (NP), pp. 578–592.
LICSLICS-2001-CookK #higher-order #reasoning #theorem
A Second-Order System for Polytime Reasoning Using Graedel’s Theorem (SAC, AK), pp. 177–186.
ICSTSAT-2001-AmirM #composition #problem #satisfiability
Solving Satisfiability using Decomposition and the Most Constrained Subproblem (EA, SM), pp. 329–343.
ICSTSAT-2001-JurkowiakLU
Parallelizing Satz Using Dynamic Workload Balancing (BJ, CML, GU), pp. 174–189.
ICSTSAT-2001-Kullmann #on the #satisfiability
On the use of autarkies for satisfiability decision (OK), pp. 231–253.
CBSECBSE-2000-BurgHHMPSW
Exploring a Comprehensive CBD Method: Use of CBD/e in Practice (WDB, JSH, DPH, KM, ASP, SS, RW), p. 9.
ADLADL-2000-Chidlovskii #automaton #xml
Using Regular Tree Automata as XML Schemas (BC), pp. 89–98.
ADLADL-2000-KhanM #ontology #personalisation #retrieval
Audio Structuring and Personalized Retrieval Using Ontologies (LK, DM), pp. 116–126.
DL-2000-MooneyR #categorisation #learning #recommendation
Content-based book recommending using learning for text categorization (RJM, LR), pp. 195–204.
DL-2000-YaoKEN #analysis #architecture
Asynchronous information space analysis architecture using content and structure-based service brokering (KTY, IYK, RE, RN), pp. 133–142.
TPDLECDL-2000-GalavottiSS #automation #categorisation #feature model
Experiments on the Use of Feature Selection and Negative Evidence in Automated Text Categorization (LG, FS, MS), pp. 59–68.
TPDLECDL-2000-Khalil #library #question
Are End-Users Satisfied by Using Digital Libraries? (MAK), pp. 360–363.
TPDLECDL-2000-StavrakasGM #multi #representation #xml
Representing Context-Dependent Information Using Multidimensional XML (YS, MG, TM), pp. 368–371.
TPDLECDL-2000-WeberBS #image #parallel #scalability #similarity
Interactive-Time Similarity Search for Large Image Collections Using Parallel VA-Files (RW, KB, HJS), pp. 83–92.
TPDLECDL-2000-ZibreiraP #image #retrieval
Image Description and Retrieval Using MPEG-7 Shape Descriptors (CZ, FP), pp. 332–335.
HTHT-2000-Miyasato #image #interactive #reuse
Creation of interactive media content by the reuse of images (TM), pp. 246–247.
HTHT-2000-SmithSK #generative #orthogonal #taxonomy #video
An orthogonal taxonomy for hyperlink anchor generation in video streams using OvalTine (JMS, PDS, SUK), pp. 11–18.
PODSPODS-2000-GeertsK #approximate #database #linear #logic #transitive
Linear Approximation of Planar Spatial Databases Using Transitive-Closure Logic (FG, BK), pp. 126–135.
SIGMODSIGMOD-2000-FaloutsosSTT
Spatial Join Selectivity Using Power Laws (CF, BS, AJMT, CTJ), pp. 177–188.
SIGMODSIGMOD-2000-LitwinS #data type #distributed #scalability
LH*RS: A High-Availability Scalable Distributed Data Structure using Reed Solomon Codes (WL, TJES), pp. 237–248.
SIGMODSIGMOD-2000-Lomet #logic #online
High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
SIGMODSIGMOD-2000-OrdonezC #algorithm #clustering #named #performance #sql
SQLEM: Fast Clustering in SQL using the EM Algorithm (CO, PC), pp. 559–570.
SIGMODSIGMOD-2000-ZaharioudakisCLPU #automation #query #sql #summary
Answering Complex SQL Queries Using Automatic Summary Tables (MZ, RC, GL, HP, MU), pp. 105–116.
VLDBVLDB-2000-ChakrabartiGRS #approximate #query
Approximate Query Processing Using Wavelets (KC, MNG, RR, KS), pp. 111–122.
VLDBVLDB-2000-DiligentiCLGG #crawling #graph
Focused Crawling Using Context Graphs (MD, FC, SL, CLG, MG), pp. 527–534.
VLDBVLDB-2000-KoudasIM #identification #roadmap #set #sketching
Identifying Representative Trends in Massive Time Series Data Sets Using Sketches (PI, NK, SM), pp. 363–372.
VLDBVLDB-2000-PedersenJD #reuse
The TreeScape System: Reuse of Pre-Computed Aggregates over Irregular OLAP Hierarchies (TBP, CSJ, CED), pp. 595–598.
VLDBVLDB-2000-PottingerL #algorithm #query #scalability
A Scalable Algorithm for Answering Queries Using Views (RP, AYL), pp. 484–495.
VLDBVLDB-2000-SakuraiYUK #approximate
The A-tree: An Index Structure for High-Dimensional Spaces Using Relative Approximation (YS, MY, SU, HK), pp. 516–526.
VLDBVLDB-2000-WangHH #constraints #mining
Mining Frequent Itemsets Using Support Constraints (KW, YH, JH), pp. 43–52.
VLDBVLDB-2000-WangZ #relational #sql
Using SQL to Build New Aggregates and Extenders for Object- Relational Systems (HW, CZ), pp. 166–175.
VLDBVLDB-2000-YagoubFIV00a #data-driven #web
Building and Customizing Data-Intensive Web Sites Using Weave (KY, DF, VI, PV), pp. 607–610.
CSEETCSEET-2000-CybulskiL #analysis #design #education #multi
Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
ITiCSEITiCSE-2000-Chalk #learning #re-engineering
Apprenticeship learning of software engineering using Webworlds (PC), pp. 112–115.
ITiCSEITiCSE-2000-Fagin #ada #education
Using Ada-based robotics to teach computer science (BSF), pp. 148–151.
ITiCSEITiCSE-2000-NelsonN #education #network #open source
Teaching computer networking using open source software (DN, YMN), pp. 13–16.
ITiCSEITiCSE-2000-OdekirkJJ #case study #experience #java
Three semesters of CSO using Java: assignments and experiences (EO, DJ, PJ), pp. 144–147.
WCREWCRE-J-1997-JerdingR00 #architecture #locality #visualisation
Using visualization for architectural localization and extraction (DFJ, SR), pp. 267–284.
CSMRCSMR-2000-BrilFGKW #algebra #multi
Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
CSMRCSMR-2000-SartipiKM #architecture #data mining #design #mining
Architectural Design Recovery using Data Mining Techniques (KS, KK, FM), pp. 129–140.
ICSMEICSM-2000-HuMDL #analysis #c #c++ #compilation #execution #symbolic computation
C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
ICSMEICSM-2000-MockusV #database #identification
Identifying Reasons for Software Changes using Historic Databases (AM, LGV), pp. 120–130.
IWPCIWPC-2000-ChenR #case study #dependence #feature model #graph
Case Study of Feature Location Using Dependence Graph (KC, VR), pp. 241–247.
WCREWCRE-2000-CagninPBM #design pattern #re-engineering
Reengineering Using Design Patterns (MIC, RP, RTVB, PCM), pp. 118–127.
WCREWCRE-2000-CzeranskiEKKS #tool support
Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
WCREWCRE-2000-DeursenM #legacy
Exploring Legacy Systems using Types (AvD, LM), pp. 32–41.
WCREWCRE-2000-MamasK #source code #towards #xml
Towards Portable Source Code Representations using XML (EM, KK), p. 172–?.
WCREWCRE-2000-MartinWWM
Analyzing xfig Using the Rigi Tool Suite (JM, KW, BW, HAM), pp. 207–209.
WCREWCRE-2000-MuthannaKPS #design #industrial #maintenance #metric
A Maintainability Model for Industrial Software Systems using Design Level Metrics (SM, KK, KP, BS), p. 248–?.
ICALPICALP-2000-GhicaM #algol #reasoning #regular expression
Reasoning about Idealized ALGOL Using Regular Languages (DRG, GM), pp. 103–115.
IFMIFM-2000-MeyerS #approach #behaviour #consistency #uml #verification
Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
CHICHI-2000-JanckeGG #design
Presenting to local and remote audiences: design and use of the TELEP system (GJ, JG, AG), pp. 384–391.
CHICHI-2000-MyersLY
Two-handed input using a PDA and a mouse (BAM, KPL, BCY), pp. 41–48.
CHICHI-2000-PatrickCSRVC #artificial reality #scalability
Using a large projection screen as an alternative to head-mounted displays for virtual environments (EP, DC, AS, JAR, TV, GC), pp. 478–485.
CHICHI-2000-TaylorR #communication #consistency #semantics
Gaze communication using semantically consistent spaces (MJT, SMR), pp. 400–407.
CHICHI-2000-WatsonFM #predict #quality
Using naming time to evaluate quality predictors for model simplification (BW, AF, AM), pp. 113–120.
CSCWCSCW-2000-CadizGG #collaboration #documentation #web
Using Web annotations for asynchronous collaboration around documents (JJC, AG, JG), pp. 309–318.
CSCWCSCW-2000-LitiuP #adaptation #component #framework #mobile
Developing adaptive groupware applications using a mobile component framework (RL, AP), pp. 107–116.
CSCWCSCW-2000-YanoNIM #interface
Shared walk environment using locomotion interfaces (HY, HN, HI, TM), pp. 163–170.
CAiSECAiSE-2000-TombrosG #framework #workflow
Building Extensible Workflow Systems Using an Event-Based Infrastructure (DT, AG), pp. 325–339.
ICEISICEIS-2000-Barn #component #enterprise #java #modelling #web
Modelling and Building Component Based Web Applications Using Enterprise Java Beans (BB), p. XXXI-XXXII.
ICEISICEIS-2000-DawsonS #lazy evaluation #requirements #specification
Requirements Specification for Electronic Services Delivery Applications Using “Lazy Dog” Templates (LD, AS), pp. 261–266.
CIKMCIKM-2000-AslamPR #clustering
Using Star Clusters for Filtering (JAA, KP, DR), pp. 306–313.
CIKMCIKM-2000-BoughanemT #algorithm #optimisation #query #search-based
Query Optimization Using An Improved Genetic Algorithm (MB, LT), pp. 368–373.
CIKMCIKM-2000-Elworthy #database #image #natural language #retrieval
Retrieval from Captioned Image Databases Using Natural Language Processing (DE), pp. 430–437.
CIKMCIKM-2000-MakawitaTL #database
Sampling from Databases Using B+-Trees (DPM, KLT, HL), pp. 158–164.
CIKMCIKM-2000-WuAA #approximate #composition #query
Using Wavelet Decomposition to Support Progressive and Approximate Range-Sum Queries over Data Cubes (YLW, DA, AEA), pp. 414–421.
ICMLICML-2000-CravenPSBG #coordination #learning #multi
Using Multiple Levels of Learning and Diverse Evidence to Uncover Coordinately Controlled Genes (MC, DP, JWS, JB, JDG), pp. 199–206.
ICMLICML-2000-Eskin #detection #probability #semistructured data
Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
ICMLICML-2000-Ghani #classification
Using Error-Correcting Codes for Text Classification (RG), pp. 303–310.
ICMLICML-2000-KatayamaKK #learning
A Universal Generalization for Temporal-Difference Learning Using Haar Basis Functions (SK, HK, SK), pp. 447–454.
ICMLICML-2000-LagoudakisL #algorithm #learning
Algorithm Selection using Reinforcement Learning (MGL, MLL), pp. 511–518.
ICMLICML-2000-LiB #approach #clustering #markov #modelling
A Bayesian Approach to Temporal Data Clustering using Hidden Markov Models (CL, GB), pp. 543–550.
ICMLICML-2000-MorimotoD #behaviour #learning
Acquisition of Stand-up Behavior by a Real Robot using Hierarchical Reinforcement Learning (JM, KD), pp. 623–630.
ICMLICML-2000-Rosenberg #image #statistics
Image Color Constancy Using EM and Cached Statistics (CRR), pp. 799–806.
ICMLICML-2000-ShultzR #comparison #knowledge-based #learning #multi
Using Knowledge to Speed Learning: A Comparison of Knowledge-based Cascade-correlation and Multi-task Learning (TRS, FR), pp. 871–878.
ICMLICML-2000-SohT #image #learning
Using Learning by Discovery to Segment Remotely Sensed Images (LKS, CT), pp. 919–926.
ICMLICML-2000-ThollardDH #automaton #probability
Probabilistic DFA Inference using Kullback-Leibler Divergence and Minimality (FT, PD, CdlH), pp. 975–982.
ICMLICML-2000-WalkerWL #comprehension #fault #identification #natural language
Using Natural Language Processing and discourse Features to Identify Understanding Errors (MAW, JHW, IL), pp. 1111–1118.
ICMLICML-2000-WesterdijkW #classification #modelling #multi
Classification with Multiple Latent Variable Models using Maximum Entropy Discrimination (MW, WW), pp. 1143–1150.
ICMLICML-2000-Zaanen #learning #recursion #syntax
Bootstrapping Syntax and Recursion using Alginment-Based Learning (MvZ), pp. 1063–1070.
ICMLICML-2000-ZelikovitzH #classification #problem
Improving Short-Text Classification using Unlabeled Data for Classification Problems (SZ, HH), pp. 1191–1198.
ICPRICPR-v1-2000-AleixosBMN #assessment #quality #realtime
Assessment of Citrus Fruit Quality Using a Real-Time Machine Vision System (NA, JB, EM, FN), pp. 1482–1485.
ICPRICPR-v1-2000-AnsiaLPM #3d #automation #re-engineering #segmentation
Automatic 3D Shape Reconstruction of Bones Using Active Nets Based Segmentation (FMA, JL, MGP, AMG), pp. 1486–1489.
ICPRICPR-v1-2000-ArlandisPL #distance #recognition
Handwritten Character Recognition using the Continuous Distance Transformation (JA, JCPC, RL), pp. 1940–1943.
ICPRICPR-v1-2000-AyersC #network #recognition #video
Scenario Recognition from Video Using a Hierarchy of Dynamic Belief Networks (DA, RC), pp. 1835–1838.
ICPRICPR-v1-2000-BaldwinB #3d #estimation
3D Estimation using Panoramic Stereo (JB, AB), pp. 1097–1100.
ICPRICPR-v1-2000-Bayro-Corrochano #algebra #invariant
Computing Depth, Shape and Motion Using Invariants and Incidence Algebra (EBC), pp. 1881–1884.
ICPRICPR-v1-2000-BesshoIY #detection
Detecting Human Face and Recognizing Facial Expressions Using Potential Net (HB, YI, MY), pp. 5076–5079.
ICPRICPR-v1-2000-BorsHW #image #modelling
Terrain Modeling in Synthetic Aperture Radar Images Using Shape-from-Shading (AGB, ERH, RCW), pp. 1798–1801.
ICPRICPR-v1-2000-Boufama #synthesis
The Use of Homographies for View Synthesis (BB), pp. 1563–1566.
ICPRICPR-v1-2000-Bourgeois #image #retrieval
Content Based Image Retrieval Using Gradient Color Fields (FLB), pp. 5027–5030.
ICPRICPR-v1-2000-DuffyCL #detection
Object Detection Using Color (ND, JLC, GL), pp. 1700–1703.
ICPRICPR-v1-2000-Farneback #estimation #modelling #parametricity #performance
Fast and Accurate Motion Estimation Using Orientation Tensors and Parametric Motion Models (GF), pp. 1135–1139.
ICPRICPR-v1-2000-Fernandez #similarity
Implicit Model-Oriented Optimal Thresholding Using the Komolgorov-Smirnov Similarity Measure (XF), pp. 1466–1469.
ICPRICPR-v1-2000-GagaudakisRC #database #image #network #visualisation
Using CBIR and Pathfinder Networks for Image Database Visualization (GG, PLR, CC), pp. 5052–5055.
ICPRICPR-v1-2000-HeikkilaSS #estimation #segmentation
Camera Motion Estimation from Non-Stationary Scenes Using EM-Based Motion Segmentation (JH, PS, OS), pp. 1370–1374.
ICPRICPR-v1-2000-HsiehF #image #retrieval
Color Image Retrieval Using Shape and Spatial Properties (ISH, KCF), pp. 5023–5026.
ICPRICPR-v1-2000-HuangH
Road Sign Interpretation Using Matching Pursuit Method (CLH, SHH), pp. 1329–1334.
ICPRICPR-v1-2000-KampkeES #estimation #image #network
Estimation of Superresolution Images Using Causal Networks: The One-Dimensional Case (TK, AE, CS), pp. 1584–1587.
ICPRICPR-v1-2000-KimH00a #self #video
Soccer Video Mosaicing Using Self-Calibration and Line Tracking (HK, KSH), pp. 1592–1595.
ICPRICPR-v1-2000-KrugerHS #network #realtime
Affine Real-Time Face Tracking using Gabor Wavelet Networks (VK, AH, GS), pp. 1127–1130.
ICPRICPR-v1-2000-KumarSR #detection #realtime #recognition
Real Time Detection and Recognition of Human Profiles Using Inexpensive Desktop Cameras (PK, KS, SR), pp. 5096–5099.
ICPRICPR-v1-2000-LhuillierQ #constraints #geometry #robust
Robust Dense Matching Using Local and Global Geometric Constraints (ML, LQ), pp. 1968–1972.
ICPRICPR-v1-2000-LiuB
Uncalibrated Stereo Matching Using DWT (HL, PB), pp. 1114–1118.
ICPRICPR-v1-2000-LiuRC #geometry
Using Geometric Properties of Correspondence Vectors for the Registration of Free-Form Shapes (YL, MAR, DC), pp. 5011–5014.
ICPRICPR-v1-2000-Louchet #analysis #evolution
Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
ICPRICPR-v1-2000-LourakisTAO #3d #constraints #geometry
Using Geometric Constraints for Matching Disparate Stereo Views of 3D Scenes Containing Planes (MIAL, SVT, AAA, SCO), pp. 1419–1422.
ICPRICPR-v1-2000-Mitchell #analysis #documentation #layout #segmentation
Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
ICPRICPR-v1-2000-MossH #markov #monte carlo
Alignment and Correspondence Using Markov Chain Monte Carlo (SM, ERH), pp. 1928–1931.
ICPRICPR-v1-2000-NandyB #3d #recognition
Recovery of 3-D Face Structure Using Recognition (DN, JBA), pp. 5104–5108.
ICPRICPR-v1-2000-NielsenP #adaptation #problem #representation #segmentation
A Solution to the Problem of Segmentation near Edges Using Adaptable Class-Specific Representation (CFN, PJP), pp. 1436–1440.
ICPRICPR-v1-2000-OkutomiS #image
Shape Recovery of Rotating Object Using Weighted Voting of Spatio-Temporal Image (MO, SS), pp. 1790–1793.
ICPRICPR-v1-2000-PalettaPP #analysis #learning #recognition
Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
ICPRICPR-v1-2000-PaquisLK #classification
Road Surface Classification by Thresholding Using Morphological Pyramid (SP, VL, HK), pp. 1334–1337.
ICPRICPR-v1-2000-ParkA #image #interactive #multi #recognition
Recognition of Human Interaction Using Multiple Features in Grayscale Images (SP, JKA), pp. 1051–1054.
ICPRICPR-v1-2000-ParkLL #3d #modelling #re-engineering #recognition
Recognition and Reconstruction of 3-D Objects Using Model-Based Perceptual Grouping (IKP, SUL, KML), pp. 1720–1724.
ICPRICPR-v1-2000-RavyseSCR #composition #detection #process #recognition
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition (IR, HS, JC, MJTR), pp. 5080–5083.
ICPRICPR-v1-2000-SkocajL #image
Range Image Acquisition of Objects with Non-Uniform Albedo Using Structured Light Range Sensor (DS, AL), pp. 1778–1781.
ICPRICPR-v1-2000-SomeyaKHI #3d #locality #segmentation
Localization of Objects in Electric Distribution Systems by Using Segmentation and 3D Template Matching with M-Estimators (YS, KK, KH, KI), pp. 1725–1729.
ICPRICPR-v1-2000-SteinbachGEB #3d #multi #re-engineering
3-D Object Reconstruction Using Spatially Extended Voxels and Multi-Hypothesis Voxel Coloring (EGS, BG, PE, AB), pp. 1774–1777.
ICPRICPR-v1-2000-Weik
A Passive Full Body Scanner Using Shape from Silhouettes (SW), pp. 1750–1753.
ICPRICPR-v1-2000-WeissR
Recognizing Articulated Objects Using Invariance (IW, MR), pp. 1055–1058.
ICPRICPR-v1-2000-WorthingtonH #recognition
Structural Object Recognition Using Shape-from-Shading (PLW, ERH), pp. 1738–1741.
ICPRICPR-v1-2000-XueLT #invariant #performance
Efficient Object Matching Using Affine-Invariant Deformable Contour (ZX, SZL, EKT), pp. 1672–1675.
ICPRICPR-v1-2000-ZhouH #image #representation #retrieval
Image Representation and Retrieval Using Structural Features (XSZ, TSH), pp. 5039–5042.
ICPRICPR-v2-2000-AlexandreCK #classification #independence
Combining Independent and Unbiased Classifiers Using Weighted Average (LAA, ACC, MSK), pp. 2495–2498.
ICPRICPR-v2-2000-AokiK #image
An Image Storage System Using Complex-Valued Associative Memories (HA, YK), pp. 2626–2629.
ICPRICPR-v2-2000-BaggenstossN #classification #probability
A Theoretically Optimal Probabilistic Classifier Using Class-Specific Features (PMB, HN), pp. 2763–2768.
ICPRICPR-v2-2000-BajaS #3d #distance #editing #image
Editing 3D Binary Images Using Distance Transforms (GSdB, SS), pp. 6030–6033.
ICPRICPR-v2-2000-BartoliPSZ #graph #morphism
Attributed Tree Homomorphism Using Association Graphs (MB, MP, KS, SWZ), pp. 2133–2136.
ICPRICPR-v2-2000-BauerHK #recognition #statistics
Video-Based Continuous Sign Language Recognition Using Statistical Methods (BB, HH, KFK), pp. 2463–2466.
ICPRICPR-v2-2000-Bax #validation
Using Validation by Inference to Select a Hypothesis Function (EB), pp. 2700–2703.
ICPRICPR-v2-2000-Berthilsson #recognition
Character Recognition Using Shape for Curves (RB), pp. 2227–2230.
ICPRICPR-v2-2000-BhattacharyaDPCLR #adaptation #image
Shape Extraction of Volumetric Images of Filamentous Bacteria Using Topology Adaptive Self Organization (UB, AD, SKP, BBC, VL, KR), pp. 2291–2294.
ICPRICPR-v2-2000-BovisS #detection
Detection of Masses in Mammograms Using Texture Features (KB, SS), pp. 2267–2270.
ICPRICPR-v2-2000-BradleyRF #clustering #database #modelling #scalability
Clustering Very Large Databases Using EM Mixture Models (PSB, CR, UMF), pp. 2076–2080.
ICPRICPR-v2-2000-ChazalR #classification #comparison
A Comparison of the Use of Different Wavelet Coefficients for the Classification of the Electrocardiogram (PdC, RBR), pp. 2255–2258.
ICPRICPR-v2-2000-ChenSWS #estimation
Head Pose Estimation Using both Color and Feature Information (QC, TS, HW, TS), pp. 2842–2841.
ICPRICPR-v2-2000-ChenW #analysis #segmentation #string
Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
ICPRICPR-v2-2000-CorreiaC #optimisation #recognition
Optimizing the Recognition Rates of Unconstrained Handwritten Numerals Using Biorthogonal Spline Wavelets (SENC, JMdC), pp. 2251–2254.
ICPRICPR-v2-2000-DahmenKGN #image #invariant #recognition
Invariant Image Object Recognition Using Mixture Densities (JD, DK, MOG, HN), pp. 2614–2617.
ICPRICPR-v2-2000-DehghanFAS #fuzzy #markov #modelling #recognition #word
Off-Line Unconstrained Farsi Handwritten Word Recognition Using Fuzzy Vector Quantization and Hidden Markov Word Models (MD, KF, MA, MS), pp. 2351–2354.
ICPRICPR-v2-2000-Fursov #pattern matching #pattern recognition #recognition
Training in Pattern Recognition from a Small Number of Observations Using Projections onto Null-Space (VAF), pp. 2785–2788.
ICPRICPR-v2-2000-GuillaudBRBT #detection #multi
Continuity Perception Using a Multiagent System: An Application to Growth Ring Detection on Fish Otoliths (AG, AB, VR, JLB, HT), pp. 2519–2522.
ICPRICPR-v2-2000-GuoDR #detection
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
ICPRICPR-v2-2000-HolzL #set #validation
Validation of Relative Feature Importance Using a Natural Data Set (HJH, MHL), pp. 2414–2417.
ICPRICPR-v2-2000-HuangY #verification
Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
ICPRICPR-v2-2000-JainJV #experience #network
Short-Term Water Demand Forecasting Using Artificial Neural Networks: IIT Kanpur Experience (AJ, UCJ, AKV), pp. 2459–2462.
ICPRICPR-v2-2000-JuanV #classification #edit distance #normalisation #on the #performance #string
On the Use of Normalized Edit Distances and an Efficient k-NN Search Technique (k-AESA) for Fast and Accurate String Classification (AJ, EV), pp. 2676–2679.
ICPRICPR-v2-2000-KanekoGF #3d #recognition
Abdominal Organ Recognition Using 3D Mathematical Morphology (TK, LG, HF), pp. 2263–2266.
ICPRICPR-v2-2000-KatoOA #modelling #precise #recognition
Precise Hand-printed Character Recognition Using Elastic Models via Nonlinear Transformation (TK, SO, HA), pp. 2364–2367.
ICPRICPR-v2-2000-KavallieratouSFK #learning #segmentation
Handwritten Character Segmentation Using Transformation-Based Learning (EK, ES, NF, GKK), pp. 2634–2637.
ICPRICPR-v2-2000-LaiCF #canonical #correlation
Power Load Forecasting Using Neural Canonical Correlates (PLL, SJC, CF), pp. 2455–2458.
ICPRICPR-v2-2000-LaoKST #3d #invariant #recognition
3D Template Matching for Pose Invariant Face Recognition Using 3D Facial Model Built with Isoluminance Line Based Stereo Vision (SL, MK, YS, FT), pp. 2911–2916.
ICPRICPR-v2-2000-LinF #detection #geometry
Human Face Detection Using Geometric Triangle Relationship (CL, KCF), pp. 2941–2944.
ICPRICPR-v2-2000-LuoH #algorithm #composition #graph
Symbolic Graph Matching Using the EM Algorithm and Singular Value Decomposition (BL, ERH), pp. 2141–2144.
ICPRICPR-v2-2000-MacLeanT #image #pattern matching #pattern recognition #performance #recognition
Fast Pattern Recognition Using Gradient-Descent Search in an Image Pyramid (WJM, JKT), pp. 2873–2877.
ICPRICPR-v2-2000-Martinez-HinarejosJC #classification #string
Use of Median String for Classification (CDMH, AJ, FC), pp. 2903–2906.
ICPRICPR-v2-2000-MenardDC #ambiguity #analysis #distance #modelling
Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
ICPRICPR-v2-2000-MitaniH #classification #design #nearest neighbour
Classifier Design Based on the Use of Nearest Neighbor Samples (YM, YH), pp. 2769–2772.
ICPRICPR-v2-2000-MiyamotoHM #classification #design #polynomial
Use of Bootstrap Samples in Quadratic Classifier Design (TM, YH, YM), pp. 2789–2792.
ICPRICPR-v2-2000-NgB #classification #segmentation
Supervised Texture Segmentation using DWT and a Modified K-NN Classifier (BWN, AB), pp. 2545–2548.
ICPRICPR-v2-2000-PavlovMD #algorithm
Scaling-Up Support Vector Machines Using Boosting Algorithm (DP, JM, BD), pp. 2219–2222.
ICPRICPR-v2-2000-PerantonisPV #analysis #classification #component #paradigm
Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
ICPRICPR-v2-2000-Ruiz-PinalesL #network #recognition
Cursive Handwriting Recognition Using the Hough Transform and a Neural Network (JRP, EL), pp. 2231–2234.
ICPRICPR-v2-2000-Scheunders #image #multi
Multispectral Image Fusion Using Local Mapping Techniques (PS), pp. 2311–2314.
ICPRICPR-v2-2000-TanY #convergence #distance #recognition
Object Recognition Using Fractal Neighbor Distance: Eventual Convergence and Recognition Rates (TT, HY), pp. 2781–2784.
ICPRICPR-v2-2000-ValvenyM #documentation #framework #recognition
Hand-Drawn Symbol Recognition in Graphic Documents Using Deformable Template Matching and a Bayesian Framework (EV, EM), pp. 2239–2242.
ICPRICPR-v2-2000-VillelaA #network #recognition
Object Recognition by Indexing Using Neural Networks (PRV, JHSA), pp. 6001–6004.
ICPRICPR-v3-2000-AcharyyaK #segmentation
Two Texture Segmentation Using M-Band Wavelet Transform (MA, MKK), pp. 3405–3408.
ICPRICPR-v3-2000-BadenasSP #integration #monitoring #sequence
Using Temporal Integration for Tracking Regions in Traffic Monitoring Sequences (JB, JMS, FP), pp. 7137–7140.
ICPRICPR-v3-2000-BaumelaARB #difference #equation #estimation
Motion Estimation Using the Differential Epipolar Equation (LB, LdA, IDR, PB), pp. 3848–3851.
ICPRICPR-v3-2000-CarreiraMTH
Grouping of Directional Features Using an Extended Hough Transform (MJC, MM, BTT, JFH), pp. 7002–7005.
ICPRICPR-v3-2000-ChantlerM #classification #invariant #on the
On the Use of Gradient Space Eigenvalues for Rotation Invariant Texture Classification (MJC, GM), pp. 3943–3946.
ICPRICPR-v3-2000-ChenHD #composition
Circle Location from Intensity and Range Data Using the Singular Value Decomposition (NsC, GH, SD), pp. 3782–3785.
ICPRICPR-v3-2000-ChoKN #image #interface #performance
An Efficient Walkthrough from Two Images Using View Morphing and Spidery Mesh Interface (HSC, CHK, SN), pp. 3143–3146.
ICPRICPR-v3-2000-ChoPP #image #segmentation
Segmentation of Color Image Using Deterministic Annealing EM (WHC, SYP, JP), pp. 3646–3649.
ICPRICPR-v3-2000-DeMenthonDS #distance #image #markov #modelling
Image Distance Using Hidden Markov Models (DD, DSD, MVS), pp. 3147–3150.
ICPRICPR-v3-2000-DemireklerKC
Fusing Length and Voicing Information, and HMM Decision Using a Bayesian Causal Tree against Insufficient Training Data (MD, FK, ), pp. 3106–3109.
ICPRICPR-v3-2000-FaruquieMRS #modelling #recognition #scalability #speech
Large Vocabulary Audio-Visual Speech Recognition Using Active Shape Models (TAF, AM, NR, LVS), pp. 3110–3113.
ICPRICPR-v3-2000-FrankeKN #fuzzy #image
Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms (KF, MK, BN), pp. 3518–3521.
ICPRICPR-v3-2000-FukuiIIW #analysis #component
Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
ICPRICPR-v3-2000-GalambosKM #probability
Using Gradient Information to Enhance the Progressive Probabilistic Hough Transform (CG, JK, JM), pp. 3564–3567.
ICPRICPR-v3-2000-GalleaniC
Dynamics Using the Wigner Distribution (LG, LC), pp. 3254–3257.
ICPRICPR-v3-2000-GatosM #algorithm #novel #recursion
A Novel Recursive Algorithm for Area Location Using Isothetic Polygons (BG, SLM), pp. 3496–3499.
ICPRICPR-v3-2000-GreenbergAKD #image
Fingerprint Image Enhancement Using Filtering Techniques (SG, MA, DK, ID), pp. 3326–3329.
ICPRICPR-v3-2000-GrigorescuPK #case study #comparative #distance
A Comparative Study of Filter Based Texture Operators Using Mahalanobis Distance (SEG, NP, PK), pp. 3897–3900.
ICPRICPR-v3-2000-HangaiYH #verification
Writer Verification Using Altitude and Direction of Pen Movement (SH, SY, TH), pp. 3483–3486.
ICPRICPR-v3-2000-HarukiH
Data Fitting by Spline Functions Using the Biorthonormal Basis of the B-spline Basis (RH, TH), pp. 3274–3277.
ICPRICPR-v3-2000-Ichimura #feature model #segmentation
Motion Segmentation Using Feature Selection and Subspace Method Based on Shape Space (NI), pp. 3858–3864.
ICPRICPR-v3-2000-Jehan-BessonBA #detection #set
Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
ICPRICPR-v3-2000-JeonY #adaptation #image
Image Restoration Using Dual Adaptive Regularization Operators (WJ, TY), pp. 3049–3052.
ICPRICPR-v3-2000-JohanssonKG #detection #normalisation #symmetry
Detecting Rotational Symmetries Using Normalized Convolution (BJ, HK, GHG), pp. 3500–3504.
ICPRICPR-v3-2000-KeglK #linear
Piecewise Linear Skeletonization Using Principal Curves (BK, AK), pp. 3135–3138.
ICPRICPR-v3-2000-Kiema #automation #classification #data fusion
Wavelet Compression and Data Fusion: An Investigation into the Automatic Classification of Urban Environments using Color Photography and Laser Scanning Data (JBKK), pp. 3089–3093.
ICPRICPR-v3-2000-KimC #image #network #segmentation #sequence
Segmentation of Image Sequences Using SOFM Networks (JK, TC), pp. 3877–3880.
ICPRICPR-v3-2000-KimCL #detection #feature model #performance
Fast Scene Change Detection Using Direct Feature Extraction from MPEG Compressed Videos (YMK, SWC, SWL), pp. 3178–3181.
ICPRICPR-v3-2000-KobayakwaHO #correlation #image #retrieval #robust
Robust Texture Image Retrieval Using Hierarchical Correlations of Wavelet Coefficients (MK, MH, TO), pp. 3395–3400.
ICPRICPR-v3-2000-KwanCG #approach #automation #bound
Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
ICPRICPR-v3-2000-LiapisST #algorithm #performance #segmentation
Color and/or Texture Segmentation Using Deterministic Relaxation and Fast Marching Algorithms (SL, ES, GT), pp. 3621–3624.
ICPRICPR-v3-2000-LiuL #clustering #image
Wavelet Image Coding Using Cluster Growing Embedding (YL, YDL), pp. 3250–3253.
ICPRICPR-v3-2000-LloretSLSV #image
Retinal Image Registration Using Creases as Anatomical Landmarks (DL, JS, AML, AS, JJV), pp. 3207–3210.
ICPRICPR-v3-2000-LuceySC #linear #performance
Initialized Eigenlip Estimator for Fast Lip Tracking Using Linear Regression (SL, SS, VC), pp. 3182–3185.
ICPRICPR-v3-2000-LuoT #approach #multi
Multi-Level Thresholding: Maximum Entropy Approach Using ICM (XL, JT), pp. 3786–3789.
ICPRICPR-v3-2000-MaedaINTS #algorithm #fuzzy #image #segmentation
Rough and Accurate Segmentation of Natural Color Images Using Fuzzy Region-Growing Algorithm (JM, CI, SN, NT, YS), pp. 3642–3645.
ICPRICPR-v3-2000-MiyagawaFA #modelling
Texture Modeling by Optimal Gray Scale Structuring Elements Using Morphological Pattern Spectrum (MM, MF, AA), pp. 3479–3482.
ICPRICPR-v3-2000-MullerH #image #invariant #on the
On the Use of SDF-Type Filters for Distortion Invariant Image Location (NM, BMH), pp. 3530–3533.
ICPRICPR-v3-2000-Nakano
Classifying the Motions of Human Body by Using Gabor Wavelets (HN), pp. 3691–3694.
ICPRICPR-v3-2000-NaphadeH #framework #probability #semantics #video
Semantic Video Indexing Using a Probabilistic Framework (MRN, TSH), pp. 3083–3088.
ICPRICPR-v3-2000-NikolovBCHW #2d #image #multi
Fusion of 2-D Images Using Their Multiscale Edges (SGN, DRB, CNC, MH, PNTW), pp. 3045–3048.
ICPRICPR-v3-2000-NodaK #adaptation #identification #probability
Adaptive Speaker Identification Using Sequential Probability Ratio Test (HN, EK), pp. 3266–3269.
ICPRICPR-v3-2000-OkataniD00a #estimation
Estimation of Illumination Distribution Using a Specular Sphere (TO, KD), pp. 3596–3599.
ICPRICPR-v3-2000-OrriolsTBRVV #approach #detection #modelling #probability
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
ICPRICPR-v3-2000-OrWLL #modelling #segmentation #video
Panoramic Video Segmentation Using Color Mixture Models (SHO, KhW, KsL, TkL), pp. 3391–3394.
ICPRICPR-v3-2000-Papamarkos #network #reduction
Using Local Features in a Neural Network Based Gray-Level Reduction Technique (NP), pp. 7037–7040.
ICPRICPR-v3-2000-PorterMT #correlation #detection #video
Video Cut Detection using Frequency Domain Correlation (SVP, MM, BTT), pp. 3413–3416.
ICPRICPR-v3-2000-RubertoDKJ #image #segmentation
Segmentation of Blood Images Using Morphological Operators (CDR, AGD, SK, BJ), pp. 3401–3404.
ICPRICPR-v3-2000-RubertoDKJ00a #automation #image
Automatic Thresholding of Infected Blood Images Using Granulometry and Regional Extrema (CDR, AGD, SK, BJ), pp. 3445–3448.
ICPRICPR-v3-2000-SanchisVJ #performance #recognition #speech #verification #word
Efficient Use of the Grammar Scale Factor to Classify Incorrect Words in Speech Recognition Verification (AS, EV, VMJ), pp. 3278–3281.
ICPRICPR-v3-2000-SekimotoNTO #query #retrieval #video
Continuous Retrieval of Video Using Segmentation-Free Query (NS, TN, HT, RO), pp. 3375–3378.
ICPRICPR-v3-2000-ShojiMT #2d #estimation
Pose Estimation of a 2-D Articulated Object from Its Silhouette Using a GA (KS, AM, FT), pp. 3717–3721.
ICPRICPR-v3-2000-VincentCF #3d #segmentation #tool support
Spatio-Temporal Segmentation Using 3D Morphological Tools (VA, CR, FH), pp. 3885–3892.
ICPRICPR-v3-2000-WilkinsonRDB #analysis
Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
ICPRICPR-v3-2000-WinkNV #heuristic
Minimum Cost Path Determination Using a Simple Heuristic Function (OW, WJN, MAV), pp. 7010–7013.
ICPRICPR-v3-2000-YamanaSA #detection #image #reliability
Edge Plane Detection in Spatio-Temporal Images by Using Edge Vector and Edge Reliability (FY, TS, KA), pp. 3664–3667.
ICPRICPR-v3-2000-YamazawaYY #3d #re-engineering
3D Line Segment Reconstruction by Using HyperOmni Vision and Omnidirectional Hough Transforming (KY, YY, MY), pp. 3487–3490.
ICPRICPR-v3-2000-ZhaMH #data type #multi
Dynamic Control of Mesh LODs (Levels of Detail) by Using a Multiresolution Mesh Data Structure (HZ, YM, TH), pp. 3505–3509.
ICPRICPR-v3-2000-ZhangGST #adaptation #analysis #modelling
Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
ICPRICPR-v3-2000-ZhangWZ
Simultaneously Recovering Affine Motion and Defocus Blur Using Moments (YZ, CW, YZ), pp. 3881–3884.
ICPRICPR-v4-2000-AdamRS #locality #modelling #navigation
Using Model-Based Localization with Active Navigation (AA, ER, IS), pp. 4676–4680.
ICPRICPR-v4-2000-AlbiolNM #people #realtime #tool support
Real-Time High Density People Counter Using Morphological Tools (AA, VN, IM), pp. 4652–4655.
ICPRICPR-v4-2000-BareaBMLB #network
E.O.G. Guidance of a Wheelchair Using Neural Networks (RB, LB, MM, ELG, LMB), pp. 4668–4671.
ICPRICPR-v4-2000-BodnarovaBL #detection
Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
ICPRICPR-v4-2000-Egmont-PetersenFNHBVR #image #multi #network #segmentation
Segmentation of Bone Tumor in MR Perfusion Images Using Neural Networks and Multiscale Pharmacokinetic Features (MEP, AFF, WJN, PCWH, JLB, MAV, JHCR), pp. 4080–4083.
ICPRICPR-v4-2000-FabletB #statistics
Statistical Motion-Based Object Indexing Using Optic Flow Field (RF, PB), pp. 4287–4290.
ICPRICPR-v4-2000-FolkersSS #multi #query
Processing Pictorial Queries with Multiple Instances Using Isomorphic Subgraphs (AF, HS, AS), pp. 4051–4054.
ICPRICPR-v4-2000-Ishii #3d #metric
3-D Shape Measurement Using a Focused-Section Method (AI), pp. 4828–4832.
ICPRICPR-v4-2000-JabriDWR #adaptation #detection #image #people #video
Detection and Location of People in Video Images Using Adaptive Fusion of Color and Edge Information (SJ, ZD, HW, AR), pp. 4627–4631.
ICPRICPR-v4-2000-JoganL #locality #recognition #robust
Robust Localization Using Panoramic View-Based Recognition (MJ, AL), pp. 4136–4139.
ICPRICPR-v4-2000-KhorsheedC #multi #recognition #word
Multi-Font Arabic Word Recognition Using Spectral Features (MSK, WFC), pp. 4543–4546.
ICPRICPR-v4-2000-KimYL
A Control Model for Vergence Movement on a Stereo Robotic Head Using Disparity Flux (HJK, MHY, SWL), pp. 4491–4494.
ICPRICPR-v4-2000-KoLB #feature model #image #performance #retrieval
Region-Based Image Retrieval System Using Efficient Feature Description (BK, HSL, HB), pp. 4283–4286.
ICPRICPR-v4-2000-Leavers #analysis
Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
ICPRICPR-v4-2000-MadabhushiA #process
Using Head Movement to Recognize Activity (AM, JKA), pp. 4698–4701.
ICPRICPR-v4-2000-MaderlechnerSS #documentation #image #metric #visual notation
Extraction of Relevant Information from Document Images Using Measures of Visual Attention (GM, AS, PS), pp. 4385–4388.
ICPRICPR-v4-2000-MaeUAI #modelling #recognition
Object Recognition using Appearance Models Accumulated into Environment (YM, TU, TA, KI), pp. 4845–4848.
ICPRICPR-v4-2000-MamicB #automation #detection
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
ICPRICPR-v4-2000-MataNS #detection #multi
Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
ICPRICPR-v4-2000-OhishiKM #online #verification
On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
ICPRICPR-v4-2000-OmachiIA #image #multi
Structure Extraction from Various Kinds of Decorated Characters Using Multi-Scale Images (SO, MI, HA), pp. 4455–4458.
ICPRICPR-v4-2000-OnishiIF00a #image #segmentation #video
Blackboard Segmentation Using Video Image of Lecture and Its Applications (MO, MI, KF), pp. 4615–4618.
ICPRICPR-v4-2000-RohKL #modelling #multi #people
Multiple People Tracking Using an Appearance Model Based on Temporal Color (HKR, SK, SWL), pp. 4643–4646.
ICPRICPR-v4-2000-SanchezM00a #behaviour #programming #visual notation
Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
ICPRICPR-v4-2000-ShimamuraTYY #image #modelling
Construction and Presentation of a Virtual Environment Using Panoramic Stereo Images of a Real Scene and Computer Graphics Models (JS, HT, NY, KY), pp. 4463–4467.
ICPRICPR-v4-2000-ShiranitaHOT #image #metric #sketching
Shape Measurement and Sketching Systems for Porcelain Using Image Technology (KS, KH, AO, RT), pp. 4795–4798.
ICPRICPR-v4-2000-StofflerBF #realtime
Real-Time Obstacle Avoidance Using an MPEG-Processor-Based Optic Flow Sensor (NOS, TB, GF), pp. 4161–4166.
ICPRICPR-v4-2000-SziranyiC #optimisation #parallel #segmentation
Spatio-Temporal Segmentation with Edge Relaxation and Optimization Using Fully Parallel Methods (TS, LC), pp. 4820–4823.
ICPRICPR-v4-2000-TakahashiKIS #image
Expanding Possible View Points of Virtual Environment Using Panoramic Images (TT, HK, KI, MS), pp. 4468–4472.
ICPRICPR-v4-2000-TakahashiSO #3d #estimation #image #realtime
Remarks on a Real-Time 3D Human Body Posture Estimation Method Using Trinocular Images (KT, TS, JO), pp. 4693–4697.
ICPRICPR-v4-2000-UtsumiYO #adaptation #multi
Adaptive Human Motion Tracking Using Non-Synchronous Multiple Viewpoint Observations (AU, HY, JO), pp. 4607–4610.
ICPRICPR-v4-2000-VinczeAZ #integration #performance
Fast Tracking of Ellipses Using Edge-Projected Integration of Cues (MV, MA, MZ), pp. 4072–4075.
ICPRICPR-v4-2000-WakaharaK #correlation #invariant #recognition
Affine-Invariant Gray-Scale Character Recognition Using GAT Correlation (TW, YK), pp. 4417–4421.
ICPRICPR-v4-2000-WolfKBJ #image #retrieval
Content Based Image Retrieval Using Interest Points and Texture Features (CW, WGK, HB, JMJ), pp. 4234–4237.
ICPRICPR-v4-2000-YamaguchiTYY #generative #image #realtime #sequence
Real-Time Generation and Presentation of View-Dependent Binocular Stereo Images Using a Sequence of Omnidirectional Images (KY, HT, KY, NY), pp. 4589–4593.
ICPRICPR-v4-2000-YamanyF #3d #recognition
3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
KDDKDD-2000-BarbaraC #clustering #dataset
Using the fractal dimension to cluster datasets (DB, PC), pp. 260–264.
KDDKDD-2000-Buchanan #information management #source code
Informed knowledge discovery: using prior knowledge in discovery programs (BGB), p. 3.
KDDKDD-2000-CadezHMSW #clustering #modelling #navigation #visualisation #web
Visualization of navigation patterns on a Web site using model-based clustering (IVC, DH, CM, PS, SW), pp. 280–284.
KDDKDD-2000-IyengarAZ #adaptation #learning
Active learning using adaptive resampling (VSI, CA, TZ), pp. 91–98.
KDDKDD-2000-KingKCD #data mining #functional #mining #predict #sequence
Genome scale prediction of protein functional class from sequence using data mining (RDK, AK, AC, LD), pp. 384–389.
KDDKDD-2000-MaLWYL #data mining #mining #student
Targeting the right students using data mining (YM, BL, CKW, PSY, SML), pp. 457–464.
KDDKDD-2000-PavlovCS #scalability #towards
Towards scalable support vector machines using squashing (DP, DC, PS), pp. 295–299.
KDDKDD-2000-RaghavanBS #detection #predict #process
Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
KDDKDD-2000-YamanishiTWM #algorithm #detection #finite #learning #online
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms (KY, JiT, GJW, PM), pp. 320–324.
KRKR-2000-BaaderKM #concept
Rewriting Concepts Using Terminologies (FB, RK, RM), pp. 297–308.
KRKR-2000-BaralMS #problem
Formulating diagnostic problem solving using an action language with narratives and sensing (CB, SAM, TCS), pp. 311–322.
KRKR-2000-MartinG #concept #learning #policy
Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
KRKR-2000-VerberneHT #approximate #constraints #reasoning
Anytime Diagnostic Reasoning using Approximate Boolean Constraint Propagation (AV, FvH, AtT), pp. 323–332.
KRKR-2000-Voronkov
Deciding K using inverse-K (AV), pp. 198–209.
SIGIRSIGIR-2000-HoashiMIH #documentation
Document filtering method using non-relevant information profile (KH, KM, NI, KH), pp. 176–183.
SIGIRSIGIR-2000-HoenkamG #proximity
Finding relevant passages using noun-noun compounds: coherence vs. proximity (EH, RdG), pp. 385–387.
SIGIRSIGIR-2000-ManevitzY #classification #documentation #network
Document classification on neural networks using only positive examples (LMM, MY), pp. 304–306.
SIGIRSIGIR-2000-NaritaO #information retrieval #query
The use of phrases from query texts in information retrieval (MN, YO), pp. 318–320.
SIGIRSIGIR-2000-OhML #categorisation #hypermedia #incremental
A practical hypertext categorization method using links and incrementally available class information (HJO, SHM, MHL), pp. 264–271.
SIGIRSIGIR-2000-Ounis #image #ranking
Ranking digital images using combination if evidences (IO), pp. 348–350.
SIGIRSIGIR-2000-SlonimT #clustering #documentation #word
Document clustering using word clusters via the information bottleneck method (NS, NT), pp. 208–215.
UMLUML-2000-AbdurazikO #collaboration #diagrams #generative #static analysis #testing #uml
Using UML Collaboration Diagrams for Static Checking and Test Generation (AA, AJO), pp. 383–395.
ECOOPECOOP-2000-Cochinwala #communication #generative
Using Objects for Next Generation Communication Services (MC), pp. 388–393.
OOPSLAOOPSLA-2000-MaessenAS #java #memory management
Improving the Java memory model using CRF (JWM, A, XS), pp. 1–12.
TOOLSTOOLS-ASIA-2000-LiCC00a #component #e-commerce
Developing an E-Commerce Application by Using Content Component Model (QL, PC, JC), pp. 275–284.
TOOLSTOOLS-ASIA-2000-LinaLX #java
An Agent-Based Load Balancing Mechanism: PLRM Using Java (LL, LL, YX), pp. 176–181.
TOOLSTOOLS-ASIA-2000-NewmarchSM #enterprise #web
Using the Web and Jini to link Vending Machines and Enterprise Systems (JN, KS, CM), pp. 260–264.
TOOLSTOOLS-ASIA-2000-Wang #automation #flexibility #object-oriented
Using Object-Orientation in Developing a Flexible Automatic Test System (LW), pp. 65–72.
TOOLSTOOLS-ASIA-2000-ZhangW #design pattern #implementation #object-oriented #undo
Implementing Undo/Redo in PDF Studio Using Object-Oriented Design Pattern (MZ, KW), pp. 58–64.
TOOLSTOOLS-ASIA-2000-ZhouC #design #multi #repository
Design Consideration Using the Multimedia Object Repository (BZ, GC), pp. 81–87.
TOOLSTOOLS-EUROPE-2000-DammHTT #case study #component #experience #integration #tool support #xmi
Tool Integration: Experiences and Issues in Using XMI and Component Technology (CHD, KMH, MT, MT), pp. 94–107.
TOOLSTOOLS-EUROPE-2000-DuvalP #design pattern #interactive #kernel #object-oriented
Using the PAC-Amodeus Model and Design Patterns to Make Interactive an Existing Object-Oriented Kernel (TD, FP), pp. 407–418.
TOOLSTOOLS-PACIFIC-2000-BornHK #design #development #distributed #uml
A Method for the Design and Development of Distributed Applications Using UML (MB, EH, OK), pp. 253–265.
TOOLSTOOLS-USA-2000-BirngruberH #set #specification
Using Plans for Specifying Preconfigured Bean Sets (DB, MH), pp. 217–226.
TOOLSTOOLS-USA-2000-Langer00a #c++ #implementation
Using C++ Templates for Implementation of Patterns (AL), pp. 485–486.
TOOLSTOOLS-USA-2000-McDavid #framework #semantics
A Framework for Discovering, Organizing, and Using Business Semantics (DM), pp. 549–554.
TOOLSTOOLS-USA-2000-PulvermullerSR #aspect-oriented #design #implementation #programming
Implementing Collaboration-Based Designs Using Aspect-Oriented Programming (EP, AS, AR), pp. 95–104.
AdaEuropeAdaEurope-2000-CloshenH #ada #implementation #programming
An Ada95 Programming Style Checker Using the GNAT ASIS Implementation (PC, HJH), pp. 149–160.
AdaEuropeAdaEurope-2000-FlintD #ada #api #compilation #java
Using JavaTM APIs with Native Ada Compilers (SF, BD), pp. 41–55.
AdaEuropeAdaEurope-2000-HovaterMB #design #documentation #generative #interface
Generation of Interface Design Description Documents Using ASIS (SVH, WM, AB), pp. 138–148.
AdaEuropeAdaEurope-2000-MauriS #analysis #embedded #reliability #safety
Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
AdaEuropeAdaEurope-2000-SoundarajanF #exception #object-oriented #reasoning
Exceptions in OO Languages: Using Them and Reasoning about Them (NS, SF), pp. 238–251.
PADLPADL-2000-MarinoM #functional #logic programming #source code #static analysis
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), pp. 63–80.
PEPMPEPM-2000-GallagherP #approximate
Using Regular Approximations for Generalisation During Partial Evalution (JPG, JCP), pp. 44–51.
PLDIPLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-FahndrichRD #analysis #constraints #scalability
Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
PLDIPLDI-2000-HeydonLY #dependence #precise
Caching function calls using precise dependencies (AH, RL, YY), pp. 311–320.
PLDIPLDI-2000-WilkenLH #integer #programming #scheduling
Optimal instruction scheduling using integer programming (KDW, JL, MH), pp. 121–133.
PPDPPPDP-2000-KollerM #abstract interpretation #component #morphism #performance
Efficient abstract interpretation using component-wise homomorphisms (JK, MM), pp. 226–234.
PPDPPPDP-2000-RoychoudhuryRR #proving
Justifying proofs using memo tables (AR, CRR, IVR), pp. 178–189.
REICRE-2000-BaumBGM #component #design #requirements #reuse
Mapping Requirements to Reusable Components Using Design Spaces (LB, MB, LG, GM), pp. 159–167.
REICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
ASEASE-2000-FahmyH #architecture #graph grammar
Using Graph Rewriting to Specify Software Architectural Transformations (HF, RCH), pp. 187–196.
ASEASE-2000-LiuR #automation #security
Automated Security Checking and Patching Using TestTalk (CL, DJR), pp. 261–264.
ASEASE-2000-Monroy #abduction #recursion
The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures (RM), pp. 91–100.
ASEASE-2000-WiseCLMOS #coordination #re-engineering
Using Little-JIL to Coordinate Agents in Software Engineering (AEW, AGC, BSL, EKM, LJO, SMSJ), pp. 155–164.
FSEFSE-2000-HollingsworthBW #case study #experience
Experience report: using RESOLVE/C++ for commercial software (JEH, LB, BWW), pp. 11–19.
ICSEICSE-2000-BasiliLSR
Improving software inspections by using reading techniques (VRB, OL, FS, IR), p. 836.
ICSEICSE-2000-KautzHT #enterprise #process
Applying and adjusting a software process improvement model in practice: the use of the IDEAL model in a small software enterprise (KK, HWH, KT), pp. 626–633.
ICSEICSE-2000-KazmanK #architecture #design
Designing and analyzing software architectures using ABASs (RK, MK), p. 820.
ICSEICSE-2000-LippertL #aspect-oriented #case study #detection #exception #programming
A study on exception detecton and handling using aspect-oriented programming (ML, CVL), pp. 418–427.
ICSEICSE-2000-LopesK #aspectj #composition #design #source code
Improving design and source code modularity using AspectJ (CVL, GK), p. 825.
ICSEICSE-2000-Michail #data mining #library #mining #reuse
Data mining library reuse patterns using generalized association rules (AM), pp. 167–176.
ICSEICSE-2000-Moore #education #lessons learnt #re-engineering #tool support
Lessons learned from teaching reflective software engineering using the Leap toolkit (CAM), pp. 672–675.
ICSEICSE-2000-NordPS #architecture
Planning realistic schedules using software architecture (RLN, DJP, DS), p. 824.
ICSEICSE-2000-Pisan #specification
Extending requirement specifications using analogy (YP), pp. 70–76.
ICSEICSE-2000-Rausch #component #contract #evolution #requirements
Software evolution in componentware using requirements/assurances contracts (AR), pp. 147–156.
ICSEICSE-2000-TakahashiEFG #development
System development using application services over the Net (KT, WE, AF, SG), p. 830.
SACSAC-2000-AlhamedL #analysis #approach #clustering #multi
A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
SACSAC-2000-BonfigliCS #adaptation #hypermedia #xml
Adaptive Intelligent Hypermedia using XML (MEB, GC, PS), pp. 922–926.
SACSAC-2000-BougeMNP #architecture #case study #distributed #parallel #runtime #thread
Using the VI Architecture to Build Distributed, Multithreaded Runtime Systems: A Case Study (LB, JFM, RN, LP), pp. 704–709.
SACSAC-2000-BoujarwahSA #analysis #data flow #java #source code #testing
Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
SACSAC-2000-ByunL #classification
Form Classification Using DP Matching (YB, YL), pp. 1–4.
SACSAC-2000-FeekinC #detection #sorting
Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
SACSAC-2000-HaratyF #distributed #optimisation #query
Distributed Query Optimization Using PERF Joins (RAH, RCF), pp. 284–288.
SACSAC-2000-JurisicaG #image #reasoning
Extending Case-Based Reasoning by Discovering and Using Image Features in IVF (IJ, JIG), pp. 52–59.
SACSAC-2000-Khalili #assembly
Using Pads Instead of Fiducial Marks in Vision Assisted Assembly of PCB’s (KK), pp. 5–9.
SACSAC-2000-KirnerM #artificial reality #development #visualisation
Development of an Information Visualization Tool Using Virtual Reality (TGK, VFMS), pp. 604–606.
SACSAC-2000-KoLB #flexibility #image #retrieval
Image Retrieval Using Flexible Image Subblocks (BK, HSL, HB), pp. 574–578.
SACSAC-2000-LeeKHL #dependence #graph #scheduling
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization (HL, JK, SJH, SL), pp. 641–648.
SACSAC-2000-OchKO #data flow #semistructured data
Integrating Heterogeneous Data Sources Using the COIL Mediator Definition Language (CO, RK, RO), pp. 991–1000.
SACSAC-2000-Reich #algorithm #difference #equation #simulation
Simulation of Imprecise Ordinary Differential Equations Using Evolutionary Algorithms (CR), pp. 428–432.
SACSAC-2000-RudraG #adaptation #clustering #problem
Adaptive Use of a Cluster of PCs for Data Warehousing Applications: Some Problems and Issues (AR, RPG), pp. 698–703.
SACSAC-2000-SchreckC #implementation
R-Tree Implementation Using Branch-Grafting Method (TS, ZC), pp. 328–332.
SACSAC-2000-Tellioglu #architecture #web
Cooperative Planning: Using the Web for Cooperation in Architectural Planning (HT), pp. 1001–1005.
SACSAC-2000-TryfonaJ #abstraction #concept #modelling
Using Abstractions for Spatio-Temporal Conceptual Modeling (NT, CSJ), pp. 313–322.
SACSAC-2000-ZhangP #distributed #network #query
Distributed Query Processing Using Active Networks (ZZ, WP), pp. 374–380.
ASPLOSASPLOS-2000-ChouCEH #compilation #protocol
Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
CCCC-2000-RyderSKGS #exception #java
A Static Study of Java Exceptions Using JESP (BGR, DS, UK, MG, NS), pp. 67–81.
CCCC-2000-Vallee-RaiGHLPS #bytecode #framework #java #optimisation #question
Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? (RVR, EG, LJH, PL, PP, VS), pp. 18–34.
DACDAC-2000-AttarhaNL #fault #fuzzy #logic #modelling #simulation
Modeling and simulation of real defects using fuzzy logic (AA, MN, CL), pp. 631–636.
DACDAC-2000-BergamaschiL #design
Designing systems-on-chip using cores (RAB, WRL), pp. 420–425.
DACDAC-2000-ChangCSM #detection #functional #performance #symmetry
Fast post-placement rewiring using easily detectable functional symmetries (CWJC, CKC, PS, MMS), pp. 286–289.
DACDAC-2000-ChiouJRD #embedded #memory management
Application-specific memory management for embedded systems using software-controlled caches (DC, PJ, LR, SD), pp. 416–419.
DACDAC-2000-DwarakanathB #fault #simulation #tuple
Universal fault simulation using fault tuples (KND, RDB), pp. 786–789.
DACDAC-2000-GhoshF #automation #diagrams #functional #generative
Automatic test pattern generation for functional RTL circuits using assignment decision diagrams (IG, MF), pp. 43–48.
DACDAC-2000-Hassoun #analysis #bound
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-HutchingsN #design #programming language
Using general-purpose programming languages for FPGA design (BLH, BEN), pp. 561–566.
DACDAC-2000-LuJCF #performance
Efficient variable ordering using aBDD based sampling (YL, JJ, EMC, MF), pp. 687–692.
DACDAC-2000-McDonaldB #clustering #scheduling #simulation
Symbolic timing simulation using cluster scheduling (CBM, REB), pp. 254–259.
DACDAC-2000-QiuWP #petri net #power management #probability
Dynamic power management of complex systems using generalized stochastic Petri nets (QQ, QW, MP), pp. 352–356.
DACDAC-2000-QuP #constraints
Fingerprinting intellectual property using constraint-addition (GQ, MP), pp. 587–592.
DACDAC-2000-RaoN #power management
Power minimization using control generated clocks (MSR, SKN), pp. 794–799.
DACDAC-2000-VancorenlandRSG #algorithm #design
Optimal RF design using smart evolutionary algorithms (PJV, CDR, MS, GGEG), pp. 7–10.
DACDAC-2000-WilsonD #reliability #simulation #verification
Reliable verification using symbolic simulation with scalar values (CW, DLD), pp. 124–129.
DACDAC-2000-YeVKI #design #energy #estimation
The design and use of simplepower: a cycle-accurate energy estimation tool (WY, NV, MTK, MJI), pp. 340–345.
DACDAC-2000-YuKW #representation
The use of carry-save representation in joint module selection and retiming (ZY, KYK, ANWJ), pp. 768–773.
DATEDATE-2000-BergfeldNR #embedded #testing
Diagnostic Testing of Embedded Memories Using BIST (TJB, DN, EMR), pp. 305–309.
DATEDATE-2000-CarlettaPN #analysis #detection #fault
Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
DATEDATE-2000-CiricYS #implementation #logic
Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic (JC, GY, CS), pp. 277–282.
DATEDATE-2000-CotaRABCL #reuse
Reuse of Existing Resources for Analog BIST of a Switch Capacitor Filte (ÉFC, MR, FA, YB, LC, ML), pp. 226–230.
DATEDATE-2000-GaoW
Wire-Sizing for Delay Minimization and Ringing Control Using Transmission Line Model (YG, DFW), pp. 512–516.
DATEDATE-2000-JacobsB #statistics
Gate Sizing Using a Statistical Delay Model (ETAFJ, MRCMB), pp. 283–290.
DATEDATE-2000-KacNMZ
Alternative Test Methods Using IEEE 1149.4 (UK, FN, SM, MSZ), pp. 463–467.
DATEDATE-2000-KallaZCH #framework #paradigm #recursion #satisfiability
A BDD-Based Satisfiability Infrastructure Using the Unate Recursive Paradigm (PK, ZZ, MJC, CH), pp. 232–236.
DATEDATE-2000-KravetsS #symmetry #synthesis
Constructive Library-Aware Synthesis Using Symmetries (VNK, KAS), pp. 208–213.
DATEDATE-2000-ManquinhoS #algorithm #on the #satisfiability
On Using Satisfiability-Based Pruning Techniques in Covering Algorithms (VMM, JPMS), pp. 356–363.
DATEDATE-2000-Maurer #logic #network #simulation #state machine
Logic Simulation Using Networks of State Machines (PMM), pp. 674–678.
DATEDATE-2000-MorawiecUR #algorithm #diagrams #simulation
Cycle-Based Simulation Algorithms for Digital Systems Using High-Level Decision Diagrams (AM, RU, JR), p. 743.
DATEDATE-2000-PeesHM
Retargeting of Compiled Simulators for Digital Signal Processors Using a Machine Description Language (SP, AH, HM), pp. 669–673.
DATEDATE-2000-SilvaDM #configuration management #correlation #hardware
Mixed-Signal BIST Using Correlation and Reconfigurable Hardware (JMdS, JSD, JSM), p. 744.
DATEDATE-2000-SousaA #clustering #complexity #fault #modelling
Reducing the Complexity of Defect Level Modeling Using the Clustering Effect (JTdS, VDA), pp. 640–644.
DATEDATE-2000-VerkestKS #c++ #design
System Level Design Using C++ (DV, JK, FS), pp. 74–81.
DATEDATE-2000-WeilerMHH #detection
Detection of Defective Sensor Elements Using Sigma-Delta-Modulation and a Matched Filter (DW, OM, DH, BJH), pp. 599–603.
HPCAHPCA-2000-BoschSSRH #analysis #case study #parallel #performance #visualisation
Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
HPCAHPCA-2000-MowryR #memory management #multi #thread
Software-Controlled Multithreading Using Informing Memory Operations (TCM, SRR), pp. 121–132.
HPDCHPDC-2000-GouacheP #corba #industrial #simulation
Coupling of Industrial Simulation Codes using CORBA (SG, TP), pp. 312–314.
HPDCHPDC-2000-PlaleS #data flow #embedded #named #query #scalability
dQUOB: Managing Large Data Flows using Dynamic Embedded Queries (BP, KS), pp. 263–270.
HPDCHPDC-2000-SumimotoTHHTI #clustering #communication #network #performance
High Performance Communication using a Commodity Network for Cluster Systems (SS, HT, AH, HH, TT, YI), pp. 139–146.
HPDCHPDC-2000-TurgeonSC #performance
Application Placement using Performance Surfaces (AT, QS, MJC), pp. 229–236.
HPDCHPDC-2000-WangOCF #predict
Using Idle Workstations to Implement Predictive Prefetching (JYQW, JSO, YC, MJF), pp. 87–94.
ISMMISMM-2000-PlakalF #concurrent #garbage collection #parallel #slicing #thread
Concurrent Garbage Collection Using Program Slices on Multithreaded Processors (MP, CNF), pp. 94–100.
LCTESLCTES-2000-CintraA #array
Array Reference Allocation Using SSA-Form and Live Range Growth (MSC, GA), pp. 48–62.
LCTESLCTES-2000-JeongKL #concurrent #multi #realtime
Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version (BSJ, DK, SL), pp. 33–47.
OSDIOSDI-2000-BrownM #memory management #physics
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently (ADB, TCM), pp. 31–44.
OSDIOSDI-2000-EnglerCCH #compilation
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions (DRE, BC, AC, SH), pp. 1–16.
PDPPDP-2000-Rowstron #distributed #fault tolerance #memory management
Using agent wills to provide fault-tolerance in distributed shared memory systems (AITR), pp. 317–324.
PDPPDP-2000-ZavanellaM #predict #source code
Predictability of bulk synchronous programs using MPI (AZ, AM), pp. 118–123.
FASEFASE-2000-AnlauffKPS #component #composition #domain-specific language
Using Domain-Specific Languages for the Realization of Component Composition (MA, PWK, AP, AS), pp. 112–126.
FASEFASE-2000-ClavelDELMMQ #maude
Using Maude (MC, FD, SE, PL, NMO, JM, JFQ), pp. 371–374.
FASEFASE-2000-GruerHK #design #network #problem #specification #verification
Verification of Object-Z Specifications by Using Transition Systems: Application to the Radiomobile Network Design Problem (PG, VH, AK), pp. 222–236.
FASEFASE-2000-HuizingK #invariant #object-oriented #source code #verification
Verification of Object Oriented Programs Using Class Invariants (KH, RK), pp. 208–221.
FASEFASE-2000-HuneS #automaton #case study #synthesis
A Case Study on Using Automata in Control Synthesis (TH, AS), pp. 349–362.
FASEFASE-2000-LanoAC #design
Structuring and Design of Reactive Systems Using RSDS and B (KL, KA, DC), pp. 97–111.
FASEFASE-2000-Parisi-PresicceW #configuration management #graph transformation #policy
Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
FASEFASE-2000-Wehrheim #automation #case study #formal method #specification
Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods (HW), pp. 334–348.
STOCSTOC-2000-AdlerL #multi #performance
Compression using efficient multicasting (MA, FTL), pp. 153–162.
STOCSTOC-2000-Boneh #integer
Finding smooth integers in short intervals using CRT decoding (DB), pp. 265–272.
STOCSTOC-2000-HallgrenRT #quantum #re-engineering
Normal subgroup reconstruction and quantum computation using group representations (SH, AR, ATS), pp. 627–635.
TACASTACAS-2000-AlfaroKNPS #model checking #probability #process #representation
Symbolic Model Checking of Probabilistic Processes Using MTBDDs and the Kronecker Representation (LdA, MZK, GN, DP, RS), pp. 395–410.
TACASTACAS-2000-BenerecettiG #logic #model checking #protocol #security
Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
TACASTACAS-2000-BozgaFG #automation #generative #static analysis #testing
Using Static Analysis to Improve Automatic Test Generation (MB, JCF, LG), pp. 235–250.
TACASTACAS-2000-RoychoudhuryKRRS #logic programming #program transformation #verification
Verification of Parameterized Systems Using Logic Program Transformations (AR, KNK, CRR, IVR, SAS), pp. 172–187.
CADECADE-2000-AndrewsB #education #higher-order #logic #named #proving #theorem proving #tutorial
Tutorial: Using TPS for Higher-Order Theorem Proving and ETPS for Teaching Logic (PBA, CEB), pp. 511–512.
CADECADE-2000-BezemHN #automation #proving #type system
Automated Proof Construction in Type Theory Using Resolution (MB, DH, HdN), pp. 148–163.
CADECADE-2000-Harrison #proving #theorem proving #verification
High-Level Verification Using Theorem Proving and Formalized Mathematics (JH), pp. 1–6.
CADECADE-2000-HasegawaFK #branch #generative #performance
Efficient Minimal Model Generation Using Branching Lemmas (RH, HF, MK), pp. 184–199.
CAVCAV-2000-StollerUL #detection #distributed #partial order #performance
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
ICLPCL-2000-AllainY #database #specification
Specification of an Active Database System Application Using Dynamic Relation Nets (LA, PY), pp. 1197–1209.
ICLPCL-2000-BastidePTSL #mining
Mining Minimal Non-redundant Association Rules Using Frequent Closed Itemsets (YB, NP, RT, GS, LL), pp. 972–986.
ICLPCL-2000-HolldoblerS #calculus #diagrams #problem
Solving the Entailment Problem in the Fluent Calculus Using Binary Decision Diagrams (SH, HPS), pp. 747–761.
ICLPCL-2000-KozenP #algebra #certification #compilation #optimisation #testing
Certification of Compiler Optimizations Using Kleene Algebra with Tests (DK, MCP), pp. 568–582.
ICLPCL-2000-PearceGV #equilibrium #modelling
Computing Equilibrium Models Using Signed Formulas (DP, IPdG, AV), pp. 688–702.
ICLPCL-2000-YangK #implementation #logic #named #performance
FLORA: Implementing an Efficient DOOD System Using a Tabling Logic Engine (GY, MK), pp. 1078–1093.
ISSTAISSTA-2000-SchroederK #analysis #black box #reduction
Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
ICTSSTestCom-2000-HorvathM #functional #testing
Functional Testing GPRS Support Nodes Using TTCN (EH, AM), pp. 229–238.
ICTSSTestCom-2000-MednonogovKMM #consistency #corba #testing
Conformance Testing of CORBA Services Using TTCN (AM, HK, OM, JM), p. 193–?.
ICTSSTestCom-2000-RyuKKS #design #generative #testing
Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques (JR, MK, SK, SS), pp. 127–142.
WICSAWICSA-1999-RiegelKS #architecture #modelling
Modeling Software Architecture Using Domain-Specific Patterns (JPR, CK, MS), pp. 273–292.
WICSAWICSA-1999-SaridakisI #architecture
Developing Dependable Systems Using Software Architecture (TS, VI), pp. 83–104.
DL-1999-DushayFL #distributed #library #query
Using Query Mediators for Distributed Searching in Federated Digital Libraries (ND, JCF, CL), pp. 171–178.
DL-1999-JonesP #library #topic
Topic-Based Browsing Within a Digital Library Using Keyphrases (SJ, GWP), pp. 114–121.
DL-1999-MelucciO #information retrieval
Musical Information Retrieval Using Melodic Surface (MM, NO), pp. 152–160.
TPDLECDL-1999-HansenYG #hypermedia #library
Dynamic Use of Digital Library Material — Supporting Users with Typed Links in Open Hypermedia (KMH, CY, KG), pp. 254–273.
TPDLECDL-1999-LopezRH #information management #summary
Using and Evaluating User Directed Summaries to Improve Information Access (MJML, MdBR, JMGH), pp. 198–214.
TPDLECDL-1999-VelegrakisCC #declarative #logic #specification
Declarative Specification of Z39.50 Wrappers Using Description Logics (YV, VC, PC), pp. 383–402.
HTHT-1999-AuffretCCDRB #authoring #documentation #hypermedia #performance
Audiovisual-Based Hypermedia Authoring: Using Structured Representations for Efficient Access to AV Documents (GA, JC, OC, TD, RR, BB), pp. 169–178.
ICDARICDAR-1999-AntonacopoulosC #analysis #comparative #representation
Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
ICDARICDAR-1999-BippusM #2d #recognition #reduction
Script Recognition using Inhomogeneous P2DHMM and Hierarchical Search Space Reduction (RDB, VM), pp. 773–776.
ICDARICDAR-1999-BrakensiekKWWR #evaluation #hybrid #modelling #online #performance #recognition
Performance Evaluation of a New Hybrid Modeling Technique for Handwriting Recognition using On-Line and Off-Line Data (AB, AK, DW, WW, GR), pp. 446–449.
ICDARICDAR-1999-BunkeSYS #online #video
Online Handwriting Data Acquisition using a Video Camera (HB, TvS, TY, MS), pp. 573–576.
ICDARICDAR-1999-ChangLTH #analysis #documentation #image #multi
Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
ICDARICDAR-1999-ChoiO #network #recognition
A Segmentation-free Recognition of Two Touching Numerals using Neural Network (SMC, ISO), pp. 253–256.
ICDARICDAR-1999-FujisawaSWK #image #recognition
Handwritten Numeral Recognition using Gradient and Curvature of Gray Scale Image (YF, MS, TW, FK), pp. 277–280.
ICDARICDAR-1999-HebertPG #detection #incremental #learning
Cursive Character Detection using Incremental Learning (JFH, MP, NG), pp. 808–811.
ICDARICDAR-1999-Hirayama #framework
A Framework for Forms Processing using Enhanced-Line-Shared-Adjacent Format (YH), pp. 103–106.
ICDARICDAR-1999-JeeKL #fault
Error Correction of Korean Courtesy Amounts in Bank Slips using Rule Information and cross-referencing (TCJ, EJK, YL), pp. 95–98.
ICDARICDAR-1999-JobbinsE #documentation #multi
Segmenting Documents using Multiple Lexical Features (ACJ, LJE), pp. 721–724.
ICDARICDAR-1999-JungSS #classification #multi
Multifont Classification using Typographical Attributes (MCJ, YCS, SNS), pp. 353–356.
ICDARICDAR-1999-KameshiroHOY #documentation #fault #image #multi #recognition #retrieval #segmentation
A Document Image Retrieval Method Tolerating Recognition and Segmentation Errors of OCR using Shape-Feature and Multiple Candidates (TK, TH, YO, FY), pp. 681–684.
ICDARICDAR-1999-Kawatani #classification #recognition
Handwritten Kanji Recognition using Combined Complementary Classifiers in a Cascade Arrangement (TK), pp. 503–506.
ICDARICDAR-1999-KhanH #recognition
Recognition of Real-Life Character Samples using a Structural Variation and Degradation Model (NAK, HH), pp. 225–228.
ICDARICDAR-1999-KiseMYM #automation #documentation #generative #hypermedia #keyword #on the
On the Use of Density Distribution of Keywords for Automated Generation of Hypertext Links from Arbitrary Parts of Documents (KK, HM, MY, KM), pp. 301–304.
ICDARICDAR-1999-KosmalaRLP #graph grammar #markov #modelling #online #recognition
On-Line Handwritten Formula Recognition using Hidden Markov Models and Context Dependent Graph Grammars (AK, GR, SL, LP), pp. 107–110.
ICDARICDAR-1999-LebourgeoisBE #learning
Structure Relation between Classes for Supervised Learning using Pretopology (FL, MB, HE), pp. 33–36.
ICDARICDAR-1999-LebourgeoisE #analysis #documentation
Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
ICDARICDAR-1999-LiuN #network #recognition
Handwritten Numeral Recognition using Neural Networks: Improving the Accuracy by Discriminative Training (CLL, MN), pp. 257–260.
ICDARICDAR-1999-MizukamiMYY #verification
An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
ICDARICDAR-1999-MullerER #database #multi #retrieval #sketching
Multimedia Database Retrieval using Hand-Drawn Sketches (SM, SE, GR), pp. 289–292.
ICDARICDAR-1999-NagasakiYN #automation #difference #pattern matching #recognition
Relaxation-based Pattern Matching using Automatic Differentiation for Off-line Character Recognition (TN, TY, MN), pp. 229–232.
ICDARICDAR-1999-NishimuraKMN #algorithm #feature model #multi #recognition
Off-line Character Recognition using HMM by Multiple Directional Feature Extraction and Voting with Bagging Algorithm (HN, MK, MM, YN), pp. 49–52.
ICDARICDAR-1999-OkamotoY #online #recognition
On-line Handwritten Character Recognition Method using Directional Features and Clockwise/Counterwise Direction-Change Features (MO, KY), pp. 491–494.
ICDARICDAR-1999-PalmeroD #documentation
Structured Document Labeling and Rule Extraction using a New Recurrent Fuzzy-neural System (GISP, YAD), pp. 181–184.
ICDARICDAR-1999-RemakiC #documentation #image #kernel #product line #visual notation
Visual Data Extraction from Bi-level Document Images using a Generalized Kernel Family with Compact Support, in Scale-Space (LR, MC), pp. 609–612.
ICDARICDAR-1999-SaidYS #recognition
Recognition of English and Arabic Numerals using a Dynamic Number of Hidden Neurons (FNS, RAY, CYS), pp. 237–240.
ICDARICDAR-1999-SawakiMH #image #recognition
Character Recognition in Bookshelf Images using Context-based Image Templates (MS, HM, NH), pp. 79–82.
ICDARICDAR-1999-StuckelbergD #on the #probability #reasoning #recognition
On Musical Score Recognition using Probabilistic Reasoning (MVS, DSD), pp. 115–118.
ICDARICDAR-1999-TanYHWZ
Text/Graphics Separation using Agent-based Pyramid Operations (CLT, BY, WH, QW, ZZ), pp. 169–172.
ICDARICDAR-1999-UchidaS #2d #recognition
Handwritten Character Recognition using Monotonic and Continuous Two-dimensional Warping (SU, HS), pp. 499–502.
ICDARICDAR-1999-ViswanathanBDT #documentation #retrieval
Retrieval from Spoken Documents using Content and Speaker Information (MV, HSMB, SD, AT), pp. 567–572.
ICDARICDAR-1999-WakaharaK #correlation #invariant
Affine-Invariant Correlation of Gray-Scale Characters using GAT Iteration (TW, YK), pp. 613–616.
ICDARICDAR-1999-WorringT #clustering #documentation #segmentation
Segmentation of Color Documents by Line Oriented Clustering using Spatial Information (MW, LT), pp. 67–70.
ICDARICDAR-1999-WuS #classification #distance #multi #network #recognition
Unconstrained Handwritten Numeral Recognition using Hausdorff Distance and Multi-Layer Neural Network Classifier (XW, PS), pp. 249–252.
ICDARICDAR-1999-YamaokaIBK #approach #documentation #image #interactive #logic
Interactive Approach to the Extraction of Logical Structures from Unformatted Document Images Using a Sub-structure Model (MY, OI, NB, TK), pp. 185–188.
PODSPODS-1999-CluetKS
Using LDAP Directory Caches (SC, OK, DS), pp. 273–284.
PODSPODS-1999-CohenNS #query
Rewriting Aggregate Queries Using Views (SC, WN, AS), pp. 155–166.
PODSPODS-1999-PapadiasMT #multi #optimisation
Processing and Optimization of Multiway Spatial Joins Using R-Trees (DP, NM, YT), pp. 44–55.
SIGMODSIGMOD-1999-JarkeQBLMS #quality
Improving OLTP Data Quality Using Data Warehouse Mechanisms (MJ, CQ, GB, DL, GM, SS), pp. 536–537.
SIGMODSIGMOD-1999-LeeKC #estimation #multi
Multi-dimensional Selectivity Estimation Using Compressed Histogram Information (JHL, DHK, CWC), pp. 205–214.
SIGMODSIGMOD-1999-VitterW #approximate #multi
Approximate Computation of Multidimensional Aggregates of Sparse Data Using Wavelets (JSV, MW), pp. 193–204.
SIGMODSIGMOD-1999-Wu #optimisation #query
Query Optimization for Selections Using Bitmaps (MCW), pp. 227–238.
VLDBVLDB-1999-AcharyaGP #approximate #named #performance #query
Aqua: A Fast Decision Support Systems Using Approximate Query Answers (SA, PBG, VP), pp. 754–757.
VLDBVLDB-1999-SahuguetA #legacy #web
Building Light-Weight Wrappers for Legacy Web Data-Sources Using W4F (AS, FA), pp. 738–741.
VLDBVLDB-1999-WangZL #classification #proximity
Building Hierarchical Classifiers Using Class Proximity (KW, SZ, SCL), pp. 363–374.
ITiCSEITiCSE-1999-ArnowB #education #online #programming #web
On-line programming examinations using Web to teach (DA, OB), pp. 21–24.
ITiCSEITiCSE-1999-KoffmanW #java
CS1 using Java language features gently (EBK, UW), pp. 40–43.
ITiCSEITiCSE-1999-Levin #education
Use of a soundcard in teaching audio frequency and analog modem communications (MHL), pp. 79–83.
ITiCSEITiCSE-1999-Polak #case study #communication #education
Teaching computer communication skills using case study method (PP), p. 190.
ITiCSEITiCSE-1999-PutSZ #network #student
The system of checking students’ knowledge with the use of wide area networks (DP, JS, MZ), p. 192.
ITiCSEITiCSE-1999-PutSZ99a #education #internet #process
The use of the Internet in the teaching process (DP, JS, MZ), p. 193.
ITiCSEITiCSE-1999-SeffahBD #object-oriented
Assessing object-oriented technology skills using an Internet-based system (AS, MB, MD), pp. 71–74.
ITiCSEITiCSE-1999-YangB #education #interface #java #programming
Using Java and the socket interface in teaching client/server programming (AY, YB), p. 206.
CSMRCSMR-1999-LamLS #metric #requirements
Managing Requirements Change Using Metrics and Action Planning (WL, ML, VS), pp. 122–129.
ICSMEICSM-1999-BriandWL #impact analysis #metric #object-oriented
Using Coupling Measurement for Impact Analysis in Object-Oriented Systems (LCB, JW, HL), pp. 475–482.
ICSMEICSM-1999-BurdM #c #cobol
Evaluating the Use of Dominance Trees for C and COBOL (EB, MM), pp. 401–410.
ICSMEICSM-1999-GallJR #visualisation
Visualizing Software Release Histories: The Use of Color and Third Dimension (HG, MJ, CR), pp. 99–108.
ICSMEICSM-1999-LapierreMSAFT #automation #execution #generative #linear #programming #testing
Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees (SL, EM, GS, GA, RF, PT), pp. 189–198.
ICSMEICSM-1999-Ward #assembly #c #migration
Assembler to C Migration Using the FermaT Transformation System (MPW), pp. 67–76.
ICSMEICSM-1999-ZhouB #ada #source code
Extracting Objects of Ada Programs Using Module Features (YZ, BX), p. 23–?.
IWPCIWPC-1999-CainM #c++ #lens #visualisation
Program Visualisation using C++ Lenses (JWC, RJM), pp. 20–26.
IWPCIWPC-1999-DeursenM #cobol #comprehension
Understanding COBOL Systems using Inferred Types (AvD, LM), pp. 74–81.
PASTEPASTE-1999-Agrawal #graph #performance #testing
Efficient Coverage Testing Using Global Dominator Graphs (HA), pp. 11–20.
PASTEPASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #verification
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
WCREWCRE-1999-Jermaine
Computing Program Modularizations Using the k-Cut Method (CJ), pp. 224–234.
ICALPICALP-1999-CrochemoreMRS
Text Compression Using Antidictionaries (MC, FM, AR, SS), pp. 261–270.
ICALPICALP-1999-Galpin #algebra #comparison #process
Comparison of Process Algebra Equivalences Using Formats (VG), pp. 341–350.
FMFM-v1-1999-Bousquet #case study #detection #experience #feature model #interactive #model checking #testing
Feature Interaction Detection Using Testing and Model-Checking Experience Report (LdB), pp. 622–641.
FMFM-v1-1999-SabatierL #design #formal method #smarttech #transaction #validation
The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications (DS, PL), pp. 348–368.
FMFM-v1-1999-TabourierCI #empirical #protocol #testing
A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
FMFM-v2-1999-Droschl #data access #requirements
Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
FMFM-v2-1999-Feijs #modelling #π-calculus
Modelling Microsoft COM Using π-Calculus (LMGF), pp. 1343–1363.
FMFM-v2-1999-HorsteS #formal method #modelling #petri net #simulation
Formal Modelling and Simulation of Train Control Systems Using Petri Nets (MMzH, ES), p. 1867.
FMFM-v2-1999-Jonkers #communication #interactive
Communication and Synchronisation Using Interaction Objects (HBMJ), pp. 1321–1342.
FMFM-v2-1999-KnightFH #tool support
Tool Support for Production Use of Formal Techniques (JCK, PTF, BRH), p. 1854.
FMFM-v2-1999-MarchandS #design #incremental #synthesis
Incremental Design of a Power Transformer Station Controller Using a Controller Synthesis Methodology (HM, MS), pp. 1605–1624.
FMFM-v2-1999-Nakajima #algebra #development #framework #object-oriented #specification
Using Algebraic Specification Techniques in Development of Object-Oriented Frameworks (SN), pp. 1664–1683.
FMFM-v2-1999-PolackS #development
Systems Development Using Z Generics (FP, SS), pp. 1048–1067.
IFMIFM-1999-DerrickB #component #specification
Specifying Component and Context Specification Using Promotion (JD, EAB), pp. 293–312.
IFMIFM-1999-Paige #communication #concurrent #refinement #specification
Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication (RFP), pp. 353–372.
IFMIFM-1999-TreharneS #algebra #process
Using a Process Algebra to Control B Operations (HT, SS), pp. 437–456.
FLOPSFLOPS-1999-BeierleM #approximate #prolog #source code #type checking
Using Types as Approximations for Type Checking Prolog Programs (CB, GM), pp. 251–266.
FLOPSFLOPS-1999-VerbaetenS #analysis #logic programming #source code #termination
Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
ICFPICFP-1999-Huch #abstract interpretation #erlang #source code #verification
Verification of Erlang Programs using Abstract Interpretation and Model Mhecking (FH), pp. 261–272.
IFLIFL-1999-WieringAP #framework #game studies #platform
Using Clean for Platform Games (MW, PA, MJP), pp. 1–17.
AGTIVEAGTIVE-1999-NiereZ #development
Using FUJABA for the Development of Production Control Systems (JN, AZ), pp. 181–191.
AGTIVEAGTIVE-1999-NiereZ99a #simulation #testing
Testing and Simulating Production Control Systems Using the Fujaba Environment (JN, AZ), pp. 449–456.
AGTIVEAGTIVE-1999-RibeiroC #composition #graph grammar #modelling #simulation
Compositional Construction of Simulation Models Using Graph Grammars (LR, BC), pp. 87–94.
AGTIVEAGTIVE-1999-Schleicher #formal method #graph transformation #modelling #process #uml
Formalizing UML-Based Process Models Using Graph Transformations (AS), pp. 341–357.
AGTIVEAGTIVE-1999-ZamperoniE #aspect-oriented #exclamation #experience #graph grammar #integration #re-engineering #term rewriting
Formal Integration of Software Engineering Aspects Using Graph Rewrite Systems — A Typical Experience?! (AZ, GE), pp. 359–367.
CHICHI-1999-BhavnaniJF #empirical
The Strategic Use of CAD: An Empirically Inspired, Theory-Based Course (SKB, BEJ, UF), pp. 183–190.
CHICHI-1999-FaradayS #authoring #web
Authoring Animated Web Pages Using “Contact Points” (PF, AGS), pp. 458–465.
CHICHI-1999-JohnsonWBKB #interface
Sympathetic Interfaces: Using a Plush Toy to Direct Synthetic Characters (MPJ, ADW, BB, CK, AFB), pp. 152–158.
HCIHCI-CCAD-1999-Chiu #algorithm #approach #learning #search-based
Learning path planning using genetic algorithm approach (CC), pp. 71–75.
HCIHCI-CCAD-1999-DuLL #development #memory management #metric
Using the memory load measurement to improve software development (TCD, CJL, CGL), pp. 53–57.
HCIHCI-CCAD-1999-FujishigeJK #automaton #finite #recognition #word
Recognition of Japanese sign language words using finite automata (EF, KJ, TK), pp. 167–171.
HCIHCI-CCAD-1999-GermannBO #artificial reality
Assisting individuals with disabilities through the use of virtual reality technologies (CG, JKB, POJ), pp. 952–956.
HCIHCI-CCAD-1999-HickeyKA #distributed #mobile
Mobile virtual participation in a distributed meeting using an omni-directional camera system (SH, KK, SA), pp. 533–537.
HCIHCI-CCAD-1999-InmanL #education
Teaching orientation and mobility skills to blind children using simulated acoustical environments (DPI, KL), pp. 1090–1094.
HCIHCI-CCAD-1999-JohnsonO #learning #multi #problem
Innovative mathematical learning environments — Using multimedia to solve real world problems (LFJ, POJ), pp. 677–681.
HCIHCI-CCAD-1999-Jones #community #development #user interface
Using the paper user interface to support community involvement in urban development (RMJ), pp. 427–431.
HCIHCI-CCAD-1999-Kameneva #communication #education
Educational use of communication and information technologies in Ukraine (TK), pp. 701–706.
HCIHCI-CCAD-1999-Kita
Intelligent plant inspection by using foveated active vision sensor (NK), pp. 1177–1181.
HCIHCI-CCAD-1999-Machate #concept #interactive #multimodal #smarttech
Being natural — on the use of multimodal interaction concepts in smart homes (JM), pp. 937–941.
HCIHCI-CCAD-1999-MaidaNM
Effects on training using illumination in virtual environments (JM, JN, KM), pp. 1124–1128.
HCIHCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
HCIHCI-CCAD-1999-Morishima #communication #multi
Multiple points face-to-face communication in cyberspace using multi-modal agent (SM), pp. 177–181.
HCIHCI-CCAD-1999-PapaioannouN #user interface
An optimum UI for using a high comfort and enhanced manoeuvrability wheelchair for transportation tasks (GP, AN), pp. 932–936.
HCIHCI-CCAD-1999-RamalhoBCCLMMV #experience #internet
Cyber Rally: An experience of democratic use of the internet (GR, FAB, SC, AC, ML, SRdLM, HPM, AV), pp. 402–406.
HCIHCI-CCAD-1999-Seki #visual notation
Systematic auditory training of obstacle sense for the visually impaired by using acoustical VR system (YS), pp. 999–1003.
HCIHCI-CCAD-1999-ShimizuIN #locality #representation
Pattern representation system using movement sense of localized sound (MS, KI, TN), pp. 990–994.
HCIHCI-CCAD-1999-TornbergV #concurrent #process
Concurrent engineering activities using videophone communications (VT, SV), pp. 256–260.
HCIHCI-CCAD-1999-TrousseJK #approach #behaviour #recommendation #similarity
Using user behaviour similarity for recommendation computation: the broadway approach (BT, MJ, RK), pp. 85–89.
HCIHCI-CCAD-1999-WeberLZ
Symbolic tele-communication using the WWW (HW, FL, KJZ), pp. 802–806.
HCIHCI-CCAD-1999-YuCK #approximate #multi
Dynamic event filtering technique using multi-level path approximation in a shared virtual environment (SJY, YCC, KK), pp. 583–587.
HCIHCI-EI-1999-Baudisch #scalability
Using a Painting Metaphor to Rate Large Numbers of Objects (PB), pp. 266–270.
HCIHCI-EI-1999-BondarovskaiaS #social
Psychological, Ethic, and Social Peculiarities of Using New Information Technologies (VMB, AAS), pp. 129–132.
HCIHCI-EI-1999-BuckleHWH
Investigation of the Use of Non-Keyboard Input Devices (NKID) (PB, RAH, VW, SH), pp. 102–105.
HCIHCI-EI-1999-CarbonellD #empirical #gesture #human-computer #multimodal #speech
Empirical data on the use of speech and gestures in a multimodal human-computer environment (NC, PD), pp. 446–450.
HCIHCI-EI-1999-Chuan #case study #web
Small Group CSCW Using Web Recources: A Case Study (TKC), pp. 788–792.
HCIHCI-EI-1999-Furtado #approach #design #usability #user interface
An Approach to Improve Design and Usability of User Interfaces for Supervision Systems by Using Human Factors (EF), pp. 993–997.
HCIHCI-EI-1999-HertzumJ
The Evaluator Effect during First-Time Use of the Cognitive Walkthrough Technique (MH, NEJ), pp. 1063–1067.
HCIHCI-EI-1999-KohzukiNTUHT #eye tracking #interactive
Man-Machine Interaction Using Eye Movement (KK, TN, AT, MU, SH, KT), pp. 407–411.
HCIHCI-EI-1999-MachiiMAKYKNK #3d #interface #internet
An Easy Internet Browsing System with Sophisticated Human Interface Using 3-D Graphics (KM, SM, YA, SK, MY, KK, YN, KK), pp. 228–232.
HCIHCI-EI-1999-OHaraB #guidelines
Software Tool for the Use of Human Factors Engineering Guidelines to Conduct Control Room Evaluations (JMO, WSB), pp. 973–977.
HCIHCI-EI-1999-SchmittO
Calculation of Totally Optimized Button Configurations Using Fitts’ Law (AS, PO), pp. 392–396.
HCIHCI-EI-1999-SegenK #animation #gesture #interactive #interface
Dextrous Interaction with Computer Animations using Vision-Based Gesture Interface (JS, SK), pp. 281–285.
HCIHCI-EI-1999-ShibuyaT #image #interface #video
Interface Using Video Captured Images (YS, HT), pp. 247–250.
HCIHCI-EI-1999-TakahashiK #3d #interface
3-D Input Device Using a Ball Rotation Interface (TT, MK), pp. 397–401.
HCIHCI-EI-1999-Takeda #approach #communication #diagrams
Evolutionary Approach to Revolutionary Use of Software Diagrams in Client-Designer Communication (KT), pp. 866–870.
HCIHCI-EI-1999-TeiwesBEMST #eye tracking #human-computer #interactive #research #testing #usability
The Use of Eye Tracking for Human-Computer Interaction Research and Usability Testing (WT, MB, GWE, SM, ES, WT), pp. 1119–1122.
HCIHCI-EI-1999-Urokohara #analysis #design #usability #user interface
Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
HCIHCI-EI-1999-VienneJJ #adaptation #fuzzy #interface #logic
Use of Fuzzy Logic in an Adaptive Interface meant for Teleoperation (FV, AMJD, DJ), pp. 306–310.
CAiSECAiSE-1999-Oh #architecture #design #transaction
The Design of Cooperative Transaction Model by Using Client-Server Architecture (AsO), p. 269.
CAiSECAiSE-1999-ScheerH #information management #process
From Business Process Model to Application System — Developing an Information System with the House of Business Engineering (HOBE) (AWS, MH), pp. 2–9.
EDOCEDOC-1999-BlancGD #concept #enterprise #uml
Using the UML language to express the ODP enterprise concepts (XB, MPG, RLD), pp. 50–59.
EDOCEDOC-1999-Linington #community #enterprise #policy #uml
Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
ICEISICEIS-1999-BarjisD #analysis #modelling #network #process
Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
ICEISICEIS-1999-Chattopadhyay #bibliography #enterprise
Overview of Enterprise Management Using SAP R/3 (SPC), p. VIII.
ICEISICEIS-1999-CostaHA #process
Facilitating Organisational Activities Using Plans and Audits (CJC, TH, PA), pp. 404–411.
ICEISICEIS-1999-Falsarella #corba #execution #framework #implementation #multi #platform
Multi Language and Multi Platform Suport for Agent Execution Using CORBA Platform-An Implementation (OMF), p. 772.
ICEISICEIS-1999-FrantiDSS #automaton #data access
Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
ICEISICEIS-1999-Garcia-FanjulMRT #internet #named #online
TIBLEUS: A Model to Build Internet Online Support Services Using ASP (JGF, CM, CdlR, JT), pp. 619–625.
ICEISICEIS-1999-MisraSKML #enterprise #information management #integration #scalability
Integration of Information Systems in Large-Scale Enterprises Using Model-Integrated Computing (AM, JS, GK, MM, ÁL), pp. 485–492.
ICEISICEIS-1999-NicolleCY
Using Transformation Paths to Translate and Migrate Data (CN, NC, KY), pp. 125–131.
ICEISICEIS-1999-Whymark #requirements
Using Criticality as a Basis for Determining Information Requirements for an EIS (GKW), pp. 542–549.
CIKMCIKM-1999-GeffnerAAS #classification #library #scalability
Browsing Large Digital Library Collections Using Classification Hierarchies (SG, DA, AEA, TRS), pp. 195–201.
CIKMCIKM-1999-LabrouF #category theory #documentation #exclamation #ontology
Yahoo! As an Ontology: Using Yahoo! Categories to Describe Documents (YL, TWF), pp. 180–187.
CIKMCIKM-1999-LiY #classification #probability
Text Classification Using ESC-based Stochastic Decision Lists (HL, KY), pp. 122–130.
CIKMCIKM-1999-WangXL #clustering #scalability #transaction
Clustering Transactions Using Large Items (KW, CX, BL), pp. 483–490.
CIKMCIKM-1999-YoonHPM #information management
Using Domain Knowledge in Knowledge Discovery (SCY, LJH, EKP, SAMM), pp. 243–250.
ICMLICML-1999-AbeL #concept #learning #linear #probability
Associative Reinforcement Learning using Linear Probabilistic Concepts (NA, PML), pp. 3–11.
ICMLICML-1999-BrodieD #induction #learning
Learning to Ride a Bicycle using Iterated Phantom Induction (MB, GD), pp. 57–66.
ICMLICML-1999-BurgardFJMT #mobile #scalability
Sonar-Based Mapping of Large-Scale Mobile Robot Environments using EM (WB, DF, HJ, CM, ST), pp. 67–76.
ICMLICML-1999-FiroiuC #markov #modelling
Abstracting from Robot Sensor Data using Hidden Markov Models (LF, PRC), pp. 106–114.
ICMLICML-1999-FrankW
Making Better Use of Global Discretization (EF, IHW), pp. 115–123.
ICMLICML-1999-Joachims #classification
Transductive Inference for Text Classification using Support Vector Machines (TJ), pp. 200–209.
ICMLICML-1999-RennieM #learning #web
Using Reinforcement Learning to Spider the Web Efficiently (JR, AM), pp. 335–343.
ICMLICML-1999-SakakibaraK #context-free grammar #learning
GA-based Learning of Context-Free Grammars using Tabular Representations (YS, MK), pp. 354–360.
KDDKDD-1999-BarbaraW #approximate #data analysis
Using Approximations to Scale Exploratory Data Analysis in Datacubes (DB, XW), pp. 382–386.
KDDKDD-1999-BrijsSVW #case study
Using Association Rules for Product Assortment Decisions: A Case Study (TB, GS, KV, GW), pp. 254–260.
KDDKDD-1999-GantiGR #category theory #clustering #named #summary
CACTUS — Clustering Categorical Data Using Summaries (VG, JG, RR), pp. 73–83.
KDDKDD-1999-LarsenA #clustering #documentation #effectiveness #linear #mining #performance
Fast and Effective Text Mining Using Linear-Time Document Clustering (BL, CA), pp. 16–22.
KDDKDD-1999-LiuHMC #mining
Mining Interesting Knowledge Using DM-II (BL, WH, YM, SC), pp. 430–434.
KDDKDD-1999-MannilaPS #predict
Prediction with Local Patterns using Cross-Entropy (HM, DP, PS), pp. 357–361.
KDDKDD-1999-MeretakisW #classification #naive bayes
Extending Naïve Bayes Classifiers Using Long Itemsets (DM, BW), pp. 165–174.
KDDKDD-1999-NagDD #interactive
Using a Knowledge Cache for Interactive Discovery of Association Rules (BN, PD, DJD), pp. 244–253.
KDDKDD-1999-ZhangRL #database #estimation #kernel #performance #scalability
Fast Density Estimation Using CF-Kernel for Very Large Databases (TZ, RR, ML), pp. 312–316.
MLDMMLDM-1999-PalenichkaV #image #multi
Extraction of Local Structural Features in Images by Using a Multi-scale Relevance Function (RMP, MAV), pp. 87–102.
SIGIRSIGIR-1999-JonesS #documentation #interactive #named #retrieval
Phrasier: A System for Interactive Document Retrieval Using Keyphrases (SJ, MSS), pp. 160–167.
SIGIRSIGIR-1999-LosadaB #documentation #modelling #ranking
Using a Belief Revision Operator for Document Ranking in Extended Boolean Models (DEL, AB), pp. 66–73.
SIGIRSIGIR-1999-PapadiasMKMA #heuristic #retrieval
Content-Based Retrieval Using Heuristic Search (DP, MM, PK, NM, IA), pp. 168–175.
UMLUML-1999-BalustG #modelling #process #uml
Using UML for Software Process Modelling (JMRB, XF), pp. 292–307.
UMLUML-1999-DemuthH #constraints #database #design #ocl #relational #uml
Using UML/OCL Constraints for Relational Database Design (BD, HH), pp. 598–613.
UMLUML-1999-Hilliard #architecture #uml
Using the UML for Architectural Description (RH), pp. 32–48.
UMLUML-1999-KimC #diagrams #formal method #uml
Formalizing the UML Class Diagram Using Object-Z (SKK, DAC), pp. 83–98.
ECOOPECOOP-1999-PangHLS #multi
Multi-method Dispatch Using Multiple Row Displacement (CP, WH, YL, DS), pp. 304–328.
OOPSLAOOPSLA-1999-KerstenM #aspect-oriented #case study #learning #named #programming
Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming (MK, GCM), pp. 340–352.
OOPSLAOOPSLA-1999-KrintzCH #java
Reducing Transfer Delay Using Java Class File Splitting and Prefetching (CK, BC, UH), pp. 276–291.
OOPSLAOOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality
Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
TOOLSTOOLS-ASIA-1999-BajgoricADU #automation #development #paradigm
Using Paradigm Plus CASE Tool in a Fusion-Based Application Development Project (NB, IKA, MD, ), pp. 424–427.
TOOLSTOOLS-ASIA-1999-KatribFP #java #thread
Synchronizing Java Threads Using Assertions (MK, DF, EP), pp. 51–60.
TOOLSTOOLS-ASIA-1999-LuDD #approach #evolution #object-oriented
A Equivalent Object-Oriented Schema Evolution Approach Using the Path-Independence Language (JL, CD, WD), pp. 212–217.
TOOLSTOOLS-ASIA-1999-ShenLSZ #algorithm #architecture #graph #object-oriented
An Algorithm for Describing Object-Oriented Software Architecture Using Graph (HHS, CL, MMS, WMZ), pp. 225–231.
TOOLSTOOLS-ASIA-1999-TanLTP #architecture #evolution #multi #orthogonal #research #reuse
Research in Evolution and Reuse of Multi-Leveled Orthogonal Software System Architecture (KT, ZyL, SqT, DcP), pp. 204–211.
TOOLSTOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
TOOLSTOOLS-EUROPE-1999-Bosch #architecture #design #industrial
Design and Use of Industrial Software Architectures (JB), p. 404.
TOOLSTOOLS-EUROPE-1999-Edwards #java #programming #visual notation
Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java (SE), p. 413.
TOOLSTOOLS-EUROPE-1999-Korson #architecture #component #framework
Using Components, Patterns and Frameworks to Realize Architecture (TDK), p. 415.
TOOLSTOOLS-EUROPE-1999-KoscielnyS #distributed #reuse
Dynamic Reuse of Services in Distributed Systems (GK, SS), pp. 305–318.
TOOLSTOOLS-EUROPE-1999-MensWD #architecture #classification
Declaratively Codifying Software Architectures Using Virtual Software Classifications (KM, RW, TD), pp. 33–45.
TOOLSTOOLS-PACIFIC-1999-CookKWMRW #product line #uml
Defining UML Family Members Using Prefaces (SC, AK, JW, RM, BR, ACW), pp. 102–114.
TOOLSTOOLS-PACIFIC-1999-HildebrandtH #corba #image #java
Dynamic Geospatial Image Mosaics Using JAVA, JAI, RMI and CORBA (JH, RH), pp. 254–264.
TOOLSTOOLS-PACIFIC-1999-Hussey #design pattern #specification
Using Design Patterns to Derive PAC Architectures from Object-Z Specifications (AH), pp. 40–51.
TOOLSTOOLS-USA-1999-Arsanjani #analysis #design #distributed #framework #implementation #java
Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
TOOLSTOOLS-USA-1999-ConcepcionLS #development #multi #recursion #thread
Managing the Software Development by Using the Recursive Multi- Threaded (RMT) Tool (AIC, SL, SJS), pp. 344–353.
TOOLSTOOLS-USA-1999-EgeRLL #database #java
Using Java to Add “Stored Procedures” to Databases (RKE, NR, JL, VL), pp. 322–331.
TOOLSTOOLS-USA-1999-Lilly #case study #problem
Use Case Pitfalls: Top 10 Problems from Real Projects Using Use Cases (SL), pp. 174–183.
TOOLSTOOLS-USA-1999-Mikhajlova #framework #java #source code #specification
Specifying Java Frameworks Using Abstract Programs (AM), p. 136–?.
AdaEuropeAdaEurope-1999-ChapmanD #safety
Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
AdaEuropeAdaEurope-1999-FranchPV #component #library #non-functional
Browsing a Component Library Using Non-functional Information (XF, JP, JV), pp. 332–343.
AdaEuropeAdaEurope-1999-Hagenauer #distributed #on the #simulation
On the Use of Controlled Types for Fossil Collection in a Distributed Simulation Systems (HH), pp. 238–249.
AdaEuropeAdaEurope-1999-LopezVV #ada #design #embedded #hardware
Hardware/Software Embedded System Specifiaction and Design Using Ada and VHDL (AL, MV, EV), pp. 356–370.
AdaEuropeAdaEurope-1999-MillanLM #ada #adaptation #java #persistent
An Adaptation of our Ada95/O2 Binding to Provide Persistence to the Java Language: Sharing and Handling of Data between Heterogenous Applications using Persistence (TM, ML, FM), pp. 320–331.
AdaEuropeAdaEurope-1999-VardanegaCP #case study #embedded #realtime #reuse
A Case Study in the Reuse of On-board Embedded Real-Time Software (TV, GC, JSP), pp. 425–436.
GPCEGCSE-1999-DHondtMW #logic programming
Using Reflective Logic Programming to Describe Domain Knowledge as an Aspect (MD, WDM, RW), pp. 16–23.
LOPSTRLOPSTR-1999-HoweK #source code
Specialising Fininte Domain Programs Using Polyhedra (JMH, AK), pp. 118–135.
LOPSTRLOPSTR-1999-PeraltaG #approach #imperative
Imperative Program Specialisation: An Approach Using CLP (JCP, JPG), pp. 102–117.
PADLPADL-1999-GoltzM #constraints #logic programming
University Timetabling Using Constraint Logic Programming (HJG, DM), pp. 320–334.
PADLPADL-1999-Lai #constraints #debugging #proving
Using Constraints in Local Proofs for CLP Debugging (CL), pp. 350–359.
PLDIPLDI-1999-Vegdahl #graph
Using Node Merging to Enhance Graph Coloring (SRV), pp. 150–154.
SASSAS-1999-TakimotoH #graph
Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
AdaSIGAda-1999-BallbastreTVC #ada #case study #distributed #experience #realtime
Experiences using Ada in a real-time and distributed laboratory (PB, ST, JViC, AC), pp. 145–155.
AdaSIGAda-1999-Colket #analysis #realtime
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
AdaSIGAda-1999-NeedhamDP #ada #distributed #object-oriented #towards
Towards a distributed object-oriented propagation model using Ada95 (DMN, SAD, TJP), pp. 203–210.
RERE-1999-GreerBS #risk management
Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
RERE-1999-WielsE #formal method #modelling
Formal Modeling of Space Shuttle Software Change Requests using SCR (VW, SME), pp. 114–122.
ASEASE-1999-Bose #architecture #automation #modelling #simulation #uml #verification
Automated Translation of UML Models of Architectures for Verification and Simulation Using SPIN (PKB), pp. 102–109.
ASEASE-1999-Krustev #generative #refinement #testing
Software Test Generation Using Refinement Types (DNK), pp. 279–282.
ASEASE-1999-MartinsD #approach #elicitation #process #requirements
An Approach to Software Requirements Elicitation Using the Precepts from Activity Theory (LEGM, BMD), pp. 15–23.
ASEASE-1999-WatersRA #architecture #concept analysis
Architectural Element Matching Using Concept Analysis (RW, SR, GDA), pp. 291–294.
ASEASE-1999-WeltyF #architecture #documentation #ontology
A Formal Ontology for Re-Use of Software Architecture Documents (CAW, DAF), pp. 259–262.
ESECESEC-FSE-1999-Bokowski #constraints #java #named
CoffeeStrainer: Statically-Checked Constraints on the Definition and Use of Types in Java (BB), pp. 355–374.
ESECESEC-FSE-1999-GargantiniH #model checking #requirements #specification #testing
Using Model Checking to Generate Tests from Requirements Specifications (AG, CLH), pp. 146–162.
ESECESEC-FSE-1999-JagerSW #modelling #process #uml
Using UML for Software Process Modeling (DJ, AS, BW), pp. 91–108.
ICSEICSE-1999-AtkinsBGM #tool support #version control
Using Version Control Data to Evaluate the Impact of Software Tools (DLA, TB, TLG, AM), pp. 324–333.
ICSEICSE-1999-DangK #mobile #model checking
Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
ICSEICSE-1999-DashofyMT #architecture #distributed #middleware #off the shelf
Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures (EMD, NM, RNT), pp. 3–12.
ICSEICSE-1999-DeursenK #clustering #concept analysis #identification
Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
ICSEICSE-1999-HallHW #approach #deployment
A Cooperative Approach to Support Software Deployment Using the Software Dock (RSH, DH, ALW), pp. 174–183.
ICSEICSE-1999-Leinbach #agile #delivery #internet
Successfully Deliver Internet Applications Using Rapid Software Techniques (CL), pp. 624–625.
ICSEICSE-1999-Magee #analysis #architecture #behaviour
Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
ICSEICSE-1999-MaruyamaS #automation #dependence #graph #refactoring
Automatic Method Refactoring Using Weighted Dependence Graphs (KM, KS), pp. 236–245.
ICSEICSE-1999-MemonPS #approach #testing #user interface
Using a Goal-Driven Approach to Generate Test Cases for GUIs (AMM, MEP, MLS), pp. 257–266.
ICSEICSE-1999-OssherT #development #evolution #object-oriented #problem #programming
Using Subject-Oriented Programming to Overcome Common Problems in Object-Oriented Software Development/Evolution (HO, PLT), pp. 687–688.
ICSEICSE-1999-YehL #metric #normalisation #precise #towards
Toward Precise Measurements Using Software Normalization (PLY, JCL), pp. 736–737.
SACSAC-1999-Al-OmariM #fault tolerance
Fault-Tolerant Routing in Hypercubes Using Masked Interval Routing Scheme (MAO, MM), pp. 481–485.
SACSAC-1999-Binkley #dependence #graph #slicing
Computing Amorphous Program Slices Using Dependence Graphs (DB), pp. 519–525.
SACSAC-1999-CraneWS #algorithm #multi #pipes and filters #scheduling #search-based
Scheduling of Multi-Product Fungible Liquid Pipelines Using Genetic Algorithms (DSC, RLW, DAS), pp. 280–285.
SACSAC-1999-FenwickD #automaton #estimation
Electrical Substation Service-Area Estimation Using Cellular Automata: An Initial Report (JWF, LJD), pp. 560–565.
SACSAC-1999-JonesK #algorithm #network #search-based
The Use of Genetic Algorithms and Neural Networks to Investigate the Baldwin Effect (MJ, AHK), pp. 275–279.
SACSAC-1999-KatayamaN #algorithm #problem #search-based
A New Iterated Local Search Algorithm Using Genetic Crossover for the Traveling Salesman Problem (KK, HN), pp. 302–306.
SACSAC-1999-MocellinM #aspect-oriented #behaviour #modelling #multi
Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS (FM, HM), pp. 450–454.
SACSAC-1999-Monfroy #constraints
Using “Weaker” Functions for Constraint Propagation Over Real Numbers (EM), pp. 553–559.
SACSAC-1999-OgataIF #optimisation #term rewriting
Optimizing Term Rewriting Using Discrimination Nets With Specialization (KO, SI, KF), pp. 511–518.
SACSAC-1999-SegarraA #file system #mobile #named
MFS: A Mobile File System Using Generic System Services (MTS, FA), pp. 419–420.
SACSAC-1999-Taylor #finite #induction #pattern matching
Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique (PAT), pp. 41–45.
DACDAC-1999-AbramoviciSS #configuration management #hardware #satisfiability
A Massively-Parallel Easily-Scalable Satisfiability Solver Using Reconfigurable Hardware (MA, JTdS, DGS), pp. 684–690.
DACDAC-1999-AbtsR #multi #scalability #verification
Verifying Large-Scale Multiprocessors Using an Abstract Verification Environment (DA, MR), pp. 163–168.
DACDAC-1999-BalasaL #layout #representation
Module Placement for Analog Layout Using the Sequence-Pair Representation (FB, KL), pp. 274–279.
DACDAC-1999-BiereCCFZ #model checking #satisfiability
Symbolic Model Checking Using SAT Procedures instead of BDDs (AB, AC, EMC, MF, YZ), pp. 317–320.
DACDAC-1999-ChangLPK #verification
Verification of a Microprocessor Using Real World Applications (YSC, SL, ICP, CMK), pp. 181–184.
DACDAC-1999-ChenM
Noise-Aware Repeater Insertion and Wire-Sizing for On-Chip Interconnect Using Hierarchical Moment-Matching (CPC, NM), pp. 502–506.
DACDAC-1999-ConnEMOSVW #optimisation
Gradient-Based Optimization of Custom Circuits Using a Static-Timing Formulation (ARC, IME, WWM, PRO, PNS, CV, CBW), pp. 452–459.
DACDAC-1999-DoboliNDGV #behaviour #design #synthesis
Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
DACDAC-1999-DrechslerG #bound
Using Lower Bounds During Dynamic BDD Minimization (RD, WG), pp. 29–32.
DACDAC-1999-ErcegovacKP #behaviour #multi #optimisation #power management #precise #synthesis
Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic (MDE, DK, MP), pp. 568–573.
DACDAC-1999-GovindarajuDB #approximate #reachability
Improved Approximate Reachability Using Auxiliary State Variables (SGG, DLD, JPB), pp. 312–316.
DACDAC-1999-GunupudiN
Model-Reduction of Nonlinear Circuits Using Krylov-Space Techniques (PKG, MSN), pp. 13–16.
DACDAC-1999-GuoRP #generative #named
Proptest: A Property Based Test Pattern Generator for Sequential Circuits Using Test Compaction (RG, SMR, IP), pp. 653–659.
DACDAC-1999-HemaniMKPONOEL #design #power management
Lowering Power Consumption in Clock by Using Globally Asynchronous Locally Synchronous Design Style (AH, TM, SK, AP, TO, PN, , PE, DL), pp. 873–878.
DACDAC-1999-JiangV #energy
IC Test Using the Energy Consumption Ratio (WJ, BV), pp. 976–981.
DACDAC-1999-JohnsonSR #performance
Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS (MCJ, DS, KR), pp. 442–445.
DACDAC-1999-KapadiaH #automation #clustering #convergence #design #standard
Using Partitioning to Help Convergence in the Standard-Cell Design Automation Methodology (HK, MH), pp. 592–597.
DACDAC-1999-SalekLP #generative #independence #named
MERLIN: Semi-Order-Independent Hierarchical Buffered Routing Tree Generation Using Local Neighborhood Search (AHS, JL, MP), pp. 472–478.
DACDAC-1999-SaxenaL
Crosstalk Minimization Using Wire Perturbations (PS, CLL), pp. 100–103.
DACDAC-1999-SgroiL #embedded #petri net #synthesis
Synthesis of Embedded Software Using Free-Choice Petri Nets (MS, LL), pp. 805–810.
DACDAC-1999-Sheehan #equation #named #order #performance #reduction
ENOR: Model Order Reduction of RLC Circuits Using Nodal Equations for Efficient Factorization (BNS), pp. 17–21.
DACDAC-1999-StepnerRH #design #embedded #realtime
Embedded Application Design Using a Real-Time OS (DS, NR, DH), pp. 151–156.
DACDAC-1999-SundararajanP #power management #synthesis
Synthesis of Low Power CMOS VLSI Circuits Using Dual Supply Voltages (VS, KKP), pp. 72–75.
DACDAC-1999-TsaiCB #quality
Improving the Test Quality for Scan-Based BIST Using a General Test Application Scheme (HCT, KTC, SB), pp. 748–753.
DACDAC-1999-TupuriKA #automation #constraints #functional #generative #testing
Test Generation for Gigahertz Processors Using an Automatic Functional Constraint Extractor (RST, AK, JAA), pp. 647–652.
DACDAC-1999-VandecappelleMBCV #design #feedback #memory management #multi
Global Multimedia System Design Exploration Using Accurate Memory Organization Feedback (AV, MM, EB, FC, DV), pp. 327–332.
DACDAC-1999-YehKSW #design #layout
Layout Techniques Supporting the Use of Dual Supply Voltages for Cell-based Designs (CWY, YSK, SJS, JSW), pp. 62–67.
DATEDATE-1999-BreuerMBFLK #reasoning #semantics
Reasoning about VHDL and VHDL-AMS using Denotational Semantics (PTB, NMM, JPB, RBF, MMLP, CDK), pp. 346–352.
DATEDATE-1999-BuhlerPKB #approach #performance #process #simulation
Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
DATEDATE-1999-ChangP #co-evolution #communication #design #named #programming
Codex-dp: Co-design of Communicating Systems Using Dynamic Programming (JMC, MP), p. 568–?.
DATEDATE-1999-CherubalC #fault #functional #parametricity
Parametric Fault Diagnosis for Analog Systems Using Functional Mapping (SC, AC), p. 195–?.
DATEDATE-1999-CotaCL #adaptation #fault #linear
A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester (ÉFC, LC, ML), pp. 184–188.
DATEDATE-1999-DhanwadaNV #constraints #synthesis
Hierarchical Constraint Transformation Using Directed Interval Search for Analog System Synthesis (NRD, ANA, RV), p. 328–?.
DATEDATE-1999-FournierAL #functional #product line #verification
Functional Verification Methodology for Microprocessors Using the Genesys Test-Program Generator-Application to the x86 Microprocessors Family (LF, YA, ML), pp. 434–441.
DATEDATE-1999-GomesC #testing
Minimal Length Diagnostic Tests for Analog Circuits using Test History (AVG, AC), pp. 189–194.
DATEDATE-1999-HongB #analysis #finite #reachability #scalability #state machine
Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
DATEDATE-1999-Hsiao #estimation #optimisation #scalability #search-based
Peak Power Estimation Using Genetic Spot Optimization for Large VLSI Circuits (MSH), p. 175–?.
DATEDATE-1999-Kuchcinski #constraints #finite #graph #scheduling
Integrated Resource Assignment and Scheduling of Task Graphs Using Finite Domain Constraints (KK), pp. 772–773.
DATEDATE-1999-Marques-SilvaG #equivalence #learning #recursion #satisfiability
Combinational Equivalence Checking Using Satisfiability and Recursive Learning (JPMS, TG), pp. 145–149.
DATEDATE-1999-MartinezAQH #algorithm #encoding
An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length (MM, MJA, JMQ, JLH), pp. 521–525.
DATEDATE-1999-Montiel-NelsonNASN #design #logic
High Speed GaAs Subsystem Design using Feed Through Logic (JAMN, SN, VdA, RS, AN), p. 509–?.
DATEDATE-1999-RaikU #diagrams #generative #modelling #testing
Sequential Circuit Test Generation Using Decision Diagram Models (JR, RU), pp. 736–740.
DATEDATE-1999-RanjanSSB #verification
Using Combinational Verification for Sequential Circuits (RKR, VS, FS, RKB), pp. 138–144.
DATEDATE-1999-SantosoMRA #generative #named #testing
FreezeFrame: Compact Test Generation Using a Frozen Clock Strategy (YS, MCM, EMR, MA), p. 747–?.
DATEDATE-1999-SantosT #fault #simulation
Defect-Oriented Mixed-Level Fault Simulation of Digital Systems-on-a-Chip Using HDL (MBS, JPT), p. 549–?.
DATEDATE-1999-Seepold #component #reuse
Reuse of IP and virtual components (RS).
DATEDATE-1999-Sheehan #reduction
Projective Convolution: RLC Model-Order Reduction Using the Impulse Response (BNS), p. 669–?.
DATEDATE-1999-TabbaraSSFL #modelling #performance
Fast Hardware-Software Co-simulation Using VHDL Models (BT, MS, ALSV, EF, LL), p. 309–?.
DATEDATE-1999-TanS #diagrams #scalability
Interpretable Symbolic Small-Signal Characterization of Large Analog Circuits using Determinant Decision Diagrams (XDT, CJRS), pp. 448–453.
DATEDATE-1999-ThorntonWDD #diagrams #order
Variable Reordering for Shared Binary Decision Diagrams Using Output Probabilities (MAT, JPW, RD, ND), pp. 758–759.
DATEDATE-1999-WeissSR #embedded #operating system #performance #realtime
Emulation of a Fast Reactive Embedded System using a Real Time Operating System (KW, TS, WR), pp. 764–765.
HPCAHPCA-1999-CondonHPS #memory management #modelling
Using Lamport Clocks to Reason about Relaxed Memory Models (AC, MDH, MP, DJS), pp. 270–278.
HPCAHPCA-1999-KaxirasG #performance #predict
Improving CC-NUMA Performance Using Instruction-Based Prediction (SK, JRG), pp. 161–170.
HPDCHPDC-1999-AkarsuFHKKSY #performance
Using Gateway System to Provide a Desktop Access to High Performance Computational Resources (EA, GF, TH, AK, KSK, PS, CHY), pp. 294–298.
HPDCHPDC-1999-AllenGMS #distributed #tool support
The Cactus Computational Toolkit and using Distributed Computing to Collide Neutron Stars (GA, TG, JM, ES), pp. 57–61.
HPDCHPDC-1999-CoadyOF #clustering #embedded #memory management #network
Using Embedded Network Processors to Implement Global Memory Management in a Workstation Cluster (YC, JSO, MJF), pp. 319–328.
HPDCHPDC-1999-ReneP #corba #encapsulation #parallel
MPI Code Encapsulating using Parallel CORBA Object (CR, TP), pp. 3–10.
LCTESLCTES-1999-CooperSS #algorithm #optimisation #search-based
Optimizing for Reduced Code Space using Genetic Algorithms (KDC, PJS, DS), pp. 1–9.
PDPPDP-1999-HollingworthST #design #detection #parallel
Design of highly parallel edge detection nodes using evolutionary techniques (GH, SLS, AMT), pp. 35–42.
PDPPDP-1999-PriceHLT #adaptation #architecture #array #parallel
Adaptive microphone array beamforming for teleconferencing using VHDL and parallel architectures (TPWP, DMH, AVL, AMT), pp. 13–18.
PDPPDP-1999-RosatoPC #framework #parallel #platform #simulation
Simulation of X-ray diffraction patterns using a massively parallel SIMD platform (VR, NP, FC), pp. 315–320.
PPoPPPPoPP-1999-BagrodiaDDP #parallel #performance #predict #scalability #simulation
Performance Prediction of Large Parallel Applications using Parallel Simulations (RB, ED, SD, TP), pp. 151–162.
PPoPPPPoPP-1999-SchererLGZ #adaptation #parallel
Transparent Adaptive Parallelism on NOWs using OpenMP (AS, HL, TRG, WZ), pp. 96–106.
PPoPPPPoPP-1999-Sundaram-StukelV #analysis #predict
Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
SOSPSOSP-1999-GovilTHR #clustering #multi #resource management
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors (KG, DT, YH, MR), pp. 154–169.
FASEFASE-1999-LopesF
Using Explicit State to Describe Architechtures (AL, JLF), pp. 144–160.
FoSSaCSFoSSaCS-1999-Sangiorgi #concurrent #reasoning
Reasoning About Concurrent Systems Using Types (DS), pp. 31–40.
STOCSTOC-1999-Trevisan #generative #pseudo
Construction of Extractors Using Pseudo-Random Generators (LT), pp. 141–148.
TACASTACAS-1999-BehrmannLAHL #composition #reuse #usability #verification
Verification of Hierarchical State/Event Systems Using Reusability and Compositionality (GB, KGL, HRA, HH, JLN), pp. 163–177.
TACASTACAS-1999-Heljanko #concurrent #logic programming #petri net #problem #reachability #semantics #source code
Using Logic Programs with Stable Model Semantics to Solve Deadlock and Reachability Problems for 1-Safe Petri Nets (KH), pp. 240–254.
TACASTACAS-1999-Hirschkoff #bisimulation #on the #verification
On the Benefits of Using the Up-To Techniques for Bisimulation Verification (DH), pp. 285–299.
TACASTACAS-1999-KahloucheVZ #communication #consistency #hardware #protocol #testing
Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
CADECADE-1999-FeltyHR #abstraction #syntax
Formal Metatheory using Implicit Syntax, and an Application to Data Abstraction for Asynchronous Systems (APF, DJH, AR), pp. 237–251.
CADECADE-1999-GribomontS #validation #verification
System Description: Using OBDD’s for the validation of Skolem verification conditions (EPG, NS), pp. 222–226.
CAVCAV-1999-BehrmannLPWY #analysis #diagrams #difference #performance #reachability
Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
CAVCAV-1999-BiereCRZ #model checking #safety
Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs (AB, EMC, RR, YZ), pp. 60–71.
CAVCAV-1999-RameshB #case study #design #pipes and filters #tool support #validation
Validation of Pipelined Processor Designs Using Esterel Tools: A Case Study (SR, PB), pp. 84–95.
CSLCSL-1999-AltenkirchR #induction #monad
Monadic Presentations of λ Terms Using Generalized Inductive Types (TA, BR), pp. 453–468.
CSLCSL-1999-Bonelli
Using Fields and Explicit Substitutions to Implement Objects and Functions in a de Bruijn Setting (EB), pp. 204–219.
CSLCSL-1999-Howe #interactive #proving #theorem proving #type system
Interactive Theorem Proving Using Type Theory (DJH), p. 578.
ICLPICLP-1999-CarroH #concurrent #database #prolog #thread
Concurrency in Prolog Using Threads and a Shared Database (MC, MVH), pp. 320–334.
ICLPICLP-1999-HermenegildoBPL #debugging #optimisation #preprocessor #program analysis
Program Analysis, Debugging, and Optimization Using the Ciao System Preprocessor (MVH, FB, GP, PLG), pp. 52–66.
ICLPICLP-1999-MarinoM #functional #logic programming #source code #static analysis
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), p. 614.
ICTSSIWTCS-1999-ProbertW #functional #generative #performance #testing
Fast Functional Test Generation Using an SDL Model (RLP, AWW), pp. 299–316.
ADLADL-1998-ChaeMM #multi #robust
A Robust Data Hiding Technique Using Multidimensional Lattices (JJC, DM, BSM), pp. 319–326.
ADLADL-1998-NelsonMSZ #clustering #multi #protocol
NCSTRL+: Adding Multi-Discipline and Multi-Genre Support to the Dienst Protocol Using Clusters and Buckets (MLN, KM, SNTS, MZ), pp. 128–136.
DL-1998-ChungPS #automation #network
Automatic Subject Indexing Using an Associative Neural Network (YMC, WMP, BRS), pp. 59–68.
DL-1998-GloverB #documentation #order
Using Decision Theory to Order Documents (EJG, WPB), pp. 285–286.
TPDLECDL-1998-MahdiCF #segmentation
Improving the Spatial-Temporal Clue Based Segmentation by the Use of Rhythm (WM, LC, DF), pp. 169–181.
TPDLECDL-1998-PaulPHC #component #distributed #execution #named #workflow
RainMaker: Workflow Execution Using Distributed, Interoperable Components (SP, EP, DH, JKC), pp. 801–818.
TPDLECDL-1998-YeminiDF #information management #named
MarketNet: Using Virtual Currency to Protect Information Systems (YY, AD, DF), pp. 891–902.
HTHT-1998-ShipmanFBCH #adaptation #case study #experience
Using Paths in the Classroom: Experiences and Adaptations (FMSI, RF, DB, CCC, HwH), pp. 267–270.
HTHT-1998-WiilO #hypermedia #taxonomy
Using the Flag Taxonomy to Study Hypermedia System Interoperabilty (UKW, ), pp. 188–197.
PODSPODS-1998-AbiteboulD #complexity #query
Complexity of Answering Queries Using Materialized Views (SA, OMD), pp. 254–263.
SIGMODSIGMOD-1998-ChakrabartiDI #categorisation #hypermedia
Enhanced Hypertext Categorization Using Hyperlinks (SC, BD, PI), pp. 307–318.
SIGMODSIGMOD-1998-Cohen #database #integration #query #semistructured data #similarity
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity (WWC), pp. 201–212.
SIGMODSIGMOD-1998-Cohen98a #query #similarity #web
Providing Database-like Access to the Web Using Queries Based on Textual Similarity (WWC), pp. 558–560.
SIGMODSIGMOD-1998-DeshpandeRSN #multi #query
Caching Multidimensional Queries Using Chunks (PD, KR, AS, JFN), pp. 259–270.
SIGMODSIGMOD-1998-Miller
Using Schematically Heterogeneous Structures (RJM), pp. 189–200.
SIGMODSIGMOD-1998-PapadopoulosM #array #query #similarity
Similarity Query Processing Using Disk Arrays (AP, YM), pp. 225–236.
SIGMODSIGMOD-1998-SubramanianV #cost analysis #optimisation #query
Cost-Based Optimization of Decision Support Queries Using Transient Views (SNS, SV), pp. 319–330.
VLDBVLDB-1998-AnkerstBKS #adaptation #approximate #query #similarity
Improving Adaptable Similarity Query Processing by Using Approximations (MA, BB, HPK, TS), pp. 206–217.
VLDBVLDB-1998-ChakrabartiSD #mining
Mining Surprising Patterns Using Temporal Description Length (SC, SS, BD), pp. 606–617.
VLDBVLDB-1998-DarEGP #database
DTL’s DataSpot: Database Exploration Using Plain Language (SD, GE, SG, EP), pp. 645–649.
VLDBVLDB-1998-MiloZ #semistructured data
Using Schema Matching to Simplify Heterogeneous Data Translation (TM, SZ), pp. 122–133.
ITiCSEITiCSE-1998-BouletJB #education #modelling #process #student
Teaching process modelling to undergraduate computer students: effects of using Lotus Notes and television programmes (MMB, FBJ, SB), pp. 32–36.
ITiCSEITiCSE-1998-Ellis #development #internet #learning #multi #problem
Group 1 (working group): development and use of multimedia and Internet resources for a problem based learning environment (AE), p. 269.
ITiCSEITiCSE-1998-FincherP #experience #towards
Beyond anecdote towards real transfer: using other institutions’ experience of project work (SF, MP), pp. 86–89.
ITiCSEITiCSE-1998-Grove #motivation #process #programming
Using the personal software process to motivate good programming practices (RFG), pp. 98–101.
ITiCSEITiCSE-1998-JohnsonLHSFDM #collaboration
Virtual office hours using TechTalk, a Web-based mathematical collaboration tool (JRJ, YNL, TTH, TS, TF, SD, PM), pp. 130–133.
ITiCSEITiCSE-1998-Marshall #education #internet
Using the Internet to teach the Internet (DM), pp. 171–174.
ITiCSEITiCSE-1998-RoantreeK #automation #web
Automated collection of coursework using the Web (MR, TEK), pp. 206–208.
ITiCSEITiCSE-1998-Roberts #education
Strategies for using technology in the teaching of ethics (ER), pp. 209–212.
ITiCSEITiCSE-1998-Scoy #programming language
Using the BURKS 2 CD-ROM in a principles of programming languages course (FLVS), pp. 239–242.
ITiCSEITiCSE-1998-TiwariH #collaboration #learning #student
Learning groupware through using groupware-computer supported collaborative learning with face to face students (AT, CH), pp. 236–238.
CSMRCSMR-1998-KirnerG #re-engineering #specification
System Specification Reengineering Using the SpecView Tool (TGK, RCG), pp. 135–141.
CSMRCSMR-1998-Kleuker #distributed #formal method #re-engineering
Reengineering of Distributed Systems Using Formal Methods (SK), pp. 189–192.
ICSMEICSM-1998-BaxterYMSB #abstract syntax tree #clone detection #detection #syntax
Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
ICSMEICSM-1998-BurdM #approach #clustering #component #evolution #maintenance #re-engineering
Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering (EB, MM), pp. 199–207.
ICSMEICSM-1998-HarmanSD #analysis #memory management #slicing
Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
ICSMEICSM-1998-LiangH #dependence #graph #slicing
Slicing Objects Using System Dependence Graphs (DL, MJH), pp. 358–367.
ICSMEICSM-1998-OcaC #data mining #identification #mining
Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
ICSMEICSM-1998-Pearse #evolution #metric
Using Software Metrics to Control Firmware Evolution (TTP), pp. 72–73.
ICSMEICSM-1998-Tonella #diagrams #encapsulation #memory management
Using the O-A Diagram to Encapsulate Dynamic Memory Access (PT), pp. 326–335.
IWPCIWPC-1998-MancoridisMRCG #automation #clustering #source code
Using Automatic Clustering to Produce High-Level System Organizations of Source Code (SM, BSM, CR, YFC, ERG), pp. 45–52.
WCREWCRE-1998-Holt #algebra #architecture #relational
Structural Manipulations of Software Architecture using Tarski Relational Algebra (RCH), pp. 210–219.
WCREWCRE-1998-PenteadoMP #legacy #object-oriented #paradigm #re-engineering
Reengineering of Legacy Systems Based on Transformation Using the Object-Oriented Paradigm (RP, PCM, AFdP), pp. 144–153.
CIAAWIA-1998-LHerPM #automaton #proving #source code
Proving Sequential Function Chart Programs Using Automata (DL, PLP, LM), pp. 149–163.
CIAAWIA-1998-Nykanen #transducer
Using Acceptors as Transducers (MN), pp. 133–148.
FMFM-1998-Borger #analysis #design #state machine
High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
FMFM-1998-KoobUW #formal method #modelling #policy #process #security #topic
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
RTARTA-1998-ArtsG #composition #dependence #termination
Modularity of Termination Using Dependency pairs (TA, JG), pp. 226–240.
AFPAFP-1998-Sheard98 #ml #programming language #staged
Using MetaML: A Staged Programming Language (TS), pp. 207–239.
ICGTTAGT-1998-Faulstich #graph transformation
Using Graph Transformation Techniques for Integrating Information from the WWW (LF), pp. 426–441.
ICGTTAGT-1998-Hrischuk #automation #graph grammar #process
A Model Making Automation Process (MMAP) Using a Graph Grammar Formalism (CEH), pp. 442–454.
CHICHI-1998-AltyR #communication #music #visual notation
Communicating Graphical Information to Blind Users Using Music: The Role of Context (JLA, DIR), pp. 574–581.
CHICHI-1998-OHaraSNS #documentation #library #student
Student Readers’ Use of Library Documents: Implications for Library Technologies (KO, FS, WMN, AS), pp. 233–240.
CHICHI-1998-Pirolli #design #information management #trade-off
Exploring Browser Design Trade-Offs Using a Dynamical Model of Optimal Information Foraging (PP), pp. 33–40.
CHICHI-1998-PlanteTI #interactive
Evaluating the Location of Hot Spots in Interactive Scenes Using the 3R Toolbox (AP, ST, SI), pp. 117–123.
CHICHI-1998-PlesniakP #artificial reality #video
Coincident Display Using Haptics and Holographic Video (WP, RP), pp. 304–311.
CSCWCSCW-1998-KobayashiSSTDW #collaboration #web
Collaborative Customer Services Using Synchronous Web Browser Sharing (MK, MS, TS, MT, SD, CGW), pp. 99–109.
CSCWCSCW-1998-MyersSG #collaboration #multi
Collaboration Using Multiple PDAs Connected to a PC (BAM, HS, RG), pp. 285–294.
CSCWCSCW-1998-SarwarKBHMR #collaboration #predict #quality #research
Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System (BMS, JAK, AB, JLH, BNM, JR), pp. 345–354.
CAiSECAiSE-1998-Dahchour #approach #formal method
Formalizing Materialization Using a Metaclass Approach (MD), pp. 401–421.
CAiSECAiSE-1998-HarrisonL #automation #information management #legacy #reverse engineering
Automated Reverse Engineering of Legacy 4GL Information System Applications Using the ITOC Workbench (JVH, WML), pp. 41–57.
EDOCEDOC-1998-Iyengar #architecture #repository #uml
A universal repository architecture using the OMG UML and MOF (SSI), pp. 35–44.
EDOCEDOC-1998-Kobryn #architecture #enterprise #modelling #uml
Modeling enterprise software architectures using UML (CK), pp. 25–34.
ECIRACIR-1998-OunisP #concept #effectiveness #graph #performance #query #relational
Effective and Efficient Relational Query Processing Using Conceptual Graphs (IO, MP).
ECIRACIR-1998-TheophylactouL #documentation #retrieval
A Dempster-Shafer Model for Document Retrieval using Noun Phrases (MT, ML).
CIKMCIKM-1998-DanielsR
Locating Passages Using a Case-Based of Excerpts (JJD, ELR), pp. 38–44.
CIKMCIKM-1998-PapkaA #classification #documentation #multi
Document Classification Using Multiword Features (RP, JA), pp. 124–131.
CIKMCIKM-1998-Tang #incremental #performance
Using Incremental Pruning to Increase the Efficiency of Dynamic Itemset Counting for Association Rules (JT), pp. 273–280.
CIKMCIKM-1998-TungTL #mining #named #online #optimisation
BROOM: Buffer Replacement using Online Optimization by Mining (AKHT, YCT, HL), pp. 185–192.
ICMLICML-1998-AbeM #learning #query
Query Learning Strategies Using Boosting and Bagging (NA, HM), pp. 1–9.
ICMLICML-1998-FrankW98a #mutation testing #permutation
Using a Permutation Test for Attribute Selection in Decision Trees (EF, IHW), pp. 152–160.
ICMLICML-1998-KimuraK #algorithm #analysis #learning
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
ICMLICML-1998-KollerF #approximate #learning #probability #process
Using Learning for Approximation in Stochastic Processes (DK, RF), pp. 287–295.
ICMLICML-1998-LochS #markov #policy #process
Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
ICMLICML-1998-McCluskeyW #case study #requirements #validation
A Case Study in the Use of Theory Revision in Requirements Validation (TLM, MMW), pp. 368–376.
ICMLICML-1998-NakamuraA #algorithm #collaboration #predict
Collaborative Filtering Using Weighted Majority Prediction Algorithms (AN, NA), pp. 395–403.
ICMLICML-1998-PrecupU #approximate #classification
Classification Using Phi-Machines and Constructive Function Approximation (DP, PEU), pp. 439–444.
ICMLICML-1998-RandlovA #learning
Learning to Drive a Bicycle Using Reinforcement Learning and Shaping (JR, PA), pp. 463–471.
ICPRICPR-1998-AdigaC #image #segmentation
Segmentation of volumetric histo-pathological images by surface following using constrained snakes (PSUA, BBC), pp. 1674–1676.
ICPRICPR-1998-AeberhardV #image #multi #recognition
Face recognition using multiple image view line segments (SA, OYdV), pp. 1198–1200.
ICPRICPR-1998-AhrnsN #realtime #similarity
Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
ICPRICPR-1998-AiharaIYT #image #self
Memory-based self-localization using omnidirectional images (NA, HI, NY, HT), pp. 1799–1803.
ICPRICPR-1998-ArakiMTY #image #multi #realtime #robust #sequence #statistics
Real-time tracking of multiple moving objects in moving camera image sequences using robust statistics (SA, TM, HT, NY), pp. 1433–1435.
ICPRICPR-1998-ArikiS #classification #multi
Classification of TV sports news by DCT features using multiple subspace method (YA, YS), pp. 1488–1491.
ICPRICPR-1998-Aviles-Cruz #algorithm #data fusion #probability #segmentation
Unsupervised texture segmentation using stochastic version of the EM algorithm and data fusion (CAC), pp. 1005–1009.
ICPRICPR-1998-BoccignoneCP #detection
Small target detection using wavelets (GB, AC, AP), pp. 1776–1778.
ICPRICPR-1998-ChenL #algorithm #documentation
Field-data grouping for form document processing using a gravitation-based algorithm (JLC, HJL), pp. 1095–1097.
ICPRICPR-1998-CheungI #detection #symmetry
Symmetry detection using complex moments (KKTC, HHSI), pp. 1473–1475.
ICPRICPR-1998-CinqueLLT #image #retrieval
Retrieval of images using rich region descriptions (LC, FL, SL, SLT), pp. 899–901.
ICPRICPR-1998-CracknellD #comprehension #documentation #image
Document image understanding of handwritten forms using rule-trees (CC, ACD), pp. 936–938.
ICPRICPR-1998-DanielssonLY #3d #segmentation
Segmentation of 3D volumes using second derivatives (PED, QL, QZY), pp. 248–251.
ICPRICPR-1998-EglinBE #complexity #visual notation
Printed text featuring using the visual criteria of legibility and complexity (VE, SB, HE), pp. 942–944.
ICPRICPR-1998-FanC #documentation #identification
Form document identification using line structure based features (KCF, MLC), pp. 1098–1100.
ICPRICPR-1998-FerriMAS #algorithm #estimation
Variable-size block matching algorithm for motion estimation using a perceptual-based splitting criterion (FJF, JM, JVA, JS), pp. 286–288.
ICPRICPR-1998-FlorebySS #bound #fourier #image #order
Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
ICPRICPR-1998-FrydendalJ #graph #image #segmentation
Segmentation of sugar beets using image and graph processing (IF, RJ), pp. 1697–1699.
ICPRICPR-1998-Garcia-SevillaP #analysis #image
The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
ICPRICPR-1998-Gavrila #distance #multi
Multi-feature hierarchical template matching using distance transforms (DMG), pp. 439–444.
ICPRICPR-1998-GiacconeGJ #estimation
Creating virtual scenes using active contours and global motion estimation (PRG, DG, GAJ), pp. 1505–1507.
ICPRICPR-1998-GoktepeAYY #image #markov #modelling #random #segmentation
Unsupervised texture based image segmentation by simulated annealing using Markov random field and Potts models (MG, VA, NY, CY), pp. 820–822.
ICPRICPR-1998-Govindu0C #geometry #image
Using geometric properties for correspondence-less image alignment (VG, CS, RC), pp. 37–41.
ICPRICPR-1998-GroweT #3d #evaluation #image
Use of explicit knowledge and GIS data for the 3D evaluation of remote sensing images (SG, RT), pp. 1413–1415.
ICPRICPR-1998-GuKTH #image #robust
Robust extraction of characters from color scene image using mathematical morphology (LG, TK, NT, RMH), pp. 1002–1004.
ICPRICPR-1998-HaritaogluHD #named
Ghost: a human body part labeling system using silhouettes (IH, DH, LSD), pp. 77–82.
ICPRICPR-1998-HattoriMS #image #symmetry
Estimating pose of human face based on symmetry plane using range and intensity images (KH, SM, YS), pp. 1183–1187.
ICPRICPR-1998-HeisterkampB #recognition
Object and motion recognition using the plane plus parallax displacement of conics (DRH, PB), pp. 751–753.
ICPRICPR-1998-Henry #modelling
Use of an evolutive base of models in a system for reading printed texts (JLH), pp. 802–804.
ICPRICPR-1998-HeydenK #constraints #re-engineering
Reconstruction from affine cameras using closure constraints (AH, FK), pp. 47–50.
ICPRICPR-1998-HjaltasonRSW #modelling #ranking #recognition #sorting
Using spatial sorting and ranking in model-based object recognition (GRH, MR, HS, IW), pp. 1347–1349.
ICPRICPR-1998-HofmanJ #analysis #approach #clustering #performance #robust
Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
ICPRICPR-1998-HuangSW
Face pose discrimination using support vector machines (SVM) (JH, XS, HW), pp. 154–156.
ICPRICPR-1998-HungYCHF #pointer
Free-hand pointer by use of an active stereo vision system (YPH, YSY, YSC, IBH, CSF), pp. 1244–1246.
ICPRICPR-1998-HwangYTY #3d #linear
A factorization method using 3D linear combination for shape and motion recovery (KCH, NY, HT, KY), pp. 959–963.
ICPRICPR-1998-IshiiMT #detection #image #realtime #video
Detection of foreign substances mixed in a plastic bottle of medicinal solution using real-time video image processing (AI, TM, ST), pp. 1646–1650.
ICPRICPR-1998-JainHK #identification #named
F2ID: a personal identification system using faces and fingerprints (AKJ, LH, YK), pp. 1373–1375.
ICPRICPR-1998-KamataNB #image
Color image compression using a Hilbert scan (SiK, TNN, YB), pp. 1575–1578.
ICPRICPR-1998-KamathKDD #image #markov #modelling #segmentation
Joint segmentation and image interpretation using hidden Markov models (NK, KSK, UBD, RD), pp. 1840–1842.
ICPRICPR-1998-KanekoH #detection #video
Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
ICPRICPR-1998-KangOC #3d #graph
Character grouping technique using 3D neighborhood graphs in raster map (YBK, SYO, HGC), pp. 1092–1094.
ICPRICPR-1998-KaufmannB #fault #locality
Amount translation and error localization in check processing using syntax-directed translation (GK, HB), pp. 1530–1534.
ICPRICPR-1998-KawaguchiN #algorithm #detection #search-based
Ellipse detection using a genetic algorithm (TK, RiN), pp. 141–145.
ICPRICPR-1998-KawaiUIST
Stereo correspondence using segment connectivity (YK, TU, YI, YS, FT), pp. 648–651.
ICPRICPR-1998-KawanishiYITY #generative #image
Generation of high-resolution stereo panoramic images by omnidirectional imaging sensor using hexagonal pyramidal mirrors (TK, KY, HI, HT, NY), pp. 485–489.
ICPRICPR-1998-KawasueSI
Range finder using circular dynamic stereo (KK, OS, TI), pp. 774–776.
ICPRICPR-1998-KawataNOKMEKM #analysis #image
Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
ICPRICPR-1998-KeeniNS #automation #classification #estimation #generative #network
Automatic generation of initial weights and estimation of hidden units for pattern classification using neural networks (KK, KN, HS), pp. 1568–1571.
ICPRICPR-1998-KimuraIWTM #network #recognition
Handwritten numeral recognition using autoassociative neural networks (FK, SI, TW, ST, YM), pp. 166–171.
ICPRICPR-1998-KogaKSF #analysis #segmentation
Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
ICPRICPR-1998-KosmalaR #online #recognition #statistics
On-line handwritten formula recognition using statistical methods (AK, GR), pp. 1306–1308.
ICPRICPR-1998-KosmalaR98a #clustering #online #recognition #scalability #self
Tree-based state clustering using self-organizing principles for large vocabulary on-line handwriting recognition (AK, GR), pp. 1313–1315.
ICPRICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-LengagneFM #3d #constraints #difference
Using differential constraints to generate a 3D face model from stereo (RL, PF, OM), pp. 637–639.
ICPRICPR-1998-LiML #estimation #multi #recognition
Human posture recognition using multi-scale morphological method and Kalman motion estimation (YL, SM, HL), pp. 175–177.
ICPRICPR-1998-LiQ #image #retrieval
Matching spatial relations using DB-tree for image retrieval (XL, XQ), pp. 1230–1234.
ICPRICPR-1998-LiuH #recognition
Using centroid covariance in target recognition (GL, RMH), pp. 1343–1346.
ICPRICPR-1998-LuoCH #detection
Corner detection using vector potential (BL, ADJC, ERH), pp. 1018–1021.
ICPRICPR-1998-MaedaKIZ #analysis #multi
Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
ICPRICPR-1998-MaedaNMSS #fuzzy #image #segmentation
Fuzzy region-growing segmentation of natural images using local fractal dimension (JM, SN, AM, SS, YS), pp. 991–993.
ICPRICPR-1998-MagareyD #image #multi
Multiresolution stereo image matching using complex wavelets (JM, ARD), pp. 4–7.
ICPRICPR-1998-MasakiYKK #interactive #video
Interactive manipulation through augmented virtuality using processed video contents (TM, TY, YK, FK), pp. 1219–1222.
ICPRICPR-1998-MatsuoKI #energy #multi
Multi-scale and hierarchical description using energy controlled active balloon model (HM, MK, AI), pp. 205–209.
ICPRICPR-1998-MelzerKZ #approach #detection #modelling #parametricity
Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
ICPRICPR-1998-MinMK #recognition
Recognition using labelled objects (SLM, JM, JK), pp. 1336–1338.
ICPRICPR-1998-MokhtariB #constant #multi
Multiscale compression of planar curves using constant curvature segments (MM, RB), pp. 744–746.
ICPRICPR-1998-MoriKTS #graph #visualisation
Visualization of the structure of classes using a graph (YM, MK, JT, MS), pp. 1724–1727.
ICPRICPR-1998-MullerH #recognition
The use of eigenpictures for optical character recognition (NM, BMH), pp. 1124–1126.
ICPRICPR-1998-Nakajima #image #visual notation
Extraction of salient apexes from an image by using the function at the primary visual cortex (CN), pp. 720–724.
ICPRICPR-1998-NakamuraEIH #algorithm
Skeleton revision algorithm using maximal circles (TN, HE, HI, LH), pp. 1607–1609.
ICPRICPR-1998-NakamuraSO #estimation
Object arrangement estimation using color edge profile (YN, NS, YO), pp. 754–758.
ICPRICPR-1998-NakazawaKI #distributed
Human tracking using distributed vision systems (AN, HK, SI), pp. 593–596.
ICPRICPR-1998-NieuwoudtB #classification #performance
Relative performance of correlation-based and feature-based classifiers of aircraft using radar range profiles (CN, ECB), pp. 1828–1832.
ICPRICPR-1998-NishikawaOM #3d
Selective acquisition of 3-D information enough for finding passable free spaces using an active stereo vision system (AN, AO, FM), pp. 857–861.
ICPRICPR-1998-OhLS #analysis
Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
ICPRICPR-1998-OhtaSN #feature model #modelling #recognition
Recognition of facial expressions using muscle-based feature models (HO, HS, HN), pp. 1379–1381.
ICPRICPR-1998-OkataniD #identification #invariant #on the #problem
On identification of singular points using photometric invariants for global shape from shading problem (TO, KD), pp. 1787–1790.
ICPRICPR-1998-OkumaKTY #artificial reality #realtime
An augmented reality system using a real-time vision based registration (TO, KK, HT, NY), pp. 1226–1229.
ICPRICPR-1998-OkutomiN #image
Extraction of road region using stereo images (MO, SN), pp. 853–856.
ICPRICPR-1998-OngM #robust #segmentation
Robust color segmentation using the dichromatic reflection model (CKO, TM), pp. 780–784.
ICPRICPR-1998-OnoeYYT #monitoring #video #visual notation
Visual surveillance and monitoring system using an omnidirectional video camera (YO, NY, KY, HT), pp. 588–592.
ICPRICPR-1998-PalubinskasDK #clustering
An unsupervised clustering method using the entropy minimization (GP, XD, FK), pp. 1816–1818.
ICPRICPR-1998-ProcterIE #markov #modelling #recognition #string
The recognition of handwritten digit strings of unknown length using hidden Markov models (SP, JI, AJE), pp. 1515–1517.
ICPRICPR-1998-SablatnigKZ #classification #modelling
Hierarchical classification of paintings using face- and brush stroke models (RS, PK, EZ), pp. 172–174.
ICPRICPR-1998-SardoK #complexity #estimation #validation
Model complexity validation for PDF estimation using Gaussian mixtures (LS, JK), pp. 195–197.
ICPRICPR-1998-SatoY #classification #learning
A formulation of learning vector quantization using a new misclassification measure (AS, KY), pp. 322–325.
ICPRICPR-1998-SattarT #approach #documentation #fuzzy #image #logic #multi #on the
On the multiresolution enhancement of document images using fuzzy logic approach (FS, DBHT), pp. 939–941.
ICPRICPR-1998-SchaufAH #modelling #recognition #recursion
Model-based shape recognition using recursive mathematical morphology (MLS, SA, RMH), pp. 202–204.
ICPRICPR-1998-SeemannT #image #segmentation
Structure preserving noise filtering of images using explicit local segmentation (TS, PET), pp. 1610–1612.
ICPRICPR-1998-Shevlin #analysis #problem
Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
ICPRICPR-1998-ShikuKN #string
A method for character string extraction using local and global segment crowdedness (OS, KK, AN), pp. 1077–1080.
ICPRICPR-1998-Sluzek #multi #segmentation
Multi-level contour segmentation using multiple segmentation primitives (AS), pp. 741–743.
ICPRICPR-1998-SmithL #segmentation
Texture segmentation using zero crossings information (GS, DL), pp. 262–264.
ICPRICPR-1998-SofferS #similarity
Using negative shape features for logo similarity matching (AS, HS), pp. 571–573.
ICPRICPR-1998-SoilleT #image
Image structure orientation using mathematical morphology (PS, HT), pp. 1467–1469.
ICPRICPR-1998-StoddartB #multi #re-engineering
Surface reconstruction and compression using multiresolution arbitrary topology G1 continuous splines (AJS, MSB), pp. 788–791.
ICPRICPR-1998-SukanyaTS #classification #image #multi
Image classification using the surface-shape operator and multiscale features (PS, RT, MS), pp. 334–337.
ICPRICPR-1998-SuzukiKM #fuzzy #memory management #set
Associative memory system using fuzzy sets (YS, NK, JM), pp. 331–333.
ICPRICPR-1998-SvalbeE #image #locality #metric #rank
Localisation of image features using measures of rank distribution (IDS, CJE), pp. 189–191.
ICPRICPR-1998-TakacsW #image #library #metric #performance
Fast searching of digital face libraries using binary image metrics (BT, HW), pp. 1235–1237.
ICPRICPR-1998-TerrillonDA #detection #image #invariant
Detection of human faces in complex scene images by use of a skin color model and of invariant Fourier-Mellin moments (JCT, MD, SA), pp. 1350–1355.
ICPRICPR-1998-TissainayagamS #algorithm #visual notation
Visual tracking and motion determination using the IMM algorithm (PT, DS), pp. 289–291.
ICPRICPR-1998-TominagaKMK #detection #performance
Realization of an efficient line detection by askant glance camera vision system using extended Hough transform (MT, KK, KM, HK), pp. 225–228.
ICPRICPR-1998-ToyamaSM #algorithm #estimation #modelling #search-based
Model-based pose estimation using genetic algorithm (FT, KS, JM), pp. 198–201.
ICPRICPR-1998-VelA #image #recognition
View-based object recognition using image lines (OYdV, SA), pp. 805–807.
ICPRICPR-1998-WangLL #classification #composition #markov #modelling #random
Texture classification using wavelet decomposition with Markov random field models (LW, JL, SZL), pp. 1613–1615.
ICPRICPR-1998-WatanabeMM #detection #image
Detecting changes of buildings from aerial images using shadow and shading model (SW, KM, NM), pp. 1408–1412.
ICPRICPR-1998-WatanabeY #gesture #image #multi #realtime #recognition #sequence
Real time recognition of gesture and gesture degree information using multi input image sequences (TW, MY), pp. 1855–1858.
ICPRICPR-1998-WorthingtonHH #recognition
Appearance-based object recognition using shape-from-shading (PLW, BH, ERH), pp. 412–416.
ICPRICPR-1998-WouwerSD #invariant
Rotation-invariant texture characterization using isotropic wavelet frames (GVdW, PS, DVD), pp. 814–816.
ICPRICPR-1998-XuS #detection #realtime
Rits Eye: a software-based system for real-time face detection and tracking using pan-tilt-zoom controllable camera (GX, TS), pp. 1194–1197.
ICPRICPR-1998-Yamada #pattern matching #query #retrieval
Handwritten text retrieval using two-stage pattern matching with handwritten query (KY), pp. 621–625.
ICPRICPR-1998-YamaguchiKI #graph #parametricity #relational
Stereo matching for stone statues using SRI parameters and relational graph (AY, KK, SI), pp. 785–787.
ICPRICPR-1998-YonemotoTT #3d #multi #sequence
Tracking of 3D multi-part objects using multiple viewpoint time-varying sequences (SY, NT, RiT), pp. 490–494.
ICPRICPR-1998-YoungKM #evolution #modelling
Hypothesis selection for scene interpretation using grammatical models of scene evolution (RCDY, JK, JM), pp. 1718–1720.
ICPRICPR-1998-ZhaHH #3d #algorithm #modelling #recursion
A recursive fitting-and-splitting algorithm for 3-D object modeling using superquadrics (HZ, TH, TH), pp. 658–662.
KDDKDD-1998-Bhattacharyya #algorithm #modelling #search-based
Direct Marketing Response Models Using Genetic Algorithms (SB), pp. 144–148.
KDDKDD-1998-CohenH #classification
Joins that Generalize: Text Classification Using WHIRL (WWC, HH), pp. 169–173.
KDDKDD-1998-ThomasS #mining #query #sql
Mining Generalized Association Rules and Sequential Patterns Using SQL Queries (ST, SS), pp. 344–348.
KRKR-1998-Horrocks #logic #question
Using an Expressive Description Logic: FaCT or Fiction? (IH), pp. 636–649.
KRKR-1998-Kamps #automation #formal method #reasoning #tool support
Formal Theory Building Using Automated Reasoning Tools (JK), pp. 478–487.
KRKR-1998-Kusters #automaton #finite #semantics
Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata (RK), pp. 499–511.
SIGIRSIGIR-1998-CarbonellG #documentation #order #ranking #summary
The Use of MMR, Diversity-Based Reranking for Reordering Documents and Producing Summaries (JGC, JG), pp. 335–336.
SIGIRSIGIR-1998-HascoetS #library #user interface
Using Maps as a User Interface to a Digital Library (MH, XS), pp. 339–340.
SIGIRSIGIR-1998-JonesSKS #retrieval
Experiments in Japanese Text Retrieval and Routing Using the NEAT System (GJFJ, TS, MK, KS), pp. 197–205.
SIGIRSIGIR-1998-LaiT #image #retrieval
Using Global Colour Features for General Photographic Image Indexing and Retrieval (TSL, JT), pp. 349–350.
SIGIRSIGIR-1998-LamH #automation #categorisation #set
Using a Generalized Instance Set for Automatic Text Categorization (WL, CYH), pp. 81–89.
SIGIRSIGIR-1998-Larkey #automation #categorisation
Automatic Essay Grading Using Text Categorization Techniques (LSL), pp. 90–95.
SIGIRSIGIR-1998-MechkourHM #clustering #web
The WebCluster Project: Using Clustering for Mediating Access to the World Wide Web (MM, DJH, GM), pp. 357–358.
SIGIRSIGIR-1998-NgZ #fault #retrieval #speech
Speech Retrieval Using Phonemes with Error Correction (CN, JZ), pp. 365–366.
SIGIRSIGIR-1998-Picard #documentation #modelling #probability
Modeling and Combining Evidence Provided by Document Relationships Using Probabilistic Argumentation Systems (JP), pp. 182–189.
SIGIRSIGIR-1998-SuzukiFS #keyword
Keyword Extraction of Radio News Using Term Weighting with an Encyclopedia and Newspaper Articles (YS, FF, YS), pp. 373–374.
SIGIRSIGIR-1998-YamanaTKKHNAKSM #distributed
Experiments of Collecting WWW Information Using Distributed WWW Robots (HY, KT, HK, SK, MH, HN, IA, HK, YS, YM), pp. 379–380.
UMLUML-1998-Ou #constraints #database #design #diagrams #object-oriented #on the #specification #uml
On Using UML Class Diagrams for Object-Oriented Database Design. Specification of Integrity Constraints (YO), pp. 173–188.
ECOOPECOOP-1998-CordsenS #case study #experience #memory management #paradigm
Experiences Developing a Virtual Shared Memory System Using High-Level Object Paradigms (JC, JN, WSP), pp. 285–306.
TOOLSTOOLS-ASIA-1998-CoddingtonHKMWWIGJT #corba #implementation #java #library
Implementation of a Geospatial Imagery Digital Library Using Java and CORBA (PDC, KAH, KEK, JAM, AJS, DLW, PJW, CGI, MWG, RJ, KT), pp. 280–289.
TOOLSTOOLS-ASIA-1998-PeriorellisBS #dependence #enterprise #modelling #network #object-oriented #paradigm
Modeling Enterprise Dependency Networks Using an Object Oriented Paradigm (PP, AB, PS), p. 148–?.
TOOLSTOOLS-PACIFIC-1998-SonYK #component #development #java
A Component-Based Client/Server Application Development Environment using Java (SS, IY, CK), pp. 168–179.
TOOLSTOOLS-USA-1998-McKim #design #education #multi #object-oriented #programming
Using a Multi-Term Project to Teach Object Oriented Programming and Design (JCM), p. 468–?.
TOOLSTOOLS-USA-1998-Watkins #contract #interface #programming
Using Interface Definition Languages to Support Path Expressions and Programming by Contract (DW), p. 308–?.
TOOLSTOOLS-USA-1998-WydaegheVMDAJ #case study #design pattern #experience
Building an OMT-Editor Using Design Patterns: An Experience Report (BW, KV, BM, BVD, EA, VJ), pp. 20–32.
AdaEuropeAdaEurope-1998-HarbourRGG #ada #execution #implementation #realtime
Implementing and Using Execution Time Clocks in Ada Hard Real-Time Applications (MGH, MAR, JJGG, JCPG), pp. 90–101.
AdaEuropeAdaEurope-1998-Saaltink #ada
Guidance on the Use of Ada95 in High Integrity Systems (SM, MS), pp. 276–287.
PPDPALP-PLILP-1998-ClearyL
Constructive Negation Using Typed Existence Properties (JGC, LL), pp. 411–426.
PPDPALP-PLILP-1998-ConselM #architecture #development
Architecture Software Using: A Methodology for Language Development (CC, RM), pp. 170–194.
PPDPALP-PLILP-1998-HatcliffDL #analysis #staging
Staging Static Analyses Using Abstraction-Based Program Specialization (JH, MBD, SL), pp. 134–151.
LOPSTRLOPSTR-1998-BaalenR #deduction #synthesis
Using Decision Procedures to Accelerate Domain-Specific Deductive Synthesis Systems (JVB, SR), pp. 61–70.
LOPSTRLOPSTR-1998-BrogiCT #source code
The Use of Renaming in Composing General Programs (AB, SC, FT), pp. 124–142.
LOPSTRLOPSTR-1998-Rosenblueth #source code
An Exhaustive-Search Method Using Layered Streams Obtained Through a Meta-Interpreter for Chain Programs (DAR), pp. 322–324.
LOPSTRLOPSTR-1998-SmausHK #fault #logic programming #multi #source code
Preventing Instantiation Errors and Loops for Logic Programs with Multiple Modes Using block Declarations (JGS, PMH, AK), pp. 289–307.
PLDIPLDI-1998-AdveM #integer #optimisation #program analysis #set
Using Integer Sets for Data-Parallel Program Analysis and Optimization (VSA, JMMC), pp. 186–198.
PLDIPLDI-1998-HastiH #analysis #pointer
Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
SASSAS-1998-HandjievaT #analysis #clustering #control flow
Refining Static Analyses by Trace-Based Partitioning Using Control Flow (MH, ST), pp. 200–214.
AdaSIGAda-1998-BarkatakiHD #design pattern #legacy #object-oriented #re-engineering
Reengineering a Legacy System Using Design Patterns and Ada-95 Object-Oriented Features (SB, SH, TD), pp. 148–152.
AdaSIGAda-1998-ChamillardLY #ada
Using Ada in Non-CS Majors (ATC, RJL, RRY), pp. 61–67.
AdaSIGAda-1998-DousetteDJ #web
Command and Control Using World Wide Web Technology (PJD, AD, MJ), pp. 212–214.
AdaSIGAda-1998-Flint #ada #api #compilation #java
Using Java APIs with Native Ada Compilers (SF), pp. 193–203.
AdaSIGAda-1998-HopperBHH #ada #simulation
Use of Ada in Digital Radar Landmass Simulation (DRLMS) (JH, JDB, HH, TH), pp. 137–139.
AdaSIGAda-1998-James #ada #data flow #distributed #evolution
The Evolution of a Distributed dataflow Processing Model Using Ada (SJ), pp. 39–44.
AdaSIGAda-1998-TardieuP #distributed #fault tolerance #multi
Building Fault Tolerant Distributed Systems Using IP Multicast (ST, LP), pp. 45–51.
AdaSIGAda-1998-WoodruffA #ada #distributed #research #scalability
A Large Distributed Control System Using Ada in Fusion Research (JPW, PJVA), pp. 121–131.
REICRE-1998-KaindlKK #case study #functional #requirements
A Case Study of Decomposing Functional Requirements Using Scenarios (HK, SK, RK), pp. 156–163.
REICRE-1998-MillardLT #elicitation #game studies #requirements
Child’s Play: Using Techniques Developed to Elicit Requirements from Children with Adults (NM, PL, KT), pp. 66–73.
REICRE-1998-SchneiderECH #fault tolerance #model checking #requirements #validation
Validating Requirements for Fault Tolerant Systems using Model Checking (FS, SME, JRC, GJH), pp. 4–13.
REICRE-1998-Smith #framework #quality #requirements
Using a Quality Model Framework to Strengthen the Requirements (RCS), p. 118–?.
ASEASE-1998-Andrews #analysis #testing #tool support
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
ASEASE-1998-HazelST #animation #requirements #specification #verification
Requirements Engineering and Verification using Specification Animation (DH, PAS, OT), pp. 302–305.
ASEASE-1998-MaoSL #case study #machine learning #reuse #usability #verification
Reusability Hypothesis Verification using Machine Learning Techniques: A Case Study (YM, HAS, HL), pp. 84–93.
ASEASE-1998-WielsE #category theory #evolution #specification
Management of Evolving Specifications using Category Theory (VW, SME), pp. 12–21.
FSEFSE-1998-GuptaMS #automation #generative #testing
Automated Test Data Generation Using an Iterative Relaxation Method (NG, APM, MLS), pp. 231–244.
FSEFSE-1998-KontioGL #case study #concept #experience #process #risk management
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
FSEFSE-1998-SneltingT #concept analysis #re-engineering
Reengineering Class Hierarchies Using Concept Analysis (GS, FT), pp. 99–110.
ICSEICSE-1998-AlmeidaLM #modelling
An Investigation on the Use of Machine Learned Models for Estimating Correction Costs (MAdA, HL, WLM), pp. 473–476.
ICSEICSE-1998-AntonP #evolution #requirements
The Use of Goals to Surface Requirements for Evolving Systems (AIA, CP), pp. 157–166.
ICSEICSE-1998-BriandELF #benchmark #development #metric #performance #simulation
Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects (LCB, KEE, OL, TF), pp. 340–349.
SACSAC-1998-AhmedDR #fuzzy #graph #memory management #performance #reuse
Fast recall of reusable fuzzy plans using acyclic directed graph memory (MA, ED, DCR), pp. 272–276.
SACSAC-1998-ArbabM #constraints #coordination #theorem proving
Using coordination for cooperative constraint solving (FA, EM), pp. 139–148.
SACSAC-1998-KangH #algorithm #graph transformation #problem #search-based
Solving the rural postman problem using a genetic algorithm with a graph transformation (MJK, CGH), pp. 356–360.
SACSAC-1998-KarakasK #adaptation #fuzzy #logic
Adaptive control of Bolu highway tunnel ventilation system using fuzzy logic (EK, HK), pp. 282–286.
SACSAC-1998-Konstam #algorithm #classification #programming #search-based
Group classification using a mix of genetic programming and genetic algorithms (AHK), pp. 308–312.
SACSAC-1998-LazanoM #query
Querying virtual videos using path and temporal expressions (RL, HM), pp. 248–252.
SACSAC-1998-McGuireS #algorithm #linear #search-based
Using a genetic algorithm to find good linear error-correcting codes (KMM, RES), pp. 332–337.
SACSAC-1998-PapadopoulosA #coordination #information management #modelling #process
Modelling activities in information systems using the coordination language MANIFOLD (GAP, FA), pp. 185–193.
SACSAC-1998-RobbinsR #animation #information management #visualisation
Web-based dynamic information visualization using exact-time animation (KAR, SR), pp. 744–751.
SACSAC-1998-WaldenBH #approximate #clustering #fuzzy #multi
Evaluating multi-valued inverse functions using clustering and fuzzy approximations (MAW, MB, AH), pp. 74–79.
ASPLOSASPLOS-1998-KrintzCLZ #execution #mobile #source code #strict
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs (CK, BC, HBL, BGZ), pp. 159–169.
ASPLOSASPLOS-1998-SchnarrL #performance #simulation
Fast Out-Of-Order Processor Simulation Using Memoization (ES, JRL), pp. 283–294.
DACDAC-1998-AmonBL
Making Complex Timing Relationships Readable: Presburger Formula Simplicication Using Don’t Cares (TA, GB, JL), pp. 586–590.
DACDAC-1998-AzizKS #hybrid #simulation #verification
Hybrid Verification Using Saturated Simulation (AA, JHK, TRS), pp. 615–618.
DACDAC-1998-FallahDK #functional #generative #linear #modelling #programming #satisfiability
Functional Vector Generation for HDL Models Using Linear Programming and 3-Satisfiability (FF, SD, KK), pp. 528–533.
DACDAC-1998-FangW #clustering #functional #multi #replication
Performance-Driven Multi-FPGA Partitioning Using Functional Clustering and Replication (WJF, ACHW), pp. 283–286.
DACDAC-1998-GovindarajuDHH #approximate #reachability
Approximate Reachability with BDDs Using Overlapping Projections (SGG, DLD, AJH, MH), pp. 451–456.
DACDAC-1998-HoltmannB #compilation #design #protocol
Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
DACDAC-1998-HwangCH #approach #design #power management #re-engineering
A Re-engineering Approach to Low Power FPGA Design Using SPFD (JMH, FYC, TH), pp. 722–725.
DACDAC-1998-KimJT #optimisation
Arithmetic Optimization Using Carry-Save-Adders (TK, WJ, SWKT), pp. 433–438.
DACDAC-1998-MurgaiFO
Using Complementation and Resequencing to Minimize Transitions (RM, MF, ALO), pp. 694–697.
DACDAC-1998-PardoH #incremental #model checking
Incremental CTL Model Checking Using BDD Subsetting (AP, GDH), pp. 457–462.
DACDAC-1998-QiuWP #estimation #order #statistics
Maximum Power Estimation Using the Limiting Distributions of Extreme Order Statistics (QQ, QW, MP), pp. 684–689.
DACDAC-1998-SuttonSR #multi
A Multiprocessor DSP System Using PADDI-2 (RAS, VPS, JMR), pp. 62–65.
DACDAC-1998-TarafdarL #data transfer #synthesis
The DT-Model: High-Level Synthesis Using Data Transfers (ST, ML), pp. 114–117.
DACDAC-1998-WangAK #array #automation #evaluation #generative #verification
Automatic Generation of Assertions for Formal Verification of PowerPC Microprocessor Arrays Using Symbolic Trajectory Evaluation (LCW, MSA, NK), pp. 534–537.
DACDAC-1998-YoungMSTHN #design #embedded #java #refinement #specification
Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement (JSY, JM, MS, AT, PNH, ARN), pp. 70–75.
DACDAC-1998-ZhongAMM #case study #configuration management #problem #satisfiability
Using Reconfigurable Computing Techniques to Accelerate Problems in the CAD Domain: A Case Study with Boolean Satisfiability (PZ, PA, SM, MM), pp. 194–199.
DATEDATE-1998-FreundF #approximate #linear #modelling #multi #scalability
Reduced-Order Modeling of Large Linear Passive Multi-Terminal Circuits Using Matrix-Pade Approximation (RWF, PF), pp. 530–537.
DATEDATE-1998-HansenKR #comparison #interface #simulation #synthesis #verification
Verification by Simulation Comparison using Interface Synthesis (CH, AK, WR), pp. 436–443.
DATEDATE-1998-PomeranzR98a
Design-for-Testability for Synchronous Sequential Circuits using Locally Available Lines (IP, SMR), pp. 983–984.
DATEDATE-1998-RingeLB #satisfiability #verification
Path Verification Using Boolean Satisfiability (MR, TL, EB), pp. 965–966.
DATEDATE-1998-RudnickVECPR #generative #performance #testing
Fast Sequential Circuit Test Generation Using High-Level and Gate-Level Techniques (EMR, RV, AE, FC, PP, MSR), pp. 570–576.
DATEDATE-1998-ShaoC #approximate #design
MCM Interconnect Design Using Two-Pole Approximation (JS, RMMC), pp. 544–548.
DATEDATE-1998-UrrizaAGBN #architecture #image
VLSI Architecture for Lossless Compression of Medical Images Using the Discrete Wavelet Transform (IU, JIA, JIGN, LAB, DN), pp. 196–201.
DATEDATE-1998-Velasco-MedinaCN #detection #fault #injection #linear
Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
DATEDATE-1998-VercauterenVJL #analysis #partial order #performance #verification
Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
HPCAHPCA-1998-SpeightB #communication #multi #thread
Using Multicast and Multithreading to Reduce Communication in Software DSM Systems (ES, JKB), pp. 312–322.
HPCAHPCA-1998-SteffanM #automation #concurrent #parallel #thread
The Potential for Using Thread-Level Data Speculation to Facilitate Automatic Parallelization (JGS, TCM), pp. 2–13.
HPDCHPDC-1998-BeckmanFHM #parallel #performance
Efficient Coupling of Parallel Applications Using PAWS (PHB, PKF, WFH, SMM), pp. 215–222.
HPDCHPDC-1998-ChenWCK #algorithm #automation #optimisation #parallel #performance #search-based
Automatic Parallel I/O Performance Optimization Using Genetic Algorithms (YC, MW, YC, SWK), pp. 155–162.
HPDCHPDC-1998-Nguyen-TuongCG
Extending Metasystem Functionality Using Reflection (ANT, SJC, ASG), pp. 346–347.
HPDCHPDC-1998-ZhangSL #message passing #source code
Dynamically Instrumenting Message-Passing Programs Using Virtual Clocks (KZ, CS, KCL), pp. 340–341.
ISMMISMM-1998-ChilimbiL #garbage collection
Using Generational Garbage Collection To Implement Cache-Conscious Data Placement (TMC, JRL), pp. 37–48.
LCTESLCTES-1998-LundqvistS #analysis #simulation
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
LCTESLCTES-1998-Selic #modelling #realtime #uml
Using UML for Modeling Complex Real-Time Systems (BS), pp. 250–260.
LCTESLCTES-1998-YurkoskiRE #java
Using InfernoTM to Execute JavaTM on Small Devices (CFY, LRR, BKE), pp. 108–118.
PDPPDP-1998-GilO #clustering #generative #parallel #testing
Parallel test generation using circuit partitioning and spectral techniques (CG, JO), pp. 264–270.
PDPPDP-1998-HillJSV #architecture #independence #parallel #performance #profiling
Portable and architecture independent parallel performance tuning using a call-graph profiling tool (JMDH, SAJ, CJS, VPV), pp. 286–294.
PDPPDP-1998-RodriguezAM #algorithm #network #parallel #performance #predict
Prediction of parallel algorithms performance on bus-based networks using PVM (RJR, CA, DM), pp. 57–63.
PDPPDP-1998-SanchezDG #configuration management #network #pipes and filters
Using channel pipelining in reconfigurable interconnection networks (JLS, JD, JMG), pp. 120–126.
STOCSTOC-1998-LubyMSS #analysis #design #graph
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
TACASTACAS-1998-DawsT #abstraction #model checking #reachability #realtime
Model Checking of Real-Time Reachability Properties Using Abstractions (CD, ST), pp. 313–329.
TACASTACAS-1998-Grahlmann #automaton #finite #parallel #petri net #source code
Combining Finite Automata, Parallel Programs and SDL Using Petri Nets (BG), pp. 102–117.
TACASTACAS-1998-JensenL #abstraction #algorithm #proving
A Proof of Burns N-Process Mutual Exclusion Algorithm Using Abstraction (HEJ, NAL), pp. 409–423.
TACASTACAS-1998-Lind-NielsenABHKL #analysis #composition #dependence #scalability #verification
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
TACASTACAS-1998-StevensS #game studies #model checking
Practical Model-Checking Using Games (PS, CS), pp. 85–101.
WRLAWRLA-1998-BorovanskyC #constraints #process #theorem proving
Cooperation of constraint solvers: using the new process control facilities of ELAN (PB, CC), pp. 1–20.
CADECADE-1998-FeveW #algebra #geometry #proving #theorem
Proving Geometric Theorems Using Clifford Algebra and Rewrite Rules (SF, DW), pp. 17–31.
CADECADE-1998-Letz
Using Matings for Pruning Connection Tableaux (RL), pp. 381–396.
CAVCAV-1998-BelluominiM #verification
Verification of Timed Systems Using POSETs (WB, CJM), pp. 403–415.
CAVCAV-1998-ColonU #abstraction #finite #generative
Generating Finite-State Abstractions of Reactive Systems Using Decision Procedures (MC, TEU), pp. 293–304.
CAVCAV-1998-CourturierM #empirical #formal method
An Experiment in Parallelizing an Application Using Formal Methods (RC, DM), pp. 345–356.
CAVCAV-1998-SkakkebaekJD #execution #incremental #verification
Formal Verification of Out-of-Order Execution Using Incremental Flushing (JUS, RBJ, DLD), pp. 98–109.
CAVCAV-1998-SternD #in memory #memory management #verification
Using Magnatic Disk Instead of Main Memory in the Murphi Verifier (US, DLD), pp. 172–183.
CAVCAV-1998-Wallner #ltl #model checking
Model Checking LTL Using Net Unforldings (FW), pp. 207–218.
CAVCAV-1998-XuCSCM #first-order #graph #logic #model checking #multi
Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs (YX, EC, XS, FC, OAM), pp. 219–231.
ISSTAISSTA-1998-GodefroidHJ #analysis #model checking #monitoring
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
ISSTAISSTA-1998-GotliebBR #automation #constraints #generative #testing #theorem proving
Automatic Test Data Generation Using Constraint Solving Techniques (AG, BB, MR), pp. 53–62.
ISSTAISSTA-1998-TraceyCM #automation
Automated Program Flaw Finding Using Simulated Annealing (NT, JAC, KM), pp. 73–81.
ICTSSIWTCS-1998-FeijsMMW #consistency #multi #testing
Conformance Testing of a Multimedia System Using PHACT (LMGF, FACM, JRM, JvW), pp. 193–210.
ICTSSIWTCS-1998-PetrenkoUC #concurrent #detection #fault
Using Partial-Orders for Detecting Faults in Concurrent Systems (AP, AU, VC), pp. 175–190.
ADLADL-1997-DAlessandroGCEC #education #library
Continuing Medical Education to the Point of Care Using a Digital Library and Intimate Computers (MPD, JRG, JJC, WEE, LGC), pp. 95–101.
ADLADL-1997-Marie-JulieE #database #image #multi #retrieval
Digital Image Indexing and Retrieval by Content Using the Fractal Transform for Multimedia Databases (JMMJ, HE), pp. 2–12.
DL-1997-ShinNK #hypermedia #semantics #similarity #statistics
Hypertext Construction Using Statistical and Semantic Similarity (DS, SN, MK), pp. 57–63.
DL-1997-WitbrockH #documentation #information retrieval #performance #string #word
Using Words and Phonetic Strings for Efficient Information Retrieval from Imperfectly Transcribed Spoken Documents (MJW, AGH), pp. 30–35.
TPDLECDL-1997-HardingCW #n-gram #probability #retrieval
Probabilistic Retrieval of OCR Degraded Text Using N-Grams (SMH, WBC, CW), pp. 345–359.
TPDLECDL-1997-Iannella #metadata #repository
Metadata Repositories using PICS (RI), pp. 87–98.
TPDLECDL-1997-TochtermannRWSM #retrieval #semantics
Using Semantic, Geographical, and Temporal Relationships to Enhance Search and Retrieval in Digital Catalogs (KT, WFR, GW, JS, BMJ), pp. 73–86.
HTHT-1997-BalasubramanianBP #documentation #hypermedia #scalability #web
A Large-Scale Hypermedia Application using Document Management and Web Technologies (VB, AB, DP), pp. 134–145.
HTHT-1997-Chuat #hypermedia #what
Using Hypertext for Textual Genetics, or, What is Suitable in a Hypertext System for an Information Gardening Application (CC), pp. 230–231.
ICDARICDAR-1997-AminM #network #recognition
Recognition of Printed Arabic Text Using Neural Networks (AA, WM), pp. 612–615.
ICDARICDAR-1997-AnisimovichRST #classification #recognition
Using Combination of Structural, Feature and Raster Classifiers for Recognition of Handprinted Characters (KA, VR, AS, VT), pp. 881–885.
ICDARICDAR-1997-BruggerZI #documentation #modelling #n-gram #recognition
Modeling Documents for Structure Recognition Using Generalized N-Grams (RB, AWZ, RI), pp. 56–60.
ICDARICDAR-1997-CoteCLS #automation
Automatic Reading of Cursive Scripts Using Human Knowledge (MC, MC, EL, CYS), pp. 107–111.
ICDARICDAR-1997-CullenHH #analysis #database #documentation #image #retrieval
Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
ICDARICDAR-1997-DingLS #classification
Classification of Oriental and European Scripts by Using Characteristic Features (JD, LL, CYS), pp. 1023–1027.
ICDARICDAR-1997-DuDLA #documentation #evaluation #lazy evaluation #recognition #semantics
Generalized Contextual Recognition of Hand-Printed Documents Using Semantic Trees with Lazy Evaluation (LD, ACD, SML, BAB), pp. 238–242.
ICDARICDAR-1997-Favata #approximate #recognition #string #word
General word recognition using approximate segment-string matching (JTF), pp. 92–96.
ICDARICDAR-1997-HennigSW #fuzzy #online
Recognizing Letters in on-line Handwriting using Hierarchical Fuzzy Inference (AH, NS, RJW), pp. 936–940.
ICDARICDAR-1997-HiranoOY #recognition
Structural Character Recognition Using Simulated Annealing (TH, YO, FY), pp. 507–510.
ICDARICDAR-1997-HoriuchiHYY #2d #normalisation #recognition
Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
ICDARICDAR-1997-IshideraNY #recognition #word
Unconstrained Japanese Address Recognition Using a Combination of Spatial Information and Word Knowledge (EI, DN, KY), p. 1016–?.
ICDARICDAR-1997-JainY #documentation #segmentation
Page Segmentation Using Document Model (AKJ, BY), pp. 34–38.
ICDARICDAR-1997-KashiHNT #markov #online #verification
On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
ICDARICDAR-1997-KawataniS #classification #component #design #difference
Complementary Classifier Design Using Difference Principal Components (TK, HS), pp. 875–880.
ICDARICDAR-1997-KeeniSN #distributed #network #on the #representation
On Distributed Representation of Output Layer for Recognizing Japanese Kana characters Using Neural Networks (KK, HS, KN), pp. 600–603.
ICDARICDAR-1997-KosmalaRR #markov #modelling #online #recognition
Improved On-Line Handwriting Recognition Using Context Dependent Hidden Markov Models (AK, JR, GR), pp. 641–644.
ICDARICDAR-1997-LinDW #multi #recognition
Handwritten Numeral Recognition Using MFNN Based Multiexpert Combination Strategy (XL, XD, YW), pp. 471–474.
ICDARICDAR-1997-LinNN #analysis #documentation #image #logic
Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
ICDARICDAR-1997-MadhvanathK #scalability #word
Pruning Large Lexicons Using Generalized Word Shape Descriptors (SM, VK), pp. 552–555.
ICDARICDAR-1997-NavoniCCGKR #memory management #recognition #word
Words Recognition using Associative Memory (LN, RC, MC, GG, AK, PLR), pp. 97–101.
ICDARICDAR-1997-NobileBSK #documentation #identification #online #word
Language identification of on-line documents using word shapes (NN, SB, CYS, SK), pp. 258–262.
ICDARICDAR-1997-Oguro #documentation #image #representation
Faxed Document Image Restoration Using Gray Level Representation (MO), pp. 679–683.
ICDARICDAR-1997-PavlidisSP #online #recognition
An On-Line Handwritten Note Recognition Method Using Shape Metamorphosis (IP, RS, NP), pp. 914–918.
ICDARICDAR-1997-RahmanF #case study #multi #recognition
Introducing New Multiple Expert Decision Combination Topologies: A Case Study using Recognition of Handwritten Characters (AFRR, MCF), p. 886–?.
ICDARICDAR-1997-RazaHSW #database #documentation #recognition #robust
Recognition of Facsimile Documents using a Database of Robust Features (GR, AH, NS, RJW), p. 444–?.
ICDARICDAR-1997-ShridharHK #recognition #word
Handwritten Word Recognition Using Lexicon Free and Lexicon Directed Word (MS, GFH, FK), pp. 861–865.
ICDARICDAR-1997-SmeatonS #information retrieval
Using Character Shape Coding for Information Retrieval (AFS, ALS), p. 974–?.
ICDARICDAR-1997-Soffer #categorisation #image
Image Categorization Using Texture Features (AS), pp. 233–237.
ICDARICDAR-1997-StuckelbergPH #architecture #recognition
An Architecture for Musical Score Recognition using High-Level Domain Knowledge (MVS, CP, MH), pp. 813–818.
ICDARICDAR-1997-SudaBKM #approach #word
Logo and Word Matching Using a General Approach to Signal Registration (PS, CB, BK, GM), p. 61–?.
ICDARICDAR-1997-SunS #documentation #image
Skew and Slant Correction for Document Images Using Gradient Direction (CS, DS), pp. 142–146.
ICDARICDAR-1997-TonouchiK #algorithm #online #recognition
An on-line Japanese character recognition method using length-based stroke correspondence algorithm (YT, AK), pp. 633–636.
ICDARICDAR-1997-WaizumiKSN #classification #learning
High speed rough classification for handwritten characters using hierarchical learning vector quantization (YW, NK, KS, YN), pp. 23–27.
ICDARICDAR-1997-WakaharaO #adaptation #normalisation
Adaptive Normalization of Handwritten Characters Using Global/Local Affine Transformation (TW, KO), p. 28–?.
PODSPODS-1997-BeeriLR #logic #query
Rewriting Queries Using Views in Description Logics (CB, AYL, MCR), pp. 99–108.
PODSPODS-1997-DuschkaG #query #recursion
Answering Recursive Queries Using Views (OMD, MRG), pp. 109–116.
PODSPODS-1997-HoBA #query
Partial-Sum Queries in Data Cubes Using Covering Codes (CTH, JB, RA), pp. 228–237.
VLDBVLDB-1997-AshwinRSSS #database #garbage collection #object-oriented #transaction
Garbage Collection in Object Oriented Databases Using Transactional Cyclic Reference Counting (SA, PR, SS, AS, SS), pp. 366–375.
VLDBVLDB-1997-ChakrabartiDAR #database #navigation #taxonomy
Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
VLDBVLDB-1997-FlorescuKLP #integration #probability
Using Probabilistic Information in Data Integration (DF, DK, AYL), pp. 216–225.
VLDBVLDB-1997-HuangJR #optimisation #traversal
Spatial Joins Using R-trees: Breadth-First Traversal with Global Optimizations (YWH, NJ, EAR), pp. 396–405.
VLDBVLDB-1997-LlirbatST #transaction
Using Versions in Update Transactions: Application to Integrity Checking (FL, ES, DT), pp. 96–105.
VLDBVLDB-1997-VassalosP #query
Describing and Using Query Capabilities of Heterogeneous Sources (VV, YP), pp. 256–265.
VLDBVLDB-1997-WhiteheadSM #information retrieval
GTE SuperPages: Using IR Techniques for Searching Complex Objects (SDW, HS, MM), pp. 553–557.
CSEETCSEET-1997-Pierce #education #re-engineering
Teaching software engineering principles using maintenance-based projects (KRP), pp. 53–60.
ITiCSEITiCSE-1997-DankelH #distance #learning
The use of the WWW to support distance learning through NTU (DDDI, JH), pp. 8–10.
ITiCSEITiCSE-1997-DixonMK #education #network #simulation
Using a network simulation package to teach the client-server model (MWD, TJM, JMK), pp. 71–73.
ITiCSEITiCSE-1997-Goldberg #student
WebCT and first year: student reaction to and use of a Web-based resource in first year computer science (MWG), pp. 127–129.
ITiCSEITiCSE-1997-PalmeM #education
Use of computer conferencing to teach a course on humans and computers (JP, SM), pp. 88–90.
ITiCSEITiCSE-1997-RoblesFPA #communication #distance #learning #multi
Using multimedia communication technologies in distance learning (TR, DF, EP, SA), pp. 6–7.
ITiCSEITiCSE-1997-Taylor #communication #online #social
Using online seminars to demonstrate the social psychological impacts of computer-mediated communication systems (JT), pp. 80–84.
ITiCSEITiCSE-WGR-1997-GrangerLABGJMY #education #information management #social
Using information technology to integrate social and ethical issues into the computer science and information systems curriculum (report of the ITiCSE 1997 working group on social and ethical issue in computing curricula) (MJG, JCL, ESA, CB, DG, DDJ, CDM, FHY), pp. 38–50.
ITiCSEITiCSE-WGR-1997-NapsBJMPPT #interactive #visualisation
Using the WWW as the delivery mechanism for interactive, visualization-based instructional modules (report of the ITiCSE 1997 working group on visualization) (TLN, JB, RJP, MFM, MPM, VKP, JT), pp. 13–26.
CSMRCSMR-1997-Aebi #migration #multi #process #re-engineering
A process model for re-engineering, migration and multi-use of business data (DA), pp. 106–113.
CSMRCSMR-1997-Michael #constraints #evolution
Using evolution constraints to assess the failure-proneness of evolving software (CCM), pp. 48–53.
CSMRCSMR-1997-MullerG #case study #experience #standard #tool support
Planning Year 2000 transformations using standard tools: an experience report (BM, RG), pp. 94–100.
CSMRCSMR-1997-PidaparthiC #case study #design #migration #object-oriented
Case Study in Migration to Object-Oriented System Structure Using Design Transformation Methods (SP, GC), pp. 128–135.
ICSMEICSM-1997-Gupta #case study #comprehension #experience
Program Understanding Using Program Slivers — An Experience Report (AG), pp. 66–71.
WCREWCRE-1997-JerdingR #architecture #locality #visualisation
Using Visualization for Architectural Localization and Extraction (DFJ, SR), pp. 56–65.
WCREWCRE-1997-Kontogiannis #detection #evaluation #metric #programming
Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics (KK), p. 44–?.
WCREWCRE-1997-Wiggerts #algorithm #clustering #legacy
Using Clustering Algorithms in Legacy Systems Remodularization (TAW), pp. 33–43.
WPCWPC-1997-MooreR #information management #interactive #representation
Using Knowledge Representation to Understand Interactive Systems (MMM, SR), pp. 60–67.
WPCWPC-1997-TilleyS #framework #on the #re-engineering #web
On Using the Web as Infrastructure for Reengineering (SRT, DBS), pp. 170–173.
ICSMEICSM-2000-Lynd #2d #maintenance
Living with the 2-digit Year Year 2000 Maintenance Using a Procedural Solution (ECL), p. 206–?.
ICSMEICSM-2000-MullerWS #framework #standard
Wrapping coarse-grained objects using standard infrastructure technology (HAM, KW, MADS), p. 301.
ICSMEICSM-2000-Schneidewind #maintenance #metric #process #reliability
Measuring and evaluating maintenance process using reliability, risk, and test metrics (NFS), p. 232–?.
DLTDLT-1997-WatanabeT #attribute grammar
An Attribute Evaluation of One-Pass Attribute Grammars Using Value Estimate (YW, TT), pp. 155–165.
ICALPICALP-1997-DiekertMM #equation #normalisation
Solving Trace Equations Using Lexicographical Normal Forms (VD, YM, AM), pp. 336–346.
CIAAWIA-1997-BertaultK #automaton #visualisation
Visualization of Dynamic Automata Using Padnon (FB, GK), pp. 25–28.
CIAAWIA-1997-SalomaaWY #implementation #performance #regular expression
Efficient Implementation of Regular Languages Using R-AFA (KS, XW, SY), pp. 176–184.
FMFME-1997-DevauchelleLV #named #specification
PICGAL: Practical Use of Formal Specification to Develop a Complex Critical System (LD, PGL, HV), pp. 221–236.
FMFME-1997-Gregoire #protocol #proving
TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
FMFME-1997-HemerL #design #pattern matching #reuse
Reuse of Verified Design Templates Through Extended Pattern Matching (DH, PAL), pp. 495–514.
FMFME-1997-Kellomaki #verification
Verification of Reactive Systems Using DisCo and PVS (PK), pp. 589–604.
FMFME-1997-Stringer-CalvertSW #case study #refinement
Using PVS to Prove a Z Refinement: A Case Study (DWJSC, SS, IW), pp. 573–588.
RTARTA-1997-Lynch #graph
Goal-Directed Completion Using SOUR Graphs (CL), pp. 8–22.
RTARTA-1997-TomasF #equation #geometry #linear
Solving Linear Diophantine Equations Using the Geometric Structure of the Solution Space (APT, MF), pp. 269–283.
ICFPICFP-1997-RichardST #set
Intensional Sets Using Explicit Substitutions (GR, FS, ATA), p. 318.
IFLIFL-1997-KarlsenW #concurrent #haskell #repository
Using Concurrent Haskell to Develop Views over an Active Repository (EWK, SW), pp. 285–303.
IFLIFL-1997-Serrarens #multi #optimisation
Using Multicasting for Optimising Data-Parallelism (PRS), pp. 270–284.
HCIHCI-CC-1997-Aoki #interface
An Ergonomical Study on Computer Interface Using Input Devices (MA), pp. 587–590.
HCIHCI-CC-1997-AraiYIHU #interface
An Input Interface System Using VEP for the Physically Challenged (YA, YY, KI, MH, YU), pp. 397–400.
HCIHCI-CC-1997-BadhamM #case study #implementation #tool support
Tools for Implementing Socio-Technical Systems: An Australian Case Study and the Use of Handbooks (RB, IM), pp. 245–248.
HCIHCI-CC-1997-Fukuzumi
Discrimination of Living Body Fingers by Using EMG and Finger Pulse Volume (SF), pp. 575–578.
HCIHCI-CC-1997-ItohSY #visual notation
A Drawing Support System for the Visually Impaired Computer User Using a Virtual Sound Screen (KI, MS, YY), pp. 401–404.
HCIHCI-CC-1997-JasperEJNW #design #intranet #social
Using Cooperative Design to Introduce ORDBMS-Driven Intranet Applications to Collaborating Social Service Agencies (JEJ, RDE, TBJ, RN, SW), pp. 97–100.
HCIHCI-CC-1997-MajchrzakB #design #lessons learnt
Lessons Learned from Using a Computer-Based Tool to Support Sociotechnical Systems Design (AM, BB), pp. 221–224.
HCIHCI-CC-1997-PerusichM #fuzzy #problem
Using Fuzzy Cognitive Maps to Define the Search Space in Problem Solving (KP, MDM), pp. 805–808.
HCIHCI-CC-1997-ShumayP #approach
Healthy Computing: A Comprehensive Group Training Approach Using Biofeedback (DMS, EP), pp. 555–558.
HCIHCI-CC-1997-Vanderheiden97a #architecture #interface
Use of a Common Table Architecture for Creating Hands Free, Eyes Free, Noisy Environment (Flex-Modal, Flex-Input) Interfaces (GCV), pp. 449–452.
HCIHCI-CC-1997-VendaL #assembly #evaluation
Ergonomic Evaluation of Manual Assembly Operations Using Direct and Indirect Observation Workstations in Sitting and Standing Positions (VFV, SSL), pp. 855–858.
HCIHCI-CC-1997-WolberS #adaptation #aspect-oriented #design
Using Psychological Aspects for the Design of Adaptive IT-Tools for Cooperative Engineering (MW, PS), pp. 781–784.
HCIHCI-SEC-1997-ChurchillSBD #3d #documentation
Using VR-VIBE: Browsing and Searching for Documents in 3D-Space (EFC, DS, SB, PD), pp. 857–860.
HCIHCI-SEC-1997-GunjiKK
Quick Address Search System with Handwriting Using Character Transition Information (KG, SK, KK), pp. 423–426.
HCIHCI-SEC-1997-KoikeC #3d #version control #visualisation
Integrating Version Control and Module Management Using Three-Dimensional Visualization (HK, HCC), pp. 853–856.
HCIHCI-SEC-1997-KuzuokaN
Assisting Remote Instruction Using Copied Reality (HK, TN), pp. 957–960.
HCIHCI-SEC-1997-LawsonRGGM #challenge #human-computer #interface
The Human-Machine Interface Challenges of Using Virtual Environment (VE) Displays Aboard Centrifuge Devices (BDL, AHR, FEG, JDG, AMM), pp. 945–948.
HCIHCI-SEC-1997-MuraiKI #3d #communication #multi #video
Display of Conversation Partners Using 3D-Facial Model in the Multiparty Video Communication System (TM, HK, SI), pp. 861–864.
HCIHCI-SEC-1997-NakajimaHNT #interface #realtime
A System for Real-time Groupware Using a Pen Interface for Creative Thought Support (KN, EH, MN, NT), pp. 443–446.
HCIHCI-SEC-1997-Neal #distance #learning #multi
Using Multiple Technologies for Distance Learning (LN), pp. 111–114.
HCIHCI-SEC-1997-OhashiYE #interface
A Real World Oriented Interface Technique Using Computer Vision (TO, TY, TE), pp. 949–952.
HCIHCI-SEC-1997-PosnerBM
Evaluating REAL Users, Using REAL Software, Performing REAL Tasks, in REAL Contexts (IP, RB, AM), pp. 597–600.
HCIHCI-SEC-1997-ShibuyaKT #education
Teaching Information Literacy in Technical Courses Using WWW (YS, GK, HT), pp. 723–726.
HCIHCI-SEC-1997-ShinYY #authoring #documentation #multi #parsing
Presentation Jockey: Multimedia Authoring System Using Structured Document Parsing (HSS, WJY, KJY), pp. 659–662.
HCIHCI-SEC-1997-SuLYFD #artificial reality #industrial
Industrial Training Using Virtual Reality (CJS, FL, LY, CMF, VGD), pp. 989–992.
CAiSECAiSE-1997-FilippidouL #approach #requirements #validation
Using Scenarios to Validate Requirements in a Plausibility Centred Approach (DF, PL), pp. 47–60.
EDOCEDOC-1997-FujisakiHK #distributed #fault tolerance #network #scalability
A Scalable Fault-Tolerant Network Management System Built Using Distributed Object Technology (TF, MH, KK), pp. 140–148.
ECIRACIR-1997-Wilkinson
Using Combination of Evidence for Term Expansion (RW).
CIKMCIKM-1997-KoczkodajHO #knowledge-based
Using Consistency-driven Pairwise Comparisons in Knowledge-based Systems (WWK, MWH, MO), pp. 91–96.
CIKMCIKM-1997-LinR #navigation
Using a Sequential Index in Terrain-Aided Navigation (LL, TR), pp. 177–184.
CIKMCIKM-1997-ObermeyerM
Evaluating Triggers Using Decision Trees (LO, DPM), pp. 144–150.
CIKMCIKM-1997-SinghSC #concept #documentation #generative
Generating Association Rules from Semi-Structured Documents Using an Extended Concept Hierarchy (LS, PS, BC), pp. 193–200.
CIKMCIKM-1997-YoonSP #data mining #mining #query
Intensional Query Processing Using Data Mining Approaches (SCY, IYS, EKP), pp. 201–208.
ICMLICML-1997-BalujaD #optimisation
Using Optimal Dependency-Trees for Combinational Optimization (SB, SD), pp. 30–38.
ICMLICML-1997-CardieN #predict
Improving Minority Class Prediction Using Case-Specific Feature Weights (CC, NN), pp. 57–65.
ICMLICML-1997-Drucker
Improving Regressors using Boosting Techniques (HD), pp. 107–115.
ICMLICML-1997-KollerS #documentation #word
Hierarchically Classifying Documents Using Very Few Words (DK, MS), pp. 170–178.
ICMLICML-1997-ReddyT #learning
Learning Goal-Decomposition Rules using Exercises (CR, PT), pp. 278–286.
ICMLICML-1997-Schapire #learning #multi #problem
Using output codes to boost multiclass learning problems (RES), pp. 313–321.
KDDKDD-1997-AliMS #classification
Partial Classification Using Association Rules (KA, SM, RS), pp. 115–118.
KDDKDD-1997-ChienFMLG #data analysis #database #image #scalability
Using Artificial Intelligence Planning to Automate Science Data Analysis for Large Image Databases (SAC, FF, HM, EL, RG), pp. 147–150.
KDDKDD-1997-KamberHC #mining #multi
Metarule-Guided Mining of Multi-Dimensional Association Rules Using Data Cubes (MK, JH, JC), pp. 207–210.
KDDKDD-1997-LiuHC #classification
Using General Impressions to Analyze Discovered Classification Rules (BL, WH, SC), pp. 31–36.
KDDKDD-1997-SmythGIRF #clustering #detection
Detecting Atmospheric Regimes Using Cross-Validated Clustering (PS, MG, KI, JR, AF), pp. 61–66.
SIGIRSIGIR-1997-AslandoganTYZR #image #retrieval #semantics
Using Semantic Contents and WordNet in Image Retrieval (YAA, CT, CTY, JZ, NR), pp. 286–295.
SIGIRSIGIR-1997-ChenHXGM #retrieval #taxonomy
Chinese Text Retrieval Without Using a Dictionary (AC, JH, LX, FCG, JM), pp. 42–49.
SIGIRSIGIR-1997-FitzpatrickD #automation #feedback #query #question #social
Automatic Feedback Using Past Queries: Social Searching? (LF, MD), pp. 306–313.
SIGIRSIGIR-1997-HearstK #interactive #interface #named #retrieval #scalability #specification
Cat-a-Cone: An Interactive Interface for Specifying Searches and Viewing Retrieval Results using a Large Category Hierarchy (MAH, CK), pp. 246–255.
SIGIRSIGIR-1997-KlavansTJ #automation #effectiveness #multi #natural language #semiparsing #speech
Effective Use of Natural Language Processing Techniques for Automatic Conflation of Multi-Word Terms: The Role of Derivational Morphology, Part of Speech Tagging, and Shallow Parsing (ET, JK, CJ), pp. 148–155.
UMLUML-1997-Korthaus #modelling #uml
Using UML for Business Object Based Systems Modeling (AK), pp. 220–237.
UMLUML-1997-SchroffT #uml
Conventions for the Practical Use of UML (AS, AT), pp. 262–270.
UMLUML-1997-WeberM #concept #diagrams #implementation #modelling #reuse #uml
Reuse of Models and Diagrams of the UML and Implementation Concepts Regarding Dynamic Modeling (WW, PM), pp. 190–203.
ECOOPECOOP-1997-MeuselCK #documentation #framework #hypermedia #object-oriented
A Model for Structuring User Documentation of Object-Oriented Frameworks Using Patterns and Hypertext (MM, KC, WK), pp. 496–510.
ECOOPECOOP-1997-OdenthalQ #design #documentation
Using Patterns for Design and Documentation (GO, KQC), pp. 511–529.
OOPSLAOOPSLA-1997-LitmanMP #modelling
Modeling Dynamic Collections of Interdependent Objects Using Path-Based Rules (DJL, AM, PFPS), pp. 77–92.
OOPSLAOOPSLA-1997-Lorenz #case study #design pattern #interpreter
Tiling Design Patterns — A Case Study Using the Interpreter Pattern (DHL), pp. 206–217.
OOPSLAOOPSLA-1997-Weihe #algorithm #challenge #object-oriented #programming #reuse
Reuse of Algorithms: Still a Challenge to Object-Oriented Programming (KW), pp. 34–48.
TOOLSTOOLS-ASIA-1997-Coplien97a #c++ #programming
Advanced C++ Programming Styles: Using C++ as a Higher-Level Language (JC), pp. 418–419.
TOOLSTOOLS-ASIA-1997-Exton #distributed #fault tolerance #interface #specification
Distributed Fault Tolerance Specification through the use of Interface Definitions (CE), pp. 254–259.
TOOLSTOOLS-ASIA-1997-HungLC #experience #network
An Experience of Using FDOOA Method to Develop a Telecommunications Network Management System (YSH, WCL, CGC), pp. 320–329.
TOOLSTOOLS-ASIA-1997-PeiYJS #framework #modelling #object-oriented #parallel
A Method for Using Object-Oriented Frameworks to Support Various High-Level Parallel Computing Models (LP, DY, LJ, DLS), pp. 151–158.
TOOLSTOOLS-ASIA-1997-Schmidt97b #communication #design pattern #framework #object-oriented
Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 422–423.
TOOLSTOOLS-ASIA-1997-SheardH #c++ #case study #concept #education #experience #object-oriented #programming #student
Experiences with Teaching Object-Oriented Concepts to Introductory Programming Students Using C++ (JS, DH), pp. 310–319.
TOOLSTOOLS-ASIA-1997-StobartPT #case study #object-oriented #polymorphism #source code #testing
Using Extended General Statecharts to Generate Test Cases for Overloaded/Polymorphic Object-Oriented Programs: A Case Study (SS, NP, BYT), pp. 96–103.
TOOLSTOOLS-ASIA-1997-WangMS #case study #design pattern #development #experience
Experience Report: Using Design Patterns in the Development of JB System (YW, HM, WS), pp. 159–165.
TOOLSTOOLS-PACIFIC-1997-LakosL #java #specification
Animating Formal Specifications Using Java Applets (CL, GL), pp. 196–209.
TOOLSTOOLS-PACIFIC-1997-Schmidt #communication #design pattern #framework #object-oriented
Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 361–362.
TOOLSTOOLS-USA-1997-GilH #debugging #generative #source code #testing
T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
TOOLSTOOLS-USA-1997-Jones #corba
Using CORBA (GJ), p. 374.
AdaEuropeAdaEurope-1997-Thornley #case study #development #experience #static analysis
Static Analysis and Diversity in the Software Development Process- Experiences with the Use of SPARK (JPT), pp. 266–277.
PPDPALP-1997-CodishT #analysis #constraints #logic programming #semantics #source code #termination
A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
PEPMPEPM-1997-BeshersF #compilation #generative #partial evaluation #performance #visualisation
Generating Efficient Virtual Worlds for Visualization Using Partial Evaluation and Dynamic Compilation (CB, SF), pp. 107–115.
PLDIPLDI-1997-BodikG #slicing
Partial Dead Code Elimination using Slicing Transformations (RB, RG), pp. 159–170.
PLDIPLDI-1997-HashemiKC #performance
Efficient Procedure Mapping Using Cache Line Coloring (AHH, DRK, BC), pp. 171–182.
PLDIPLDI-1997-JensenJKS #automation #higher-order #logic #monad #pointer #source code #verification
Automatic Verification of Pointer Programs using Monadic Second-Order Logic (JLJ, MEJ, NK, MIS), pp. 226–236.
PLDIPLDI-1997-Webber #program analysis
Program Analysis Using Binary Relations (ABW), pp. 249–260.
PPDPPLILP-1997-Patterson #lazy evaluation
Transforming Lazy Functions Using Comportment Properties (RP), pp. 111–125.
PPDPPLILP-1997-SparudR #functional #lazy evaluation
Tracing Lazy Functional Computations Using Redex Trails (JS, CR), pp. 291–308.
POPLPOPL-1997-Godefroid #model checking #programming language
Model Checking for Programming Languages using Verisoft (PG), pp. 174–186.
POPLPOPL-1997-Ruf #analysis #clustering #data flow
Partitioning Dataflow Analyses Using Types (ER), pp. 15–26.
POPLPOPL-1997-WandS #semantics
Denotational Semantics Using an Operationally-Based Term Model (MW, GTS), pp. 386–399.
SASSAS-1997-Braunburger #analysis #automation #order #polynomial #termination
Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
SASSAS-1997-FahndrichA #constraints #program analysis #set
Program Analysis Using Mixed Term and Set Constraints (MF, AA), pp. 114–126.
AdaTRI-Ada-1997-SuchanS #ada #education #problem
Using Ada 95 as a Tool to Teach Problem Solving to Non-CS Majors (WKS, TLS), pp. 31–36.
AdaTRI-Ada-1997-Yu #component #object-oriented #reuse
Using Object-Oriented Techniques to Develop Reusable Components (HY), pp. 117–124.
RERE-1997-BoisDZ #on the #problem
On the Use of a Formal R. E. Language — The Generalized Railroad Crossing Problem (PDB, ED, JMZ), p. 128–?.
RERE-1997-Hall #question #requirements #what
What’s the Use of Requirements Engineering? (AH), p. 2–?.
RERE-1997-MassonetL #framework #requirements #reuse
Analogical Reuse of Requirements Frameworks (PM, AvL), p. 26–?.
ASEASE-1997-DevanbuS #automation #hardware #research #verification
Research Directions for Automated Software Verification: Using Trusted Hardware (PTD, SGS), pp. 274–279.
ASEASE-1997-FenselS #architecture #knowledge-based #verification
Using KIV to Specify and Verify Architectures of Knowledge-Based Systems (DF, AS), p. 71–?.
ASEASE-1997-Hall #automation #library #reasoning #validation
Reactive System Validation using Automated Reasoning over a Fragment Library (RJH), pp. 299–300.
ASEASE-1997-Pecheur #distributed #specification #verification
Specification and Verification of the Co4 Distributed Knowledge System using LOTOS (CP), pp. 63–70.
ASEASE-1997-Yamaguchi #modelling #ontology #process
Modeling Software Processes by using Process and Object Ontologies (TY), pp. 319–320.
ESECESEC-FSE-1997-BodikGS #data flow
Refining Data Flow Information Using Infeasible Paths (RB, RG, MLS), pp. 361–377.
ESECESEC-FSE-1997-CheungGK #analysis #composition #liveness #reachability #verification
Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
ESECESEC-FSE-1997-DwyerCH #abstraction #model checking #user interface #visual notation
Model Checking Graphical User Interfaces Using Abstractions (MBD, VC, LH), pp. 244–261.
ESECESEC-FSE-1997-LandSJ #design #detection #empirical #fault #performance #validation
Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
ESECESEC-FSE-1997-RepsBDL #maintenance #problem #profiling
The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem (TWR, TB, MD, JRL), pp. 432–449.
ICSEICSE-1997-Gentleman #component #effectiveness #off the shelf
Effective Use of COTS (Commercial-off-the-Shelf) Software Components in Long Lived Systems (WMG), pp. 635–636.
ICSEICSE-1997-JohnsonT #case study #overview
Assessing Software Review Meetings: A Controlled Experimental Study Using CSRS (PMJ, DT), pp. 118–127.
ICSEICSE-1997-MedvidovicOT #architecture #component #off the shelf #reuse
Reuse of Off-the-Shelf Components in C2-Style Architectures (NM, PO, RNT), pp. 692–700.
ICSEICSE-1997-PerpichPPVW #development #scalability #web
Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development (JP, DEP, AAP, LGV, MWW), pp. 14–21.
ICSEICSE-1997-PezzeY #analysis #modelling #multi #semantics #tool support
Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
ICSEICSE-1997-SullivanSM #architecture #formal method #standard
Using Formal Methods to Reason about Architectural Standards (KJS, JS, MM), pp. 503–513.
SACSAC-1997-ChengKK #assessment #concept #fuzzy #representation
Knowledge assessment using fuzzy conceptual representation (PC, DK, GK), pp. 3–9.
SACSAC-1997-ChungLLD #equation
Effect of data distribution in data assimilation using Burgers’ equation (WC, JML, SL, SKD), pp. 521–526.
SACSAC-1997-FontanaF #documentation #evaluation #fuzzy
Using fuzzy grammars for the evaluation of SGML-based documents (FAF, FF), pp. 202–203.
SACSAC-1997-KozaBAK #evolution #programming #search-based
Evolution using genetic programming of a low-distortion, 96 decibel operational amplifier (JRK, FHBI, DA, MAK), pp. 207–216.
SACSAC-1997-LeeLP #approach #empirical #information management #towards
Towards Interoperable Heterogeneous Information Systems: An Experiment Using the DIOM Approach (YL, LL, CP), pp. 112–114.
SACSAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry
An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
DACDAC-1997-AmonBHL #diagrams #verification
Symbolic Timing Verification of Timing Diagrams using Presburger Formulas (TA, GB, TH, JL), pp. 226–231.
DACDAC-1997-Gebotys #energy #memory management #network
Low Energy Memory and Register Allocation Using Network Flow (CHG), pp. 435–440.
DACDAC-1997-GrundmannDAR #design #performance
Designing High Performance CMOS Microprocessors Using Full Custom Techniques (WJG, DD, RLA, NLR), pp. 722–727.
DACDAC-1997-GuptaMA #formal method #simulation #towards #validation
Toward Formalizing a Validation Methodology Using Simulation Coverage (AG, SM, PA), pp. 740–745.
DACDAC-1997-HenkelE #hardware
A Hardware/Software Partitioner Using a Dynamically Determined Granularity (JH, RE), pp. 691–696.
DACDAC-1997-HongBBM
Safe BDD Minimization Using Don’t Cares (YH, PAB, JRB, KLM), pp. 208–213.
DACDAC-1997-KimC #synthesis
Power-conscious High Level Synthesis Using Loop Folding (DK, KC), pp. 441–445.
DACDAC-1997-KuehlmannK #equivalence
Equivalence Checking Using Cuts and Heaps (AK, FK), pp. 263–268.
DACDAC-1997-LiaoD #bound #problem
Solving Covering Problems Using LPR-Based Lower Bounds (SYL, SD), pp. 117–120.
DACDAC-1997-PandeyRBA #evaluation #verification
Formal Verification of Content Addressable Memories Using Symbolic Trajectory Evaluation (MP, RR, REB, MSA), pp. 167–172.
DACDAC-1997-PomeranzR #approach #fault #multi #simulation
Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
DACDAC-1997-SentovichTB #optimisation #performance #set
Efficient Latch Optimization Using Exclusive Sets (ES, HT, GB), pp. 8–11.
DACDAC-1997-XanthopoulosYC #architecture #case study #estimation
Architectural Exploration Using Verilog-Based Power Estimation: A Case Study of the IDCT (TX, YY, AC), pp. 415–420.
DATEEDTC-1997-ArabiK #performance #testing
Efficient and accurate testing of analog-to-digital converters using oscillation-test method (KA, BK), pp. 348–352.
DATEEDTC-1997-BeckmannH #constraints #in memory #logic programming #memory management #synthesis
Using constraint logic programming in memory synthesis for general purpose computers (RB, JH), p. 619.
DATEEDTC-1997-GirodiasC #constraints #correlation #interface #logic programming #verification
Interface timing verification with delay correlation using constraint logic programming (PG, EC), pp. 12–19.
DATEEDTC-1997-HsiaoRP #generative #testing #traversal
Sequential circuit test generation using dynamic state traversal (MSH, EMR, JHP), pp. 22–28.
DATEEDTC-1997-KropfR #model checking
Using MTBDDs for discrete timed symbolic model checking (TK, JR), pp. 182–187.
DATEEDTC-1997-LiuS #graph #heuristic #multi #performance
Multi-layer chip-level global routing using an efficient graph-based Steiner tree heuristic (LCEL, CS), pp. 311–318.
DATEEDTC-1997-MignotteP #scheduling
Scheduling using mixed arithmetic: an ILP formulation (AM, OP), p. 621.
DATEEDTC-1997-NouraniP #analysis #behaviour
Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
DATEEDTC-1997-RomanowiczLLRABMP #hardware #modelling #simulation #transducer
Modeling and simulation of electromechanical transducers in microsystems using an analog hardware description language (BR, ML, PL, PR, HPA, AB, VM, FP), pp. 119–123.
DATEEDTC-1997-SurtiCT #automaton #design #encoding #power management
Low power FSM design using Huffman-style encoding (PS, LFC, AT), pp. 521–525.
DATEEDTC-1997-TsengS #multi #standard
A gridless multi-layer router for standard cell circuits using CTM cells (HPT, CS), pp. 319–326.
DATEEDTC-1997-UrsuGZ #automaton #design #logic #specification #verification
Design and verification of the sequential systems automata using temporal logic specifications (AU, GG, SZ), p. 623.
DATEEDTC-1997-WalrathVB #analysis #partial evaluation #performance #verification
Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
DATEEDTC-1997-WunscheCSW #design
Microsystem design using simulator coupling (SW, CC, PS, FW), pp. 113–118.
HPDCHPDC-1997-SiuS #design pattern #network #parallel
Design Patterns for Parallel Computing using a Network of Processors (SS, AS), pp. 293–304.
HPDCHPDC-1997-Wolski #network #performance #scheduling
Forecasting Network Performance to Support Dynamic Scheduling using the Network Weather Service (RW), pp. 316–325.
PDPPDP-1997-Errico #lightweight #mobile #named #parallel #process
Swarm: Parallel computing using lightweight mobile processes (LdE), pp. 84–92.
PDPPDP-1997-RuhlB #communication #library
A portable collective communication library using communication schedules (TR, HEB), pp. 297–306.
PDPPDP-1997-Sergent #algorithm #distributed #latency #petri net
Evaluating latency of distributed algorithms using petri nets (NS), pp. 437–444.
PPoPPPPoPP-1997-Rinard #automation #effectiveness #source code
Effective Fine-Grain Synchronization for Automatically Parallelized Programs Using Optimistic Synchronization Primitives (MCR), pp. 112–123.
STOCSTOC-1997-BuhlerSS #fourier #integer #performance #precise
Fast and Precise Computations of Discrete Fourier Transforms Using Cyclotomic Integers (JB, MAS, VS), pp. 40–47.
STOCSTOC-1997-FreundSSW #predict
Using and Combining Predictors That Specialize (YF, RES, YS, MKW), pp. 334–343.
STOCSTOC-1997-Karger #graph #random
Using Random Sampling to Find Maximum Flows in Uncapacitated Undirected Graphs (DRK), pp. 240–249.
TACASTACAS-1997-EngelsFM #generative #model checking #network #testing
Test Generation for Intelligent Networks Using Model Checking (AE, LMGF, SM), pp. 384–398.
TACASTACAS-1997-ParashkevovY #analysis #performance #pseudo #reachability
Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
TAPSOFTTAPSOFT-1997-AlessiBH
Partializing Stone Spaces using SFP Domains (Extended Abstract) (FA, PB, FH), pp. 478–489.
TAPSOFTTAPSOFT-1997-GenetG #constraints #proving #termination
Termination Proofs Using gpo Ordering Constraints (TG, IG), pp. 249–260.
TAPSOFTTAPSOFT-1997-HeiselL #architecture
Using LOTOS Patterns to Characterize Architectural Styles (MH, NL), pp. 818–832.
CADECADE-1997-DennisBG #bisimulation #induction #proving
Using A Generalisation Critic to Find Bisimulations for Coinductive Proofs (LAD, AB, IG), pp. 276–290.
CADECADE-1997-FeltyH #hybrid #interactive #proving #theorem proving
Hybrid Interactive Theorem Proving Using Nuprl and HOL (APF, DJH), pp. 351–365.
CADECADE-1997-Matthews #implementation #induction
A Practical Implementation of Simple Consequence Relations Using Inductive Definitions (SM), pp. 306–320.
CAVCAV-1997-BultanGP #infinity #model checking
Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic (TB, RG, WP), pp. 400–411.
CAVCAV-1997-Kaivola #composition #verification
Using Compositional Preorders in the Verification of Sliding Window Protocal (RK), pp. 48–59.
CAVCAV-1997-MelzerR #concurrent
Deadlock Checking Using Net Unfoldings (SM, SR), pp. 352–363.
CAVCAV-1997-RamakrishnanRRSSW #model checking #performance
Efficient Model Checking Using Tabled Resolution (YSR, CRR, IVR, SAS, TS, DSW), pp. 143–154.
CAVCAV-1997-Sistla #automaton #invariant #linear #network #verification
Parametrized Verification of Linear Networks Using Automata as Invariants (APS), pp. 412–423.
ICLPICLP-1997-BuenoCL #analysis #logic programming #set #source code
Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
ICLPICLP-1997-KagedalD #approach #array #reuse
A Practical Approach to Structure Reuse of Arrays in Single Assignment Languages (AK, SKD), pp. 18–32.
ICLPICLP-1997-TsuchidaAIY #constraints #logic programming
Tree Drawing Using Constraint Logic Programming (KT, YA, TI, TY), p. 414.
ICLPILPS-1997-MonteliusM
Using SimICS to Evaluate the Penny System (JM, PSM), pp. 133–147.
ADLADL-1996-FranceschiniM
Data Compression Using Encrypted Text (RF, AM), pp. 130–138.
ADLADL-1996-LoweWPJVM #image #library
The Image Engine HPCC Project: A Medical Digital Library System using Agent-Based Technology to Create an Integrated View of the Electronic Medical Record (HJL, WKW, SEP, FJ, JKV, ATM), pp. 45–56.
DL-1996-ManmathaHRC #word
Indexing Handwriting Using Word Matching (RM, CH, EMR, WBC), pp. 151–159.
DL-1996-SchatzJCC #information retrieval #interactive #library
Interactive Term Suggestion for Users of Digital Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval (BRS, EHJ, PAC, HC), pp. 126–133.
HTHT-1996-GirgensohnLS #case study #collaboration #experience #web
Experiences in Developing Collaborative Applications Using the World Wide Web “Shell” (AG, AL, KS), pp. 246–255.
HTHT-1996-SaltonSBM #automation #composition
Automatic Text Decomposition Using Text Segments and Text Themes (GS, AS, CB, MM), pp. 53–65.
PODSPODS-1996-LevyRU #query
Answering Queries Using Limited External Processors (AYL, AR, JDU), pp. 227–237.
SIGMODSIGMOD-1996-BohmA #database #documentation #named #object-oriented
HyperStorM — Administering Structured Documents Using Object-Oriented Database Technology (KB, KA), p. 547.
SIGMODSIGMOD-1996-FukudaMMT #2d #algorithm #data mining #mining #visualisation
Data Mining Using Two-Dimensional Optimized Accociation Rules: Scheme, Algorithms, and Visualization (TF, YM, SM, TT), pp. 13–23.
SIGMODSIGMOD-1996-HullZ #framework #integration
A Framework for Supporting Data Integration Using the Materialized and Virtual Approaches (RH, GZ), pp. 481–492.
VLDBVLDB-1996-FaloutsosG #analysis
Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
VLDBVLDB-1996-FaloutsosMS #modelling #multi
Modeling Skewed Distribution Using Multifractals and the “80-20” Law (CF, YM, AS), pp. 307–317.
VLDBVLDB-1996-FukudaMMT #performance
Constructing Efficient Decision Trees by Using Optimized Numeric Association Rules (TF, YM, SM, TT), pp. 146–155.
VLDBVLDB-1996-Hammond #consistency #set
Using Referential Integrity To Easily Define Consistent Subset Replicas (BH), p. 591.
VLDBVLDB-1996-Kleewein #database
Practical Issues with Commercial Use of Federated Databases (JK), p. 580.
VLDBVLDB-1996-LevyRO #query
Querying Heterogeneous Information Sources Using Source Descriptions (AYL, AR, JJO), pp. 251–262.
VLDBVLDB-1996-Ogawa #documentation #effectiveness #performance #ranking #scalability
Effective & Efficient Document Ranking without using a Large Lexicon (YO), pp. 192–202.
VLDBVLDB-1996-Padmanabhan #parallel #scalability #set
Extracting Large Data Sets using DB2 Parallel Edition (SP), p. 582.
VLDBVLDB-1996-ShethKMWDLPLS #multi #workflow
Supporting State-Wide Immunisation Tracking Using Multi-Paradigm Workflow Technology (APS, KK, JAM, DW, SD, CL, DP, JL, IS), pp. 263–273.
VLDBVLDB-1996-SrivastavaDJL #query
Answering Queries with Aggregation Using Views (DS, SD, HVJ, AYL), pp. 318–329.
CSEETCSEE-1996-ShepardBS #automation #education #scalability #tool support
Use of Large, Domain Specific CASE tools in Undergraduate Curricula (TS, BB, MS), pp. 144–148.
CSEETCSEE-1996-TakvorianMZ #education #re-engineering #web
Using the World Wide Web to Promote Software Engineering Education (AT, KM, DZ), p. 270–?.
ITiCSEITiCSE-1996-Castaneda #visual notation
Windows-based applications in Visual Basic using project teams (SEC), p. 232.
ITiCSEITiCSE-1996-Hartley #education #hypermedia #network #operating system
A hypermedia lab manual for operating systems: using the network to teach (SJH), pp. 8–10.
ITiCSEITiCSE-1996-HartleyGJMMPRS #education #interactive #internet #web
Enhancing teaching using the Internet: report of the working group on the World Wide Web as an interactive teaching resource (SH, JGP, DJ, CM, MDM, BAP, MR, MKS), pp. 218–228.
ITiCSEITiCSE-1996-KnoxWJKKLMPR #education #guidelines
Use of laboratories in computer science education: guidelines for good practice: report of the working group on computing laboratories (DK, UW, DTJ, EBK, JK, AL, JPM, VKP, KAR), pp. 167–181.
ITiCSEITiCSE-1996-Krone #algorithm #analysis #data type #education #symbolic computation
Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
ITiCSEITiCSE-1996-McManusBCST #challenge #education
Challenges of using groupware to teach groupware (MMM, CMB, JAC, JS, MBT), pp. 165–166.
ITiCSEITiCSE-1996-McNally #algorithm #data type #education #visualisation
Using visualization in teaching data structures and algorithms (MFM), p. 231.
ITiCSEITiCSE-1996-MirandaP #internet
Using Internet technology for course support (JEPM, JSP), pp. 96–100.
ITiCSEITiCSE-1996-MutchlerL #multi #programming #user interface
Using multimedia and GUI programming in CS 1 (DM, CL), pp. 63–65.
ITiCSEITiCSE-1996-PilgrimL #internet
Appropriate use of the Internet in computer science courses (CJP, YKL), pp. 81–86.
ITiCSEITiCSE-1996-VeraartW #student #web
Using CD-ROMs and local Web pages to provide course materials for distance-students (VEV, SLW), pp. 90–92.
ICSMEICSM-1996-GannodC #c #reverse engineering #source code
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 265–274.
ICSMEICSM-1996-MancoridisH #clustering #graph
Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering (SM, RCH), p. 23–?.
ICSMEICSM-1996-MayrandLM #automation #detection #empirical #metric
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics (JM, CL, EM), p. 244–?.
ICSMEICSM-1996-MortimerB #abstraction #maintenance
Maintenance and abstraction of program data using formal transformations (REM, KHB), p. 301–?.
ICSMEICSM-1996-OwensWG #classification #fault
Software Error Classification using Purify (HDO, BFW, MJG), pp. 104–113.
ICSMEICSM-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code
Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
WCREWCRE-1996-GannodC #c #reverse engineering #source code
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 249–258.
WCREWCRE-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code
Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
WPCWPC-1996-Bull #comprehension #domain-specific language #safety
Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
FMFME-1996-ArnoldBR #debugging #embedded #formal method
An Example of Use of Formal Methods to Debug an Embedded Software (AA, DB, JPR), pp. 649–661.
FMFME-1996-BoigelotG #analysis #model checking #protocol
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
FMFME-1996-ComuzziH #slicing
Program Slicing Using Weakest Preconditions (JJC, JMH), pp. 557–575.
FMFME-1996-SeguinW #approach #category theory #fault tolerance #logic #validation
Using a Logical and Categorical Approach for the Validation of Fault-Tolerant Systems (CS, VW), pp. 347–366.
FMFME-1996-ZwiersHLRS #composition #development #reuse #top-down
Modular Completeness: Integrating the Reuse of Specified Software in Top-down Program Development (JZ, UH, YL, WPdR, FAS), pp. 595–608.
IFLIFL-1996-Assmann #coordination #functional #petri net #process
Coordinating Functional Processes Using Petri Nets (CA), pp. 162–183.
CHICHI-1996-Erickson #analysis #design
The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
CHICHI-1996-KambaEHSS
Using Small Screen Space More Efficiently (TK, SAE, TH, TS, PNS), pp. 383–390.
CHICHI-1996-Miller #approach #development #multi
Integrating Human Factors in Customer Support Systems Development Using a Multi-Level Organisational Approach (AM), pp. 368–375.
CHICHI-1996-RiceFPG #web
Using the Web Instead of a Window System (JR, AF, PP, TRG), pp. 103–110.
CHICHI-1996-VirziSK #identification #problem #prototype #usability
Usability Problem Identification Using Both Low- and High-Fidelity Prototypes (RAV, JLS, DK), pp. 236–243.
CSCWCSCW-1996-HillT #social
Using Frequency-of-Mention in Public Conversations for Social Filtering (WCH, LGT), pp. 106–112.
CSCWCSCW-1996-KawaiBT #multi #named #video
ARGUS: An Active Awareness System Using Computer-Controlled Multiple Cameras (Video Program) (TK, YB, HT), p. 7.
CSCWCSCW-1996-LeeG #collaboration #web
Developing Collaborative Applications Using the World Wide Web Shell (AL, AG), p. 4.
CSCWCSCW-1996-Waldo #collaboration #java #programming
Using the Java Programming Environment to Build Collaborative Applications (JW), p. 3.
CAiSECAiSE-1996-KroneKHDE #case study #information management
Developing an Information System Using TROLL: An Application Field Study (MK, MK, PH, GD, HDE), pp. 136–159.
CAiSECAiSE-1996-LammariLJC #constraints #normalisation
Deriving Normalized Is_a Hierarchies by Using Applicability Constraints (NL, RL, MJ, XC), pp. 562–580.
KDDAKDDM-1996-HsuK #induction #learning #optimisation #query #semantics
Using Inductive Learning To Generate Rules for Semantic Query Optimization (CNH, CAK), pp. 425–445.
CIKMCIKM-1996-LeePHC #composition #query
Spatial Query Processing Using Object Decomposition Method (YJL, HHP, NHH, CWC), pp. 53–61.
CIKMCIKM-1996-Pulido #graph #query #recursion #traversal
Recursive Query Processing Using Graph Traversal Techniques (EP), pp. 37–44.
ICMLICML-1996-AbeL #learning #modelling #word
Learning Word Association Norms Using Tree Cut Pair Models (NA, HL), pp. 3–11.
ICMLICML-1996-DonohoR #induction
Constructive Induction Using Fragmentary Knowledge (SKD, LAR), pp. 113–121.
ICMLICML-1996-HelmboldSSW #multi #online
On-Line Portfolio Selection Using Multiplicative Updates (DPH, RES, YS, MKW), pp. 243–251.
ICMLICML-1996-OliverBW #learning
Unsupervised Learning Using MML (JJO, RAB, CSW), pp. 364–372.
ICMLICML-1996-Suzuki #algorithm #learning #network #performance
Learning Bayesian Belief Networks Based on the Minimum Description Length Principle: An Efficient Algorithm Using the B & B Technique (JS), pp. 462–470.
ICPRICPR-1996-AraujoBPD
Pursuit control in a binocular active vision system using optical flow (HA, JB, PP, JD), pp. 313–317.
ICPRICPR-1996-Ayoung-CheeDF #3d #hybrid #representation
Enhanced 3D representation using a hybrid model (NAC, GD, FPF), pp. 575–579.
ICPRICPR-1996-AzarbayejaniP #3d #estimation #realtime #self
Real-time self-calibrating stereo person tracking using 3-D shape estimation from blob features (AA, AP), pp. 627–632.
ICPRICPR-1996-BalaDHVW #architecture #detection #hybrid #search-based #visual notation
Visual routine for eye detection using hybrid genetic architectures (JWB, KD, JH, HV, HW), pp. 606–610.
ICPRICPR-1996-Bayro-CorrochanoBS #algebra #geometry #network #self
A new self-organizing neural network using geometric algebra (EBC, SB, GS), pp. 555–559.
ICPRICPR-1996-Bayro-CorrochanoLS #algebra #framework #geometry
Geometric algebra: a framework for computing point and line correspondences and projective structure using n uncalibrated cameras (EBC, JL, GS), pp. 334–338.
ICPRICPR-1996-BelloK #analysis
Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
ICPRICPR-1996-BimboP #effectiveness #image #retrieval
Effective image retrieval using deformable templates (ADB, PP), pp. 120–124.
ICPRICPR-1996-BimboP96a #image #visual notation
Image indexing using shape-based visual features (ADB, PP), pp. 351–355.
ICPRICPR-1996-BrucksteinRW #invariant
Recognizing objects using scale space local invariants (AMB, ER, IW), pp. 760–764.
ICPRICPR-1996-CaiA #multi
Tracking human motion using multiple cameras (QC, JKA), pp. 68–72.
ICPRICPR-1996-CallariF #ambiguity #nondeterminism #recognition
Active recognition: using uncertainty to reduce ambiguity (FGC, FPF), pp. 925–929.
ICPRICPR-1996-CamusCHH #realtime
Real-time single-workstation obstacle avoidance using only wide-field flow divergence (TC, DC, MH, THH), pp. 323–330.
ICPRICPR-1996-CesarC #energy #multi
Shape characterization in natural scales by using the multiscale bending energy (RMCJ, LdFC), pp. 735–739.
ICPRICPR-1996-ChehadehCB #adaptation #algorithm #distance
A skeletonization algorithm using chamfer distance transformation adapted to rectangular grids (YC, DC, PB), pp. 131–135.
ICPRICPR-1996-Chen #detection #parallel
The use of hidden deletable pixel detection to obtain bias-reduced skeletons in parallel thinning (YSC), pp. 91–95.
ICPRICPR-1996-ChenHW #feature model #geometry #image #modelling #recognition
Model-based object recognition using range images by combining morphological feature extraction and geometric hashing (CSC, YPH, JLW), pp. 565–569.
ICPRICPR-1996-ChenL96c #novel
A novel form structure extraction method using strip projection (JLC, HJL), pp. 823–827.
ICPRICPR-1996-ChenLC #analysis #classification #sequence
Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
ICPRICPR-1996-ChenY #symmetry #visual notation
Thinning noisy binary patterns using human visual symmetry (YSC, YTY), pp. 146–150.
ICPRICPR-1996-ChetverikovLKH #classification
Zone classification using texture features (DC, JL, JK, RMH), pp. 676–680.
ICPRICPR-1996-ChiaCY #re-engineering
Curved surface reconstruction using a simple structured light method (TLC, ZC, CJY), pp. 844–848.
ICPRICPR-1996-ChungH #2d #3d #modelling #re-engineering
Using 2D active contour models for 3D reconstruction from serial sections (RC, CkH), pp. 849–853.
ICPRICPR-1996-CordellaFSV #algorithm #graph #performance
An efficient algorithm for the inexact matching of ARG graphs using a contextual transformational model (LPC, PF, CS, MV), pp. 180–184.
ICPRICPR-1996-CourtneyA #image #multi #segmentation
Segmentation of volume images using a multiscale transform (TC, NA), pp. 432–436.
ICPRICPR-1996-DarrellP #gesture #markov #process #recognition
Active gesture recognition using partially observable Markov decision processes (TD, AP), pp. 984–988.
ICPRICPR-1996-DayP #generative #network
The generation of motion kinematics using a time-delay neural network (MJSD, JSP), pp. 545–549.
ICPRICPR-1996-DeguchiN #interactive #matrix #visual notation
Visual servoing using eigenspace method and dynamic calculation of interaction matrices (KD, TN), pp. 302–306.
ICPRICPR-1996-DemsarS #image #machine learning
Using machine learning for content-based image retrieving (JD, FS), pp. 138–142.
ICPRICPR-1996-DePieroT #adaptation #image #kernel #realtime #segmentation
Real-time range image segmentation using adaptive kernels and Kalman filtering (FWD, MMT), pp. 573–577.
ICPRICPR-1996-DeruyverH #automation #image #multi #segmentation
Automatic multi-thresholdable image segmentation by using separating bipoints (AD, YH), pp. 457–461.
ICPRICPR-1996-DiasBD #classification #identification
Results of the use of Bayesian classifiers for identification of breast cancer cell nuclei (ÂVD, FB, MRD), pp. 508–512.
ICPRICPR-1996-DunkerHS #3d #estimation #prototype #recognition #set
Single view recognition and pose estimation of 3D objects using sets of prototypical views and spatially tolerant contour representations (JD, GH, MS), pp. 14–18.
ICPRICPR-1996-GreenhillFJ #image
Analysing interferometric images using the Hough transform (DG, PF, GAJ), pp. 844–848.
ICPRICPR-1996-GrobelH #realtime #recognition
Video-based handshape recognition using a handshape structure model in real time (KG, HH), pp. 446–450.
ICPRICPR-1996-GunnN #bound #energy
Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
ICPRICPR-1996-GuttaHTW #network #recognition
Face recognition using ensembles of networks (SG, JH, BT, HW), pp. 50–54.
ICPRICPR-1996-Hachimura #retrieval
Retrieval of paintings using principal color information (KH), pp. 130–134.
ICPRICPR-1996-HamamotoUWYT #recognition
Recognition of handwritten numerals using Gabor features (YH, SU, MW, TY, ST), pp. 250–253.
ICPRICPR-1996-HansenS #estimation
Active depth estimation with gaze and vergence control using Gabor filters (MH, GS), pp. 287–291.
ICPRICPR-1996-HarukiHYY #3d #automation #verification
Automatic seal verification using three-dimensional reference seals (HH, TH, HY, KY), pp. 199–203.
ICPRICPR-1996-HataSKK #algorithm #search-based
Shape extraction of transparent object using genetic algorithm (SH, YS, SK, KK), pp. 684–688.
ICPRICPR-1996-HeidemannR #3d #architecture #recognition
A neural 3-D object recognition architecture using optimized Gabor filters (GH, HJR), pp. 70–74.
ICPRICPR-1996-HepplewhiteS #classification #pattern matching #pattern recognition #recognition
Texture classification using n-tuple pattern recognition (LH, TJS), pp. 159–163.
ICPRICPR-1996-HeydenR #evaluation
Evaluation of corner extraction schemes using invariance methods (AH, KR), pp. 895–899.
ICPRICPR-1996-Hirayama #image
Analyzing form images by using line-shared-adjacent cell relations (YH), pp. 768–772.
ICPRICPR-1996-HolderTM #mobile #navigation
Mobile robot navigation by wall following using a rotating ultrasonic scanner (MBH, MMT, SBM), pp. 298–302.
ICPRICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics
Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
ICPRICPR-1996-HuangPC
Shape from shading using Ritz method with tent basis (CKH, CP, WTC), pp. 398–402.
ICPRICPR-1996-HuijsmansL #image #performance #retrieval
Efficient content-based image retrieval in digital picture collections using projections: (near)-copy location (DPH, MSL), pp. 104–108.
ICPRICPR-1996-HusseinNO #analysis
Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
ICPRICPR-1996-HwangH #approach
Performing temporal action with a hand-eye system using the SHOSLIF approach (WSH, SJH), pp. 35–39.
ICPRICPR-1996-IoannouD #detection #image
Parallelogram detection in a digital image with the use of the Hough transform (DI, ETD), pp. 532–536.
ICPRICPR-1996-IwaiWYY #gesture #recognition
Gesture recognition using colored gloves (YI, KW, YY, MY), pp. 662–666.
ICPRICPR-1996-Jaeger #optimisation #recognition
Recovering writing traces in off-line handwriting recognition: using a global optimization technique (SJ0), pp. 150–154.
ICPRICPR-1996-JengLLC #approach #detection #geometry #performance
An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
ICPRICPR-1996-JiangM #geometry
Geometric primitive extraction using tabu search (TJ, SM), pp. 266–269.
ICPRICPR-1996-Johnson #automation #programming #search-based #visual notation
Automated creation of visual routines using genetic programming (MPJ), pp. 951–956.
ICPRICPR-1996-KamataNK #image
A gray image compression using a Hilbert scan (SiK, MN, EK), pp. 905–909.
ICPRICPR-1996-KindratenkoE #classification #fourier
Classification of irregularly shaped micro-objects using complex Fourier descriptors (VVK, PJMVE), pp. 285–289.
ICPRICPR-1996-Kita
Force-based registration method using attribute values (YK), pp. 34–39.
ICPRICPR-1996-KlemencicPK #diagrams #image #modelling #segmentation
Segmentation of muscle fibre images using Voronoi diagrams and active contour models (AK, FP, SK), pp. 538–542.
ICPRICPR-1996-KnechtS #geometry #modelling
Finding map correspondence using geometric models (JdK, KS), pp. 755–759.
ICPRICPR-1996-KoschanRS
Color stereo vision using hierarchical block matching and active color illumination (AK, VR, KS), pp. 835–839.
ICPRICPR-1996-KudoS #classification
Selection of classifiers based on the MDL principle using the VC dimension (MK, MS), pp. 886–890.
ICPRICPR-1996-LambertN #invariant
Discrimination properties of invariants using the line moments of vectorized contours (GL, JN), pp. 735–739.
ICPRICPR-1996-LanserZ #constraints #on the #recognition
On the use of topological constraints within object recognition tasks (SL, CZ), pp. 580–584.
ICPRICPR-1996-LasakulAK #analysis #formal method #image #linear #multi
A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
ICPRICPR-1996-Lemaire #nondeterminism #recognition
Use of a priori descriptions in a high-level language and management of the uncertainty in a scene recognition system (JL), pp. 560–564.
ICPRICPR-1996-LengagneFM #re-engineering
Using crest lines to guide surface reconstruction from stereo (RL, PF, OM), pp. 9–13.
ICPRICPR-1996-LiaoA
Curve and surface interpolation using rational radial basis functions (WHL, JKA), pp. 8–13.
ICPRICPR-1996-LinF #fourier #re-engineering #slicing #theorem
Range data reconstruction using Fourier slice theorem (SSL, CSF), pp. 874–878.
ICPRICPR-1996-LingrandV #3d #modelling
Dynamic foveal 3D sensing using affine models (DL, TV), pp. 810–814.
ICPRICPR-1996-LinL #detection
Detection of specularity using stereo in color and polarization space (SL, SWL), pp. 263–267.
ICPRICPR-1996-LinLC #3d #modelling
Recovery of 3-D closed surfaces using progressive shell models (RL, WCL, CTC), pp. 95–99.
ICPRICPR-1996-LiuCC #graph #online #order #recognition #relational
Stroke order and stroke number free on-line Chinese character recognition using attributed relational graph matching (JL, WkC, MMYC), pp. 259–263.
ICPRICPR-1996-LiuL #approach #classification #effectiveness #performance
An efficient and effective texture classification approach using a new notion in wavelet theory (JFL, JCML), pp. 820–824.
ICPRICPR-1996-LladosLM #comprehension #documentation #graph
Hand drawn document understanding using the straight line Hough transform and graph matching (JL, JLK, EM), pp. 497–501.
ICPRICPR-1996-ManabeI #image #recognition
Recognition of material types using spectral image (YM, SI), pp. 840–843.
ICPRICPR-1996-MatsuoFI #3d #adaptation #recognition
3-D object recognition using adaptive scale MEGI (HM, JF, AI), pp. 117–122.
ICPRICPR-1996-Mel #3d #approach #multi #named #recognition #visual notation
SEEMORE: a view-based approach to 3-D object recognition using multiple visual cues (BWM), pp. 570–574.
ICPRICPR-1996-MichaelisSSM #adaptation #network
Adaptive filtering of distorted displacement vector fields using artificial neural networks (BM, OS, US, RM), pp. 335–339.
ICPRICPR-1996-MizukamiK #algorithm #recognition
A handwritten character recognition system using hierarchical displacement extraction algorithm (YM, KK), pp. 160–164.
ICPRICPR-1996-ModayurS #3d #statistics
3D matching using statistically significant groupings (BRM, LGS), pp. 238–242.
ICPRICPR-1996-MorimotoYD #gesture #markov #modelling #recognition
Recognition of head gestures using hidden Markov models (CM, YY, LSD), pp. 461–465.
ICPRICPR-1996-Nagao #2d
Direct methods for evaluating the planarity and rigidity of a surface using only 2D views (KN), pp. 417–422.
ICPRICPR-1996-NamuduriRR #algorithm #image #named #segmentation #slicing
SVBS: a high-resolution medical image compression algorithm using slicing with variable block size segmentation (KRN, NR, HR), pp. 919–923.
ICPRICPR-1996-NgT #multi
Multirobot convoying using neuro-fuzzy control (KCN, MMT), pp. 417–421.
ICPRICPR-1996-NishimuraK0HNNO #image #locality
Effect of time-spatial size of motion image for localization by using the spotting method (TN, HK, YI, AH, SN, SN, RO), pp. 191–195.
ICPRICPR-1996-OgiharaNY #image
Data embedding into pictorial images with less distortion using discrete cosine transform (TO, DN, NY), pp. 675–679.
ICPRICPR-1996-OhbaI #multi #recognition
Recognition of the multi-specularity objects using the eigen-window (KO, KI), pp. 692–696.
ICPRICPR-1996-OhyaK #algorithm #detection #image #search-based
Detecting facial expressions from face images using a genetic algorithm (JO, FK), pp. 649–653.
ICPRICPR-1996-OkamotoYSY #network #online #string
On-line handwriting character string separation method using network expression (MO, HY, KS, KY), pp. 422–425.
ICPRICPR-1996-PaikCLL #multi
Multiple recognizers system using two-stage combination (JP, SBC, KL, YL), pp. 581–585.
ICPRICPR-1996-ParagiosT #algorithm #detection
Detection and location of moving objects using deterministic relaxation algorithms (NP, GT), pp. 201–205.
ICPRICPR-1996-PauwelsFG #adaptation #algorithm
Autonomous grouping of contour-segments using an adaptive region-growing algorithm (EJP, PF, LJVG), pp. 586–590.
ICPRICPR-1996-PrantlGP #multi #network
Active fusion using Bayesian networks applied to multi-temporal remote sensing imagery (MP, HG, AP), pp. 890–894.
ICPRICPR-1996-PulliS #modelling #probability #recognition
Triplet-based object recognition using synthetic and real probability models (KP, LGS), pp. 75–79.
ICPRICPR-1996-RamaswamyNR #composition #image
Lossless image compression using wavelet decomposition (VNR, KRN, NR), pp. 924–928.
ICPRICPR-1996-SaberT #cost analysis #detection #feature model #symmetry
Face detection and facial feature extraction using color, shape and symmetry-based cost functions (ES, AMT), pp. 654–658.
ICPRICPR-1996-SainzS #context-sensitive grammar #learning #modelling
Learning bidimensional context-dependent models using a context-sensitive language (MS, AS), pp. 565–569.
ICPRICPR-1996-SaitoM #algorithm #image #modelling #multi #search-based
Object modeling from multiple images using genetic algorithms (HS, MM), pp. 669–673.
ICPRICPR-1996-SchieleC #multi #probability #recognition
Probabilistic object recognition using multidimensional receptive field histograms (BS, JLC), pp. 50–54.
ICPRICPR-1996-SchwartzLMRZ #independence #recognition #speech
Language-independent OCR using a continuous speech recognition system (RMS, CL, JM, CR, YZ), pp. 99–103.
ICPRICPR-1996-SeitzD #representation #towards
Toward image-based scene representation using view morphing (SMS, CRD), pp. 84–89.
ICPRICPR-1996-SenguptaB #clustering
Using spectral features for modelbase partitioning (KS, KLB), pp. 65–69.
ICPRICPR-1996-SerraS #image #network
Perceptual grouping on texture images using non-cartesian networks (JRS, JBSV), pp. 462–466.
ICPRICPR-1996-Singh #detection #recognition
Shape detection using gradient features for handwritten character recognition (SPS), pp. 145–149.
ICPRICPR-1996-Skubalska-RafajlowiczK #classification #metric #performance
Fast k-NN classification rule using metric on space-filling curves (ESR, AK), pp. 121–125.
ICPRICPR-1996-SmitsD #adaptation #approach #image #markov #random #segmentation
Information fusion in a Markov random field-based image segmentation approach using adaptive neighbourhoods (PCS, SGD), pp. 570–575.
ICPRICPR-1996-SobottkaP
Extraction of facial regions and features using color and shape information (KS, IP), pp. 421–425.
ICPRICPR-1996-SoiferKKS #identification
Fingerprint identification using the directions field (VAS, VVK, SNK, RVS), pp. 586–590.
ICPRICPR-1996-StefanoFTV #distance
A distance measure for structural descriptions using circular arcs as primitives (CDS, PF, FT, MV), pp. 290–294.
ICPRICPR-1996-StoschekYH #2d #detection #invariant #multi #robust
Rotation-invariant and robust multiple-2D-object detection using steerable pyramid denoising and optimized circular harmonic filters (AS, TPYY, RH), pp. 376–380.
ICPRICPR-1996-TakacsW #detection
Attention and pattern detection using sensory and reactive control mechanisms (BT, HW), pp. 19–23.
ICPRICPR-1996-TakatooOK #detection #image
Detection of objects including persons using image processing (MT, CO, YK), pp. 466–472.
ICPRICPR-1996-TanakaI96a #recognition
Curvature-based face surface recognition using spherical correlation-principal directions for curved object recognition (HTT, MI), pp. 638–642.
ICPRICPR-1996-TatsunoSYIT #analysis #image #synthesis
Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
ICPRICPR-1996-ThayerG #constraints #design
Designing stereo heads using task domain constraints (SMT, CSG), pp. 820–824.
ICPRICPR-1996-TianT96a #3d #algorithm #image #search-based #sequence
3D shape recovery from two-color image sequences using a genetic algorithm (YlT, HTT), pp. 674–678.
ICPRICPR-1996-TingL #classification #string
Business form classification using strings (AT, MKHL), pp. 690–694.
ICPRICPR-1996-TozakiKNOEM #3d #analysis #image
Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
ICPRICPR-1996-TsurutaTA #constraints #image #re-engineering
Image reconstruction using high-level constraints (NT, RiT, MA), pp. 401–405.
ICPRICPR-1996-UtsumiMKN #gesture #multi #recognition
Hand gesture recognition system using multiple cameras (AU, TM, FK, RN), pp. 667–671.
ICPRICPR-1996-VarstaK #generative #modelling #self
Surface modeling and robot path generation using self-organization (MV, PK), pp. 30–34.
ICPRICPR-1996-VinodM
Object location using complementary color features: histogram and DCT (VVV, HM), pp. 554–559.
ICPRICPR-1996-VitulanoNVM #detection
Edge detection using a new definition of entropy (SV, MN, DV, CM), pp. 141–145.
ICPRICPR-1996-WakaharaNMO #online #recognition
On-line cursive Kanji character recognition using stroke-based affine transformation (TW, NN, SM, KO), pp. 204–209.
ICPRICPR-1996-Webb #feature model #multi #scalability
Nonlinear feature extraction with radial basis functions using a weighted multidimensional scaling stress measure (ARW), pp. 635–639.
ICPRICPR-1996-WebbG #estimation
Source position estimation using radial basis functions (ARW, PNG), pp. 3–7.
ICPRICPR-1996-WorringW #analysis
Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
ICPRICPR-1996-WuL #3d #segmentation
3D part segmentation using simulated electrical charge distributions (KW, MDL), pp. 14–18.
ICPRICPR-1996-YagiNYY #estimation #image #mobile
Rolling motion estimation for mobile robot by using omnidirectional image sensor HyperOmniVision (YY, WN, KY, MY), pp. 946–950.
ICPRICPR-1996-YimBA #segmentation
Bayesian range segmentation using focus cues (CY, ACB, JKA), pp. 482–486.
ICPRICPR-1996-YipP #detection #representation
Detection of moving objects using a spatiotemporal representation (HMY, TCP), pp. 483–487.
ICPRICPR-1996-ZhangB #automation #image #recognition
Automatic model construction for object recognition using ISAR images (SZ, BB), pp. 169–173.
ICPRICPR-1996-ZhaNN #3d #algorithm #image #modelling #recognition
3-D object recognition from range images by using a model-based Hopfield-style matching algorithm (HZ, HN, TN), pp. 111–116.
ICPRICPR-1996-ZhengMFA #3d #modelling #re-engineering
Reconstruction of 3D models from specular motion using circular lights (JYZ, AM, YF, NA), pp. 869–873.
KDDKDD-1996-CiesielskiP #database #hybrid #mining #overview
Using a Hybrid Neural/Expert System for Data Base Mining in Market Survey Data (VC, GP), pp. 38–43.
KDDKDD-1996-Feelders #learning #modelling
Learning from Biased Data Using Mixture Models (AJF), pp. 102–107.
KDDKDD-1996-HofackerHSS #information management #product line #scalability #sequence
Knowledge Discovery in RNA Sequence Families of HIV Using Scalable Computers (ILH, MAH, PFS, PES), pp. 20–25.
KDDKDD-1996-IglesiaDR #database #heuristic
Discovering Knowledge in Commercial Databases Using Modern Heuristic Techniques (BdlI, JCWD, VJRS), pp. 44–49.
KDDKDD-1996-LakshminarayanHGS #machine learning
Imputation of Missing Data Using Machine Learning Techniques (KL, SAH, RPG, TS), pp. 140–145.
KDDKDD-1996-Lange #approach #empirical #predict #recursion
An Empirical Test of the Weighted Effect Approach to Generalized Prediction Using Recursive Neural Nets (RL), pp. 183–188.
KDDKDD-1996-MannilaT
Discovering Generalized Episodes Using Minimal Occurrences (HM, HT), pp. 146–151.
KDDKDD-1996-RyuE #programming #query #search-based
Deriving Queries from Results Using Genetic Programming (TWR, CFE), pp. 303–306.
KDDKDD-1996-ShanZHC #classification #database #set
Discovering Classification Knowledge in Databases Using Rough Sets (NS, WZ, HJH, NC), pp. 271–274.
KDDKDD-1996-Smyth #clustering #monte carlo
Clustering Using Monte Carlo Cross-Validation (PS), pp. 126–133.
KDDKDD-1996-TeranoI #induction #information management #interactive #learning
Interactive Knowledge Discovery from Marketing Questionnaire Using Simulated Breeding and Inductive Learning Methods (TT, YI), pp. 279–282.
KDDKDD-1996-WangW #representation
Representing Discovered Patterns Using Attributed Hypergraph (YW, AKCW), pp. 283–286.
KRKR-1996-Costello #modelling
Modeling Belief Change using Counterfactuals (TC), pp. 432–443.
KRKR-1996-Kelley #calculus #case study #modelling #problem
Modeling Complex Systems in the Situation Calculus: A Case Study Using the Dagstuhl Steam Boiler Problem (TGK), pp. 26–37.
KRKR-1996-TeijeH #approximate
Computing Approximate Diagnoses By Using Approximate Entailment (AtT, FvH), pp. 256–265.
SEKESEKE-1996-ChangDC #approach #fuzzy #metric #usability
Measurement of Usability of Software Using a Fuzzy Systems Approach (EC, TSD, DC), pp. 69–76.
SEKESEKE-1996-HwangCWS #3d #performance #visualisation
A Fast 3-D Visualization Methodology Using Characteristic Views of Objects (SH, SYC, TW, PCYS), pp. 577–584.
SEKESEKE-1996-KangB #design #visualisation
Using Design Cohesion to Visualize, Quantify, and Restructure Software (BKK, JMB), pp. 222–229.
SIGIRSIGIR-1996-LeeA #n-gram #retrieval
Using n-Grams for Korean Text Retrieval (JHL, JSA), pp. 216–224.
SIGIRSIGIR-1996-RollekeF #logic #retrieval
Retrieval of Complex Objects Using a Four-Valued Logic (TR, NF), pp. 206–214.
SIGIRSIGIR-1996-SheridanB #information retrieval #multi
Experiments in Multilingual Information Retrieval Using the SPIDER System (PS, JPB), pp. 58–65.
SIGIRSIGIR-1996-SmeatonQ #image #retrieval #semantics #word
Experiments on Using Semantic Distances Between Words in Image Caption Retrieval (AFS, IQ), pp. 174–180.
SIGIRSIGIR-1996-XuC #analysis #documentation #query
Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
ECOOPECOOP-1996-BullatS #clustering #database #effectiveness
Dynamic Clustering in Object Databases Exploiting Effective Use of Relationships Between Objects (FB, MS), pp. 344–365.
ECOOPECOOP-1996-KonoKM #distributed #implementation #memory management
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
ECOOPECOOP-1996-SilvaC #concept #database #design #diagrams #multi #object-oriented
Conceptual Design of Active Object-Oriented Database Applications Using Multi-level Diagrams (MJVS, CRC), pp. 366–397.
OOPSLAOOPSLA-1996-BardouD
Split Objects: a Disciplined Use of Delegation within Objects (DB, CD), pp. 122–137.
OOPSLAOOPSLA-1996-VanHilstN #component #design
Using Role Components to Implement Collaboration-Based Designs (MVH, DN), pp. 359–369.
OOPSLAOOPSLA-1996-Yelland #case study #design pattern #framework
Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
AdaEuropeAdaEurope-1996-FletcherS #framework #object-oriented #specification #testing
A Framework for Testing Object-Oriented Software Using Formal Specifications (RF, ASMS), pp. 159–170.
AdaEuropeAdaEurope-1996-LundqvistW #ada #object-oriented
Using Object-Oriented Methods in Ada 95 to Implement Linda (KL, GW), pp. 211–222.
AdaEuropeAdaEurope-1996-RealEC #ada #prototype #realtime
Using Ada 95 for Prototyping Real-Time Systems (JR, AE, AC), pp. 262–274.
AdaEuropeAdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
PPDPALP-1996-Marchiori96a #abstract domain #first-order #logic
Prime Factorizations of Abstract Domains Using First Order Logic (EM), pp. 209–223.
PLDIPLDI-1996-DawsonRW #case study #logic programming #program analysis
Practical Program Analysis Using General Purpose Logic Programming Systems — A Case Study (SD, CRR, DSW), pp. 117–126.
PLDIPLDI-1996-SreedharGL #analysis #data flow #framework #graph #incremental
A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
PPDPPLILP-1996-Bagnara #implementation
A Reactive Implementation of Pos Using ROBDDs (RB), pp. 107–121.
PPDPPLILP-1996-BenaissaLR #modelling #recursion #reduction
Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
PPDPPLILP-1996-StuckeyT #constraints #logic programming #modelling #probability #theorem proving
Models for Using Stochastic Constraint Solvers in Constraint Logic Programming (PJS, VT), pp. 423–437.
POPLPOPL-1996-HughesPS #correctness #proving
Proving the Correctness of Reactive Systems Using Sized Types (JH, LP, AS), pp. 410–423.
POPLPOPL-1996-Jones #composition
Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
SASSAS-1996-Paterson #compilation #lazy evaluation
Compiling Laziness Using Projections (RP), pp. 255–269.
AdaTRI-Ada-1996-NebeshF #ada #component #html #learning
Learning to Use Ada 95 Components Using HTML Linking (BN, MBF), pp. 207–210.
AdaTRI-Ada-1996-Pettit #ada #design #distributed #realtime
Using Ada 95 for the Design of Distributed Real-Time Systems (RGPI), pp. 49–55.
REICRE-1996-NobeW #lessons learnt #modelling #requirements
Lessons Learned from a Trial Application of Requirements Modeling Using Statecharts (CRN, WEW), pp. 86–93.
REICRE-1996-RollandP #modelling #process
Using Generic Method Chunks to Generate Process Models Fragments (CR, VP), pp. 173–181.
FSEFSE-1996-MedvidovicORT #architecture #design #object-oriented #type system
Using Object-Oriented Typing to Support Architectural Design in the C2 Style (NM, PO, JER, RNT), pp. 24–32.
FSEFSE-1996-NaumovichCO #analysis #communication #data flow #protocol #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
FSEFSE-1996-SeiterPL #behaviour #evolution
Evolution of Object Behavior Using Context Relations (LMS, JP, KJL), pp. 46–57.
ICSEICSE-1996-KoskimiesM #diagrams #named #object-oriented #source code
Scene: Using Scenario Diagrams and Active Text for Illustrating Object-Oriented Programs (KK, HM), pp. 366–375.
ICSEICSE-1996-Ledru #tool support
Using KIDS as a Tool Support for VDM (YL), pp. 236–245.
ICSEICSE-1996-OgasawaraYK #case study #experience #lifecycle #metric #quality
Experiences of Software Quality Management Using Metrics through the Life-Cycle (HO, AY, MK), pp. 179–188.
ICSEICSE-1996-ShepperdSK #estimation
Effort Estimation Using Analogy (MJS, CS, BK), pp. 170–178.
ASEKBSE-1996-HarmerMB #cobol #knowledge-based #source code
Using Knowledge-Based Transformations to Reverse-Engineer COBOL Programs (TJH, PJM, JMB), p. 17.
ASEKBSE-1996-LeeG #collaboration #web
Developing Collaborative Applications Using the World Wide Web “Shell” (AL, AG), p. 3.
SACSAC-1996-AbualiWS #algorithm #design #problem #search-based #set
Solving the subset interconnection design problem using genetic algorithms (FNA, RLW, DAS), pp. 299–304.
SACSAC-1996-Asgharzadeh #analysis #fuzzy #image #rule-based
Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
SACSAC-1996-Boulet #development #multi
Using multimedia to emphasize the development of professional abilities (MMB), pp. 110–114.
SACSAC-1996-ChungLLD #behaviour #comparison
A comparison of variational data assimilation and nudging using a simple dynamical system with chaotic behavior (WC, JML, SL, SKD), pp. 454–462.
SACSAC-1996-Cripps #performance #predict
Using artificial neural nets to predict academic performance (AC), pp. 33–37.
SACSAC-1996-Duben #statistics
Conformational statistics of the nitrogen linkage in glycopeptides using umbrella sampling (AJD), pp. 38–43.
SACSAC-1996-DurandAN #algorithm #automation #search-based
Automatic aircraft conflict resolution using genetic algorithms (ND, JMA, JN), pp. 289–298.
SACSAC-1996-HarangsriSN #classification #multi #optimisation #query
Query optimisation in multidatabase systems using query classification (BH, JS, AHHN), pp. 173–177.
SACSAC-1996-HashemiSHL #identification #testing
Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
SACSAC-1996-HoeltingSW #algorithm #network #search-based
Finding investigator tours in telecommunication networks using genetic algorithms (CJH, DAS, RLW), pp. 82–87.
SACSAC-1996-HoeltingSW96a #algorithm #precedence #problem #search-based
A genetic algorithm for the minimum broadcast time problem using a global precedence vector (CJH, DAS, RLW), pp. 258–262.
SACSAC-1996-Liu #data type #persistent #runtime
A persistent runtime system using persistent data structures (ZL), pp. 429–436.
ASPLOSASPLOS-1996-JamrozikFVEKLV #latency #memory management #network
Reducing Network Latency Using Subpages in a Global Memory Environment (HAJ, MJF, GMV, JEI, ARK, HML, MKV), pp. 258–267.
CCCC-1996-LiK #performance #reuse
Efficient Storage Reuse of Aggregates in Single Assignment Languages (ZL, CCK), pp. 238–252.
CCCC-1996-Salomon #maintenance #partial evaluation #reuse #usability
Using Partial Evaluation in Support of Portability, Reusability, and Maintainability (DJS), pp. 208–222.
DACDAC-1996-AraujoML #architecture #code generation
Using Register-Transfer Paths in Code Generation for Heterogeneous Memory-Register Architectures (GA, SM, MTCL), pp. 591–596.
DACDAC-1996-BrownMVCGGGLZS #design #experience #multi #programmable #scalability #tool support
Experience in Designing a Large-scale Multiprocessor using Field-Programmable Devices and Advanced CAD Tools (SDB, NM, ZGV, SC, AG, RG, MG, KL, ZZ, SS), pp. 427–432.
DACDAC-1996-Dahlgren #logic #simulation
Oscillation Control in Logic Simulation using Dynamic Dominance Grahps (PD), pp. 155–160.
DACDAC-1996-DesaiY #cpu #design #simulation #verification
A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
DACDAC-1996-GenderenM #performance
Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction (AJvG, NPvdM), pp. 758–763.
DACDAC-1996-HansenS #diagrams #synthesis
Synthesis by Spectral Translation Using Boolean Decision Diagrams (JPH, MS), pp. 248–253.
DACDAC-1996-IpD #reduction
State Reduction Using Reversible Rules (CNI, DLD), pp. 564–567.
DACDAC-1996-LeeHCF #design #modelling #synthesis
Domain-Specific High-Level Modeling and Synthesis for ATM Switch Design Using VHDL (MTCL, YCH, BC, MF), pp. 585–590.
DACDAC-1996-LiG #optimisation
HDL Optimization Using Timed Decision Tables (JL, RKG), pp. 51–54.
DACDAC-1996-LiM #adaptation #linear #modelling #parametricity
Computing Parametric Yield Adaptively Using Local Linear Models (ML, LSM), pp. 831–836.
DACDAC-1996-MiliozziVCMS #design #modelling
Use of Sensitivities and Generalized Substrate Models in Mixed-Signal IC Design (PM, IV, EC, EM, ALSV), pp. 227–232.
DACDAC-1996-OhPP #bound #linear #programming
Constructing Lower and Upper Bounded Delay Routing Trees Using Linear Programming (JO, IP, MP), pp. 401–404.
DACDAC-1996-PandeyRBB #array #evaluation #verification
Formal Verification of PowerPC Arrays Using Symbolic Trajectory Evaluation (MP, RR, DLB, REB), pp. 649–654.
DACDAC-1996-SemenovY #petri net #verification
Verification of asynchronous circuits using Time Petri Net unfolding (ALS, AY), pp. 59–62.
DACDAC-1996-SunDH #equation #geometry #independence #parametricity #performance
Fast Parameters Extraction of General Three-Dimension Interconnects Using Geometry Independent Measured Equation of Invariance (WS, WWMD, WHI), pp. 371–376.
HPCAHPCA-1996-CvetanovicB #performance #specification
Performance Characterization of the Alpha 21164 Microprocessor Using TP and SPEC Workloads (ZC, DB), pp. 270–280.
HPCAHPCA-1996-IftodeDFL #automation #memory management
Improving Release-Consistent Shared Virtual Memory Using Automatic Update (LI, CD, EWF, KL), pp. 14–25.
HPCAHPCA-1996-KontothanassisS #distributed #interface #memory management #network #performance
Using Memory-Mapped Network Interfaces to Improve the Performance of Distributed Shared Memory (LIK, MLS), pp. 166–177.
HPDCHPDC-1996-ChandyRSMRTW #distributed #internet #java
A World-Wide Distributed System Using Java and the Internet (KMC, AR, PAGS, JM, MR, WT, LW), pp. 11–18.
HPDCHPDC-1996-Konchady #distributed
Distributed Supercomputing Using ACTS (MK), pp. 172–181.
PDPPDP-1996-CauZCM #scalability #simulation #specification
Using ITL and Tempura for Large-Scale Specification and Simulation (AC, HZ, NC, BCM), pp. 493–500.
ESOPESOP-1996-Bechet #encoding #partial evaluation
Removing Value Encoding Using Alternative Values in Partial Evaluation of Strongly-Typed Languages (DB), pp. 77–91.
WRLARWLW-1996-Castro #csp
Solving binary CSP using computational systems (CC), pp. 246–265.
STOCSTOC-1996-CleggEI #algorithm #proving #satisfiability
Using the Groebner Basis Algorithm to Find Proofs of Unsatisfiability (MC, JE, RI), pp. 174–183.
STOCSTOC-1996-Milenkovic #linear #programming #strict
Translational Polygon Containment and Minimal Enclosure using Linear Programming Based Restriction (VM), pp. 109–118.
TACASTACAS-1996-Lowe #protocol
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
TACASTACAS-1996-Rauzy #analysis #constraints #reduction #specification
Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (AR), p. 417.
CADECADE-1996-Fuchs #experience #heuristic #proving
Experiments in the Heuristic Use of Past Proof Experience (MF), pp. 523–537.
CAVCAV-1996-Avrunin #algebra #geometry #model checking
Symbolic Model Checking Using Algebraic Geometry (GSA), pp. 26–37.
CAVCAV-1996-BengtssonGKLLPY #protocol #verification
Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
CAVCAV-1996-BoigelotG #communication #infinity #protocol #verification
Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (BB, PG), pp. 1–12.
CAVCAV-1996-ClarkeGZ #algorithm #proving #theorem proving #verification
Verifying the SRT Division Algorithm Using Theorem Proving Techniques (EMC, SMG, XZ), pp. 111–122.
CAVCAV-1996-FernandezJJV #generative #on the fly #testing #verification
Using On-The-Fly Verification Techniques for the Generation of test Suites (JCF, CJ, TJ, CV), pp. 348–359.
CAVCAV-1996-GrafS #invariant #proving #theorem proving #verification
Verifying Invariants Using theorem Proving (SG, HS), pp. 196–207.
CSLCSL-1996-Matzinger #modelling
Computational Representations of Herbrand Models Using Grammars (RM), pp. 334–348.
ISSTAISSTA-1996-BarjaktarovicCJ #functional #kernel #protocol #specification #verification
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
ISSTAISSTA-1996-CrowleyLL #automation #formal method #testing
Issues in the Full Scale Use of Formal Methods for Automated Testing (JLC, JFL, KAL), pp. 71–78.
ISSTAISSTA-1996-GodefroidPS #concurrent #industrial #partial order #source code #validation
Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs (PG, DP, MGS), pp. 261–269.
ISSTAISSTA-1996-MorellM #analysis #testing
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
ADLADL-1995-NicaR #approach #constraints #documentation
Uniform Structured Document Handling using a Constraint-based Object Approach (AN, EAR), pp. 83–101.
DL-1995-Lamb #online
Using Online Information Resources: Reaching for the *.*’s (RL).
ICDARICDAR-v1-1995-AkindeleB #documentation #modelling
Construction of generic models of document structures using inference of tree grammars (OTA, AB), pp. 206–209.
ICDARICDAR-v1-1995-ArikiM #recognition #segmentation
Segmentation and recognition of handwritten characters using subspace method (YA, YM), pp. 120–123.
ICDARICDAR-v1-1995-BayerW #documentation
Experiments on extracting structural information from paper documents using syntactic pattern (TAB, HW), pp. 476–479.
ICDARICDAR-v1-1995-BlandoKN #image #predict
Prediction of OCR accuracy using simple image features (LRB, JK, TAN), pp. 319–322.
ICDARICDAR-v1-1995-BunkeL #classification #documentation #parsing
Classification and postprocessing of documents using an error-correcting parser (HB, RL), pp. 222–226.
ICDARICDAR-v1-1995-ChiuTC #invariant #matrix #recognition
Invariant handwritten Chinese character recognition using weighted ring-data matrix (HPC, DCT, JCC), pp. 116–119.
ICDARICDAR-v1-1995-FangH #algorithm #approach #recognition #testing #word
A hypothesis testing approach to word recognition using an A* search algorithm (CF, JJH), pp. 360–363.
ICDARICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition
Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
ICDARICDAR-v1-1995-Gentric #metric #recognition #word
Experimental results on improved handwritten word recognition using the Levenshtein metric (PG), pp. 364–367.
ICDARICDAR-v1-1995-GrbavecB #graph grammar #recognition
Mathematics recognition using graph rewriting (AG, DB), pp. 417–421.
ICDARICDAR-v1-1995-GuyonP #design #markov #memory management #modelling
Design of a linguistic postprocessor using variable memory length Markov models (IG, FP), pp. 454–457.
ICDARICDAR-v1-1995-HochbergKKT #automation #clustering #identification #image
Automatic script identification from images using cluster-based templates (JH, LK, PK, TT), pp. 378–381.
ICDARICDAR-v1-1995-KaneharaSH #flexibility #image #retrieval #visual notation
A flexible image retrieval using explicit visual instruction (FK, SS, TH), pp. 175–178.
ICDARICDAR-v1-1995-Kawatani #performance #recognition
Character recognition performance improvement using personal handwriting characteristics (TK), pp. 98–103.
ICDARICDAR-v1-1995-KimD #classification #distance #network #recognition
Off-line Recognition of Korean Scripts Using Distance Matching and Neural Network Classifiers (SHK, JID), pp. 34–37.
ICDARICDAR-v1-1995-LeeK #multi #network #recognition #self
Multi-lingual, multi-font and multi-size large-set character recognition using self-organizing neural network (SWL, JSK), pp. 28–33.
ICDARICDAR-v1-1995-LeTW #analysis #documentation #image
Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
ICDARICDAR-v1-1995-LinLS #comprehension #documentation #heuristic #interactive
Interactive acquisition of thematic information of Chinese verbs for judicial verdict document understanding using templates, syntactic clues, and heuristics (KHCL, RLL, VWS), pp. 297–300.
ICDARICDAR-v1-1995-OlivierPAL #modelling #probability #recognition #word
Recognition of handwritten words using stochastic models (CO, TP, MA, YL), pp. 19–23.
ICDARICDAR-v1-1995-TanahashiSY #algorithm #image #search-based
Recovering decorative patterns of ceramic objects from a monocular image using a genetic algorithm (HT, KS, KY), pp. 339–342.
ICDARICDAR-v2-1995-AntonacopoulosR #classification #representation
Representation and classification of complex-shaped printed regions using white tiles (AA, RTR), pp. 1132–1135.
ICDARICDAR-v2-1995-CaesarGM95a #recognition #word
Using lexical knowledge for the recognition of poorly written words (TC, JMG, EM), pp. 915–918.
ICDARICDAR-v2-1995-ChenHP #documentation #image #recursion #segmentation #word
Simultaneous word segmentation from document images using recursive morphological closing transform (SSC, RMH, ITP), pp. 761–764.
ICDARICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #verification
Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
ICDARICDAR-v2-1995-FutrelleN #analysis #constraints #diagrams #parsing #performance
Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
ICDARICDAR-v2-1995-HaHP #bound #component #recursion
Recursive X-Y cut using bounding boxes of connected components (JH, RMH, ITP), pp. 952–955.
ICDARICDAR-v2-1995-HamamotoUMT #recognition
Recognition of handprinted Chinese characters using Gabor features (YH, SU, KM, ST), pp. 819–823.
ICDARICDAR-v2-1995-Hirayama #analysis
A method for table structure analysis using DP matching (YH), pp. 583–586.
ICDARICDAR-v2-1995-JunKKKK #modelling #online #recognition
On-line cursive Korean character recognition by using curvature models (BHJ, MYK, CSK, WSK, JK), pp. 1051–1054.
ICDARICDAR-v2-1995-KimuraMS #algorithm #recognition #word
Handwritten ZIP code recognition using lexicon free word recognition algorithm (FK, YM, MS), pp. 906–910.
ICDARICDAR-v2-1995-LeeLK #online #recognition
On-line cursive script recognition using an island-driven search technique (SHL, HL, JHK), pp. 886–889.
ICDARICDAR-v2-1995-LiangAS #approach #segmentation
Segmentation of interference marks using morphological approach (SL, MA, MS), pp. 1042–1046.
ICDARICDAR-v2-1995-MiyaoN #approach #music #network
Head and stem extraction from printed music scores using a neural network approach (HM, YN), pp. 1074–1079.
ICDARICDAR-v2-1995-NakamuraHN #image
Drawing capturing system using image enhancement (NN, KH, MN), pp. 652–655.
ICDARICDAR-v2-1995-OhK #markov #modelling #recognition
Off-line recognition of handwritten Korean and alphanumeric characters using hidden Markov models (CO, WSK), pp. 815–818.
ICDARICDAR-v2-1995-ParmentierB #architecture #bibliography #validation
Bibliography references validation using emergent architecture (FP, AB), pp. 532–535.
ICDARICDAR-v2-1995-SafariNSA #documentation #geometry
Document registration using projective geometry (RS, NN, MS, MA), pp. 1161–1164.
ICDARICDAR-v2-1995-SauvolaP #analysis #classification #feature model #performance #segmentation
Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
ICDARICDAR-v2-1995-ShikuNATK
Extraction of slant character candidates from maps using circular templates (OS, AN, MA, HT, HK), pp. 936–939.
ICDARICDAR-v2-1995-SivaramakrishnanPHSH #classification #documentation #generative
Zone classification in a document using the method of feature vector generation (RS, ITP, JH, SS, RMH), pp. 541–544.
ICDARICDAR-v2-1995-TangMXCS #documentation
Extraction of reference lines from documents with grey-level background using sub-images of wavelets (YYT, HM, DX, YC, CYS), pp. 571–574.
ICDARICDAR-v2-1995-Ueda
Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
ICDARICDAR-v2-1995-YoonLK #image
Faxed image restoration using Kalman filtering (MYY, SWL, JSK), pp. 677–680.
ICDARICDAR-v2-1995-ZiinoAS #machine learning #recognition
Recognition of hand printed Latin characters using machine learning (DZ, AA, CS), pp. 1098–1102.
PODSPODS-1995-ChangH #database #generative
Using Witness Generators to Support Bi-directional Update Between Object-Based Databases (TPC, RH), pp. 196–207.
PODSPODS-1995-LevyMSS #query
Answering Queries Using Views (AYL, AOM, YS, DS), pp. 95–104.
PODSPODS-1995-RajaramanSU #query
Answering Queries Using Templates with Binding Patterns (AR, YS, JDU), pp. 105–112.
SIGMODSIGMOD-1995-AdyaGLM #concurrent #performance
Efficient Optimistic Concurrency Control Using Loosely Synchronized Clocks (AA, RG, BL, UM), pp. 23–34.
SIGMODSIGMOD-1995-Atkinson #architecture #component #relational
Use of a Component Architecture in Integrating Relational and Non-relational Storage Systems (RGA), p. 454.
SIGMODSIGMOD-1995-DreyerDS
Using the CALANDA Time Series Management System (WD, AKD, DS), p. 489.
VLDBVLDB-1995-AmmannJR #formal method #semantics #transaction
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
VLDBVLDB-1995-BelussiF #correlation #query
Estimating the Selectivity of Spatial Queries Using the “Correlation” Fractal Dimension (AB, CF), pp. 299–310.
VLDBVLDB-1995-SistlaYLL #retrieval #similarity
Similarity based Retrieval of Pictures Using Indices on Spatial Relationships (APS, CTY, CL, KLL), pp. 619–629.
CSEETCSEE-1995-Hefley #comprehension #design #education #web
Understanding, Using and Designing for Educational Uses of the World-Wide Web (WEH), pp. 431–432.
TFPIEFPLE-1995-HilsdaleADF #compilation
Compiler Construction Using Scheme (EH, JMA, RKD, DPF), pp. 251–267.
TFPIEFPLE-1995-KlugeRS #education #execution #functional #programming
Using pi-RED as a Teaching Tool for Functional Programming and Program Execution (WEK, CR, SBS), pp. 231–249.
ICSMEICSM-1995-AvrilionisC #maintenance #modelling #petri net #process
Using views to maintain Petri-net-based process models (DA, PYC), pp. 318–326.
ICSMEICSM-1995-CimitileLM #case study #identification #reuse #slicing #specification
Identifying reusable functions using specification driven program slicing: a case study (AC, ADL, MM), pp. 124–133.
ICSMEICSM-1995-DeBaudR #domain model #modelling #re-engineering
A software re-engineering method using domain models (JMD, SR), pp. 204–213.
ICSMEICSM-1995-StoreyM
Manipulating and documenting software structures using SHriMP views (MADS, HAM), p. 275–?.
ICSMEICSM-1995-Williams #analysis #case study #design #experience #object-oriented
Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
WCREWCRE-1995-CimitileLM #execution #reuse #symbolic computation
Qualifying Reusable Functions Using Symbolic Execution (AC, ADL, MM).
WCREWCRE-1995-EdwardsM #logic
Deriving a Logical Data Model for a System Using the RECAST Method (HME, MM).
RTARTA-1995-KirchnerM #constraints #prototype
Prototyping Completion with Constraints Using Computational Systems (HK, PEM), pp. 438–443.
TLCATLCA-1995-BerardiB #optimisation #type system
Using Subtyping in Program Optimization (SB, LB), pp. 63–77.
FPCAFPCA-1995-SharpR #specification
Using a Language of Functions and Relations for VLSI Specification (RS, OR), pp. 45–54.
CHICHI-1995-JohnP #approach #case study #learning
Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
CHICHI-1995-KabbashB
The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
CHICHI-1995-KierasWM #architecture #modelling #predict
Predictive Engineering Models Using the EPIC Architecture for a High-Performance Task (DEK, SDW, DEM), pp. 11–18.
CHICHI-1995-MalinowskiN #collaboration #design #user interface
Using Computational Critics to Facilitate Long-Term Collaboration in User Interface Design (UM, KN), pp. 385–392.
CHICHI-1995-MitchellPB #learning
Learning to Write Together Using Groupware (AM, IP, RB), pp. 288–295.
CHICHI-1995-ShipmanMM
Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information (FMSI, CCM, TPM), pp. 346–353.
CAiSECAiSE-1995-DuffyMMM #analysis #automation #framework #reasoning #requirements
A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
CAiSECAiSE-1995-ShklarSKS #automation #metadata #named #retrieval
InfoHarness: Use of Automatically Generated Metadata for Search and Retrieval of Heterogeneous Information (LAS, APS, VK, KS), pp. 217–230.
CAiSECAiSE-1995-SiauWB #concept
A Psychological Study on the Use of Relationship Concept — Some Preliminary Findings (KS, YW, IB), pp. 341–354.
CIKMCIKM-1995-Bestavros
Using Speculation to Reduce Server Load and Service Time on the WWW (AB), pp. 403–410.
CIKMCIKM-1995-IkejiF #adaptation #query
Computation of Partial Query Results Using An Adaptive Stratified Sampling Technique (ACI, FF), pp. 145–149.
CIKMCIKM-1995-Paradis #topic
Using Linguistic and Discourse Structures to Derive Topics (FP), pp. 44–49.
CIKMCIKM-1995-ParkHC #automation #network
Automatic Thesaurus Construction Using Bayesian Networks (YCP, YSH, KSC), pp. 212–217.
CIKMCIKM-1995-ShrufiT #knowledge base #query
Query Processing for Knowledge Bases Using Join Indices (AS, TT), pp. 158–166.
CIKMCIKM-1995-Tammet
Using Resolution for Extending KL-ONE-type Languages (TT), pp. 326–332.
CIKMCIKM-1995-YoonSP #approach #database #deduction #object-oriented #query #semantics
Semantic Query Processing in Object-Oriented Databases Using Deductive Approach (SCY, IYS, EKP), pp. 150–157.
ICMLICML-1995-AbeLN #2d #algorithm #learning #online
On-line Learning of Binary Lexical Relations Using Two-dimensional Weighted Majority Algorithms (NA, HL, AN), pp. 3–11.
ICMLICML-1995-ClearyT #distance
K*: An Instance-based Learner Using and Entropic Distance Measure (JGC, LET), pp. 108–114.
ICMLICML-1995-Lubinsky #classification #consistency #performance
Increasing the Performance and Consistency of Classification Trees by Using the Accuracy Criterion at the Leaves (DJL), pp. 371–377.
ICMLICML-1995-PerezR #multi
Using Multidimensional Projection to Find Relations (EP, LAR), pp. 447–455.
ICMLICML-1995-SalganicoffU #learning #multi
Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
ICMLICML-1995-SmythGF #classification #estimation #kernel
Retrofitting Decision Tree Classifiers Using Kernel Density Estimation (PS, AGG, UMF), pp. 506–514.
KDDKDD-1995-EzawaN #information management #modelling #network
Knowledge Discovery in Telecommunication Services Data Using Bayesian Network Models (KJE, SWN), pp. 100–105.
KDDKDD-1995-KohaviS #set
Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology (RK, DS), pp. 192–197.
KDDKDD-1995-ShanZHC #information management #set #tool support
Using Rough Sets as Tools for Knowledge Discovery (NS, WZ, HJH, NC), pp. 263–268.
KDDKDD-1995-SimoudisLK
Using Recon for Data Cleaning (ES, BL, RK), pp. 282–287.
SEKESEKE-1995-BrownseyZ #functional #programming #specification #user interface
From Specification to Building a GUI using Functional Programming (KB, MZ), pp. 244–251.
SEKESEKE-1995-ConstantinidisZ #concept #database #design
Engineering an Ingres Active Database using Conceptual Design Knowledge Elements (VC, ABZ), pp. 158–160.
SEKESEKE-1995-FarCK #design #reuse #specification
Software Creation: Using Specification and Description Language (SDL) for Capturing and Reusing Human Experts’ Knowledge in Software Design (BHF, HC, ZK), pp. 189–196.
SEKESEKE-1995-GatesC #constraints #re-engineering
The Use of Integrity Constraints in Software Engineering (AQG, DEC), pp. 383–390.
SIGIRSIGIR-1995-ChakravarthyH #internet #named #semantics
Netserf: Using Semantic Knowledge to Find Internet Information Archives (ASC, KBH), pp. 4–11.
SIGIRSIGIR-1995-DeFazioDSSCC #information retrieval
Integrating IR and RDBMS Using Cooperative Indexing (SD, AMD, LAS, JS, WBC, JPC), pp. 84–92.
SIGIRSIGIR-1995-EfraimidisGMST #parallel #performance #retrieval
Parallel Text Retrieval on a High Performance Super Computer Using the Vector Space Model (PSE, CG, BM, PGS, BT), pp. 58–66.
SIGIRSIGIR-1995-OgawaI #documentation
A New Character-based Indexing Organization using Frequency Data for Japanese Documents (YO, MI), pp. 121–129.
SIGIRSIGIR-1995-PfeiferF #approach #data type #performance #query
Efficient Processing of Vague Queries using a Data Stream Approach (UP, NF), pp. 189–197.
SIGIRSIGIR-1995-RaghavanS #on the #query #reuse
On the Reuse of Past Optimal Queries (VVR, HS), pp. 344–350.
ECOOPECOOP-1995-DeanGC #analysis #object-oriented #optimisation #source code
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
ECOOPECOOP-1995-LeaM #interface #protocol #specification
Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
ECOOPECOOP-1995-SchmidtS #communication #design pattern #experience #platform
Experience Using Design Patterns to Evolve Communication Software Across Diverse OS Platforms (DCS, PS), pp. 399–423.
ECOOPECOOP-1995-SeligmannG #algorithm #garbage collection #incremental #maturity
Incremental Mature Garbage Collection Using the Train Algorithm (JS, SG), pp. 235–252.
ECOOPECOOP-1995-StroudW #data type #protocol
Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
OOPSLAOOPSLA-1995-ItohYT #concurrent #low level #named #operating system #programming
SCONE: Using Concurrent Objects for Low-level Operating System Programming (JiI, YY, MT), pp. 385–398.
OOPSLAOOPSLA-1995-MasuharaMAY #compilation #concurrent #object-oriented #partial evaluation
Compiling Away the Meta-Level in Object-Oriented Concurrent Reflective Languages Using Partial Evaluation (HM, SM, KA, AY), pp. 300–315.
OOPSLAOOPSLA-1995-Smith #experience #prototype #user interface
Using a Prototype-based Language for User Interface: The Newton Project’s Experience (WRS), pp. 61–72.
AdaEuropeAdaEurope-1995-DaviesR #ada
The Use of Ada for the ENVISAT-1 Simulator (BD, DAR), pp. 170–177.
AdaEuropeAdaEurope-1995-Heitz #ada #automation #c++ #code generation #reliability #reuse
Achieving Reusable and Reliable Client-Server Code using HOODTM Automated Code Generation for ADA95 and C++ Targets (MH), pp. 419–438.
LOPSTRLOPSTR-1995-ArtsZ #logic programming #semantics #source code #termination #unification
Termination of Logic Programs Using Semantic Unification (TA, HZ), pp. 219–233.
LOPSTRLOPSTR-1995-VasconcelosF #approach #logic programming #optimisation #program analysis
An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
LOPSTRLOPSTR-1995-WaalT #deduction #problem #program analysis #program transformation
Solving Deductive Planning Problems Using Program Analysis and Transformation (DAdW, MT), pp. 189–203.
PEPMPEPM-1995-Cridlig #analysis #concurrent #model checking #semantics
Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
PEPMPEPM-1995-Monsuez #abstract interpretation #strict #type inference
Using Abstract Interpretation to Define a Strictness Type Inference System (BM), pp. 122–133.
PLDIPLDI-1995-BarrettZ #bound #garbage collection
Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
PLDIPLDI-1995-BurgerWD #lazy evaluation
Register Allocation Using Lazy Saves, Eager Restores, and Greedy Shuffling (RGB, OW, RKD), pp. 130–138.
PLDIPLDI-1995-ColemanM #layout
Tile Size Selection Using Cache Organization and Data Layout (SC, KSM), pp. 279–290.
PPDPPLILP-1995-SaglamG #approximate #constraints #logic programming #polymorphism #source code
Approximating Constraint Logic Programs Using Polymorphic Types and Regular Descriptions (HS, JPG), pp. 461–462.
POPLPOPL-1995-HarperM #analysis #compilation #morphism #polymorphism
Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
POPLPOPL-1995-Reynolds #category theory
Using Functor Categories to Generate Intermediate Code (JCR), pp. 25–36.
SASSAS-1995-Faxen #functional #lazy evaluation #optimisation #source code
Optimizing Lazy Functional Programs Using Flow Inference (KFF), pp. 136–153.
SASSAS-1995-Giesl #analysis #functional #order #source code #termination
Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
SASSAS-1995-Schmidt-SchausPS #calculus #reduction
Abstract Reduction Using a Tableau Calculus (MSS, SEP, MS), pp. 348–365.
AdaTRI-Ada-1995-BalfourG #ada #paradigm
Patterns and paradigms for using Ada 95 (BB, MG), pp. 243–310.
AdaTRI-Ada-1995-Ogren95a #case study #development #experience
Experiences from Trial Use of MIL-STD-498 in Connection with the O4S (Objects for Systems) Development Method (), pp. 773–789.
RERE-1995-ChungNY #non-functional #requirements
Using non-functional requirements to systematically support change (LC, BAN, ESKY), pp. 132–139.
ESECESEC-1995-TuyaSC #model checking #modelling #safety #verification
Using a Symbolic Model Checker for Verify Safety Properties in SA/RT Models (JT, LS, JAC), pp. 59–75.
ESECESEC-1995-VottaZ #case study #design #process
Design Process Improvement Case Study Using Process Waiver Data (LGV, MLZ), pp. 44–58.
FSEFSE-1995-GuptaS #approach #hybrid #information management #slicing
Hybrid Slicing: An Approach for Refining Static Slices Using Dynamic Information (RG, MLS), pp. 29–40.
FSEFSE-1995-Weyuker #assessment #reliability #testing
Using the Consequence of Failures for Testing and Reliability Assessment (EJW), pp. 81–91.
ICSEICSE-1995-BarghoutiK #constraints #monitoring #process
Using Event Contexts and Matching Constraints to Monitor Software Processes (NSB, BK), pp. 83–92.
ICSEICSE-1995-BertolinoS #assessment #dependence #metric #testing
Using Testability Measures for Dependability Assessment (AB, LS), pp. 61–70.
ICSEICSE-1995-Floch #automation #code generation #evolution #flexibility #maintenance
Supporting Evolution and Maintenance by Using a Flexible Automatic Code Generator (JF), pp. 211–219.
ASEKBSE-1995-CliftonL #component #design
Classifying Software Components Using Design Characteristics (CC, WSL), pp. 139–146.
ASEKBSE-1995-HoweMM #empirical #sequence #testing
Test Sequences as Plans: An Experiment in Using an AI Planner to Generate System Tests (AEH, AvM, RTM), pp. 184–191.
ASEKBSE-1995-PenixBA #classification #component #retrieval #reuse #semantics
Classification and Retrieval of Reusable Components Using Semantic Features (JP, PB, PA), pp. 131–138.
SACSAC-1995-AbualiWS95a #algorithm #morphism #problem #search-based
Solving the three-star tree isomorphism problem using genetic algorithms (FNA, RLW, DAS), pp. 337–344.
SACSAC-1995-Arnow #email #network #programming
:-) When you grade that: using e-mail and the network in programming courses (DMA), pp. 10–13.
SACSAC-1995-BowmanD #distributed #modelling
Modelling distributed systems using Z (HB, JD), pp. 147–151.
SACSAC-1995-CrawfordVW #algorithm #detection #multi #search-based
Detecting multiple outliers in regression data using genetic algorithms (KDC, DJV, RLW), pp. 351–356.
SACSAC-1995-Duben #modelling #statistics
Conformational statistics of models for serine- and threonine-linked glycopeptides using umbrella sampling (AJD), pp. 108–112.
SACSAC-1995-FiedlerLDL
Optimal initialization of mixed-layer model using the adjoint technique (RF, SL, SKD, JML), pp. 91–95.
SACSAC-1995-GrimRP #3d #algorithm #re-engineering #search-based
Use of genetic algorithms in three-dimensional reconstruction in carbon black aggregates (RJG, JRR, LDP), pp. 288–292.
SACSAC-1995-GudaitisLT #parallel
Multicriteria vehicle route-planning using parallel A* search (MSG, GBL, AJT), pp. 171–176.
SACSAC-1995-KrishnaKumarS #algorithm #fuzzy #modelling #multi
Discovering multiple fuzzy models using the EFMCN algorithm (KK, AS), pp. 537–541.
SACSAC-1995-KumblaJB #algorithm #fuzzy #implementation #logic #network
Implementation of fuzzy logic and neural networks control algorithm using a digital signal processing chip (KKK, MJ, JBR), pp. 524–528.
SACSAC-1995-LiangL #algorithm #matrix #representation #scheduling #search-based
A sparse matrix representation for production scheduling using genetic algorithms (SJTL, JML), pp. 313–317.
SACSAC-1995-Sabin #generative #linear #parallel
The use of parallelization in the generation of binary linear codes (RES), pp. 215–220.
SACSAC-1995-SmitsBSD #approach #fuzzy #image
An image processing approach using fuzzy topology (PCS, DdB, AS, SGD), pp. 557–561.
SACSAC-1995-Spector #development #problem
Using system dynamics to model courseware development: the project dynamics of complex problem-solving (JMS), pp. 32–35.
SACSAC-1995-Stegmaier-StraccaT #classification #detection #fuzzy
Cough detection using fuzzy classification (PASS, NNTG), pp. 440–444.
SACSAC-1995-Tschichold-Gurman #classification #fuzzy #generative #incremental #learning
Generation and improvement of fuzzy classifiers with incremental learning using fuzzy RuleNet (NNTG), pp. 466–470.
ASF+SDFASF+SDF-1995-BrandEGMOP #asf+sdf #program transformation
Program Transformations using ASF+SDF (MvdB, SME, DKAG, HM, MJFP, HRO), pp. 29–52.
ASF+SDFASF+SDF-1995-Vigna #asf+sdf #case study #specification
Specifying Imp(G) Using ASF+SDF: A Case Study (SV), pp. 65–88.
DACDAC-1995-BiekerM #constraints #generative #logic programming #self
Retargetable Self-Test Program Generation Using Constraint Logic Programming (UB, PM), pp. 605–611.
DACDAC-1995-BredenfeldC #design #graph #integration #tool support
Tool Integration and Construction Using Generated Graph-Based Design Representations (AB, RC), pp. 94–99.
DACDAC-1995-ChouKW #3d #approach #simulation
Transient Simulations of Three-Dimensional Integrated Circuit Interconnect Using a Mixed Surface-Volume Approach (MC, TK, JW), pp. 485–490.
DACDAC-1995-DeCastelo-Vide-e-SouzaPP #algorithm #approach #architecture #optimisation #throughput
Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming (YGDVeS, MP, ACP), pp. 113–118.
DACDAC-1995-LiM #analysis #embedded #performance
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
DACDAC-1995-LiuKCH #approach #clustering #graph #replication
Performance-Driven Partitioning Using a Replication Graph Approach (LTL, MTK, CKC, TCH), pp. 206–210.
DACDAC-1995-LyKMM #behaviour #scheduling
Scheduling Using Behavioral Templates (TL, DK, RM, DM), pp. 101–106.
DACDAC-1995-NarayanG #generative #interface #process #protocol
Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
DACDAC-1995-SilvaK #design #web
The Case for Design Using the World Wide Web (MJS, RHK), pp. 579–585.
DACDAC-1995-VenkataramanHFRCP #agile #fault #simulation
Rapid Diagnostic Fault Simulation of Stuck-at Faults in Sequential Circuits Using Compact Lists (SV, IH, WKF, EMR, SC, JHP), pp. 133–138.
DACDAC-1995-WempleY #analysis #megamodelling
Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
DACDAC-1995-ZepterGM #data flow #design #generative #graph
Digital Receiver Design Using VHDL Generation from Data Flow Graphs (PZ, TG, HM), pp. 228–233.
HPCAHPCA-1995-CitronR
Creating a Wider Bus Using Caching Techniques (DC, LR), pp. 90–99.
HPDCHPDC-1995-AbramsonSGH #distributed #named #simulation
Nimrod: A Tool for Performing Parameterised Simulations Using Distributed Workstations (DA, RS, JG, BH), pp. 112–121.
LCTESLCT-RTS-1995-LiM #analysis #embedded #performance
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
PDPPDP-1995-BeschP #flexibility #network #parallel
Flexible data parallel training of neural networks using MIMD-Computers (MB, HWP), pp. 27–32.
PDPPDP-1995-CoscasFL #modelling #source code
Modelling actor programs using Predicate/Transition nets (PC, GF, AL), pp. 199–200.
PDPPDP-1995-GaiRR #algorithm #parallel
An improved data parallel algorithm for Boolean function manipulation using BDDs (SG, MR, MSR), pp. 33–41.
PDPPDP-1995-GianuzziM #distributed #simulation
Using PVM to implement a distributed dependable simulation system (VG, FM), pp. 529–537.
PDPPDP-1995-GregorettiP #architecture #parallel #testing
Using a massively parallel architecture for integrated circuits testing (FG, CP), pp. 332–338.
PDPPDP-1995-LatrousM #parallel
Distributing code in a parallel fine grain machine using the actor model (YL, GM), pp. 122–129.
SOSPSOSP-1995-FordHL #interface
Using Annotated Interface Definitions to Optimize RPC (BF, MH, JL), p. 232.
SOSPSOSP-1995-GhemawatKL #database #object-oriented #performance
Using a Modified Object Buffer to Improve the Write Performance of an Object-Oriented Database (SG, MFK, BL), p. 235.
TAPSOFTTAPSOFT-1995-Kleuker #case study #specification
A Gentle Introduction to Specification Engineering Using a Case Study in Telecommunications (SK), pp. 636–650.
CAVCAV-1995-AndersenV #behaviour #fixpoint #performance
Efficient Checking of Behavioural Relations and Modal Assertions using Fixed-Point Inversion (HRA, BV), pp. 142–154.
CAVCAV-1995-BasinK #hardware #higher-order #logic #monad #verification
Hardware Verification using Monadic Second-Order Logic (DAB, NK), pp. 31–41.
CAVCAV-1995-DingelF #abstraction #infinity #model checking #proving #reasoning #theorem proving
Model Checking for Infinite State Systems Using Data Abstraction, Assumption-Commitment Style reasoning and Theorem Proving (JD, TF), pp. 54–69.
CAVCAV-1995-EirikssonM #analysis #case study #design #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
CAVCAV-1995-McMillan #verification
Trace Theoretic Verification of Asynchronous Circuits Using Unfoldings (KLM), pp. 180–195.
ICLPICLP-1995-BarbutiFS #execution #modelling #prolog
Modeling OR-Parallel Execution of Prolog using CHOCS (RB, NDF, AS), pp. 547–561.
ICLPICLP-1995-ChiuL #constraints #linear #theorem proving
Interval Linear Constraint Solving Using the Preconditioned Interval Gauss-Seidel Method (CKC, JHML), pp. 17–31.
ICLPICLP-1995-HermenegildoGC #concurrent #implementation #logic programming #parallel
Using Attributed Variables in the Implementation of Concurrent and Parallel Logic Programming Systems (MVH, DCG, MC), pp. 631–645.
ICLPICLP-1995-Jain #logic programming #source code
Projections of Logic Programs using Symbol Mappings (AJ), pp. 483–496.
DLDL-1994-RusS #documentation
Using Non-Textal Cues for Electronic Document Browsing (DR, KS), pp. 129–162.
HTHT-ECHT-1994-Brailsford #experience
Experience with the Use of Acrobat in the CAJUN Publishing Project (DFB), pp. 228–232.
HTHT-ECHT-1994-ChristophidesR #documentation #hypermedia #query
Querying Structured Documents with Hypertext Links using OODBMS (VC, AR), pp. 186–197.
PODSPODS-1994-FaloutsosK #analysis #concept #independence
Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
SIGMODSIGMOD-1994-ChenR #adaptation #estimation #feedback #query
Adaptive Selectivity Estimation Using Query Feedback (CMC, NR), pp. 161–172.
SIGMODSIGMOD-1994-LoR
Spatial Joins Using Seeded Trees (MLL, CVR), pp. 209–220.
VLDBVLDB-1994-KamelF
Hilbert R-tree: An Improved R-tree using Fractals (IK, CF), pp. 500–509.
VLDBVLDB-1994-LiC #database #integration #network #semantics #semistructured data
Semantic Integration in Heterogeneous Databases Using Neural Networks (WSL, CC), pp. 1–12.
CSEETCSEE-1994-BralickR #distance #education #multi #re-engineering
Using a Multi-User Dialogue System to Support Software Engineering Distance Education (WABJ, JSR), pp. 565–582.
CSEETCSEE-1994-Epstein #education #re-engineering
The Use of Computer Ethics Scenarios in Software Engineering Education: The Case of the Killer Robot (RGE), pp. 429–440.
CSEETCSEE-1994-Horton #automation #design #education
Using Commercial CASE Environments to Teach Software Design (TBH), pp. 97–115.
CSEETCSEE-1994-Zalewski #tool support
Cohesive Use of Commercial Tools in a Classroom (JZ), pp. 65–75.
ICSMEICSM-1994-AshAOL #health #maintenance #modelling
Using Software Maintainability Models to Track Code Health (DA, JA, PWO, BL), pp. 154–160.
ICSMEICSM-1994-CowanGLS #comprehension #readability
Enhancing Code for Readability and Comprehension Using SGML (DDC, DMG, CJPdL, AvS), pp. 181–190.
ICSMEICSM-1994-KinlochM #c #comprehension #graph #representation #source code
Understanding C Programs Using the Combined C Graph Representation (DAK, MM), pp. 172–180.
ICSMEICSM-1994-MatwinA #analysis #automation #composition #reuse
Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
ICSMEICSM-1994-PaulP #algebra #query #source code
Querying Source Code Using an Algebraic Query Language (SP, AP), pp. 127–136.
FMFME-1994-ErasmyS #case study #refinement
Stepwise Refinement of Control Software — A Case Study Using RAISE (FE, ES), pp. 547–566.
FMFME-1994-Evans #concurrent #specification #verification
Specifying & Verifying Concurrent Systems Using Z (AE), pp. 366–380.
FMFME-1994-FencottGLOP #algebra #formal method #modelling #process #semantics
Formalising the Semantics of Ward/Mellor SA/RT Essential Models using a Process Algebra (PCF, AG, MAL, SJO, SP), pp. 681–702.
FMFME-1994-RitchieBH #automaton #case study #experience
Experiences in Using the Abstract Machine Notation in a GKS Case Study (BR, JB, HPH), pp. 93–104.
FMFME-1994-StoreyH
A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
LISPLFP-1994-AdityaFH #garbage collection #re-engineering #runtime
Garbage Collection for Strongly-Typed Languages Using Run-Time Type Reconstruction (SA, CHF, JEH), pp. 12–23.
LISPLFP-1994-DeanC #towards
Towards Better Inlining Decisions Using Inlining Trials (JD, CC), pp. 273–282.
LISPLFP-1994-Hall #representation #type inference
Using Hindley-Milner Type Inference to Optimise List Representation (CVH), pp. 162–172.
LISPLFP-1994-HuelsbergenLA #data type #runtime #thread
Using the Run-Time Sizes of Data Structures to Guide Parallel-Thread Creation (LH, JRL, AA), pp. 79–90.
LISPLFP-1994-Tolmach #garbage collection #parametricity
Tag-Free Garbage Collection Using Explicit Type Parameters (APT), pp. 1–11.
ICGTTAGT-1994-BlosteinFG #graph grammar
Issues in the Practical Use of Graph Rewriting (DB, HF, AG), pp. 38–55.
ICGTTAGT-1994-Drewes #algebra #graph #transducer
The Use of Tree Transducers to Compute Translations Between Graph Algebras (FD), pp. 196–210.
ICGTTAGT-1994-Wills #graph #parsing #source code
Using Attributed Flow Graph Parsing to Recognize Clichés in Programs (LMW), pp. 170–184.
CHICHI-1994-GoldsteinR94a #query #scalability #set
Using aggregation and dynamic queries for exploring large data sets (JG, SFR), pp. 23–29.
CHICHI-1994-Newman94a #analysis #human-computer #research
A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
CHICHI-1994-Ogozalek94a #comparison #interface #multi
A comparison of the use of text and multimedia interfaces to provide information to the elderly (VZO), pp. 65–71.
CHICHI-1994-RothKMG94a #automation #design #interactive
Interactive graphic design using automatic presentation knowledge (SFR, JK, JM, JG), pp. 112–117.
CHICHI-1994-Strommen94a #interface
Children’s use of mouse-based interfaces to control virtual travel (ES), pp. 405–410.
CHICHI-1994-WalkerSS94a #interface
Using a human face in an interface (JHW, LS, RS), pp. 85–91.
CSCWCSCW-1994-EvelandBBM #network #tool support
The Role of “Help Networks” in Facilitating Use of CSCW Tools (JDE, ALB, WB, JM), pp. 265–274.
CSCWCSCW-1994-KrautRCF #communication #social
Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium (REK, RER, CC, RSF), pp. 13–21.
CSCWCSCW-1994-PrakashS #collaboration #named #performance
DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects (AP, HSS), pp. 153–164.
CSCWCSCW-1994-TrevorRM #adaptation
The Use of Adapters to Support Cooperative Sharing (JT, TR, JAM), pp. 219–230.
CSCWCSCW-1994-WanJ #approach #collaboration #learning
Computer Supported Collaborative Learning Using CLARE: The Approach and Experimental Findings (DW, PMJ), pp. 187–198.
CAiSECAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience
From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
CAiSECAiSE-1994-Rosengren #query #visual notation
Using Visual ER Query Systems in Real World Applications (PR), pp. 394–405.
CAiSECAiSE-1994-SeoL #data type #formal method #process #reuse
Formalisation of Data and Process Model Reuse Using Hierarchic Data Types (DS, PL), pp. 256–268.
CIKMCIKM-1994-HalperGPK
Integrating a Part Relationship Into an Open OODB System Using Metaclasses (MH, JG, YP, WK), pp. 10–17.
CIKMCIKM-1994-KwonKC #adaptation #query
Query Expansion Using Domain Adapted, Weighted Thesaurus in an Extended Boolean Model (OWK, MCK, KSC), pp. 140–146.
CIKMCIKM-1994-LeeL #database #object-oriented #query
Using Path Information for Query Processing in Object-Oriented Database Systems (DLL, WCL), pp. 64–71.
CIKMCIKM-1994-LehmannC #integration #prototype #reliability #semantics
The EGG/YOLK Reliability Hierarchy : Semantic Data Integration Using Sorts with Prototypes (FL, AGC), pp. 272–279.
CIKMCIKM-1994-RezendeH #abstraction #semantics
A Lock Method for KBMSs Using Abstraction Relationships’ Semantics (FdFR, TH), pp. 112–121.
CIKMCIKM-1994-SyuL #information retrieval
A Competition-Based Connectionist Model for Information Retrieval Using a Merged Thesaurus (IS, SDL), pp. 164–170.
ICMLICML-1994-CravenS #network #query
Using Sampling and Queries to Extract Rules from Trained Neural Networks (MC, JWS), pp. 37–45.
ICMLICML-1994-OpitzS #knowledge-based #network #search-based
Using Genetic Search to Refine Knowledge-based Neural Networks (DWO, JWS), pp. 208–216.
KDDKDD-1994-BerndtC
Using Dynamic Time Warping to Find Patterns in Time Series (DJB, JC), pp. 359–370.
KDDKDD-1994-Kaufman #development #learning #multi #tool support
Comparing International Development Patterns Using Multi-Operator Learning and Discovery Tools (KAK), pp. 431–440.
KDDKDD-1994-SasisekharanSW #machine learning #maintenance #network
Proactive Network Maintenance Using Machine Learning (RS, VS, SMW), pp. 453–462.
KDDKDD-1994-ShenMOZ #database #deduction #induction #learning
Using Metagueries to Integrate Inductive Learning and Deductive Database Technology (WMS, BGM, KO, CZ), pp. 335–346.
KRKR-1994-Gotts #how
How Far Can We “C”? Defining a “Doughnut” Using Connection Alone (NMG), pp. 246–257.
KRKR-1994-McIlraith #abduction #generative #testing
Generating Tests Using Abduction (SAM), pp. 449–460.
SEKESEKE-1994-AbranDMMS #analysis #hypermedia #learning
Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
SEKESEKE-1994-FigueiredoPC #analysis #fuzzy #petri net #realtime
Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
SEKESEKE-1994-Holm #communication #modelling
The COMMODIOUS method — COMmunication MODelling as an aid to Illustrate the Organisational Use of Software (PH), pp. 10–19.
SEKESEKE-1994-KoskinenPS #dependence #hypermedia
Program text as hypertext: using program dependences for transient linking (JK, JP, AS), pp. 209–216.
SEKESEKE-1994-ReynoldsZ #algorithm #learning
Learning to understand software from examples using cultural algorithms (RGR, EZ), pp. 188–192.
SEKESEKE-1994-SuzukiT #abstraction #behaviour #retrieval
Associative program retrieval using partially-ordered behavioral abstractions of a program (HS, NT), pp. 395–404.
SIGIRSIGIR-1994-BruzaH #axiom
Investigating Aboutness Axioms using Information Fields (PB, TWCH), pp. 112–121.
SIGIRSIGIR-1994-Gey #probability
Inferring Probability of Relevance Using the Method of Logistic Regression (FCG), pp. 222–231.
SIGIRSIGIR-1994-Hoch #analysis #classification #documentation #information retrieval
Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
SIGIRSIGIR-1994-Hull #problem #retrieval #semantics
Improving Text Retrieval for the Routing Problem using Latent Semantic Indexing (DAH), pp. 282–291.
SIGIRSIGIR-1994-Voorhees #query #semantics
Query Expansion Using Lexical-Semantic Relations (EMV), pp. 61–69.
ECOOPECOOP-1994-OkamuraI #programming
Object Location Control Using Meta-level Programming (HO, YI), pp. 299–319.
OOPSLAOOPSLA-1994-AmielGS #multi #optimisation
Optimizing Multi-Method Dispatch Using Compressed Dispatch Tables (EA, OG, ES), pp. 244–258.
OOPSLAOOPSLA-1994-BogleL
Reducing Cross Domain Call Overhead using Batched Futures (PB, BL), pp. 341–354.
OOPSLAOOPSLA-1994-Seidewitz #inheritance #self
Genericity versus Inheritance Reconsidered: Self-Reference Using Generics (ES), pp. 153–163.
TOOLSTOOLS-EUROPE-1994-CharltonLR #database #inheritance #persistent
Using Inheritance to Provide Subschema Views in a Shared Persistent Object Database (CCC, PHL, MR), pp. 419–428.
TOOLSTOOLS-EUROPE-1994-PereiraD #case study #comparison #experience #object-oriented #realtime
Using Object-Orientation in Real-Time Applications: An Experience Report or (1 Application + 5 Approaches = 1 Comparison) (CEP, PD), pp. 147–158.
TOOLSTOOLS-EUROPE-1994-RuperezJA #behaviour #object-oriented #rule-based #simulation
Embedding of Rule-based Expert System Capabilities in Object-Oriented Applications by Using or Simulating Active Behaviour (RFR, CJ, JRZA), pp. 315–327.
TOOLSTOOLS-EUROPE-1994-SurendharA #evolution #object-oriented
Object-Oriented Type Evolution Using Reflection (MS, SA), pp. 271–280.
AdaEuropeAdaEurope-1994-BarbeyB #ada #data type #specification #testing
Testing Ada Abstract Data Types Using Formal Specifications (SB, DB), pp. 76–89.
PPDPALP-1994-Miller #logic programming #multi #source code #specification
Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
LOPSTRLOPSTR-1994-BoulangerB #analysis #logic programming #program transformation
Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
LOPSTRLOPSTR-1994-FlenerP #induction #on the #reasoning #synthesis
On the Use of Inductive Reasoning in Program Synthesis: Prejudice and Prospects (PF, LP), pp. 69–87.
LOPSTRLOPSTR-1994-MarakakisG #data type #design #logic programming #source code #top-down
Schema-Based Top-Down Design of Logic Programs Using Abstract Data Types (EIM, JPG), pp. 138–153.
PLDIPLDI-1994-GranlundM #integer #invariant #multi
Division by Invariant Integers using Multiplication (TG, PLM), pp. 61–72.
PLDIPLDI-1994-HentenryckCC #analysis #graph #prolog
Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
PLDIPLDI-1994-Wismuller #analysis #data flow #debugging #source code
Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
PPDPPLILP-1994-BelkhirN #functional #logic #towards
Towards Integrating Functional and Logic Styles Using Relation (AB, NN), pp. 463–464.
PPDPPLILP-1994-BoulangerBD #approach
Abstracting s-semantincs Using A Model-Theoretic Approach (DB, MB, MD), pp. 432–446.
PPDPPLILP-1994-MetzemakersMSS #performance
Improving Arithmetic Performance using Fine-Grain Unfolding (TM, AM, DS, RS), pp. 324–339.
PPDPPLILP-1994-Miller #logic programming #multi #source code #specification
Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
PPDPPLILP-1994-Serrano #analysis #compilation #control flow #functional #higher-order
Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
POPLPOPL-1994-DiwanTM #garbage collection #memory management #performance #source code
Memory Subsystem Performance of Programs Using Copying Garbage Collection (AD, DT, JEBM), pp. 1–14.
POPLPOPL-1994-TofteT #call-by #implementation #stack #λ-calculus
Implementation of the Typed Call-by-Value λ-Calculus using a Stack of Regions (MT, JPT), pp. 188–201.
SASSAS-1994-CodishD #dependence #logic programming #multi #polymorphism #source code
Deriving Polymorphic Type Dependencies for Logic Programs Using Multiple Incarnations of Prop (MC, BD), pp. 281–296.
SASSAS-1994-GrasH #independence #strict
Extracting Non-Strict Independent And-Parallelism Using Sharing and Freeness Information (DCG, MVH), pp. 297–313.
SASSAS-1994-Jorgensen #analysis #finite #fixpoint
Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
SASSAS-1994-Mauborgne #abstract interpretation
Abstract Interpretation Using TDGs (LM), pp. 363–379.
AdaTRI-Ada-1994-KayloeL #ada #architecture #named
Easy-Sim: Using Ada 9X in a Graphics System Software Architecture (JRK, PKL), pp. 164–169.
REICRE-1994-Alford #complexity #requirements
Attacking requirements complexity using a separation of concerns (MWA), pp. 2–5.
REICRE-1994-MaidenS #abstraction #requirements
Requirements critiquing using domain abstractions (NAMM, AGS), pp. 184–193.
REICRE-1994-ReizerAMP #formal method #requirements #specification #standard
Using formal methods for requirements specification of a proposed POSIX standard (NRR, GDA, BCM, PRHP), pp. 118–125.
FSEFSE-1994-BatoryTS #compilation #data type #re-engineering #scalability
Reengineering a Complex Application Using a Scalable Data Structure Compiler (DSB, JT, MS), pp. 111–120.
FSEFSE-1994-EvansGHT #named #specification
LCLint: A Tool for Using Specifications to Check Code (DE, JVG, JJH, YMT), pp. 87–96.
FSEFSE-1994-VandevoordeG #analysis #composition #runtime
Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
ICSEICSE-1994-Ardis #lessons learnt
Lessons from Using Basic LOTOS (MAA), pp. 5–14.
ICSEICSE-1994-DevanbuJ #case study #experience #logic
The Use of Description Logics in KBSE Systems: Experience Report (PTD, MAJ), pp. 23–35.
ICSEICSE-1994-YasumotoHT #process
Software Process Description Using LOTOS and Its Enaction (KY, TH, KT), pp. 169–178.
ASEKBSE-1994-MintonW #machine learning #source code
Using Machine Learning to Synthesize Search Programs (SM, SRW), pp. 31–38.
ASEKBSE-1994-WildR #evolution #reuse #specification
Evolution and Reuse of Formal Specification Using Decision Structures (JCW, DR), pp. 108–115.
SACSAC-1994-AbualiSW #algorithm #design #network #probability #search-based
Designing telecommunications networks using genetic algorithms and probabilistic minimum spanning trees (FNA, DAS, RLW), pp. 242–246.
SACSAC-1994-ChandH #realtime
A real-time contol application using asynchronous remote procedure calls (GC, DMH), pp. 515–517.
SACSAC-1994-ConnorCKM #evolution #persistent
Using persistence technology to control schema evolution (RCHC, QIC, GNCK, RM), pp. 441–446.
SACSAC-1994-FlachsbartBCH #algorithm #classification
Using the ID3 symbolic classification algorithm to reduce data density (BF, WEB, DCSC, JH), pp. 292–296.
SACSAC-1994-Foster #analysis #education #named
FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
SACSAC-1994-GentherG #automation #classification #clustering #fuzzy #generative
Automatic generation of a fuzzy classification system using fuzzy clustering methods (HG, MG), pp. 180–183.
SACSAC-1994-Konstam #algorithm #classification #search-based
N-group classification using genetic algorithms (AHK), pp. 212–216.
SACSAC-1994-KumarH #concept #fuzzy #logic #reduction
Reduction of communications in a MasPar computer using fuzzy logic concepts (AGK, JH), pp. 351–356.
SACSAC-1994-Lutsky #documentation #parsing #testing
Using a document parser to automate software testing (PL), pp. 59–63.
SACSAC-1994-PalmS #fuzzy #logic #optimisation
Torque optimization for a locomotive using fuzzy logic (RP, KS), pp. 105–109.
SACSAC-1994-RogersU #linear
A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.
SACSAC-1994-RosenG #network
Training hard to learn networks using advanced simulated annealing methods (BER, JMG), pp. 256–260.
SACSAC-1994-Sen94a #network
File placement over a network using simulated annealing326741 (SS), pp. 251–255.
SACSAC-1994-Shearer #design #multi
Design of a Linda kernal using causal multicast (KS), pp. 518–523.
SACSAC-1994-WarwickT #algorithm #problem #search-based
Using a genetic algorithm to tackle the processors configuration problem (TW, EPKT), pp. 217–221.
SACSAC-1994-WongD #hybrid #stack #thread
Supporting thousands of threads using a hybrid stack sharing scheme (KFW, BD), pp. 493–498.
SACSAC-1994-XiaoW #algorithm #search-based
Molecular docking using genetic algorithms (YLX, DEW), pp. 196–200.
ASPLOSASPLOS-1994-GallagherCMGH #ambiguity #memory management
Dynamic Memory Disambiguation Using the Memory Conflict Buffer (DMG, WYC, SAM, JCG, WmWH), pp. 183–193.
ASPLOSASPLOS-1994-YoungS #branch #correlation #predict
Improving the Accuracy of Static Branch Prediction Using Branch Correlation (CY, MDS), pp. 232–241.
CCCC-1994-Binkley #constant #data flow #dependence #graph #interprocedural
Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model (DB), pp. 374–388.
DACDAC-1994-BaldwinC #design #graph grammar
Design Methodology Management Using Graph Grammars (RAB, MJC), pp. 472–478.
DACDAC-1994-BeattyB #simulation #verification
Formally Verifying a Microprocessor Using a Simulation Methodology (DLB, REB), pp. 596–602.
DACDAC-1994-ChenF #analysis
Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
DACDAC-1994-GuptaCDP #design #experience #image #tool support
Experience with Image Compression Chip Design using Unified System Construction Tools (PG, CTC, JCDB, ACP), pp. 250–256.
DACDAC-1994-ImanPC #fuzzy #logic
Technology Mapping Using Fuzzy Logic (SI, MP, KC), pp. 333–338.
DACDAC-1994-KahngM #analysis #equation
Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
DACDAC-1994-KeeSGK #framework
The Use of CAD Frameworks in a CIM Environment (WTK, DS, JG, LKK), pp. 257–261.
DACDAC-1994-Minato #algebra #set
Calculation of Unate Cube Set Algebra Using Zero-Suppressed BDDs (SiM), pp. 420–424.
DACDAC-1994-MurgaiBS #composition #encoding #functional
Optimum Functional Decomposition Using Encoding (RM, RKB, ALSV), pp. 408–414.
DACDAC-1994-NagumoNNMM #fault #named #reduction
VFSIM: Vectorized Fault Simulator Using a Reduction Technique Excluding Temporarily Unobservable Faults (TN, MN, TN, MM, SM), pp. 510–515.
DACDAC-1994-PomeranzR #combinator #fault #scalability
Design-for-Testability for Path Delay Faults in Large Combinatorial Circuits Using Test-Points (IP, SMR), pp. 358–364.
DACDAC-1994-PotkonjakD #optimisation #resource management #testing
Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
DACDAC-1994-PotkonjakSC #constant #multi #performance
Efficient Substitution of Multiple Constant Multiplications by Shifts and Additions Using Iterative Pairwise Matching (MP, MBS, AC), pp. 189–194.
DACDAC-1994-RiessDJ #clustering #scalability
Partitioning Very Large Circuits Using Analytical Placement Techniques (BMR, KD, FMJ), pp. 646–651.
DACDAC-1994-SaldanhaHMBS #optimisation #performance
Performance Optimization Using Exact Sensitization (AS, HH, PCM, RKB, ALSV), pp. 425–429.
DACDAC-1994-ShipleHSB #heuristic
Heuristic Minimization of BDDs Using Don’t Cares (TRS, RH, ALSV, RKB), pp. 225–231.
DACDAC-1994-SilveiraEWCK #approach #performance #simulation
An Efficient Approach to Transmission Line Simulation Using Measured or Tabulated S-parameter Data (LMS, IME, JW, MC, KSK), pp. 634–639.
DACDAC-1994-TsaiM
Boolean Matching Using Generalized Reed-Muller Forms (CCT, MMS), pp. 339–344.
DACDAC-1994-VittalM #design
Minimal Delay Interconnect Design Using Alphabetic Trees (AV, MMS), pp. 392–396.
DATEEDAC-1994-AhmedCC #approach #fault #modelling #optimisation
A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
DATEEDAC-1994-BaharCHMS #analysis
Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
DATEEDAC-1994-BrashearMOPM #analysis #performance #predict #statistics
Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
DATEEDAC-1994-ByrneMLD #optimisation #overview
An Overview of Analogue Optimisation Using “AD-OPT” (EB, OM, DL, BD), pp. 540–545.
DATEEDAC-1994-DalkilicP #bound #scheduling
Optimal Operation Scheduling Using Resource Lower Bound Estimations (MED, VP), pp. 319–324.
DATEEDAC-1994-HuangR #behaviour #performance #throughput
Maximizing the Throughput of High Performance DSP Applications Using Behavioral Transformations (SHH, JMR), pp. 25–30.
DATEEDAC-1994-NaganumaOH #algorithm #debugging #design #validation
High-Level Design Validation Using Algorithmic Debugging (JN, TO, TH), pp. 474–480.
DATEEDAC-1994-WangD #approximate #linear #optimisation #performance
An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
HPDCHPDC-1994-AgrawalCLS
Investigating Weak Memories Using Maya (DA, MC, HVL, AKS), pp. 123–130.
HPDCHPDC-1994-ArmstrongM #distributed #framework #parallel
The Use of Frameworks for Scientific Computation in a Parallel Distributed Environment (RCA, JM), pp. 15–25.
HPDCHPDC-1994-NguyenZZ #distributed #problem
Distributed Computation of Electromagnetic Scattering Problems Using Finite-Difference Time-Domain Decompositions (SN, BJZ, XZ), pp. 85–89.
HPDCHPDC-1994-Stevens #multi
Multimedia Supercomputing: The Use of Supercomputers to Drive High-Performance Multimedia Systems and Virtual Environments (RS), p. 3.
PDPPDP-1994-AhmedBA #parallel #simulation
Parallel Discrete Event Simulation Using Space-time Events (HA, LB, RA), pp. 40–47.
PDPPDP-1994-BirdC #communication #logic programming #modelling #network
Modelling Logic Programming Using A Network Of Communicating Machines (PRB, AJC), pp. 156–161.
PDPPDP-1994-HowardKTAJ #configuration management #logic #named #novel #parallel
Zelig: A Novel Parallel Computing Machine Using Reconfigurable Logic (NJH, AK, AMT, NMA, AJJ), pp. 70–75.
PDPPDP-1994-StuartW #algorithm #approach #linear #parallel #visualisation
The Enhancement Of Parallel Numerical Linear Algorithms Using A Visualization Approach (EJS, JSW), pp. 274–281.
STOCSTOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics
Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
CADECADE-1994-BronsardRH #induction #order
Induction using Term Orderings (FB, USR, RWH), pp. 102–117.
CADECADE-1994-ChuP #first-order #proving #semantics #theorem proving
Semantically Guided First-Order Theorem Proving using Hyper-Linking (HC, DAP), pp. 192–206.
CADECADE-1994-McPheeCG #geometry #proving #theorem
Mechanically Proving Geometry Theorems Using a Combination of Wu’s Method and Collins’ Method (NFM, SCC, XSG), pp. 401–415.
CAVCAV-1994-BouajjaniER #hybrid #linear #verification
Verification of Context-Free Timed Systems Using Linear Hybrid Observers (AB, RE, RR), pp. 118–131.
CAVCAV-1994-DamsGDHKP #abstraction #adaptation #model checking
Model Checking Using Adaptive State and Data Abstraction (DD, RG, GD, RH, PK, HP), pp. 455–467.
CAVCAV-1994-GorrieriS #realtime #verification
Real-Time System Verification using P/T Nets (RG, GS), pp. 14–26.
CAVCAV-1994-Graf #abstraction #distributed #memory management #verification
Verification of a Distributed Cache Memory by Using Abstractions (SG), pp. 207–219.
CAVCAV-1994-HojatiMB #graph
Improving Language Containment Using Fairness Graphs (RH, RBMT, RKB), pp. 391–403.
CAVCAV-1994-NaikS #model checking #modelling #protocol #verification
Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
CAVCAV-1994-OliveroSY #abstraction #hybrid #linear #verification
Using Abstractions for the Verification of Linear Hybrid Systems (AO, JS, SY), pp. 81–94.
ICLPILPS-1994-Cras #constraints #logic programming
Using Constraint Logic Programming in Services: A Few Short Tales (YC), pp. 3–16.
ICLPILPS-1994-JourdanFRD #concurrent #constraints #modelling #parallel #programming #scheduling
Data Alignment and Task Scheduling On Parallel Machines Using Concurrent Constraint Model-based Programming (JJ, FF, DR, AD), p. 678.
ICLPILPS-1994-Ross #constraints
A Syntactic Stratification Condition Using Constraints (KAR), pp. 76–90.
ISSTAISSTA-1994-Karam #timeline #visualisation
Visualization using Timelines (GMK), pp. 125–137.
ISSTAISSTA-1994-MurrillM #approach #fault #semantics
An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (BWM, LJM), p. 200.
ICDARICDAR-1993-AgazziK #2d #documentation #image #markov #modelling #normalisation #pseudo #recognition
Joint normalization and recognition of degraded document images using pseudo-2D hidden Markov models (OEA, SsK), pp. 155–158.
ICDARICDAR-1993-AminW #network #recognition
Hand-printed character recognition system using artificial neural networks (AA, WHW), pp. 943–946.
ICDARICDAR-1993-AraiAN #interactive #network #recognition
Intelligent interactive map recognition using neural networks (HA, SA, MN), pp. 922–925.
ICDARICDAR-1993-Bai #multi #recognition
Multifont Chinese character recognition using side-stroke-end feature (GB), pp. 794–797.
ICDARICDAR-1993-Breul #bound #fault #recognition
Recognition of handprinted digits using optimal bounded error matching (TMB), pp. 493–496.
ICDARICDAR-1993-ChenWB #detection #image #keyword #markov #modelling
Detecting and locating partially specified keywords in scanned images using hidden Markov models (FC, LW, DSB), pp. 133–138.
ICDARICDAR-1993-DoermannRW #geometry #invariant #recognition
Logo recognition using geometric invariants (DSD, ER, IW), pp. 894–897.
ICDARICDAR-1993-GillouxLB #markov #modelling #recognition #word
Strategies for handwritten words recognition using hidden Markov models (MG, ML, JMB), pp. 299–304.
ICDARICDAR-1993-HerrmannS #documentation #image #layout #retrieval
Retrieval of document images using layout knowledge (PH, GS), pp. 537–540.
ICDARICDAR-1993-HoriuchiTYY #on the #recognition
On method of training dictionaries for handwritten character recognition using relaxation matching (TH, KT, KY, HY), pp. 638–641.
ICDARICDAR-1993-HoriuchiTYY93a #image #recognition
Stamped character recognition method using range image (TH, KT, HY, KY), pp. 782–785.
ICDARICDAR-1993-ImadeTW #classification #documentation #image #network #segmentation
Segmentation and classification for mixed text/image documents using neural network (SI, ST, TW), pp. 930–934.
ICDARICDAR-1993-InoharaKSS #complexity #database #retrieval
Retrieval method of textile pictures database using a complexity scale (TI, KK, HS, SS), pp. 699–702.
ICDARICDAR-1993-JainC #analysis #locality
Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
ICDARICDAR-1993-JiangKT #recognition #representation
Recognition and representation of text characters using rubber band (JJ, WK, HT), pp. 955–958.
ICDARICDAR-1993-Kita #automation #recognition #taxonomy
Making a personal recognition dictionary from characters automatically generated by using handwriting model (NK), pp. 76–81.
ICDARICDAR-1993-LamH #markov #modelling
Reading constrained text using hierarchical hidden Markov models (SWL, WKH), pp. 151–154.
ICDARICDAR-1993-LeeS #design #modelling
Optimal design of reference models using simulated annealing combined with an improved LVQ3 (SWL, HHS), pp. 244–249.
ICDARICDAR-1993-LiiPS #recognition #syntax
Address block location using character recognition and address syntax (JL, PWP, SNS), pp. 330–334.
ICDARICDAR-1993-MarukawaKSF #recognition
A post-processing method for handwritten Kanji name recognition using Furigana information (KM, MK, YS, HF), pp. 218–221.
ICDARICDAR-1993-MonaganR #graph #representation
Appropriate base representation using a run graph (GM, MR), pp. 623–626.
ICDARICDAR-1993-MykaG #automation #documentation #hypermedia #re-engineering
Using electronic facsimiles of documents for automatic reconstruction of underlying hypertext structures (AM, UG), pp. 528–532.
ICDARICDAR-1993-NakamuraSANK #string
A method for recognizing character strings from maps using linguistic knowledge (AN, OS, MA, CN, HK), pp. 561–564.
ICDARICDAR-1993-OhkuraSSH #on the
On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
ICDARICDAR-1993-ParkerJS
Thresholding using an illumination model (JRP, CJ, AGS), pp. 270–273.
ICDARICDAR-1993-PasternakN #adaptation #constraints #object-oriented #specification
Adaptable drawing interpretation using object-oriented and constraint-based graphic specification (BP, BN), pp. 359–364.
ICDARICDAR-1993-Pavlidis #image
Threshold selection using second derivatives of the gray scale image (TP), pp. 274–277.
ICDARICDAR-1993-Pflug #n-gram #recognition #set
Using n-grams for the definition of a training set for cursive handwriting recognition (VP), pp. 295–298.
ICDARICDAR-1993-SendaMI #documentation #image #process #recognition #retrieval
Document image retrieval system using character candidates generated by character recognition process (SS, MM, KI), pp. 541–546.
ICDARICDAR-1993-SeniorF
Using constrained snakes for feature spotting in off-line cursive script (AWS, FF), pp. 305–310.
ICDARICDAR-1993-Sinha #constraints #on the #recognition
On using syntactic constraints in text recognition (RMKS), pp. 858–861.
ICDARICDAR-1993-Srihari #modelling #recognition
From pixels to paragraphs: The use of contextual models in text recognition (SNS), pp. 416–423.
ICDARICDAR-1993-StefanoTV #reliability
Using entropy for drawing reliable templates (CDS, FT, MV), pp. 345–348.
ICDARICDAR-1993-StrathySK #segmentation
Segmentation of handwritten digits using contour features (NWS, CYS, AK), pp. 577–580.
ICDARICDAR-1993-Viard-GaudinNB #2d #algorithm #approach
A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
ICDARICDAR-1993-Yan93a #classification #image #nearest neighbour #segmentation
Color map image segmentation using optimized nearest neighbor classifiers (HY), pp. 111–114.
ICDARICDAR-1993-YangHT #approximate #automation #identification
Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
ICDARICDAR-1993-YoshimuraSY #locality #recognition
A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
SIGMODSIGMOD-1993-AnanthanarayananGKLP #approach #object-oriented #relational
Using the Co-existence Approach to Achieve Combined Functionality of Object-Oriented and Relational Systems (RA, VG, WK, TJL, HP), pp. 109–118.
SIGMODSIGMOD-1993-BrinkhoffKS #performance
Efficient Processing of Spatial Joins Using R-Trees (TB, HPK, BS), pp. 237–246.
SIGMODSIGMOD-1993-LuniewskiSSST #information management
Information Organization Using Rufus (AL, PMS, KAS, JS, JT), pp. 560–561.
SIGMODSIGMOD-1993-Mukhopadhyay
Interoperability Using APPC (DM), pp. 479–482.
SIGMODSIGMOD-1993-ShatdalN #memory management #parallel
Using Shared Virtual Memory for Parallel Join Processing (AS, JFN), pp. 119–128.
SIGMODSIGMOD-1993-WoelkACMSST #dependence #scheduling
Task Scheduling Using Intertask Dependencies in Carot (DW, PCA, PC, GM, APS, MPS, CT), pp. 491–494.
VLDBVLDB-1993-ChenR93a #adaptation #database #feedback #query
Adaptive Database Buffer Allocation Using Query Feedback (CMC, NR), pp. 342–353.
VLDBVLDB-1993-MillerIR #capacity #integration
The Use of Information Capacity in Schema Integration and Translation (RJM, YEI, RR), pp. 120–133.
VLDBVLDB-1993-ZobelMS #scalability
Searching Large Lexicons for Partially Specified Terms using Compressed Inverted Files (JZ, AM, RSD), pp. 290–301.
ICSMECSM-1993-Abd-El-HafizB #library #source code
Documenting Programs Using a Library of Tree Structured Plans (SKAEH, VRB), pp. 152–161.
ICSMECSM-1993-EdwardsM #lifecycle #logic
Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method (HME, MM), pp. 162–171.
ICSMECSM-1993-LoyallM #analysis #dependence #maintenance #process
Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
ICSMECSM-1993-Narat #case study #database #maintenance #relational
Using a Relational Database for Software Maintenance: A Case Study (VN), pp. 244–251.
FMFME-1993-CauR #fault tolerance #refinement
Using Relative Refinement for Fault Tolerance (AC, WPdR), pp. 19–41.
FMFME-1993-HaxthausenG #case study #concurrent
A Concurrency Case Study Using RAISE (AEH, CG), pp. 367–387.
FPCAFPCA-1993-Nocker #analysis #reduction #strict
Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
HCIHCI-ACS-1993-Ala-Siuru #case study #experience #specification #user interface
Using QFD Techniques in User Interface Specification: First Experiences (PAS), pp. 456–461.
HCIHCI-ACS-1993-ChasePHH #case study #documentation
Task-Oriented User Documentation Using the User Action Notation: A Case Study (JDC, MP, HRH, DH), pp. 421–426.
HCIHCI-ACS-1993-Chung
Decision Maker’s Knowledge Level and the Selection of Decision Strategies in Using a Decision Support System (HMMC), pp. 487–491.
HCIHCI-ACS-1993-Hjelmquist #communication #people
Communication Between People Using a Computer-Mediated Communication System (EH), pp. 955–960.
HCIHCI-ACS-1993-McFarlane #automation #development
Current Status of Development and Use of Tethered and Autonomous Underwater Vehicles and the Potential for Further Automation (JRM), pp. 301–306.
HCIHCI-ACS-1993-PouraghabagherB #evaluation #eye tracking #monitoring
An Evaluation of Information Highlighting Methods on Computer Screens Using an Eye Movement Monitor (RP, DB), pp. 762–767.
HCIHCI-ACS-1993-Sundstrom-Frisk
Near-Accidents in the Use of Advanced Medical Equipment (CSF), pp. 821–826.
HCIHCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
HCIHCI-SHI-1993-AndersonJBA
The Use of Computer Simulated Cases to Study Factors that Influence Clinical Practice Styles (JGA, SJJ, CB, MMA), pp. 742–747.
HCIHCI-SHI-1993-BorgesBLT #design #education #framework #knowledge base
A Framework for Building a Knowledge Based System Using Several Experts — With an Application for Curriculum Design of Engineering Degree Courses (MNB, YB, ML, MTT), pp. 344–349.
HCIHCI-SHI-1993-EnomotoNNS
Virtual Kitchen System using Kansei Engineering (NE, MN, JN, KS), pp. 657–662.
HCIHCI-SHI-1993-GodbertPS #concept #constraints #interface #natural language #specification
Natural Language Interfaces: Specifying and Using Conceptual Constraints (EG, RP, PS), pp. 385–390.
HCIHCI-SHI-1993-GreavesWO #image #speech #visual notation
Enhancing Speech Intelligibility Using Visual Images (CG, MW, ), pp. 1097–1102.
HCIHCI-SHI-1993-HsiA93a #design #education #multi
Use of Multimedia Technology in Teaching Engineering Design (SH, AMA), pp. 778–783.
HCIHCI-SHI-1993-KamalaSC #difference #multi #student
Individual Differences in the Use of Hyper/Multimedia by Undergraduate Students at the University of Hawaii at Manoa (TNK, JS, MEC), pp. 507–512.
HCIHCI-SHI-1993-KamijoK #artificial reality
A Virtual Reality System Using Physiological Data — Application to Virtual Sports CAI (KK, AK), pp. 675–680.
HCIHCI-SHI-1993-KatoO #analysis
Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
HCIHCI-SHI-1993-KirschA #approach #education #multi #visual notation
Using Multimedia to Teach Visual Literacy: A Systematic Approach (RPK, RMA), pp. 531–536.
HCIHCI-SHI-1993-Lowgren #editing #visual notation
Using Domain Knowledge to Support Graphical Editing (JL), pp. 421–426.
HCIHCI-SHI-1993-MoriiKT #animation #detection #evaluation #eye tracking #realtime
Evaluation of a Gaze Using Real-Time CG Eye-Animation Combined with Eye Movement Detector (KM, FK, NT), pp. 1103–1108.
HCIHCI-SHI-1993-SharitC #reasoning #rule-based
The Use of Expert Systems for Training Humans in Rule-Based Reasoning (JS, SC), pp. 819–824.
HCIHCI-SHI-1993-ShibuyaT #communication #image
Use of Bi-Directional Image Exchange in Facilitating Precontact Communication (YS, HT), pp. 943–948.
HCIHCI-SHI-1993-SillinceM #human-computer #hypermedia
Using Argumentation to Overcome Hypertext’s HCI Failings (JAAS, RHM), pp. 639–644.
HCIHCI-SHI-1993-Stelovsky #hypermedia #implementation #parametricity #reuse
Use of Parameters to Facilitate the Implementation of Reusable Hypermedia Modules (JS), pp. 525–530.
HCIHCI-SHI-1993-UetakeNTT #analysis
A Meeting Support System Based on Analyses of Human-Communication — Using the Context and Contents of Meetings (TU, MN, KT, HT), pp. 967–972.
HCIHCI-SHI-1993-WatersonO #multi
Using Animated Demonstrations in Multimedia Applications: Some Suggestions Based upon Experimental Evidence (PEW, CO), pp. 543–548.
CHIINTERCHI-1993-BerlinJOPW #design #memory management
Where did you put it? Issues in the design and use of a group memory (LMB, RJ, VLO, AP, CW), pp. 23–30.
CHIINTERCHI-1993-BrownMS #graph #perspective
Browsing graphs using a fisheye view (MHB, JRM, MS), p. 516.
CHIINTERCHI-1993-Byrne #documentation
Using icons to find documents: simplicity is critical (MDB), pp. 446–453.
CHIINTERCHI-1993-HigakiTM
A telewriting system on a LAN using a pen-based computer as the terminal (SH, HT, SM), p. 303.
CHIINTERCHI-1993-KabbashMB #performance
Human performance using computer input devices in the preferred and non-preferred hands (PK, ISM, WB), pp. 474–481.
CHIINTERCHI-1993-KurtenbachB #performance
The limits of expert performance using hierarchic marking menus (GK, WB), pp. 482–487.
CHIINTERCHI-1993-McKerlieM #design
QOC in action (abstract): using design rationale to support design (DM, AM), p. 519.
CHIINTERCHI-1993-NardiSKLWS
Turning away from talking heads: the use of video-as-data in neurosurgery (BAN, HS, AK, RL, SW, RJS), pp. 327–334.
CHIINTERCHI-1993-SteffenE #interactive #visualisation
High interaction data visualization using Seesoft to visualize program change history (JLS, SGE), p. 517.
CHIINTERCHI-1993-Wang
A groupware engine using UIMS methodologies (LW), pp. 249–250.
CAiSECAiSE-1993-AntonellisV #reuse #specification
Temporal Apsects in Reuse of Requirement Specifications (VDA, LV), pp. 504–520.
CAiSECAiSE-1993-GullaW #execution #modelling #validation
Using Explanations to Improve the Validation of Executable Models (JAG, GW), pp. 118–142.
CAiSECAiSE-1993-PalanqueBDS #design #interface #petri net
Design of User-Driven Interfaces Using Petri Nets and Objects (PAP, RB, LD, CSB), pp. 569–585.
CIKMCIKM-1993-AzarbodP #concept #incremental #integration
Building Concept Hierarchies for Schema Integration in HDDBS Using Incremental Concept Formation (CA, WP), pp. 732–734.
CIKMCIKM-1993-MehtaGPN #generative
The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
CIKMCIKM-1993-Riloff #classification
Using Cases to Represent Context for Text Classification (ER), pp. 105–113.
CIKMCIKM-1993-Sussna #ambiguity #for free #network #semantics #word
Word Sense Disambiguation for Free-text Indexing Using a Massive Semantic Network (MS), pp. 67–74.
CIKMCIKM-1993-ZhangOCF #data type #optimisation #query
A Method of Using Semijoins to Optimizing Queries with ADT Functions (XZ, NO, HC, YF), pp. 723–725.
ICMLICML-1993-Cardie #learning
Using Decision Trees to Improve Case-Based Learning (CC), pp. 25–32.
ICMLICML-1993-ClarkM #induction #learning #modelling
Using Qualitative Models to Guide Inductive Learning (PC, SM), pp. 49–56.
ICMLICML-1993-CravenS #learning #network
Learning Symbolic Rules Using Artificial Neural Networks (MC, JWS), pp. 73–80.
SEKESEKE-1993-BachateneCS #design #re-engineering
Using Software Engineering Principles to Design Intelligent Cooperative Systems (HB, MC, AEFS), pp. 309–313.
SEKESEKE-1993-Bhansali #architecture #reuse
Architecture-driven Reuse of Code in KASE (SB), pp. 483–490.
SEKESEKE-1993-ChuP #reuse #scalability
A Re-cnginacring Tool for the Reuse of Large Scale Software Systems (WCC, SP), pp. 94–101.
SEKESEKE-1993-LeloucheV #automation #knowledge-based #testing
Using the Inference Engine Strategy in the Automatic Construction of Test Cases for a Knowledge-Based System (RL, LV), pp. 388–395.
SEKESEKE-1993-MacMillanFLLS #architecture #natural language #reuse #tool support
A Common Architecture To Encourage Reuse Of Natural Language/Text Processing Tools (TRM, MLF, SJL, EPL, LJS), pp. 266–270.
SEKESEKE-1993-Paterno #logic #user interface
Definition of Properties of User Interfaces Using Action-Based Temporal Logic (FP), pp. 314–318.
SEKESEKE-1993-PirriP #datalog #deduction #design #taxonomy
Using Datalog as a Language for Data Dictionary Design: A Deductive Support (FP, CP), pp. 304–308.
SEKESEKE-1993-ReynoldsM #metric #process #programming language #refinement
The Use of Refinement Metrics to Assess Programming Language Support for the Stepwise Refinement Process (RGR, JIM), pp. 150–157.
SIGIRSIGIR-1993-CallanC #evaluation #query
An Evaluation of Query Processing Strategies Using the TIPSTER Collection (JPC, WBC), pp. 347–355.
SIGIRSIGIR-1993-Hull #evaluation #retrieval #statistics #testing
Using Statistical Testing in the Evaluation of Retrieval Experiments (DAH), pp. 329–338.
SIGIRSIGIR-1993-Kupiec #approach #named #online #robust
MURAX: A Robust Linguistic Approach for Question Answering Using an On-Line Encyclopedia (JK), pp. 181–190.
SIGIRSIGIR-1993-Voorhees #retrieval #word
Using WordNet to Disambiguate Word Senses for Text Retrieval (EMV), pp. 171–180.
ECOOPECOOP-1993-GammaHJV #abstraction #design pattern #object-oriented #reuse
Design Patterns: Abstraction and Reuse of Object-Oriented Design (EG, RH, REJ, JMV), pp. 406–431.
OOPSLAOOPSLA-1993-BalK #runtime
Object Distribution in Orca using Compile-Time and Run-Time Techniques (HEB, MFK), pp. 162–177.
OOPSLAOOPSLA-1993-BinghamHH #case study #experience #library #object-oriented
Experiences Developing and Using an Object-Oriented Library for Program Manipulation (TB, NH, DH), pp. 83–89.
OOPSLAOOPSLA-1993-GodinM #maintenance
Building and Maintaining Analysis-Level Class Hierarchies Using Galois Lattices (RG, HM), pp. 394–410.
OOPSLAOOPSLA-1993-MatsuokaTY #concurrent #encapsulation #object-oriented #performance
Highly Efficient and Encapsulated Re-use of Synchronization Code in Concurrent Object-Oriented Languages (SM, KT, AY), pp. 109–126.
TOOLSTOOLS-EUROPE-1993-DecooninckNJ #modelling #object-oriented
Satellite Modeling Using Object-Oriented Technologies (ASD, PN, FJ), pp. 19–30.
TOOLSTOOLS-EUROPE-1993-KetabchiS #analysis #automation #documentation #generative #maintenance
Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
TOOLSTOOLS-PACIFIC-1993-Dew #agile #concept #object-oriented #prototype #realtime
A Rapid Prototyping System for Real-time Systems Using Object-oriented Concepts (RAD), pp. 279–291.
TOOLSTOOLS-PACIFIC-1993-Grant #ada #object-oriented #paradigm #re-engineering
Software Engineering Using the Object-Oriented Paradigm: The Promise of Ada 9X (DDG), p. 329.
TOOLSTOOLS-PACIFIC-1993-LingD #comparison #concurrent #object-oriented #paradigm #specification
A Comparison of Techniques for Specifying Concurrent Systems Using the Object-Oriented Paradigm (SL, BD), pp. 155–177.
TOOLSTOOLS-USA-1993-Brandis #c++ #design #scalability
An O-O Case History: Large System Design Using C++ (CB), p. 534.
TOOLSTOOLS-USA-1993-VideiraS #c++ #design #development #framework
Using C++ in the Development of an Electronic Design Framework (IV, HS), pp. 255–264.
AdaEuropeAdaEurope-1993-Lundberg #ada #evaluation #parallel #performance #source code
Performance Evaluation of Parallel Ada Programs Using an Experimental Multiprocessor (LL), pp. 280–297.
AdaEuropeAdaEurope-1993-Schwille #exception #guidelines
Use and Abuse of Exceptions — 12 Guidelines for Proper Exception Handling (JS), pp. 141–152.
LOPSTRLOPSTR-1993-BoulangerB #abstract interpretation
Using Abstract Interpretation for Goal Replacement (DB, MB), pp. 210–228.
LOPSTRLOPSTR-1993-Johansson #incremental #interactive
Interactive Program Derivation Using Program Schemata and Incrementally Generated Strategies (ALJ), pp. 100–112.
LOPSTRLOPSTR-1993-MaddenHGB #automation #generative #performance #proving #source code #theorem proving
A General Technique for Automatically Generating Efficient Programs Through the Use of Proof Planning (PM, JH, IG, AB), pp. 64–66.
PEPMPEPM-1993-Lawall #induction #partial evaluation #proving
Proofs by Structural Induction using Partial Evaluation (JLL), pp. 155–166.
PEPMPEPM-1993-Seward #analysis #polymorphism #strict
Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
PLDIPLDI-1993-BarrettZ #memory management #performance #predict
Using Lifetime Predictors to Improve Memory Allocation Performance (DAB, BGZ), pp. 187–196.
PPDPPLILP-1993-JourdanBPR #attribute grammar #implementation #specification
Specification and Implementation of Grammar Couplings using Attribute Grammars (MJ, CLB, DP, GR), pp. 123–136.
PPDPPLILP-1993-Moreno-NavarroKMWH #analysis #lazy evaluation #performance
Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
PPDPPLILP-1993-Poetzsch-Heffter #programming language #prototype #specification
Programming Language Specification and Prototyping Using the MAX System (APH), pp. 137–150.
POPLPOPL-1993-BatesH #dependence #graph #incremental #testing
Incremental Program Testing Using Program Dependence Graphs (SB, SH), pp. 384–396.
POPLPOPL-1993-Lakhotia #dependence #graph #multi
Constructing Call Multigraphs Using Dependence Graphs (AL), pp. 273–284.
AdaTRI-Ada-1993-DownsDMTT #ada
Using X with the ADA Mind-Set (MD, JD, KM, LT, CT), pp. 20–28.
AdaTRI-Ada-1993-GieringMB #ada #design #implementation #thread
Implementing Ada 9X Features Using POSIX Threads: Design Issues (EWG, FM, TPB), pp. 214–228.
AdaTRI-Ada-1993-Nickerson #ada #design #representation #visual notation
Visual Conventions for System Design Using Ada 9X: Representing Asynchronous Transfer of Control (JVN), pp. 379–384.
AdaTRI-Ada-1993-White #ada #interface #semantics #specification
A Universal Delogger Using the Ada Semantic Interface Specification (ASIS) (MW), pp. 347–353.
SASWSA-1993-FergusonH #abstract interpretation #algorithm #performance
Fast Abstract Interpretation Using Sequential Algorithms (AF, JH), pp. 45–59.
REICRE-1993-HoffmannD #design #execution #process #prototype #specification
Using Executable Specifications for Prototyping System Design Process (CH, BD), pp. 135–145.
RERE-1993-AndersonD #requirements
Using scenarios in deficiency-driven requirements engineering (JSA, BD), pp. 134–141.
RERE-1993-CastanoA #concept #reuse #specification
Reuse of conceptual requirement specifications (SC, VDA), pp. 121–124.
RERE-1993-GreenspanF #paradigm #requirements
Requirements engineering using the SOS paradigm (SJG, MF), pp. 260–263.
RERE-1993-IshiharaSK #dependence #natural language #specification
A translation method from natural language specifications into formal specifications using contextual dependencies (YI, HS, TK), pp. 232–239.
ESECESEC-1993-JengC #component #formal method #library
Using Formal Methods to Construct a Software Component Library (JJJ, BHCC), pp. 397–417.
FSEFSE-1993-AbowdAG #architecture
Using Style to Understand Descriptions of Software Architecture (GDA, RA, DG), pp. 9–20.
FSEFSE-1993-Wood #approach #calculus #re-engineering #refinement
A Practical Approach to Software Engineering Using Z and the Refinement Calculus (KRW), pp. 79–88.
ICSEICSE-1993-BastaniDP #correctness #evaluation
Experimental Evaluation of a Fuzzy-Set Based Measure of Software Correctness Using Program Mutation (FBB, GD, AP), pp. 45–54.
ICSEICSE-1993-GerhartCR #formal method #industrial
Observations on Industrial Practice Using Formal Methods (SLG, DC, TR), pp. 24–33.
ICSEICSE-1993-OrnburnL #component #generative
Building, Modifying and Using Component Generators (SBO, RJL), pp. 391–402.
ICSEICSE-1993-Zelkowitz #classification
Use of an Environment Classification Model (MVZ), pp. 348–357.
ASEKBSE-1993-KingstonVD #approach #development #evaluation #hybrid
Development of an Expert Assistant for Software Evaluation using a Hybrid Approach (GK, RV, PD), p. 26.
ASEKBSE-1993-MacMillanFLLS #architecture #natural language #reuse #tool support
A Common Architecture to Encourage Reuse of Natural Language/Text Processing Tools (TRM, MF, SL, EPL, LJS), p. 20.
ASEKBSE-1993-Redmiles #empirical #knowledge-based #re-engineering
Observations on Using Empirical Studies in Developing a Knowledge-Based Software Engineering Tool (DFR), p. 24.
SACSAC-1993-AguirreBBG #information management #prototype #representation
Using a High Level Knowledge Representation for Expert Systems Knowledge Acquisition and Prototyping (JLA, OB, RFB, MNG), pp. 490–497.
SACSAC-1993-Al-HaddadGG #implementation #object-oriented #paradigm #programming #reuse
Dynamic Selection and Reuse of Implementations in the Object-Oriented Programming Paradigm (HMAH, KMG, TG), pp. 452–459.
SACSAC-1993-ChewSK #object-oriented
Use of Object-Oriented Structures to Represent Knowledge in Expert Systems (GC, MS, AK), pp. 498–503.
SACSAC-1993-Konstam #algorithm #analysis #linear #search-based
Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
SACSAC-1993-RankinW #combinator #fixpoint #prolog
Finding Fixed Point Combinators Using Prolog (RR, RWW), pp. 604–608.
SACSAC-1993-Sen #low cost #probability #set
Minimal Cost Set Covering Using Probabilistic Methods (SS), pp. 157–164.
SACSAC-1993-ThangiahN #adaptation
Dynamic Trajectory Routing Using an Adaptive Search Method (SRT, KEN), pp. 131–138.
DACDAC-1993-ChakradharDPR #optimisation
Sequential Circuit Delay optimization Using Global Path Delays (STC, SD, MP, SGR), pp. 483–489.
DACDAC-1993-ChengK #automation #finite #functional #generative #state machine #testing
Automatic Functional Test Generation Using the Extended Finite State Machine Model (KTC, ASK), pp. 86–91.
DACDAC-1993-ChouCC #finite #modelling #performance #simulation
High-Speed Interconnect Modeling and High-Accuracy Simulation Using SPICE and Finite Element Methods (TYC, JC, ZJC), pp. 684–690.
DACDAC-1993-HamadaCC #approach #linear #named #network
Prime: A Timing-Driven Placement Tool using A Piecewise Linear Resistive Network Approach (TH, CKC, PMC), pp. 531–536.
DACDAC-1993-HeebPR #modelling
Frequency Domain Microwave Modeling Using Retarded Partial Element Equivalent Circuits (HH, SP, AER), pp. 702–706.
DACDAC-1993-IqbalPDP #algebra
Critical Path Minimization Using Retiming and Algebraic Speed-Up (ZI, MP, SD, ACP), pp. 573–577.
DACDAC-1993-LadageL #algorithm
Resistance Extraction using a Routing Algorithm (LL, RL), pp. 38–42.
DACDAC-1993-LamBS #modelling
Circuit Delay Models and Their Exact Computation Using Timed Boolean Functions (WKCL, RKB, ALSV), pp. 128–134.
DACDAC-1993-LiaoDWC #metaprogramming #network #polynomial
S-Parameter Based Macro Model of Distributed-Lumped Networks Using Exponentially Decayed Polynomial Function (HL, WWMD, RW, FYC), pp. 726–731.
DACDAC-1993-LiuCS #behaviour #simulation #verification
Analog System Verification in the Presence of Parasitics Using Behavioral Simulation (EWYL, HCC, ALSV), pp. 159–163.
DACDAC-1993-MandayamV #attribute grammar #performance #specification
Performance Specification Using Attributed Grammars (RM, RV), pp. 661–667.
DACDAC-1993-MotoharaHMMKSS #algorithm #matrix #traversal
A State Traversal Algorithm Using a State Covariance Matrix (AM, TH, MM, HM, KK, YS, SS), pp. 97–101.
DACDAC-1993-OhlrichEGS #algorithm #identification #morphism #named #performance
SubGemini: Identifying SubCircuits using a Fast Subgraph Isomorphism Algorithm (MO, CE, EG, LS), pp. 31–37.
DACDAC-1993-PullelaMP #optimisation #reliability
Reliable Non-Zero Skew Clock Trees Using Wire Width Optimization (SP, NM, LTP), pp. 165–170.
DACDAC-1993-SantucciCG #behaviour #heuristic
Speed up of Behavioral A.T.P.G. using a Heuristic Criterion (JFS, ALC, NG), pp. 92–96.
DACDAC-1993-SuttonBD #design
Design Management Using Dynamically Defined Flows (PRS, JBB, SWD), pp. 648–653.
DACDAC-1993-WangDNS #architecture #multi #scalability #synthesis
High-Level Synthesis of Scalable Architectures for IIR Filters using Multichip Modules (HW, NDD, AN, KYS), pp. 336–342.
DACDAC-1993-YaoCDNL
Cell-Based Hierarchical Pitchmatching Compaction Using Minimal LP (SZY, CKC, DD, SN, CYL), pp. 395–400.
HPDCHPDC-1993-ColombetDM #modelling #network
Star Modeling on IBM RS6000 Networks Using PVM (LC, LD, FM), pp. 121–128.
HPDCHPDC-1993-CrutcherLFZ #3d #network
Management of Broadband Networks Using a 3D Virtual World (LAC, AAL, SF, MXZ), pp. 306–315.
HPDCHPDC-1993-MukherjeeS #adaptation #concurrent #configuration management #multi #performance #thread
Improving Performance by Use of Adaptive Objects: Experimentation with a Configurable Multiprocessor Thread Package (BM, KS), pp. 59–66.
HPDCHPDC-1993-TanenbaumBK #distributed #programming
Programming a Distributed System Using Shared Objects (AST, HEB, MFK), pp. 5–12.
PDPPDP-1993-AzharF #adaptation #network
Adaptive robot control using a processor network (FA, DAF), pp. 351–358.
PDPPDP-1993-LawsonMH #matrix #named
SMART: a neurocomputer using sparse matrices (JCL, NM, JH), pp. 59–64.
PDPPDP-1993-Montiel-NelsonAFN #development #library
Using the ES2 library and SILOS simulator in the development of a single chip with three processors and analog IO (JAMN, VdA, DQMF, AN), pp. 359–368.
PDPPDP-1993-StuartW #algorithm #array #matrix #parallel #scalability #set #symmetry
An algorithm far the parallel computation of subsets of eigenvalues and associated eigenvectors of large symmetric matrices using an array processor (EJS, JSW), pp. 211–217.
PPoPPPPoPP-1993-HallHKMMOPR #case study #editing #experience #interactive #parallel #programming
Experiences Using the ParaScope Editor: an Interactive Parallel Programming Tool (MWH, TJH, KK, NM, KSM, JDO, MHP, GR), pp. 33–43.
PPoPPPPoPP-1993-KontothanassisW #performance
Using Scheduler Information to Achieve Optimal Barrier Synchronization Performance (LIK, RWW), pp. 64–72.
PPoPPPPoPP-1993-Siegl #algorithm #symbolic computation
Parallelizing Algorithms for Symbolic Computation using ||MAPLE|| (KS), pp. 179–186.
SOSPSOSP-1993-HauserJTWW #case study #interactive #thread
Using Threads in Interactive Systems: A Case Study (CH, CJ, MT, BBW, MW), pp. 94–105.
TAPSOFTTAPSOFT-1993-Esparza #model checking
Model Checking Using Net Unfoldings (JE), pp. 613–628.
TAPSOFTTAPSOFT-1993-GiannottiL #abstract interpretation #specification
Gate Splitting in LOTOS Specifications Using Abstract Interpretation (FG, DL), pp. 437–452.
TAPSOFTTAPSOFT-1993-InverardiKY #case study #formal method #named
Yeast: A Case Study for a Practical Use of Formal Methods (PI, BK, DY), pp. 105–120.
TAPSOFTTAPSOFT-1993-Kirkwood #automation #equation #implementation #reasoning
Automating (Specififation = Implementation) Using Equational Reasoning and LOTOS (CK), pp. 544–558.
TAPSOFTTAPSOFT-1993-PenaA #liveness #process #specification
A Technique for Specifying and Refining TCSP Processes by Using Guards and Liveness Conditions (RP, LMA), pp. 328–342.
CAVCAV-1993-GuptaF #induction #parametricity #representation
Parametric Circuit Representation Using Inductive Boolean Functions (AG, ALF), pp. 15–28.
CAVCAV-1993-HojatiBK #debugging #design
BDD-Based Debugging Of Design Using Language Containment and Fair CTL (RH, RKB, RPK), pp. 41–58.
CAVCAV-1993-HuD #invariant #performance #verification
Efficient Verification with BDDs using Implicitly Conjoined Invariants (AJH, DLD), pp. 3–14.
CAVCAV-1993-Peled #model checking
All from One, One for All: on Model Checking Using Representatives (DP), pp. 409–423.
CAVCAV-1993-Shankar #realtime #verification
Verification of Real-Time Systems Using PVS (NS), pp. 280–291.
CSLCSL-1993-BaazZ #equivalence #proving
Short Proofs of Tautologies Using the Schema of Equivalence (MB, RZ), pp. 33–35.
ICLPICLP-1993-CarlssonG #automation #constraints
Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques (MC, MG), pp. 647–665.
ICLPICLP-1993-LiRSVBPPSCDRSS #named #parallel
APPLAUSE: Applications Using the ElipSys Parallel CLP System (LLL, MR, KS, AV, JB, CP, ZP, TS, DAC, SD, CJR, JS, GS), pp. 847–848.
ICLPILPS-1993-BoizumaultDP #problem
Solving a real life exams problem using CHIP (PB, YD, LP), p. 661.
ICLPILPS-1993-CodishD #logic programming #source code
Analysing Logic Programs Using “Prop”-ositional Logic Programs and a Magic Wand (MC, BD), pp. 114–129.
ICLPILPS-1993-CodognetD #constraints #theorem proving
Boolean Constraint Solving Using clp(FD) (PC, DD), pp. 525–539.
ICLPILPS-1993-Vargas-VeraVR #editing #prolog #scalability #source code
Building Large-Scale Prolog Programs using a Techniques Editing System (MVV, WWV, DSR), p. 636.
ISSTAISSTA-1993-AvritzerL #testing
Load Testing Software Using Deterministic State Testing (AA, BL), pp. 82–88.
ISSTAISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction
Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
ISSTAISSTA-1993-UntchOH #analysis #mutation testing
Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
ICTSSIWPTS-1993-UlrichK
Test Derivation from LOTOS Using Structure Information (AU, HK), pp. 279–293.
ICTSSIWPTS-1993-WittemanW #network #principle #testing
ATM Broadband Network Testing Using the Ferry Principle (MFW, RCvW), pp. 125–138.
HTHT-ECHT-1992-FreiS #hypermedia
Making Use of Hypertext Links when Retrieving Information (HPF, DS), pp. 102–111.
HTHT-ECHT-1992-GuinanS #hypermedia #information retrieval
Information Retrieval from Hypertext using Dynamically Planned Guided Tours (CG, AFS), pp. 122–130.
HTHT-ECHT-1992-WiilL #distributed #hypermedia #named
Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems (UKW, JJL), pp. 251–261.
HTHT-ECHT-1992-ZhengP #hypermedia
Using Statecharts to Model Hypertext (YZ, MCP), pp. 242–250.
SIGMODSIGMOD-1992-AgrawalAJ #database #protocol #realtime
Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
SIGMODSIGMOD-1992-Bamford #consistency #multi #performance
Using Multiversioning to Improve Performance Without Loss of Consistency (RB), p. 164.
SIGMODSIGMOD-1992-JhingranK #analysis #database #protocol
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMODSIGMOD-1992-LanzelotteVZ #object-oriented #optimisation #query #recursion
Optimization of Object-Oriented Recursive Queries using Cost-Controlled Strategies (RSGL, PV, MZ), pp. 256–265.
SIGMODSIGMOD-1992-MohanL #concurrent #named #performance
ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
VLDBVLDB-1992-AnsariNRS #flexibility #multi #transaction
Using Flexible Transactions to Support Multi-System Telecommunication Applications (MA, LN, MR, APS), pp. 65–76.
VLDBVLDB-1992-ChenLYY #execution #pipes and filters
Using Segmented Right-Deep Trees for the Execution of Pipelined Hash Joins (MSC, MLL, PSY, HCY), pp. 15–26.
VLDBVLDB-1992-Raz #multi #principle
The Principle of Commitment Ordering, or Guaranteeing Serializability in a Heterogeneous Environment of Multiple Autonomous Resource Mangers Using Atomic Commitment (YR), pp. 292–312.
CSEETSEI-1992-WildeG #re-engineering
Use of the Individual Exchange Project Model in an Undergraduate Software Engineering Laboratory (NW, JKG), pp. 339–348.
LISPLFP-1992-CooperNS #garbage collection #memory management #performance
Improving the Performance of SML Garbage Collection Using Application-Specific Virtual Memory Management (EC, SN, IS), pp. 43–52.
CHICHI-1992-FrankGGF #user interface
Building User Interfaces Interactively Using Pre- and Postconditions (MRF, JJdG, DFG, JDF), pp. 641–642.
CHICHI-1992-Hill #constraints #paradigm #user interface
The abstraction-link-view paradigm: using constraints to connect user interfaces to applications (RDH), pp. 335–342.
CHICHI-1992-KitajimaP #user interface #visual notation
A Computational Model of Skilled Use of a Graphical User Interface (MK, PGP), pp. 241–249.
CHICHI-1992-Muller #design
Retrospective on a year of participatory design using the PICTIVE technique (MJM), pp. 455–462.
CHICHI-1992-SellenBA
Using Spatial Cues to Improve Videoconferencing (AS, WB, JLA), pp. 651–652.
CSCWCSCW-1992-HymesO #editing
Unblocking Brainstorming Through the Use of a Simple Group Editor (CMH, GMO), pp. 99–106.
CSCWCSCW-1992-TakemuraK
Cooperative Work Environment Using Virtual Workspace (HT, FK), pp. 226–232.
KRKR-1992-Konolige #reasoning
Using Default and Causal Reasoning in Diagnosis (KK), pp. 509–520.
KRKR-1992-Nayak #order #reasoning
Order of Magnitude Reasoning using Logarithms (PPN), pp. 201–210.
ICMLML-1992-GiordanaS #algorithm #concept #learning #search-based
Learning Structured Concepts Using Genetic Algorithms (AG, CS), pp. 169–178.
ICMLML-1992-McCallum #learning #performance #proximity
Using Transitional Proximity for Faster Reinforcement Learning (AM), pp. 316–321.
ICMLML-1992-OliveiraS #feature model #induction
Constructive Induction Using a Non-Greedy Strategy for Feature Selection (ALO, ALSV), pp. 355–360.
ICMLML-1992-OmlinG #higher-order #network
Training Second-Order Recurrent Neural Networks using Hints (CWO, CLG), pp. 361–366.
SEKESEKE-1992-LiKL #architecture #design #reuse
The Reuse of Software Design and Software Architecture (HL, JvK, AML), pp. 170–177.
SEKESEKE-1992-MillerQ #approach #knowledge-based #modelling #reuse #simulation #source code
A Knowledge-Based Approach to Encouraging Reuse of Simulation and Modeling Programs (LM, AQ), pp. 158–163.
SEKESEKE-1992-ReynoldsMZ #induction
Extracting Procedural Knowledge from Software Systems Using Inductive Leaning in the PM system (RGR, JIM, EZ), pp. 131–139.
SEKESEKE-1992-SatoMI #refinement
Program Refinement Using Generic Object (YS, YM, TI), pp. 18–25.
SEKESEKE-1992-Wong #incremental #library
Using Version Spaces to Support Incremental Searches in a Software Library (YCW), pp. 412–419.
SIGIRSIGIR-1992-Grefenstette #retrieval
Use of Syntactic Context to Produce Term Association Lists for Text Retrieval (GG), pp. 89–97.
SIGIRSIGIR-1992-MasandLW #memory management #reasoning
Classifying News Stories using Memory Based Reasoning (BMM, GL, DLW), pp. 59–65.
SIGIRSIGIR-1992-RobertsonW #database
Searching for Historical Word-Forms in a Database of 17th-Century English Text Using Spelling-Correction Methods (AMR, PW), pp. 256–265.
ECOOPECOOP-1992-Gabelgaard #implementation #object-oriented #programming
Using Object-Oriented Programming Techniques for Implementing ISDN Supplementary Services (BG), pp. 213–232.
ECOOPECOOP-1992-Holland #component #contract #reuse #specification
Specifying Reusable Components Using Contracts (IMH), pp. 287–308.
OOPSLAOOPSLA-1992-EggenschwilerG
ET++ Swaps Manager: Using Object Technology in the Financial Engineering Domain (TE, EG), pp. 166–177.
OOPSLAOOPSLA-1992-Johnson #framework
Documenting Frameworks using Patterns (REJ), pp. 63–76.
TOOLSTOOLS-EUROPE-1992-DojatP #prototype #representation #smalltalk
Representation of a Medical Expertise using the Smalltalk Environment: Putting a Prototype to Work (MD, FP), pp. 379–389.
TOOLSTOOLS-EUROPE-1992-Zhao #approach #geometry #object-oriented #online #recognition
On-Line Geometry Recognition Using C++, an Object-Oriented Approach (RZ), pp. 371–378.
TOOLSTOOLS-PACIFIC-1992-Goldberg #object-oriented #question
Can A Manager Be Successful Using Object-Oriented Technology? (AG), p. 3.
TOOLSTOOLS-PACIFIC-1992-MaE #approach #library #relational
A Practical Approach to Class Library Management Using a Relational DBMS (JM, JME), pp. 165–173.
TOOLSTOOLS-PACIFIC-1992-McNamara #development #object-oriented
Objects in Context: the Use of Scope in Object-Oriented Development (ARM), pp. 205–211.
TOOLSTOOLS-USA-1992-FirthOFBN #development #object-oriented
Improving a software development environment using object-oriented technology (MAF, MHO, REF, SKB, TCN), pp. 41–49.
AdaEuropeAdaEurope-1992-BayassiBJL #ada #distributed #paradigm
A Practical Use of the Ada Rendez-Vous Paradigm in Distributed Systems (MB, HB, JFJ, PL), pp. 312–324.
AdaEuropeAdaEurope-1992-DuellSW #ada #code generation #scalability #source code
Using Ada Source Code Generators in a Large Project (RD, HJS, FCAdW), pp. 47–59.
AdaEuropeAdaEurope-1992-Groeneveld #ada
Using Ada in Integrating ATC Systems (MG), pp. 72–79.
AdaEuropeAdaEurope-1992-LooneyO #ada #distributed
Distributed Application Designed Using MASCOT and Implemented in Ada (MJL, AO), pp. 1–8.
LOPSTRLOPSTR-1992-BoulangerB #abstract interpretation #logic programming #source code
Deriving Transformations for Logic Programs Using Abstract Interpretation (DB, MB), pp. 99–117.
PEPMPEPM-1992-RufW #analysis #control flow #higher-order
Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
PLDIPLDI-1992-GranlundK #branch #c #compilation
Eliminating Branches using a Superoptimizer and the GNU C Compiler (TG, RK), pp. 341–352.
PLDIPLDI-1992-HanxledenK #constraints #control flow
Relaxing SIMD Control Flow Constraints using Loop Transformations (RvH, KK), pp. 188–199.
PLDIPLDI-1992-PughW #data flow #dependence
Eliminating False Data Dependences using the Omega Test (WP, DW), pp. 140–151.
PPDPPLILP-1992-Hanus #functional #logic programming #source code
Improving Control of Logic Programs by Using Functional Logic Languages (MH), pp. 1–23.
PPDPPLILP-1992-PenningsSV #attribute grammar #incremental
Using Cached Functions and Constructors for Incremental Attribute Evaluation (MP, SDS, HV), pp. 130–144.
AdaTRI-Ada-C-1992-Blair #ada #configuration management #library #version control
Managing Ada Using Rational’s Configuration Management/Version Control and IBM’s Software Configuration Library Manager (DJB), pp. 424–431.
AdaTRI-Ada-C-1992-Carmichael #architecture #design #object-oriented
Defining Software Architectures Using the Hierarchical Object-Oriented Design Nethod (HOOD) (ARC), pp. 211–219.
AdaTRI-Ada-C-1992-CramerD #ada #fault tolerance
The Use of Ada to Achieve Fault Tolerance in AAS (RSC, JDD), pp. 545–552.
AdaTRI-Ada-C-1992-GieringB #ada #thread
Using POSIX Threads to Implement Ada Tasking: Description of Work in Progress (EWG, TPB), pp. 518–529.
AdaTRI-Ada-T1-1992-FeldmanP #ada #education
Teaching and Using Ada in CS1/CS2 (MBF, REP), pp. 1–59.
SASWSA-1992-GiannottiL #abstract interpretation #specification
Using Abstract Interpretation for Gate splitting in LOTOS Specifications (FG, DL), pp. 194–204.
ICSEICSE-1992-HorwitzR #dependence #graph #re-engineering
The Use of Program Dependence Graphs in Software Engineering (SH, TWR), pp. 392–411.
SOSPSOSP-WIP-1991-HartyC92 #memory management #physics
Application-Controlled Physical Memory using External Page-Cache Management (KH, DRC), p. 19.
ASPLOSASPLOS-1992-HartyC #memory management #physics
Application-Controlled Physical Memory using External Page-Cache Management (KH, DRC), pp. 187–197.
ASPLOSASPLOS-1992-PanSR #branch #correlation #predict
Improving the Accuracy of Dynamic Branch Prediction Using Branch Correlation (STP, KS, JTR), pp. 76–84.
CCCC-1992-Grosch #pattern matching
Transformation of Attributed Trees Using Pattern Matching (JG), pp. 1–15.
CCCC-1992-Samples #compilation #data type #implementation
Compiler Implementation of ADTs Using Profile Data (ADS), pp. 72–87.
DACDAC-1992-BamjiV #design
Hierarchical Pitchmatching Compaction Using Minimum Design (CB, RV), pp. 311–317.
DACDAC-1992-BergamaschiLK #behaviour #optimisation #synthesis
Control Optimization in High-Level Synthesis Using Behavioral Don’t Cares (RAB, DAL, AK), pp. 657–661.
DACDAC-1992-BhattacharyaAA #fault #generative #testing
Delay Fault Test Generation for Scan/Hold Circuits Using Boolean Expressions (DB, PA, VDA), pp. 159–164.
DACDAC-1992-GennartL #simulation #validation
Validating Discrete Event Simulations Using Event Pattern Mappings (BAG, DCL), pp. 414–419.
DACDAC-1992-JuS #incremental #simulation
Incremental Circuit Simulation Using Waveform Relaxation (YCJ, RAS), pp. 8–11.
DACDAC-1992-KimLS #graph #layout #modelling
A New Hierarchical Layout Compactor Using Simplified Graph Models (WK, JL, HS), pp. 323–326.
DACDAC-1992-KrishnamoorthyN
Data Path Allocation using an Extended Binding Model (GK, JAN), pp. 279–284.
DACDAC-1992-LeeR #analysis #evaluation #linear #named
AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
DACDAC-1992-Malik #multi #network #optimisation
Optimization of Primitive Gate Networks Using Multiple Output Two-Level Minimization (AAM), pp. 449–453.
DACDAC-1992-PomeranzC
State Assignment Using Input/Output Functions (IP, KTC), pp. 573–577.
DACDAC-1992-RundensteinerG #functional #optimisation #synthesis
Functional Synthesis Using Area and Delay Optimization (EAR, DG), pp. 291–296.
ESOPESOP-1992-Levaire #case study #programming
Using the Centaur System to for Data-Parallel SIMD Programming: A Case Study (JLL), pp. 341–350.
CADECADE-1992-HeskethBS #reasoning #recursion #source code #synthesis
Using Middle-Out Reasoning to Control the Synthesis of Tail-Recursive Programs (JH, AB, AS), pp. 310–324.
CADECADE-1992-Uribe #constraints #set #unification
Sorted Unification Using Set Constraints (TEU), pp. 163–177.
CADECADE-1992-WalshNB #proving #theorem proving
The Use of Proof Plans to Sum Series (TW, AN, AB), pp. 325–339.
CAVCAV-1992-HamaguchiHY #branch #design #logic #verification
Design Verification of a Microprocessor Using Branching Time Regular Temporal Logic (KH, HH, SY), pp. 206–219.
CAVCAV-1992-McMillan #explosion #problem #verification
Using Unfoldings to Avoid the State Explosion Problem in the Verification of Asynchronous Circuits (KLM), pp. 164–177.
CAVCAV-1992-WrightL #algorithm #concurrent #proving #reasoning #theorem proving
Using a Theorem Prover for Reasoning about Concurrent Algorithms (JvW, TL), pp. 56–68.
ICLPJICSLP-1992-BigotDM #abstract interpretation #analysis #comprehension
Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
HTHT-1991-BassettiPS #effectiveness #hypermedia
Applications Navigator: Using Hypertext to Support Effective Scientific Information Exchange (OB, DP, MS), pp. 411–416.
HTHT-1991-CreechFG #component #hypermedia #reuse
Using Hypertext in Selecting Reusable Software Components (MLC, DFF, MLG), pp. 25–38.
HTHT-1991-NanardN #hypermedia
Using Structured Types to Incorporate Knowledge in Hypertext (JN, MN), pp. 329–343.
PODSPODS-1991-SohnG #detection #logic programming #source code #termination
Termination Detection in Logic Programs using Argument Sizes (KS, AVG), pp. 216–226.
SIGMODSIGMOD-1991-AgrawalK #execution #multi #transaction
Using Multiversion Data for Non-interfering Execution of Write-only Transactions (DA, VK), pp. 98–107.
VLDBVLDB-1991-Elmasri #modelling
Conecptual Modeling Using and Extended E-R Model (RE), p. 67.
VLDBVLDB-1991-SullivanS #data type #database #fault tolerance
Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
ICALPICALP-1991-ChazelleEGGHSS
Ray Shooting in Polygons Using Geodesic Triangulations (BC, HE, MG, LJG, JH, MS, JS), pp. 661–646.
ICALPICALP-1991-LagergrenA #congruence #finite
Finding Minimal Forbidden Minors Using a Finite Congruence (JL, SA), pp. 532–543.
RTARTA-1991-DenneheuvelKLS #optimisation #query
Query Optimization Using Rewrite Rules (SvD, KLK, GRRdL, ES), pp. 252–263.
FMVDME-1991-BicarreguiR #reasoning
Reasoning about VDM Developments using the VDM Support Tool in MURAL (JB, BR), pp. 371–388.
FMVDME-1991-Bril #algebra #specification
A Model-Oriented Method for Algebraic Specification using COLD-1 as Notation (RJB), pp. 106–124.
FMVDME-1991-ChalmersDGPZ
Using RAISE — First Impressions from the LaCoS Applications (DLC, BD, JG, JSP, EZ), pp. 645–657.
FMVDME-1991-HoustonK #case study #cics #experience
CICS Project Report: Experiences and Results from the use of Z in IBM (IH, SK), pp. 588–596.
FMVDME-1991-MarshallS #framework #object-oriented
Using VDM within an Object-Oriented Framework (LSM, LS), pp. 619–628.
FPCAFPCA-1991-Fradet #continuation #detection #thread
Syntactic Detection of Single-Threading Using Continuations (PF), pp. 241–258.
CHICHI-1991-Mackay91a #guidelines #question #video
Ethical issues in the use of video: is it time to establish guidelines? (WEM), pp. 403–405.
CHICHI-1991-ManteiBSBMW #case study #experience
Experiences in the use of a media space (MMM, RMB, AS, WB, TM, BW), pp. 203–208.
CHICHI-1991-MurakamiT #gesture #network #recognition
Gesture recognition using recurrent neural networks (KM, HT), pp. 237–242.
CHICHI-1991-RobertsonMC91a #3d #animation #interactive #visualisation
Information visualization using 3D interactive animation (GGR, JDM, SKC), pp. 461–462.
CHICHI-1991-SiochiH #analysis #case study #evaluation #user interface
A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
CHICHI-1991-Stasko #algorithm #animation
Using direct manipulation to build algorithm animations by demonstration (JTS), pp. 307–314.
CHICHI-1991-TetzlaffS #design #guidelines #interface
The use of guidelines in interface design (LT, DRS), pp. 329–333.
CAiSECAiSE-1991-HillstonOP #case study
A Case Study Using the IMSE Experimentation Tool (JH, ALO, RP), pp. 284–306.
CAiSECAiSE-1991-KrogstieMOS #development #information management #process #rule-based
Information Systems Development Using a Combination of Process and Rule Based Approaches (JK, PM, RO, AHS), pp. 319–335.
KDDKDD-1991-ChenM #estimation #summary
Summary Data Estimation Using Decision Trees (MCC, LM), pp. 309–324.
KDDKDD-1991-Frawley #induction #statistics
Using Functions to Encode Domain and Contextual Knowledge in Statistical Induction (WJF), pp. 261–276.
KDDKDD-1991-SmythG #induction
Rule Induction Using Information Theory (PS, RMG), pp. 159–176.
KRKR-1991-RodiP
A Nonmonotonic Assumption-Based TMS Using Stable Bases (WLR, SGP), pp. 485–495.
ICMLML-1991-BottaRSS #abduction #learning
Improving Learning Using Causality and Abduction (MB, SR, LS, SBS), pp. 480–484.
ICMLML-1991-HummeS
Using Inverse Resolution to Learn Relations from Experiments (DH, CS), pp. 412–416.
ICMLML-1991-Jones #refinement
Knowledge Refinement Using a High Level, Non-Technical Vocabulary (EKJ), pp. 18–22.
ICMLML-1991-Kwok #adaptation #architecture #learning #query
Query Learning Using an ANN with Adaptive Architecture (KLK), pp. 260–264.
ICMLML-1991-ThompsonLI #concept
Using Background Knowledge in Concept Formation (KT, PL, WI), pp. 554–558.
SIGIRSIGIR-1991-CroftTL #information retrieval #query
The Use of Phrases and Structured Queries in Information Retrieval (WBC, HRT, DDL), pp. 32–45.
SIGIRSIGIR-1991-Sutcliffe #distributed #information retrieval
Distributed Representations in a Text Based Information Retrieval System: A New Way of Using the Vector Space Model (RFES), pp. 123–132.
SIGIRSIGIR-1991-WilkinsonH #documentation #network
Using the Cosine Measure in a Neural Network for Document (RW, PH), pp. 202–210.
ECOOPECOOP-1991-MedeirosP
Object Integrity Using Rules (CBM, PP), pp. 219–230.
OOPSLAOOPSLA-1991-HansonHR #case study #database #experience #implementation #object-oriented #persistent #programming language #tool support
Experiences in DBMS Implementation Using an Object-Oriented Persistent Programming Language and a Database Toolkit (ENH, TMH, MAR), pp. 314–328.
OOPSLAOOPSLA-1991-Hayes
Using Key Object Opportunism to Collect Old Objects (BH), pp. 33–46.
OOPSLAOOPSLA-1991-KonstanR #object-oriented #programming
Developing a GUIDE Using Object-Oriented Programming (JAK, LAR), pp. 75–88.
TOOLSTOOLS-USA-1991-Goldberg #named #object-oriented #question
Keynote: Can a Manager Be Successful Using Object-Oriented Technology? (AG), p. 5.
TOOLSTOOLS-USA-1991-KitchelM
Using Descriptor Classes in O-O Systems (SWK, NLM), pp. 167–178.
AdaEuropeAdaEurope-1991-BadaroM #ada #named #reuse
ROSE-Ada: a Method and a Tool to Help Reuse of Ada Codes (NB, TM), pp. 304–325.
AdaEuropeAdaEurope-1991-ChengU #ada #petri net
Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets (JC, KU), pp. 125–146.
AdaEuropeAdaEurope-1991-CurtisS #ada #modelling
Modelling the Temporal Summation of Neural Membranes Using the Ada Language (MCC, VJDS), pp. 2–19.
AdaEuropeAdaEurope-1991-DelisT #ada #assessment #design #static analysis
Design Assessment of Ada Systems Using Static Analysis (AD, WMT), pp. 227–250.
AdaEuropeAdaEurope-1991-ElradW #3d #ada
The Use of Ada in Reactive Systems: A 3-Dimensional Model (TE, VW), pp. 20–36.
AdaEuropeAdaEurope-1991-GilbertTB #ada #embedded #experience #process #realtime
Experience Developing two Ada Applications for Embedded Real-Time Systems Using Different Software Processes (BG, MT, GB), pp. 394–403.
AdaEuropeAdaEurope-1991-SouposG #ada #distributed #object-oriented #transaction
Using Ada to Implement the Transaction Mechanism of a Distributed Object-Oriented DBMS (PS, SG), pp. 252–259.
LOPSTRLOPSTR-1991-AlexandreBQ #logic programming #on the #source code
On Using Mode Input-output for Transforming Logic Programs (FA, KB, AQ), pp. 129–146.
LOPSTRLOPSTR-1991-JiaoG #database #object-oriented #optimisation #prolog #query
Query Optimization in an Object-Oriented Database using Prolog (ZJ, PMDG), pp. 332–334.
LOPSTRLOPSTR-1991-SolnonR #design #object-oriented #prolog #prototype
Using a Prolog Prototype for Designing an Object Oriented Scheme (CS, MR), pp. 300–317.
PEPMPEPM-1991-KhooS #compilation #inheritance #partial evaluation
Compiling Inheritance using Partial Evaluation (SCK, RSS), pp. 211–222.
PEPMPEPM-1991-McNerney #abstract interpretation #compilation #correctness #verification
Verifying the Correctness of Compiler Transformations on Basic Blocks using Abstract Interpretation (TSM), pp. 106–115.
PEPMPEPM-1991-RufW
Using Types to Avoid Redundant Specialization (ER, DW), pp. 321–333.
PEPMPEPM-1991-ShermanSD #equation #optimisation #partial evaluation #source code
Optimization of Equational Programs Using Partial Evaluation (DS, RS, ID), pp. 72–82.
PEPMPEPM-1991-Sundaresh #incremental #partial evaluation #source code
Building Incremental Programs using Partial Evaluation (RSS), pp. 83–93.
PLDIPLDI-1991-Wall #behaviour #predict
Predicting Program Behavior Using Real or Estimated Profiles (DWW), pp. 59–70.
PPDPPLILP-1991-ErtlK #constraints #logic programming #scheduling
Optimal Instruction Scheduling using Constraint Logic Programming (MAE, AK), pp. 75–86.
POPLPOPL-1991-PinterP #optimisation #parallel
Program Optimization and Parallelization Using Idioms (SSP, RYP), pp. 79–92.
PLDIBest-of-PLDI-1991-Wall91a #behaviour #predict
Predicting program behavior using real or estimated profiles (with retrospective) (DWW), pp. 429–441.
ICSEICSE-1991-GorlickR #analysis
Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
ICSEICSE-1991-Hartman #composition #comprehension #source code
Understanding Natural Programs Using Proper Decomposition (JH), pp. 62–73.
ASEKBSE-1991-JohnsonH #requirements #reuse
Sharing and Reuse of Requirements Knowledge (WLJ, DRH), pp. 57–66.
ASEKBSE-1991-Setliff
Using Domain Knowledge to Synthesize Routing Software (DES), pp. 77–82.
DACDAC-1991-BergamaschiCP #analysis #synthesis
Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
DACDAC-1991-Burch #multi #verification
Using BDDs to Verify Multipliers (JRB), pp. 408–412.
DACDAC-1991-CardenC #algorithm #approximate #multi #performance
A Global Router Using An Efficient Approximate Multicommodity Multiterminal Flow Algorithm (RCCI, CKC), pp. 316–321.
DACDAC-1991-ChakrabortyBBL #testing
Enhanced Controllability for IDDQ Test Sets Using Partial Scan (TJC, SB, RB, CJL), pp. 278–281.
DACDAC-1991-Harrison #layout
VLSI Layout Compaction Using Radix Priority Search Trees (AJH), pp. 732–735.
DACDAC-1991-HolmesSS #algorithm
New Algorithm for Over-the-Cell Channel Routing Using Vacant Terminals (NDH, NAS, MS), pp. 126–131.
DACDAC-1991-PomeranzR #fault #on the
On Achieving a Complete Fault Coverage for Sequential Machines Using the Transition Fault Model (IP, SMR), pp. 341–346.
DACDAC-1991-ShihK #approach #equation #named #performance
ILLIADS: A New Fast MOS Timing Simulator Using Direct Equation-Solving Approach (YHS, SMK), pp. 20–25.
DACDAC-1991-SoeK #logic
Logic Minimization using Two-column Rectangle Replacement (SS, KK), pp. 470–473.
DACDAC-1991-Utesch #adaptation #approach #interactive
A New Approach to Hierarchical Adaptation Using Sequence-Control Based on Cell Interactions (MCU), pp. 723–726.
PPoPPPPoPP-1991-YangC #metalanguage #program transformation
Parallel-Program Transformation Using A Metalanguage (JAY, YiC), pp. 11–20.
SOSPSOSP-1991-DravesBRD #communication #concurrent #continuation #operating system #thread
Using Continuations to Implement Thread Management and Communication in Operating Systems (RD, BNB, RFR, RWD), pp. 122–136.
TAPSOFTCAAP-1991-Broek #algebra #category theory #graph grammar
Algebraic Graph Rewriting Using a Single Pushout (PMvdB), pp. 90–102.
TAPSOFTCCPSD-1991-Cardell-Oliver #higher-order #logic #modelling #protocol #realtime
Using Higher Order Logic for Modelling Real-Time Protocols (RCO), pp. 259–282.
TAPSOFTCCPSD-1991-CazinCJLM #reuse
Construction and Reuse of Formal Program Developments (JC, PC, RJ, ML, PM), pp. 120–136.
STOCSTOC-1991-Adleman #integer
Factoring Numbers Using Singular Integers (LMA), pp. 64–71.
STOCSTOC-1991-BarnesR #algorithm #polynomial #sublinear
Deterministic Algorithms for Undirected s-t Connectivity Using Polynomial Time and Sublinear Space (GB, WLR), pp. 43–53.
STOCSTOC-1991-KushilevitzM #fourier #learning
Learning Decision Trees Using the Fourier Sprectrum (EK, YM), pp. 455–464.
CAVCAV-1991-BarbeauB #approach #fault #petri net #verification
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
CAVCAV-1991-DillHW #simulation
Checking for Language Inclusion Using Simulation Preorders (DLD, AJH, HWT), pp. 255–265.
CAVCAV-1991-GodefroidW #concurrent #partial order #performance #safety #verification
Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties (PG, PW), pp. 332–342.
CAVCAV-1991-HamaguchiHY #branch #logic #model checking #verification
Formal Verification of Speed-Dependent Asynchronous Cicuits Using Symbolic Model Checking of branching Time Regular Temporal Logic (KH, HH, SY), pp. 410–420.
CAVCAV-1991-Mutz #behaviour #correctness #proving #term rewriting
Using the HOL Prove Assistant for proving the Correctness of term Rewriting Rules reducing Terms of Sequential Behavior (MM), pp. 277–287.
CAVCAV-1991-SegerJ #verification
A Two-Level Formal Verification Methodology using HOL and COSMOS (CJHS, JJJ), pp. 299–309.
ICLPICLP-1991-ColussiM #axiom #correctness #logic programming #proving #semantics #source code
Proving Correctness of Logic Programs Using Axiomatic Semantics (LC, EM), pp. 629–642.
ICLPICLP-1991-FujitaH #algorithm #generative #proving #theorem proving
A Model Generation Theorem Prover in KL1 Using a Ramified -Stack Algorithm (HF, RH), pp. 535–548.
ICLPICLP-1991-Marre #algebra #automation #logic programming #specification #testing #towards
Toward Automatic Test Data Set Selection Using Algebraic Specifications and Logic Programming (BM), pp. 202–219.
ICLPICLP-1991-Monin #compilation #prolog
Real-size Compiler Writing Using Prolog with Arrows (JFM), pp. 188–201.
ICLPICLP-1991-SatohI #abduction
Computing Abduction by Using the TMS (KS, NI), pp. 505–518.
ICLPICLP-1991-VerschaetseS #logic programming #proving #source code #termination
Deriving Termination Proofs for Logic Programs, Using Abstract Procedures (KV, DDS), pp. 301–315.
ICLPISLP-1991-FosterKT #composition #parallel #programming #source code
Using Compositional Programming to Write Portable, High-Performance Parallel Programs (ITF, CK, ST), pp. 737–738.
ICLPISLP-1991-Szeredi #prolog
Using Dynamic Predicates in an Or--Parallel Prolog System (PS), pp. 355–371.
ICTSSIWPTS-1991-CavalliK #consistency #generative #graph grammar #protocol #term rewriting #testing
Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
ISSTATAV-1991-DuesterwaldS #analysis #concurrent #data flow #framework
Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
ISSTATAV-1991-YehY #algebra #analysis #composition #process #reachability
Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
SIGMODSIGMOD-1990-BernsteinHM #implementation
Implementing Recoverable Requests Using Queues (PAB, MH, BM), pp. 112–122.
VLDBVLDB-1990-BhargavaB #adaptation
Adaptable Recovery Using Dynamic Quorum Assignments (BKB, SB), pp. 231–242.
VLDBVLDB-1990-KemperM #data access #query
Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
VLDBVLDB-1990-PucheralTV #data transformation #in memory #memory management #performance
Efficient Main Memory Data Management Using the DBGraph Storage Model (PP, JMT, PV), pp. 683–695.
FMVDME-1990-Hall #calculus #object-oriented #specification
Using Z as a Specification Calculus for Object-Oriented Systems (AH), pp. 290–318.
FMVDME-1990-Lange #approach #formal method #hypermedia #prototype #specification
A Formal Approach to Hypertext using Post-Prototype Formal Specification (DBL), pp. 99–121.
FMVDME-1990-Weber-Wulff #implementation
A Buffering System Implementation using VDM (DWW), pp. 135–149.
LISPLFP-1990-Burn #analysis
Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
CHICHI-1990-BohringerP #algorithm #automation #constraints #graph #layout
Using constraints to achieve stability in automatic graph layout algorithms (KFB, FNP), pp. 43–51.
CHICHI-1990-FischerLMM
Using critics to empower users (GF, ACL, TWM, AIM), pp. 337–347.
CHICHI-1990-GongE #approach #design #documentation #evaluation #usability
Designing minimal documentation using a GOMS model: a usability evaluation of an engineering approach (RG, JE), pp. 99–107.
CHICHI-1990-YoungW #analysis #concept #fault #predict
Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
CSCWCSCW-1990-YakemovicC #development #information management
Report on a Development Project Use of an Issue-Based Information System (KCBY, EJC), pp. 105–118.
CAiSECAiSE-1990-WijersD #automation #case study #experience
Experiences with the Use of CASE-Tools in the Netherlands (GMW, HED), pp. 5–20.
ICMLML-1990-ArunkumarY #information management #learning #representation
Knowledge Acquisition from Examples using Maximal Representation Learning (SA, SY), pp. 2–8.
ICMLML-1990-Kodratoff #abduction #problem #proving
Using Abductive Recovery of Failed Proofs for Problem Solving by Analogy (YK), pp. 295–303.
ICMLML-1990-LairdHYT
Correcting and Extending Domain Knowledge using Outside Guidance (JEL, MH, ESY, CMT), pp. 235–243.
ICMLML-1990-McCallumS #algorithm #search-based
Using Genetic Algorithms to Learn Disjunctive Rules from Examples (AM, KAS), pp. 149–152.
SEKESEKE-1990-RizmanR #agile #data flow #knowledge-based #prototype #specification
Using Data-flow Description Supported By The Rapid Prototyping Tool For Specifying and Developing of Knowledge-Based System (KR, IR), pp. 58–63.
SEKESEKE-1990-YangH #modelling
Modeling Software Objects Using Hypergraph (YY, FH), pp. 39–44.
SIGIRSIGIR-1990-CringeanEMW #parallel
Parallel Text Searching in Serial Files Using a Processor Farm (JKC, RE, GAM, PW), pp. 429–453.
SIGIRSIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval
Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
PPDPALP-1990-DebartEL #equation #logic programming #multi #order
Multi-Modal Logic Programming using Equational and Order-Sorted Logic (FD, PE, ML), pp. 55–69.
PLDIPLDI-1990-Wendt #code generation #performance
Fast Code Generation Using Automatically-Generated Decision Trees (ALW), pp. 9–15.
PPDPPLILP-1990-Ferdinand #functional #model transformation #pattern matching #transformation language
Pattern Matching in a Functional Transformation Language using Treeparsing (CF), pp. 358–371.
PPDPPLILP-1990-Sahlin #fixpoint #prolog
Finding the Least Fixed Point Using Wait-Declarations in Prolog (DS), pp. 151–158.
ICSEICSE-1990-Bush90b #quality
Improving Software Quality: The Use of Formal Inspections at the JPL (MWB), pp. 196–199.
ICSEICSE-1990-DeMarcoG #documentation #video
Use of Video for Program Documentation (TD, CG), pp. 126–128.
ICSEICSE-1990-Dowson #experience
Experience Using the Graphite Meta-Tool (MD), pp. 192–195.
ICSEICSE-1990-LafontaineLS #case study #development #empirical #formal method #proving #theorem proving
An Experiment in Formal Software Development: Using the B Theorem Prover on a VDM Case Study (CL, YL, PYS), pp. 34–42.
ICSEICSE-1990-ZucconiMW #development #object-oriented #prototype
Using Object-Oriented Development for Support Prototyping (LZ, GM, LGW), pp. 129–132.
WAGAWAGA-1990-DelestF #attribute grammar
Counting Polyominoes Using Attribute Grammars (MPD, JMF), pp. 46–60.
WAGAWAGA-1990-Rosendahl #abstract interpretation #attribute grammar
Abstract Interpretation Using Attribute Grammar (MR), pp. 143–156.
WAGAWAGA-1990-ShinodaK #algorithm #attribute grammar #distributed #implementation #object-oriented
Object-Oriented Extension of Attribute Grammars and its Implementation Using Distributed Attribute Evaluation Algorithm (YS, TK), pp. 177–191.
WAGAWAGA-1990-Waite #attribute grammar #compilation
Use of Attribute Grammars in Compiler Construction (WMW), pp. 255–265.
CCCC-1990-DesplandMR #generative #named #term rewriting
PAGODE: A Back End Generator Using Attribute Abstract Syntaxes and Term Rewritings (AD, MM, RR), pp. 86–105.
CCCC-1990-Larcheveque #compilation #incremental #lalr #parsing
Using an LALR Compiler Compiler to Generate Incremental Parsers (JML), pp. 147–164.
DACDAC-1990-BurchCMD #model checking #verification
Sequential Circuit Verification Using Symbolic Model Checking (JRB, EMC, KLM, DLD), pp. 46–51.
DACDAC-1990-ChakradharAB #automation #generative #polynomial #programming #testing
Automatic Test Generation Using Quadratic 0-1 Programming (STC, VDA, MLB), pp. 654–659.
DACDAC-1990-CompasanoB #algorithm #scheduling #synthesis
Synthesis Using Path-Based scheduling: algorithms and Exercises (RC, RAB), pp. 450–455.
DACDAC-1990-DonathNABHKLM
Timing Driven Placement Using Complete Path Delays (WED, RJN, BKA, SEB, SYH, JMK, PL, RIM), pp. 84–89.
DACDAC-1990-HungWGS #parallel #simulation
Parallel Circuit Simulation Using Hierarchical Relaxation (GGH, YCW, KG, RAS), pp. 394–399.
DACDAC-1990-IshiuraDY #diagrams #simulation
Coded Time-Symbolic Simulation Using Shared Binary Decision Diagram (NI, YD, SY), pp. 130–135.
DACDAC-1990-KucukcakarP #trade-off
Data Path Tradeoffs Using MABAL (KK, ACP), pp. 511–516.
DACDAC-1990-KundaARN #generative #testing
Speed Up of Test Generation Using High-Level Primitives (RPK, JAA, BDR, PN), pp. 594–599.
DACDAC-1990-MartelloLC #verification
Timing Verification Using HDTV (ARM, SPL, DMC), pp. 118–123.
DACDAC-1990-SavojB #multi #network
The Use of Observability and External Don’t Cares for the Simplification of Multi-Level Networks (HS, RKB), pp. 297–301.
STOCSTOC-1990-EvenR #distributed #network
The Use of a Synchronizer Yields Maximum Computation Rate in Distributed Networks (SE, SR), pp. 95–105.
CADECADE-1990-Hagiya #higher-order #programming #proving #unification
Programming by Example and Proving by Example Using Higher-order Unification (MH), pp. 588–602.
CAVCAV-1990-BryantS #modelling #verification
Formal Verification of Digital Circuits Using Symbolic Ternary System Models (REB, CJHS), pp. 33–43.
CAVCAV-1990-CamuratiGPR #model checking
The Use of Model Checking in ATPG for Sequential Circuits (PC, MG, PP, MSR), pp. 86–95.
CAVCAV-1990-Godefroid #automation #partial order #verification
Using Partial Orders to Improve Automatic Verification Methods (PG), pp. 176–185.
CAVCAV-1990-JanickiK #graph #reachability #simulation
Using Optimal Simulations to Reduce Reachability Graphs (RJ, MK), pp. 166–175.
CAVCAV-1990-LaiPD #on the #protocol #verification
On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
CAVCAV-1990-LloretAV #communication #composition #design #petri net #protocol #verification
Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
CAVCAV-1990-LoewensteinD #higher-order #logic #multi #protocol #simulation #verification
Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
CAVCAV-1990-NakamuraKFT #logic #verification
A Data Path Verifier for Register Transfer Level Using Temporal Logic Language Tokio (HN, YK, MF, HT), pp. 76–85.
CAVCAV-1990-ProbstL #explosion #partial order #problem #semantics
Using Partial-Order Semantics to Avoid the State Explosion Problem in Asynchronous Systems (DKP, HFL), pp. 146–155.
ICLPCLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict
A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
LICSLICS-1990-CleavelandS #proving #specification
When is “Partial” Adequate? A Logic-Based Proof Technique Using Partial Specifications (RC, BS), pp. 440–449.
LICSLICS-1990-LarsenX #equation
Equation Solving Using Modal Transition Systems (KGL, LX), pp. 108–117.
HTHT-1989-CrouchCA #clustering #hypermedia #information retrieval
The Use of Cluster Hierarchies in Hypertext Information Retrieval (DBC, CJC, GA), pp. 225–237.
HTHT-1989-YoderW #hypermedia
Using Hypertext in a Law Firm (EAY, TCW), pp. 159–167.
PODSPODS-1989-FaloutsosM #clustering #fault
Declustering Using Error Correcting Codes (CF, DNM), pp. 253–258.
VLDBVLDB-1989-Motro #constraints #query #relational
Using Integrity Constraints to Provide Intensional Answers to Relational Queries (AM), pp. 237–246.
CSEETSEI-1989-Tomayko #education #maintenance #scalability
Teaching Maintenance Using Large Software Artifacts (JET), pp. 3–15.
CSEETSEI-1989-WerthW #education #object-oriented #programming
Teaching Object-Oriented Programming Using the Macintosh MPW/MacApp Environment (LHW, JW), pp. 141–155.
FPCAFPCA-1989-Rittri #library
Using Types as Search Keys in Function Libraries (MR), pp. 174–183.
CHICHI-1989-BrownNG #empirical #visual notation
An experiment into the use of auditory cues to reduce visual workload (MLB, SLN, EPG), pp. 339–346.
CHICHI-1989-CohenDMPSGST #natural language
Synergistic use of direct manipulation and natural language (PRC, MD, DBM, FCNP, JWS, RAGJ, JLS, SWT), pp. 227–233.
CHICHI-1989-IwaiDYFT #architecture #automation #documentation #layout
A document layout system using automatic document architecture extraction (II, MD, KY, MF, YT), pp. 369–374.
CAiSECAiSE-1989-Ihme #design #embedded #knowledge-based #reuse #specification
A Knowledge-based Support System for the Reuse of Structured Specifications and Designs of Embedded Computer Systems (TI).
CAiSECAiSE-1989-LaenensSSV #case study #design #knowledge base #object-oriented
A Case Study in Object-Oriented Knowledge-Base Design Using the KIWI System (EL, JS, FS, DV).
CAiSECAiSE-1989-McDaniel #information management
Using PSL/PSA to Model Information System Planning for The United States Department of the Army Headquarters (PDM).
KRKR-1989-RossiM #constraints #linear #network
Exact Solution in Linear Time of Networks of Constraints Using Perfect Relaxation (FR, UM), pp. 394–399.
ICMLML-1989-AllenL #concept
Using Concept Hierarchies to Organize Plan Knowledge (JAA, PL), pp. 229–231.
ICMLML-1989-Buntine #classification #learning
Learning Classification Rules Using Bayes (WLB), pp. 94–98.
ICMLML-1989-CaruanaSE #algorithm #bias #induction #multi #search-based
Using Multiple Representations to Improve Inductive Bias: Gray and Binary Coding for Genetic Algorithms (RC, JDS, LJE), pp. 375–378.
ICMLML-1989-FriedrichN #algorithm #induction #learning
Using Domain Knowledge to Improve Inductive Learning Algorithms for Diagnosis (GF, WN), pp. 75–77.
ICMLML-1989-Mahadevan #problem
Using Determinations in EBL: A Solution to the incomplete Theory Problem (SM), pp. 320–325.
ICMLML-1989-Rose
Using Domain Knowledge to Aid Scientific Theory Revision (DR), pp. 272–277.
ICMLML-1989-Seifert #feature model #retrieval
A Retrieval Model Using Feature Selection (CMS), pp. 52–54.
ICMLML-1989-SobekL #learning
Using Learning to Recover Side-Effects of Operators in Robotics (RPS, JPL), pp. 205–208.
SEKESEKE-1989-Czejdo #database #query #recursion #specification
Recursive Query Specification Using Nested Databases (BDC), pp. 140–145.
SIGIRSIGIR-1989-Belew #adaptation #documentation #information retrieval #representation
Adaptive Information Retrieval: Using a Connectionist Representation to Retrieve and Learn About Documents (RKB), pp. 11–20.
SIGIRSIGIR-1989-CampagnoniE #information retrieval
Information Retrieval Using a Hypertext-Based Help System (FRC, KE), pp. 212–220.
SIGIRSIGIR-1989-KrovetzC #ambiguity #word
Word Sense Disambiguation Using Machine-Readable Dictionaries (RK, WBC), pp. 127–136.
SIGIRSIGIR-1989-RaghavanBJ #evaluation #precise #problem #retrieval
Retrieval System Evaluation Using Recall and Precision: Problems and Answers (VVR, PB, GSJ), pp. 59–68.
OOPSLAOOPSLA-1989-HarrisonSS #development #experience #object-oriented #paradigm
Good News, Bad News: Experience Building a Software Development Environment Using the Object-Oriented Paradigm (WHH, JJS, PFS), pp. 85–94.
OOPSLAOOPSLA-1989-Jerrell #automation #c++ #difference
Function Minimization and Automatic Differentiation Using C++ (MEJ), pp. 169–173.
OOPSLAOOPSLA-1989-MullerRKS #interface #multi
The Use of Multimethods and Method Combination in a CLOS Based Window System Interface (HM, JRR, JK, TS), pp. 239–253.
OOPSLAOOPSLA-1989-RussoC #design #memory management #multi #object-oriented #operating system
Virtual Memory and Backing Storage Management in Multiprocessor Operating Systems Using Object-Oriented Design Techniques (VFR, RHC), pp. 267–278.
PLDIPLDI-1989-ChiD #liveness
Unified Management of Registers and Cache Using Liveness and Cache Bypass (CHC, HGD), pp. 344–355.
ESECESEC-1989-FranceD #analysis #specification
Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
ESECESEC-1989-MorascaP #ada #concurrent #execution #source code #symbolic computation #validation
Validation of Concurrent ADA Programs using Symbolic Execution (SM, MP), pp. 469–486.
ESECESEC-1989-Shutt #development #program analysis #specification #tool support
A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
ESECESEC-1989-WirsingHS #named #reuse #specification
MENU — An Example for the Systematic Reuse of Specifications (MW, RH, RS), pp. 20–41.
ICSEICSE-1989-Jameson #design #reuse
A Model for the Reuse of Software Design Information (KWJ), pp. 205–216.
ASPLOSASPLOS-1989-Karger #performance
Using Registers to Optimize Cross-Domain Call Performance (PAK), pp. 194–204.
DACDAC-1989-AudeK #adaptation #design #representation
Representation and Use of Design Rules within a Technology Adaptable CAD System (JSA, HJK), pp. 478–484.
DACDAC-1989-ChengY #difference #fault #memory management #performance #simulation
Differential Fault Simulation — a Fast Method Using Minimal Memory (WTC, MLY), pp. 424–428.
DACDAC-1989-ChungC #parallel #simulation
Data Parallel Simulation Using Time-Warp on the Connection Machine (MJC, YC), pp. 98–103.
DACDAC-1989-DaveP #generative #testing
A Functional-Level Test Generation Methodology Using Two-level Representations (UJD, JHP), pp. 722–725.
DACDAC-1989-GoreR #array #automation #equation #logic #programmable #synthesis
Automatic Synthesis of Boolean Equations Using Programmable Array Logic (RG, KR), pp. 283–289.
DACDAC-1989-HedenstiernaJ #design #layout
The Use of Inverse Layout Trees for Hierarchical Design Rule Checking (NH, KOJ), pp. 508–512.
DACDAC-1989-HwangOI #communication #complexity #logic #multi #synthesis
Multi-Level Logic Synthesis Using Communication Complexity (TH, RMO, MJI), pp. 215–220.
DACDAC-1989-HwangWF #architecture #configuration management #evaluation
Evaluation of a Reconfigurable Architecture for Digital Beamforming Using the OODRA Workbench (DLH, TLW, WKF), pp. 614–617.
DACDAC-1989-LeeHK #fault #generative #testing
Test Generation of Stuck-open Faults Using Stuck-at Test Sets in CMOS Combinational Circuits (HKL, DSH, KK), pp. 345–350.
DACDAC-1989-LisG #modelling #synthesis
VHDL Synthesis Using Structured Modeling (JL, DG), pp. 606–609.
DACDAC-1989-Muller-GlaserB #approach #design #specification
An Approach to Intelligent Assistance for the Specification of ASIC Design Using Objects and Rules (KDMG, JB), pp. 472–477.
DACDAC-1989-RajsumanJM #detection #fault
CMOS Stuck-open Fault Detection Using Single Test Patterns (RR, APJ, YKM), pp. 714–717.
DACDAC-1989-RoyA #approach #novel #verification
A Novel Approach to Accurate Timing Verification Using RTL Descriptions (KR, JAA), pp. 638–641.
DACDAC-1989-SaldanhaWBS #logic #multi
Multi-level Logic Simplification Using Don’t Cares and Filters (AS, ARW, RKB, ALSV), pp. 277–282.
DACDAC-1989-SaucierDP
State Assignment Using a New Embedding Method Based on an Intersecting Cube Theory (GS, CD, FP), pp. 321–326.
DACDAC-1989-WinslettKHW #coordination #design
Use of Change Coordination in an Information-rich Design Environment (MW, DWK, KH, GW), pp. 252–257.
TAPSOFTAS-1989-VissersSSB #design #distributed #on the
On the Use of Specifiation Styles in the Design of Distributed Systems (Abstract) (CAV, GS, MvS, EB), p. 60.
TAPSOFTCCIPL-1989-ClementI #behaviour #specification #visual notation
Specifying the Behavior of Graphical Objects Using Esterel (DC, JI), pp. 111–125.
STOCSTOC-1989-HastadLN #performance
Fast Computation Using Faulty Hypercubes (JH, FTL, MN), pp. 251–263.
STOCSTOC-1989-RivestS #automaton #finite #sequence
Inference of Finite Automata Using Homing Sequences (RLR, RES), pp. 411–420.
CSLCSL-1989-PrieseN #metric #semantics
Semantic for Abstract Fairness using Metric Spaces (LP, DN), pp. 355–368.
ICLPNACLP-1989-InamuraIRN #evaluation #multi #optimisation
Optimizing Techniques Using the MRB and Their Evaluation on the Multi-PSI/V2 (YI, NI, KR, KN), pp. 907–921.
ICLPNACLP-1989-SataluriF #logic programming #semantics #source code #specification
Semantic Specification Using Logic Programs (SRS, ACF), pp. 772–791.
ISSTATAV-1989-KotikM #analysis #automation #program transformation #testing
Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
PODSPODS-1988-ParedaensG #algebra
Possibilities and Limitations of Using Flat Operators in Nested Algebra Expressions (JP, DVG), pp. 29–38.
SIGMODSIGMOD-1988-MazumdarSS #proving #security #theorem proving
Resolving the Tension between Integrity and Security Using a Theorem Prover (SM, DWS, TS), pp. 233–242.
VLDBVLDB-1988-NakayamaK
Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
CSEETSEI-1988-ChandhokG #ada
Ada Edu Project: Supporting the Use of Ada in Introductory Computer Science (RC, TAG), pp. 199–207.
FMVDME-1988-Boddy
The Use of VDM within the Alvey Flagship Project (GB), pp. 153–166.
FMVDME-1988-ButhB #code generation #correctness #proving #specification #term rewriting
Correctness Proofs for Meta IV Written Code Generator Specification using Term Rewriting (BB, KHB), pp. 406–433.
FMVDME-1988-Scullard #testing
Test Case Selection using VDM (GTS), pp. 178–186.
FMVDME-1988-TeoA #specification
The Use of VDM in the Specification of Chinese Characters (GST, MMaA), pp. 476–499.
FMVDME-1988-WoodcockD #case study #experience
Using VDM with Rely and Guarantee-Conditions — Experiences from a Real Project (JW, BD), pp. 434–458.
LISPLFP-1988-Norman #combinator #hardware #performance #reduction
Faster Combinator Reduction Using stock Hardware (ACN), pp. 235–243.
CSCWCSCW-1988-Bly #collaboration
A Use of Drawing Surfaces in Different Collaborative Settings (SAB), pp. 250–256.
CSCWCSCW-1988-LelandFK #collaboration #documentation
Collaborative Document Production Using Quilt (MDPL, RSF, REK), pp. 206–215.
CSCWCSCW-1988-Mackay #communication #email
More than just a Communication System: Diversity in the Use of Electronic Mail (WEM), pp. 344–353.
CSCWCSCW-1988-SingerBR #collaboration
Children’s Collaborative Use of a Computer Microworld (JS, SDB, JR), pp. 271–281.
ICMLML-1988-Gross #concept #incremental #learning #multi
Incremental Multiple Concept Learning Using Experiments (KPG), pp. 65–72.
ICMLML-1988-JongS #game studies #learning
Using Experience-Based Learning in Game Playing (KADJ, ACS), pp. 284–290.
ICMLML-1988-Kerber
Using a Generalization Hierarchy to Learn from Examples (RK), pp. 1–7.
ICMLML-1988-Mel #modelling
Building and Using Mental Models in a Sensory-Motor Domain (BWM), pp. 207–213.
ICMLML-1988-TanE #classification #network
Using Weighted Networks to Represent Classification Knowledge in Noisy Domains (MT, LJE), pp. 121–134.
SIGIRSIGIR-1988-BonziL #documentation #information retrieval
The Use of Anaphoric Resolution for Document Description in Information Retrieval (SB, EDL), pp. 53–66.
SIGIRSIGIR-1988-Case #comprehension #how #retrieval #scalability
How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
SIGIRSIGIR-1988-FurnasDDLHSL #composition #information retrieval #semantics
Information Retrieval using a Singular Value Decomposition Model of Latent Semantic Structure (GWF, SCD, STD, TKL, RAH, LAS, KEL), pp. 465–480.
SIGIRSIGIR-1988-HirabayashiMK #documentation #information retrieval
Information Retrieval using Impression of Documents as a Clue (FH, HM, YK), pp. 233–244.
SIGIRSIGIR-1988-SaltonB #automation #information retrieval #on the
On the Use of Spreading Activation Methods in Automatic Information Retrieval (GS, CB), pp. 147–160.
ECOOPECOOP-1988-DoiKH #concurrent #implementation #kernel #object-oriented #operating system
An Implementation of an Operating System Kernel Using Concurrent Object-Oriented Language ABCL/c+ (ND, YK, KH), pp. 250–266.
ECOOPECOOP-1988-Pasquier-BoltuckGC #approach #interactive #object-oriented #prototype
Prototyping an Interactive Electronic Book System Using an Object-Oriented Approach (JPB, EG, GC), pp. 177–190.
OOPSLAOOPSLA-1988-DuhlD #benchmark #comparison #database #metric #performance #relational
A Performance Comparison of Object and Relational Databases Using the Sun Benchmark (JD, CD), pp. 153–163.
OOPSLAOOPSLA-1988-KleynG #comprehension #named #object-oriented
GraphTrace — Understanding Object-Oriented Systems Using Concurrently Animated Views (MFK, PCG), pp. 191–205.
OOPSLAOOPSLA-1988-MatsuokaK #communication #distributed #object-oriented #tuple
Using Tuple Space Communication in Distributed Object-Oriented Languages (SM, SK), pp. 276–284.
OOPSLAOOPSLA-1988-Rumbaugh
Controlling Propagation of Operations Using Attributes on Relations (JER), pp. 285–296.
PLDIPLDI-1988-HorwitzRB #dependence #graph #interprocedural #slicing
Interprocedural Slicing Using Dependence Graphs (SH, TWR, DB), pp. 35–46.
PPDPPLILP-1988-AsirelliI #database #development #logic
Using Logic Databases in Software Development Environments (PA, PI), pp. 292–299.
PPDPPLILP-1988-Dang #definite clause grammar #interactive #specification
Formal Specification of Interactive Languages Using Definite Clause Grammars (WD), pp. 283–291.
PPDPPLILP-1988-RiedewaldL #attribute grammar #logic programming
Using an Attribute Grammar as a Logic Program (GR, UL), pp. 161–179.
PLDIBest-of-PLDI-1988-HorwitzRB88a #dependence #graph #interprocedural #slicing
Interprocedural slicing using dependence graphs (with retrospective) (SH, TWR, DB), pp. 229–243.
ICSEICSE-1988-ChaLS #analysis #fault #safety #verification
Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
ICSEICSE-1988-EvangelistSFG #design #distributed
Using Raddle To Design Distributed Systems (ME, VYS, IRF, MG), pp. 102–115.
ICSEICSE-1988-NakagawaFTS #algebra #specification
Algebraic Specification of Macintosh’s Quickdraw Using OBJ2 (ATN, KF, ST, TS), pp. 334–343.
ICSEICSE-1988-Sharp #automation #design #evaluation #named #refinement
KDA — A Tool for Automatic Design Evaluation and Refinement Using the Blackboard Model of Control (HCS), pp. 407–417.
ICSEICSE-1988-TarumiAO #object-oriented #programming #reuse
A Programming Environment Supporting Reuse of Object-Oriented Software (HT, KA, YO), pp. 265–273.
DACDAC-1988-AugustinGHLS #design #verification
Verification of VHDL Designs Using VAL (LMA, BAG, YH, DCL, AGS), pp. 48–53.
DACDAC-1988-BeattyB #analysis #incremental #performance
Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
DACDAC-1988-GaedeRMB #automation #concurrent #named #parallel #testing
CATAPULT: Concurrent Automatic Testing Allowing Parallelization and Using Limited Topology (RKG, DER, MRM, KMB), pp. 597–600.
DACDAC-1988-KimTH #automation #hardware
Automatic Insertion of BIST Hardware Using VHDL (KK, JGT, DSH), pp. 9–15.
DACDAC-1988-MadreB #behaviour #comparison #correctness #proving
Proving Circuit Correctness Using Formal Comparison Between Expected and Extracted Behaviour (JCM, JPB), pp. 205–210.
DACDAC-1988-MaoC #algorithm #generative #metric #named #self #testing
Dytest: A Self-Learning Algorithm Using Dynamic Testability Measures to Accelerate Test Generation (WM, MDC), pp. 591–596.
DACDAC-1988-SaitohINKMHHK #logic #simulation
Logic Simulation System Using Simulation Processor (SP) (MS, KI, AN, MK, JM, HH, FH, NK), pp. 225–230.
DACDAC-1988-Sechen #metaprogramming
Chip-Planning, Placement, and Global Routing of Macro/Custom Cell Integrated Circuits Using Simulated Annealing (CS), pp. 73–80.
DACDAC-1988-StarkH #network #power management
Analyzing CMOS Power Supply Networks Using Ariel (DS, MH), pp. 460–464.
PPoPPPPEALS-1988-Katseff #assembly #clustering #parallel
Using Data Partitioning to Implement a Parallel Assembler (HPK), pp. 66–76.
STOCSTOC-1988-AdlemanK #parallel
Using Smoothness to Achieve Parallelism (LMA, KK), pp. 528–538.
STOCSTOC-1988-Ben-OrC #algebra #constant
Computing Algebraic Formulas Using a Constant Number of Registers (MBO, RC), pp. 254–257.
CADECADE-1988-Bundy #induction #proving
The Use of Explicit Plans to Guide Inductive Proofs (AB), pp. 111–120.
CADECADE-1988-DonatW #higher-order #learning
Learning and Applying Generalised Solutions using Higher Order Resolution (MRD, LAW), pp. 41–60.
CADECADE-1988-ZhangK #first-order #proving #theorem proving
First-Order Theorem Proving Using Conditional Rewrite Rules (HZ, DK), pp. 1–20.
CSLCSL-1988-SaakeL #database #logic #specification
Using Finite-Linear Temporal Logic for Specifying Database Dynamics (GS, UWL), pp. 288–300.
ICLPJICSCP-1988-McCroskyK88 #array #prolog
Improving First-Class Array Expressions Using Prolog (CM, AJK), pp. 18–25.
ICLPJICSCP-1988-Port88 #approach
A Simple Approach to Finding the Cause of Non-Unifiability (GSP), pp. 651–665.
HTHT-1987-Marshall #hypermedia #problem #representation
Exploring Representation Problems Using Hypertext (CCM), pp. 253–268.
VLDBVLDB-1987-SiebesK #axiom #database #design #semantics
Using Design Axioms and Topology to Model Database Semantics (AS, MLK), pp. 51–59.
ICALPICALP-1987-LarsenM #bisimulation #protocol #verification
Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
FMVDME-1987-ChedgeyKK #ada #development #object-oriented
Using VDM in an Object-Oriented Development Method for Ada Software (CC, SK, HJK), pp. 63–76.
FMVDME-1987-Crispin #experience
Experience Using VDM in STC (RJC), pp. 19–32.
FMVDME-1987-HaffO
Use of VDM within CCITT (PH, AO), pp. 324–330.
FMVDME-1987-Jones87b #data flow #semantics
A Formal Semantics for a DataFlow Machine — Using VDM (KDJ), pp. 331–355.
FMVDME-1987-MinkowitzH #object-oriented #programming
A Formal Description of Object-Oriented Programming Using VDM (CM, PBH), pp. 237–259.
HCIHCI-CE-1987-Moser #comprehension #debugging #design #visual notation
Understanding Complex Software Systems Using GADD: A Tool for Graphical Animated Design and Debugging (MCM), pp. 449–456.
HCIHCI-CE-1987-Ruggles #design
Enhancing a Traditional Typeface Design Environment Through the Use of Contemporary Computing Technology (LR), pp. 481–488.
HCIHCI-SES-1987-Bradley #industrial
Changing Roles in an Electronic Industry: Engineers Using CAD System and Secretaries Using work-Processing System (GB), pp. 295–302.
SIGIRSIGIR-1987-Borgman #difference #information retrieval
Individual Differences in the Use of Information Retrieval Systems: Some Issues and Some Data (CLB), pp. 61–71.
SIGIRSIGIR-1987-OommenM #automaton #clustering #learning #performance #probability
Fast Object Partitioning Using Stochastic Learning Automata (BJO, DCYM), pp. 111–122.
SIGIRSIGIR-1987-RasmussenW #array #clustering #distributed #documentation
Non-Hierarchic Document Clustering Using the ICL Distributed Array Processor (EMR, PW), pp. 132–139.
SIGIRSIGIR-1987-TongAAC #concept #information retrieval
Conceptual Information Retrieval Using RUBRIC (RMT, LAA, VNA, JFC), pp. 247–253.
ECOOPECOOP-1987-HalbertO #inheritance #object-oriented
Using Types and Inheritance in Object-Oriented Languages (DCH, PDO), pp. 20–31.
OOPSLAOOPSLA-1987-BarryATW #design
Using Objects To Design and Build Radar ESM Systems (BMB, JRA, DAT, MW), pp. 192–201.
OOPSLAOOPSLA-1987-KerrP #analysis #object-oriented #programming
Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
ESECESEC-1987-GarzottoGMM #logic programming #on the #realtime #specification
On the Specification of Real-Time Systems Using Logic Programming (FG, CG, DM, AM), pp. 180–190.
ESECESEC-1987-Szwillus #data flow #editing #interactive #operating system #specification #user interface
Using Data Flow Specifications and Interactive Editing in the Operating System User Interface (GS), pp. 149–157.
ICSEICSE-1987-Bjorner #development #formal method #on the
On the Use of Formal Methods in Software Development (DB), pp. 17–29.
ICSEICSE-1987-LubarsH #design #knowledge-based
Knowledge-Based Software Design Using Design Schemas (MDL, MTH), pp. 253–262.
ICSEICSE-1987-MiyazakiM #metric
Software Metrics Using Deviation Value (YM, NM), pp. 83–95.
ICSEICSE-1987-Nomura #re-engineering #tool support
Use of Software Engineering Tools in Japan (TN), pp. 263–269.
ASPLOSASPLOS-1987-WallP #experience
The Mahler Experience: Using and Intermediate Language as the Machine Description (DWW, MLP), pp. 100–104.
DACDAC-1987-ChangCH #approach #automation #generative #layout #matrix
Automated Layout Generation Using Gate Matrix Approach (YCC, SCC, LHH), pp. 552–558.
DACDAC-1987-Grover #standard
Standard Cell Placement Using Simulated Sintering (LKG), pp. 56–59.
DACDAC-1987-KlingB #evolution #named #standard
ESP: A New Standard Cell Placement Package Using Simulated Evolution (RMK, PB), pp. 60–66.
DACDAC-1987-YuKL #adaptation #optimisation #testing
VLSI Circuit Testing Using an Adaptive Optimization Model (PSY, CMK, YHL), pp. 399–406.
SOSPSOSP-1987-Hagmann #commit #file system
Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
SOSPSOSP-1987-Nichols
Using Idle Workstations in a Shared Computing Environment (DAN), pp. 5–12.
STOCSTOC-1987-Vazirani #performance
Efficiency Considerations in Using Semi-random Sources (UVV), pp. 160–168.
CSLCSL-1987-HeiselRS #logic #verification
Program Verification Using Dynamic Logic (MH, WR, WS), pp. 102–117.
LICSLICS-1987-GallierRS #equation #proving #theorem proving
Theorem Proving Using Rigid E-Unification Equational Matings (JHG, SR, WS), pp. 338–346.
PODSPODS-1986-Robinson #linear #order #statistics
Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
SIGMODSIGMOD-1986-Faloutsos #multi
Multiattribute Hashing Using Gray Codes (CF), pp. 227–238.
SIGMODSIGMOD-1986-HarandiSC
Rule Base Management Using Meta Knowledge (MTH, TS, SC), pp. 261–267.
VLDBVLDB-1986-ChakravarthyM #database #deduction #graph #multi #query
Multiple Query Processing in Deductive Databases using Query Graphs (USC, JM), pp. 384–391.
VLDBVLDB-1986-CheineyFMT #clustering #multi #reliability
A Reliable Backend Using Multiattribute Clustering and Select-Join Operator (JPC, PF, RM, JMT), pp. 220–227.
VLDBVLDB-1986-SarinKS #database #process
Using History Information to Process Delayed Database Updates (SKS, CWK, JES), pp. 71–78.
LISPLFP-1986-LeeP #implementation #lisp #on the #semantics
On the Use of LISP in Implementing Denotational Semantics (PL, UFP), pp. 233–248.
ICGTGG-1986-MoldovanP #analysis #graph grammar #parallel #rule-based
Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
CSCWCSCW-1986-JohnsonWODM #collaboration #empirical
Using a computer-based tool to support collaboration: a field experiment (BJ, GW, MHO, RD, GM), pp. 343–352.
SIGIRSIGIR-1986-BelkinK #documentation #retrieval
Using Structural Representations of Anomalous States of Knowledge for Choosing Document Retrieval Strategies (NJB, BHK), pp. 11–22.
SIGIRSIGIR-1986-El-HamdouchiW #clustering #documentation
Hierarchic Document Clustering Using Ward’s Method (AEH, PW), pp. 149–156.
SIGIRSIGIR-1986-TeuholaR #predict
Text Compression Using Prediction (JT, TR), pp. 97–102.
SIGIRSIGIR-1986-Zarri #database #relational #retrieval #scalability
The Use of Inference Mechanisms to Improve the Retrieval Facilities from Large Relational Databases (GPZ), pp. 221–227.
OOPSLAOOPSLA-1986-Lieberman #behaviour #object-oriented #prototype
Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems (HL), pp. 214–223.
POPLPOPL-1986-JonesM #analysis #data flow #graph #source code
Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
POPLPOPL-1986-MacQueen #composition #dependent type
Using Dependent Types to Express Modular Structure (DBM), pp. 277–286.
DACDAC-1986-BapatV #logic #reasoning
Reasoning about digital systems using temporal logic (SB, GV), pp. 215–219.
DACDAC-1986-BushnellD #integration #tool support
VLSI CAD tool integration using the Ulysses environment (MLB, SWD), pp. 55–61.
DACDAC-1986-Gonzalez-SustaetaB #automation #concept #database #design
An automated database design tool using the ELKA conceptual model (JGS, APB), pp. 752–759.
DACDAC-1986-LadjadjMHM #array #testing
Use of the subscripted DALG in submodule testing with applications in cellular arrays (ML, JFM, DHH, WM), pp. 346–353.
DACDAC-1986-LigthartAB #statistics
Design-for-testability of PLA’s using statistical cooling (MML, EHLA, FPMB), pp. 339–345.
DACDAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis
Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
DACDAC-1986-PincusD #reduction
Delay reduction using simulated annealing (JDP, AMD), pp. 690–695.
DACDAC-1986-Sasao #generative #multi #named #synthesis
MACDAS: multi-level AND-OR circuit synthesis using two-variable function generators (TS), pp. 86–93.
CADECADE-1986-DickC #automation #empirical #equation #reasoning
Using Narrowing to do Isolation in Symbolic Equation Solving — An Experiment in Automated Reasoning (AJJD, JC), pp. 272–280.
CADECADE-1986-Hussmann #algebra #prototype #specification
The Passau RAP System: Prototyping Algebraic Specifications Using Conditional Narrowing (HH), pp. 689–690.
CADECADE-1986-KapurNZ #induction #proving #testing
Proof by Induction Using Test Sets (DK, PN, HZ), pp. 99–117.
CADECADE-1986-Plaisted86a #abstraction
Abstraction Using Generalization Functions (DAP), pp. 365–376.
ICLPICLP-1986-GoebelFP86 #approach #constraints #reasoning
Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning (RG, KF, DP), pp. 211–222.
ICLPICLP-1986-KanamoriS86 #execution #prolog #source code #verification
Verification of Prolog Programs Using an Extension of Execution (TK, HS), pp. 475–489.
ICLPICLP-1986-RawlingsTNFS86 #prolog
Using Prolog to Represent and Reason about Protein Structure (CJR, WRT, JN, JF, MJES), pp. 536–543.
LICSLICS-1986-Browne #algorithm #automation #finite #logic #verification
An Improved Algorithm for the Automatic Verification of Finite State Systems Using Temporal Logic (MCB), pp. 260–266.
LICSLICS-1986-Plaisted #nondeterminism #recursion #semantics #source code
The Denotional Semantics of Nondeterministic Recursive Programs using Coherent Relations (DAP), pp. 163–174.
ICLPSLP-1986-Gelder86 #logic programming #source code
Negation as Failure Using Tight Derivations for General Logic Programs (AVG), pp. 127–138.
SIGMODSIGMOD-1985-Christodoulakis #architecture #documentation
Issues in the Architecture of a Document Archiver using Optical Disk Technology (SC), pp. 34–50.
SIGMODSIGMOD-1985-EickL #database #design
Acquisition of Terminological Knowledge Using Database Design Techniques (CFE, PCL), pp. 84–94.
SIGMODSIGMOD-1985-RoussopoulosL #database
Direct Spatial Search on Pictorial Databases Using Packed R-Trees (NR, DL), pp. 17–31.
SIGMODSIGMOD-1985-ShinI #approach #clustering #database #knowledge-based #relational
Partitioning a Relational Database Horizontally Using a Knowledge-Based Approach (DGS, KBI), pp. 95–105.
VLDBVLDB-1985-MondR #concurrent #database
Concurrency Control in B+-Trees Databases Using Preparatory Operations (YM, YR), pp. 331–334.
ICALPICALP-1985-SippuS #algorithm #design #on the #performance #relational
On the Use of Relational Expressions in the Design of Efficient Algorithms (SS, ESS), pp. 456–464.
ICALPICALP-1985-VarmanR #array #matrix #multi #on the
On Matrix Multiplication Using Array Processors (PJV, IVR), pp. 487–496.
FPCAFPCA-1985-Sheeran85 #architecture #array #design #higher-order
Designing Regular Array Architectures using Higher Order Functions (MS), pp. 220–237.
ICSEICSE-1985-BasiliS #metric #set
Calculation and Use of an Environment’s Characteristic Software Metric Set (VRB, RWS), pp. 386–393.
ICSEICSE-1985-BrunoM #agile #petri net #prototype
Rapid Prototyping of Control Systems Using High Level Petri Nets (GB, GM), pp. 230–237.
ICSEICSE-1985-GirgisW #analysis #data flow #testing
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
ICSEICSE-1985-KafuraC #metric #validation
A Validation of Software Metrics Using Many Metrics and Two Resources (DGK, JC), pp. 378–385.
ICSEICSE-1985-PeschSSS #generative #prolog #testing
Test Case Generation Using Prolog (HP, PS, HS, APS), pp. 252–258.
ICSEICSE-1985-RamseyB #process #testing
Analyzing the Test Process Using Structural Coverage (JR, VRB), pp. 306–312.
ICSEICSE-1985-Schaul #design #education #overview #re-engineering
Design Using Software Engineering Principles: Overview of an Educational Program (MS), pp. 201–209.
DACDAC-1985-AshokCS #data flow #modelling #simulation
Modeling switch-level simulation using data flow (VA, RLC, PS), pp. 637–644.
DACDAC-1985-Blanks #polynomial
Near-optimal placement using a quadratic objective function (JPB), pp. 609–615.
DACDAC-1985-Bryant #representation #visual notation
Symbolic manipulation of Boolean functions using a graphical representation (REB), pp. 688–694.
DACDAC-1985-Frank #data-driven #simulation
Switch-level simulation of VLSI using a special-purpose data-driven computer (EHF), pp. 735–738.
DACDAC-1985-HillFL #effectiveness #generative #grid
Effective use of virtual grid compaction in macro-module generators (DDH, JPF, MDPL), pp. 777–780.
DACDAC-1985-TygarE #comparison #performance
Efficient netlist comparison using hierarchy and randomization (JDT, RE), pp. 702–708.
SOSPSOSP-1985-Clark
The Structuring of Systems Using Upcalls (DDC), pp. 171–180.
TAPSOFTCSE-1985-LevesonS #fault tolerance #petri net #safety
Analyzing Safety and Fault Tolerance Using Time Petri Nets (NGL, JLS), pp. 339–355.
TAPSOFTCSE-1985-MadhavjiLV
Software Construction Using Typed Fragments (NHM, NL, DV), pp. 163–178.
PODSPODS-1984-BuckleyS #concurrent #graph #protocol
Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
PODSPODS-1984-HwangDG #multi #process #query
Using Semiouterjoins to Process Queries in Multidatabase Systems (HYH, UD, MGG), pp. 153–162.
SIGMODSIGMOD-1984-Chang #database #design #distributed #network
Simplifying Distributed Database Systems Design by Using a Broadcast Network (JMC), pp. 223–233.
SIGMODSIGMOD-1984-Fedorowicz #database #evaluation #multi
Database Evaluation Using Multiple Regression Techniques (JF), pp. 70–76.
SIGMODSIGMOD-1984-Salton #information retrieval #logic
The Use of Extended Boolean Logic in Information Retrieval (GS), pp. 277–285.
SIGMODSIGMOD-1984-ValduriezV #multi
A Multikey Hashing Scheme Using Predicate Trees (PV, YV), pp. 107–114.
SIGMODSIGMOD-1984-Willard #calculus #performance #query #relational
Efficient Processing of Relational Calculus Expressions Using Range Query Theory (DEW), pp. 164–175.
VLDBVLDB-1984-Ward
Name-Tracing Using the ICL Content Addressable Filestore (AGW), pp. 523–528.
SIGIRSIGIR-1984-CroftT #adaptation #documentation #retrieval
The Use of Adaptive Mechanisms for Selection of Search Strategies in Document Retrieval Systems (WBC, RT), pp. 95–110.
PLDISCC-1984-ChristopherHK #code generation #programming
Using dynamic programming to generate optimized code in a Graham-Glanville style code generator (TWC, PJH, RCK), pp. 25–36.
PLDISCC-1984-Pleban #compilation #prototype #semantics
Compiler prototyping using formal semantics (UFP), pp. 94–105.
ICSEICSE-1984-AzemaJSM #distributed #petri net #prolog #specification #verification
Specification and Verification of Distributed Systems Using PROLOG Interpreded Petri Nets (PA, GJ, ES, MM), pp. 510–519.
ICSEICSE-1984-DuncanHBCFKMMS #ada #communication #design
Communication System Design Using Ada (AGD, JSH, JWB, TMC, AF, EK, TM, DM, SBS), pp. 398–407.
ICSEICSE-1984-RomanD #distributed #multi #process #specification
Multifaceted Distributed Systems Specification Using Processes and Event Synchronization (GCR, MSD), pp. 44–55.
DACDAC-1984-Blanks #array
Initial placement of gate arrays using least-squares methods (JPB), pp. 670–671.
DACDAC-1984-DunlopADJKW #layout #optimisation
Chip layout optimization using critical path weighting (AED, VDA, DND, MFJ, PK, MW), pp. 133–136.
DACDAC-1984-HorstmannS #design #logic programming
Computer aided design (CAD) using logic programming (PWH, EPS), pp. 144–151.
DACDAC-1984-SaucierB #control flow
VLSI test expertise system using a control flow model (GS, CB), pp. 497–503.
CADECADE-1984-PelinG #algebra #complexity #problem #word
Solving Word Problems in Free Algebras Using Complexity Functions (AP, JHG), pp. 476–495.
CADECADE-1984-Plaisted #analysis #dependence #graph #proving #theorem proving
Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
ICLPILPC-1984-Johansson84 #logic programming #source code #symmetry
Using Symmetry for the Derivation of Logic Programs (ALJ), pp. 243–251.
ICLPSLP-1984-Borgwardt84 #parallel #prolog #stack
Parallel Prolog Using Stack Segements on Shared-Memory Multiprocessors (PB), pp. 2–11.
ICLPSLP-1984-TaylorLMS84 #logic programming #parallel
Logic Programming Using Parallel Associative Operations (ST, AL, GQMJ, SJS), pp. 58–68.
ICALPICALP-1983-AptD #axiom #logic
An Axiomatization of the Intermittent Assertion Method Using Temporal Logic (KRA, CD), pp. 15–27.
ICALPICALP-1983-MycroftN #abstract interpretation
Strong Abstract Interpretation Using Power Domains (AM, FN), pp. 536–547.
SIGIRSIGIR-1983-BatesB #information retrieval #interface #natural language
Information Retrieval Using a Transportable Natural Language Interface (MB, RJB), pp. 81–86.
SIGIRSIGIR-1983-BrooksB #analysis #design #information retrieval #interactive
Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
SIGIRSIGIR-1983-RaghavanSY #evaluation
Evaluation of The 2-Poisson Model as a Basis for Using Term Frequency Data in Searching (VVR, HPS, CTY), pp. 88–100.
SIGIRSIGIR-1983-Zarri #information management #information retrieval #representation
Reseda, An Information Retrieval System Using Artificial Intelligence and Knowledge Representation Techniques (GPZ), pp. 189–195.
AdaAda-1983-Persch #compilation
The Use of Diana in Compilers, Language Transformers, Formatters and Debuggers (GP), pp. 76–87.
POPLPOPL-1983-ClarkeES #approach #automation #concurrent #finite #logic #specification #verification
Automatic Verification of Finite State Concurrent Systems Using Temporal Logic Specifications: A Practical Approach (EMC, EAE, APS), pp. 117–126.
POPLPOPL-1983-LampsonS #polymorphism
Practical Use of a Polymorphic Applicative Language (BWL, EES), pp. 237–255.
RERE-1983-Partsch #algebra #on the #requirements
On the Use of Algebraic Methods for Formal Requirements Definitions (HP), pp. 138–158.
RERE-1983-Reisig #design #petri net
System Design Using Petri Nets (WR), pp. 29–41.
DACDAC-1983-BarzilaiHSTW #logic #simulation
Simulating pass transistor circuits using logic simulation machines (ZB, LMH, GMS, DTT, LSW), pp. 157–163.
DACDAC-1983-FukunagaYSK #approach #graph
Placement of circuit modules using a graph space approach (KF, SY, HSS, TK), pp. 465–471.
DACDAC-1983-JainA #generative #testing
Test generation for MOS circuits using D-algorithm (SKJ, VDA), pp. 64–70.
DACDAC-1983-PrazicB #array #automation
Automatic routing of double layer gate arrays using a moving cursor (BDP, MAB), pp. 644–650.
DACDAC-1983-RothermelM #design
Routing method for VLSI design using irregular cells (HJR, DAM), pp. 257–262.
PODSPODS-1982-Maier #database #memory management
Using Write-once Memory for Database Storage (DM), pp. 239–246.
SIGMODSIGMOD-1982-KambayashiYY #database #distributed #query
Query Processing for Distributed Databases Using Generalized Semi-Joins (YK, MY, SY), pp. 151–160.
VLDBVLDB-1982-SaccoS #database #relational #set
A Mechanism for Managing the Buffer Pool in a Relational Database System Using the Hot Set Model (GMS, MS), pp. 257–262.
VLDBVLDB-1982-WhangWS #database #design #network #physics
Physical Design of Network Model Databases Using the Property of Separability (KYW, GW, DS), pp. 98–107.
LISPLFP-1982-Moss #how #prolog
How to Define a Language Using PROLOG (CDSM), pp. 67–73.
ICGTGG-1982-Pratt #semantics #specification
Formal specification of software using H-graph semantics (TWP), pp. 314–332.
SIGIRSIGIR-1982-TagueN #database #retrieval #simulation
Simulation of Bibliographic Retrieval Databases Using Hyperterms (JT, MJN), pp. 194–208.
POPLPOPL-1982-GanapathiF #attribute grammar #code generation
Description-Driven Code Generation using Attribute Grammars (MG, CNF), pp. 108–119.
POPLPOPL-1982-Wolper #communication #logic #process #specification #synthesis
Specification and Synthesis of Communicating Processes using an Extended Temporal Logic (PW), pp. 20–33.
PLDISCC-1982-KoskimiesRS #attribute grammar #compilation
Compiler Construction Using Attribute Grammars (KK, KJR, MS), pp. 153–159.
ICSEICSE-1982-Ling #design #diagrams #source code
Designing Data Entry Programs Using State Diagram as a Common Model (MML), pp. 296–308.
ASPLOSASPLOS-1982-McDaniel #analysis #set
An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
DACDAC-1982-GrayBR #array #compilation #design
Designing gate arrays using a silicon compiler (JPG, IB, PSR), pp. 377–383.
DACDAC-1982-ShivaC #composition #simulation #synthesis
Modular description/simulation/synthesis using DDL (SGS, JAC), pp. 321–329.
DACDAC-1982-Shliferstein #interactive
Experiments using interactive color raster graphics for CAD (ARS), pp. 445–452.
CADECADE-1982-Weyhrauch
An Example of FOL Using Metatheory (RWW), pp. 151–158.
SIGMODSIGMOD-1981-KedemS #concurrent #database
Deadlock Removal Using Partial Rollback in Database Systems (DSF, ZMK, AS), pp. 65–73.
SIGMODSIGMOD-1981-Sagiv #question
Can We Use the Universal Instance Assumption Without Using Nulls? (YS), pp. 108–120.
SIGMODSIGMOD-1981-StearnsR #concurrent #database #distributed
Distributed Database Concurrency Controls Using Before-Values (RES, DJR), pp. 74–83.
VLDBVLDB-1981-Sevcik #database #performance #predict
Data Base System Performance Prediction Using an Analytical Model (KCS), pp. 182–198.
SIGIRSIGIR-1981-SmeatonR #algorithm #bound #information retrieval #nearest neighbour #problem
The Nearest Neighbour Problem in Information Retrieval: An Algorithm Using Upperbounds (AFS, CJvR), pp. 83–87.
ICSEICSE-1981-ChenZ #analysis #clustering #re-engineering
Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
ICSEICSE-1981-DuncanH #attribute grammar #design #implementation
Using Attributed Grammars to Test Designs and Implementations (AGD, JSH), pp. 170–178.
ICSEICSE-1981-KomodaHKS #analysis #approach #modelling #requirements
An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
DACDAC-1981-Akers #algorithm #linear #on the
On the use of the linear assignment algorithm in module placement (SBA), pp. 137–144.
DACDAC-1981-AlmyR #fault
Using error latch trace to obtain diagnostic information (PMA, JLR), pp. 355–359.
DACDAC-1981-Scoble #interactive
Creating and updating space occupancy and building plans using interactive graphics (RAS), pp. 66–73.
SIGMODSIGMOD-1980-LuskOP #database #design #implementation
A Practical Design Methodology for the Implementation of IMS Databases, Using the Entity-Relationship Model (ELL, RAO, BDP), pp. 9–21.
VLDBVLDB-1980-BernsteinBC #maintenance #performance #semantics
Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data (PAB, BTB, EMC), pp. 126–136.
ICALPICALP-1980-EmersonC #correctness #fixpoint #parallel #source code
Characterizing Correctness Properties of Parallel Programs Using Fixpoints (EAE, EMC), pp. 169–181.
ICALPICALP-1980-Turchin #optimisation #proving #theorem proving
The Use of Metasystem Transition in Theorem Proving and Program Optimization (VFT), pp. 645–657.
SIGIRSIGIR-1980-LeaS #runtime
An Associative File Store Using Fragments for Run-Time Indexing and Compression (RML, EJS), pp. 280–295.
POPLPOPL-1980-BuddDLS #correctness #functional #source code
Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs (TAB, RAD, RJL, FGS), pp. 220–233.
DACDAC-1980-DyerLMS #design #simulation
The use of graphics processors for circuit design simulation at GTE AE Labs (JD, AL, EJM, WDS), pp. 446–450.
DACDAC-1980-Mallmann
The management of engineering changes using the PRIMUS system (FPM), pp. 348–361.
DACDAC-1980-TadaYKS #performance #strict
A fast maze router with iterative use of variable search space restriction (FT, KY, TK, TS), pp. 250–254.
CCSDCG-1980-Reynolds #category theory #design
Using category theory to design implicit conversions and generic operators (JCR), pp. 211–258.
STOCSTOC-1980-Yao #performance #programming
Efficient Dynamic Programming Using Quadrangle Inequalities (FFY), pp. 429–435.
CADECADE-1980-AielloW #algebra #reasoning
Using Meta-Theoretic Reasoning to do Algebra (LCA, RWW), pp. 1–13.
CADECADE-1980-BundyW #algebra #multi
Using Meta-Level Inference for Selective Application of Multiple Rewrite Rules in Algebraic Manipulation (AB, BW), pp. 24–38.
CADECADE-1980-Furtek #constraints #distributed #formal method #realtime #specification #verification
Specification and Verification of Real-Time, Distributed Systems Using the Theory of Constraints (FCF), pp. 110–125.
SIGMODSIGMOD-1979-El-MasriW #integration
Data Model Integration Using the Structural Model (RE, GW), pp. 191–202.
SIGIRSIGIR-1979-Dattola #documentation #retrieval
Use of Dynamic Discrimination Values in a Document Retrieval System (RTD), pp. 23–32.
SIGIRSIGIR-1979-Jamieson #implementation #retrieval #scalability
The Economic Implementation of Experimental Retrieval Techniques on a Very Large Scale Using an Intelligent Terminal (SHJ), pp. 45–51.
POPLPOPL-1979-HoffmanO #generative #interpreter #pattern matching
Interpreter Generation Using Tree Pattern Matching (CMH, MJO), pp. 169–179.
PLDISCC-1979-Feldman #compilation #fortran #implementation #tool support
Implementation of a portable Fortran 77 compiler using modern tools (SIF), pp. 98–106.
PLDISCC-1979-Pleban #compilation #matrix #recursion
The use of transition matrices in a recursive-descent compiler (UFP), pp. 144–151.
ICSEICSE-1979-AnconaDD #development
Cross Software Development for Microprocessors Using a Translator Writing System (MA, GD, ELD), pp. 399–402.
ICSEICSE-1979-BauerF #generative #testing
Test Plan Generation Using Formal Grammars (JAB, ABF), pp. 425–432.
ICSEICSE-1979-BerryP #design #specification
The Use of a Module Interconnection Specification Capability in the SARA System Design Methodology (DMB, MH(P), pp. 294–307.
DACDAC-1979-Ayres79a
Silicon compilation-a hierarchical use of PLAs (RA), pp. 314–326.
DACDAC-1979-CarlsonPC #3d #data transformation #design
The use of color and 3-D temporal and spatial data management techniques in computer-aided design (WEC, REP, CC), pp. 32–38.
DACDAC-1979-Chang #layout #recognition
LSI layout checking using bipolar device recognition technique (CSC), pp. 95–101.
DACDAC-1979-KawatoSMU #design #scalability #verification
Design and verification of large-scale computers by using DDL (NK, TS, FM, TU), pp. 360–366.
DACDAC-1979-KjelkerudT #deduction #fault #generative #logic #simulation #testing
Generation of hazard free tests using the D-algorithm in a timing accurate system for logic and deductive fault simulation (EK, OT), pp. 180–184.
DACDAC-1979-OhnoMS #logic #scalability #verification
Logic verification system for very large computers using LSI’s (YO, MM, KS), pp. 367–374.
DACDAC-1979-WeingartenKC #3d #interactive #named
DRAW3D: Time sharing graphic interaction using a device-space buffer (NHW, WK, MC), pp. 135–141.
VLDBVLDB-1978-AdibaCE #database #distributed #logic #relational
A Distributed Data Base System Using Logical Relational Machines (MEA, JYC, CE), pp. 450–461.
ICALPICALP-1978-CremersH
Mutual Exclusion of N Processors Using an O(N)-Valued Message Variable (ABC, TNH), pp. 165–176.
ICGTGG-1978-Pratt #graph #programming language #semantics
Definition of Programming Language Semantics Using Grammars for Hierarchical Graphs (TWP), pp. 389–400.
ICSEICSE-1978-Brooks #behaviour #comprehension #re-engineering
Using a Behavioral Theory of Program Comprehension in Software Engineering (REB), pp. 196–201.
ICSEICSE-1978-ChungG #diagrams
Use of State Diagrams to Engineer Communications Software (PC, BG), pp. 215–221.
ICSEICSE-1978-Lindstrom #parsing #top-down
Control Structure Aptness: A Cast Study Using Top-Down Parsing (GL), pp. 5–12.
DACDAC-1978-Fortin #approximate #diagrams #named
BUBBLE: Relationship diagrams using iterative vector approximation (GF), pp. 145–151.
DACDAC-1978-Huey #graph #problem #reduction
Guiding sensitization searches using problem reduction graphs (BH), pp. 312–320.
DACDAC-1978-LekkosP #how #logic #pseudo #refinement
How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
DACDAC-1978-Raeger #design #interactive
The design of a dense PCB using an interactive DA system (DR), p. 454.
STOCSTOC-1978-Tompa #trade-off
Time-Space Tradeoffs for Computing Functions, Using Connectivity Properties of their Circuits (MT), pp. 196–204.
VLDBVLDB-1977-FieldsN
Using New Clues to Find Data (CF, NN), pp. 156–158.
POPLPOPL-1977-Soisalon-Soininen #lr #parsing #reduction
Elimination of Single Productions from LR Parsers in Conjunction with the Use of Default Reductions (ESS), pp. 183–193.
DACDAC-1977-Brown #component #design
Using a computer aided graphics system to help design and draft automotive components (NLB), pp. 112–117.
DACDAC-1977-JaffeY #automation #diagrams
Automating analog circuit diagrams using a list processing language (RCJ, JPY), pp. 391–395.
DACDAC-1977-MorrisMG #network #scalability #simulation
Simulation of large communications networks using SPIN (ILM, JM, RG), pp. 194–204.
DACDAC-1977-Waldvogel #hybrid #multi
Computer designed multilayer hybrid substrate using thick film technology (CWW), pp. 351–353.
SIGMODSIGMOD-1976-WelchG #multi #order #retrieval
Retrieval Using Ordered Lists in Inverted and Multilist Files (JWW, JWG), pp. 21–29.
ICSEICSE-1976-Mashey #programming language
Using a Command Language as a High-Level Programming Language (JRM), pp. 169–176.
ICSEICSE-1976-Stonebraker #comparison #database #relational
A Comparison of the Use of Links and Secondary Indices in a Relational Data Base System (MS), pp. 527–531.
DACDAC-1976-Lerman #design
Computer aided design of printed circuit boards using remote graphics and TSO (HNL), pp. 104–108.
DACDAC-1976-Marks #design #documentation #online
Use of an on-line, time-shared graphics system to design and document printed circuit boards (LM), pp. 91–103.
DACDAC-1976-Zobniw #multi #realtime
Multi-defect real time diagnosis using a single pin probe (LMZ), pp. 179–185.
SIGMODSIGMOD-1975-WelchG #information retrieval #set
Information Retrieval in Files Described Using Sets (JWW, JWG), pp. 92–98.
VLDBVLDB-1975-Carlson #database #interactive #problem #scalability
Using Large Data Bases for Interactive Problem Solving (EDC), pp. 499–501.
VLDBVLDB-1975-HofferS #analysis #clustering #database #design #physics
The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
VLDBVLDB-1975-RoussopoulosM #database #network #semantics
Using Semantic Networks for Database Management (NR, JM), pp. 144–172.
VLDBVLDB-1975-YaoM
Selection of File Organization Using an Analytic Model (SBY, AGM), pp. 255–267.
DACDAC-1975-BlainLR #industrial
The system bal: a technique for spreading the use of CAD techniques within an industrial environment (GB, AL, JCR), pp. 77–84.
DACDAC-1975-SchulerUBB #concurrent #generative #logic #random testing #simulation #testing
Random test generation using concurrent logic simulation (DMS, EGU, TEB, SPB), pp. 261–267.
DACDAC-1975-Sherman #testing
Program function test definition using a three-value simulator (WJS), pp. 189–194.
DACDAC-1975-Zobniw #realtime
Real time diagnosis using single pin probe (LMZ), pp. 268–285.
SIGMODSIGFIDET-1974-RamirezRP #automation #generative #source code
Automatic Generation of Data Conversion Programs Using A Data Description Language (JAR, NAR, NSP), pp. 207–225.
ICALPICALP-1974-EhrenfeuchtR #morphism #term rewriting #trade-off
Trade-off between the Use of Nonterminals, Codings and Homomorphisms in Defining Languages for Some Classes of Rewriting Systems (AE, GR), pp. 473–480.
ICALPICALP-1974-FischerP #algorithm #matrix #performance
Efficient Procedures for Using Matrix Algorithms (PCF, RLP), pp. 413–427.
DACDAC-1974-Sr #performance #simulation
Using simulation to evaluate system performance (EKBS), pp. 359–365.
DACDAC-1974-ThompsonSBP #analysis #fault #simulation
Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
SIGMODSIGFIDET-1972-Smith
A Method for Data Translation Using the Stored Data Definition and Translation Task Group Languages (DCPS), pp. 107–124.
SIGMODSIGFIDET-1972-Stonebraker #performance #retrieval
Retrieval Efficiency Using Combined Indexes (MS), pp. 243–256.
DACDAC-1972-Grant #architecture #design #problem #proximity
Combining proximity criteria with nature-of-the-spot criteria in architectural and urban design space planning problems using a computer-aided space allocation technique: A proposed technique and an example of its application (DPG), pp. 197–202.
SOSPSOSP-J-1973-CoffmanR72 #case study #clustering #locality
A Study of Storage Partitioning Using a Mathematical Model of Locality (EGCJ, TAR), pp. 185–190.
DACDAC-1971-Grason #approach #graph
An approach to computerized space planning using graph theory (JG), pp. 170–178.
SOSPSOSP-1971-CoffmanR #case study #clustering
A Study of Storage Partitioning Using a Mathematical Model (EGCJ, TAR), pp. 122–129.
SIGMODSIGFIDET-1970-Beitz
The Interpretation of Structured Stored Data Using Delimiters (EHB), pp. 188–200.
DACDAC-1970-Urban #design #effectiveness
Effective use of a computer aided design system (SJU), pp. 243–249.
STOCSTOC-1970-Chang #2d #analysis
The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
DACDAC-1968-CorreiaD #documentation #logic
The use of engineering documentation in support of a high density logic test system (MC, RLD).
DACDAC-1968-Marin #algorithm #logic #on the #strict #synthesis
On a general synthesis algorithm of logical circuits using a restricted inventory of integrated circuits (MAM).
DACSHARE-1966-Feigin #design #optimisation
Use of design optimization techniques at Norden (LF).
DACSHARE-1964-Branin #analysis #network
D-C and transient analysis of networks using a digital computer (FHBJ).
LISPLISP-1963-McIntosh #lisp
The use of operator predicates in LISP (HVM), p. 9.
LISPLISP-1963-Thomas #array #lisp #source code
Use of arrays in LISP. Group theory programs (BST), p. 11.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.